0% found this document useful (0 votes)
66 views101 pages

PowerPoint Slides To Chapter 06

Uploaded by

Ashish Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views101 pages

PowerPoint Slides To Chapter 06

Uploaded by

Ashish Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 101

Chapter 6

Wireless
Networks
and
Mobile IP
.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.1
Chapter6: Outline

6.1 WIRLESS LANS

6.2 OTHER WIRELESS NETWORKS

6.3 MOBILE IP

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.2
Chapter 6: Objective

 We introduce wired LANs, using IEEE project 802.11, the


dominant standard. Next, we cover the Bluetooth LANs that are
used as stand-alone LANs with many applications. We also
discuss WiMAX technology, which is the counterpart of last-
mile wired networks such as DSL or cable.

 We then discuss other wireless networks that can be categorized


as wireless WANs or wireless broadband networks. For this
purpose, we first discuss the channelization access method that
is used in cellular telephones.

 We finally talk about mobile IP, which provides mobile access to


the Internet. Our discussion include addressing, a big issue in
mobile networking, and three phases of mobile access.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.3
6-1 WIRELESS LANS

Wireless communication is one of the fastest-


growing technologies. The demand for
connecting devices without the use of cables is
increasing everywhere. Wireless LANs can be
found on college campuses, in office
buildings, and in many public areas.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.4
6.1.1 Introduction

Before we discuss a specific protocol related to


wireless LANs, let us talk about them in general.

 Architectural Comparison
 Medium
 Hosts
 Isolated LANs
 Connection to Other Networks
 Moving between Environments

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.5
6.1.1 (continued)

 Characteristics
 Attenuation
 Interference
 Multipath Propagation
 Error
 Access Control

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.6
Figure 6.1: Isolated LANs: wired versus wireless

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.7
Figure 6.2: Connection of a wired LAN and a wireless LAN to other
networks

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.8
Figure 6.3: Hidden station problem

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.9
6.1.2 IEEE 802.11 Project

IEEE has defined the specifications for a wireless


LAN, called IEEE 802.11, which covers the physical
and data-link layers. In some countries, including
the United States, the public uses the term WiFi
(short for wireless fidelity) as a synonym for wireless
LAN. WiFi, however, is a wireless LAN that is
certified by the WiFi Alliance, a global, nonprofit
industry association of more than 300 member
companies devoted to promoting the growth of
wireless LANs.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.10
6.1.2 (continued)

 Architecture
 Basic Service Set
 Extended Service Set
 Station Types

 MAC Sublayer
 Distributed Coordination Function (DCF)
 Point Coordination Function (PCF)
 Fragmentation
 Frame Format
 Frame Types
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.11
6.1.2 (continued)

 Addressing Mechanism
 Exposed Station Problem
 Physical Layer
 IEEE 802.11 FHSS
 IEEE 802.11 DSSS
 IEEE 802.11 Infrared
 IEEE 802.11a OFDM
 IEEE 802.11b DSSS
 IEEE 802.11g
 IEEE 802.11n
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.12
Figure 6.4: Basic service sets (BSSs)

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.13
Figure 6.5: Extended service set (ESS)

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.14
Figure 6.6: MAC layers in IEEE 802.11 standard

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.15
Figure 6.7: Flow diagram of CSMA/CA

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.16
Figure 6.8: Contention window

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.17
Figure 6.9: CSMA/CA and NAV

NAV

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.18
Figure 6.10: Example of repetition interval

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.19
Figure 6.11: Frame format

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.20
Table 6.1: Subfields in FC field

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.21
Figure 6.12: Control frames

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.22
Table 6.2: Values of subfields in control frames

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.23
Table 6.3: Addresses

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.24
Figure 6.13: Addressing mechanisms

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.25
Figure 6.14: Exposed station problem

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.26
Table 6.4: Specifications

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.27
Figure 6.15: Physical layer of IEEE 802.11 FHSS

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.28
Figure 6.16: Physical layer of IEEE 802.11 DSSS

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.29
Figure 6.17: Physical layer of IEEE 802.11 infrared

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.30
Figure 6.18: Physical layer of IEEE 802.11b

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.31
6.1.3 Bluetooth

Bluetooth is a wireless LAN technology designed to


connect devices of different functions such as
telephones, notebooks, computers (desktop and
laptop), cameras, printers, and even coffee makers
when they are at a short distance from each other. A
Bluetooth LAN is an ad hoc network, which means
that the network is formed spontaneously; the
devices, sometimes called gadgets, find each other
and make a network called a piconet.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.32
6.1.3 (continued)

 Architecture
 Piconets
 Scatternet
 Bluetooth Devices

 Bluetooth Layers
 L2CAP
 Baseband Layer
 Radio Layer

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.33
Figure 6.19: Piconet

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.34
Figure 6.20: Scatternet

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.35
Figure 6.21: Bluetooth layers

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.36
Figure 6.22: L2CAP data packet format

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.37
Figure 6.23: Single-secondary communication

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.38
Figure 6.24: Multiple-secondary communication

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.39
Figure 6.25: Frame format types

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.40
6.1.4 WiMax

Worldwide Interoperability for Microwave Access


(WiMAX) is an IEEE standard 802.16 (for fixed
wireless) and 802.16e (for mobile wireless) that aims
to provide the “last mile” broadband wireless access
alternative to cable modem, telephone DSL service..

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.41
6.1.4 (continued)

 Architecture
 Base Station
 Subscriber Stations
 Portable Unit

 Data-Link Layer

 Physical Layer

 Application

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.42
6-2 OTHER WIRELESS NETWORKS

In this section, we concentrate on other wireless


networks. We first discuss cellular
telephony, which is ubiquitous. We then talk about
satellite networks. Before we discuss
the above-mentioned wireless networks, let us
discuss one access method that we postponed from
Chapter 5: channelization, which is used in
cellular and other wireless networks.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.43
6.2.1 Channelization

Channelization (or channel partition, as it is


sometime called) is a multiple-access method in
which the available bandwidth of a link is
shared in time, frequency, or through code,
between different stations. In this section, we
discuss three channelization protocols: FDMA,
TDMA, and CDMA.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.44
6.2.1 (continued)

 Frequency-Division Multiple Access (FDMA)


 Time-Division Multiple Access (TDMA)
 Code-Division Multiple Access (CDMA))
 Analogy
 Idea
 Chips
 Data Representation
 Encoding and Decoding
 Signal Level
 Sequence Generation
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.45
Figure 6.26: Frequency-division multiple access (FDMA)

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.46
Figure 6.27: Time-division multiple access (TDMA)

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.47
Figure 6.28: Simple idea of communication with code

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.48
Figure 6.29: Chip sequences

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.49
Figure 6.30: Data representation in CDMA

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.50
Figure 6.31: Sharing channel in CDMA

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.51
Figure 6.32: Digital signal created by four stations in CDMA

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.52
Figure 6.33: Decoding of the composite signal for one in CDMA

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.53
Figure 6.34: General rules and examples of creating Walsh tables

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.54
Example 6.1
Find the chips for a network with
a. Two stations
b. Four stations

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.55
Example 6.2
What is the number of sequences if we have 90 stations in
our network?

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.56
Example 6.3
Prove that a receiving station can get the data sent by a
specific sender if it multiplies the entire data on the channel
by the sender’s chip code and then divides it by the number
of stations.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.57
6.2.2 Cellular Telephony

Cellular telephony is designed to provide


communications between two moving units, called
mobile stations (MSs), or between one mobile unit
and one stationary unit, often called a land unit.
A service provider must be able to locate and
track a caller, assign a channel to the call, and
transfer the channel from base station to base
station as the caller moves out of range.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.58
6.2.2 (continued)

 Frequency-Reuse Principle
 Transmitting
 Receiving
 Handoff
 Roaming
 First Generation (1G)
 AMPS

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.59
6.2.2 (continued)

 Second Generation (2G)


 D-AMPS
 GSM
 IS-95
 Third Generation (3G)
 IMT-2000 Radio Interface
 Fourth Generation (4G)
 Access Scheme
 Modulation
 Radio System
 Antenna
 Applications
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.60
Figure 6.35: Cellular system

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.61
Figure 6.36: Frequency reuse patterns

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.62
Figure 6.37: Cellular bands for AMPS

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.63
Figure 6.38: AMPS reverse communication band

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.64
Figure 6.39: D-AMPS

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.65
Figure 6.40: GSM bands

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.66
Figure 6.41: GSM

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.67
Figure 6.42: Multiframe components

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.68
Figure 6.43: IS-95 forward transmission

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.69
Figure 6.44: S-95 reverse transmission

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.70
Figure 6.45: IMT-2000 radio interfaces

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.71
6.2.3 Satellite Networks

A satellite network is a combination of nodes,


some of which are satellites, that provides
communication from one point on the Earth to
another. A node in the network can be a satellite,
an Earth station, or an end-user terminal or
telephone.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.72
6.2.3 (continued)

 Orbits
 Footprint
 Three Categories of Satellites
 Frequency Bands for Satellite Communication

 GEO Satellites
 MEO Satellites
 Global Positioning System (GPS)
 LEO Satellites
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.73
Figure 6.46: Satellite orbits

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.74
Example 6.4
What is the period of the moon, according to Kepler’s law?

Here C is a constant approximately equal to 1/100. The


period is in seconds and the distance in kilometers.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.75
Example 6.5
According to Kepler’s law, what is the period of a satellite
that is located at an orbit approximately 35,786 km above
the Earth?

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.76
Figure 6.47: Satellite orbit altitudes

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.77
Table 6.5: Satellite frequency bands

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.78
Figure 6.48: Satellites in geostationary orbit

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.79
Figure 6.49: Orbits for global positioning system (GPS) satellites

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.80
Figure 6.50: Trilateration on a plane

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.81
Figure 6.51: LEO satellite system

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.82
6-3 MOBILE IP

As mobile and personal computers such as


notebooks become increasingly popular, we
need to think about mobile IP, the extension of
IP protocol that allows mobile computers to be
connected to the Internet at any location where
the connection is possible. In this section, we
discuss this issue.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.83
6.3.1 Addressing

The main problem that must be solved in


providing mobile communication using the IP
protocol is addressing.

 Stationary Hosts
 Mobile Hosts
 Changing the Address
 Two Addresses

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.84
Figure 6.52: Home address and care-of address

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.85
6.3.2 Agents

To make the change of address transparent to the


rest of the Internet requires a home agent and a
foreign agent. Figure 6.53 shows the position of a
home agent relative to the home network and a
foreign agent relative to the foreign network.

 Home Agent

 Foreign Agent

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.86
Figure 6.53: Home agent and foreign agent

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.87
6.3.3 Three Phases

To communicate with a remote host, a mobile


host goes through three phases: agent discovery,
registration, and data transfer, as shown in
Figure 6.54.

 Agent Discovery
 Agent Advertisement
 Agent Solicitation

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.88
6.3.3 (continued)

 Registration
 Request and Reply
 Encapsulation

 Data Transfer
 From Remote Host to Home Agent
 From Home Agent to Foreign Agent
 From Foreign Agent to Mobile Host
 From Mobile Host to Remote Host
 Transparency

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.89
Figure 6.54: Remote host and mobile host communication

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.90
Figure 6.55: Agent advertisement

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.91
Table 6.6: Code Bits

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.92
Figure 6.56: Registration request format

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.93
Table 6.7: Registration request flag field bits

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.94
Figure 6.57: Registration reply format

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.95
Figure 6.58: Data transfer

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.96
6.3.4 Inefficiency in Mobile IP

Communication involving mobile IP can be


inefficient. The inefficiency can be severe or
moderate. The severe case is called double
crossing or 2X. The moderate case is called
triangle routing or dog-leg routing.
 Double Crossing
 Triangle Routing
 Solution

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.97
Figure 6.59: Double crossing

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.98
Figure 6.60: Triangle routing

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.99
Chapter 6: Summary

 Wireless LANs became formalized with the IEEE 802.11


standard, which defines two services: basic service set (BSS) and
extended service set (ESS). The access method used in the
distributed coordination function (DCF) MAC sublayer is
CSMA/CA. The access method used in the point coordination
function (PCF) MAC sublayer is polling.

 Bluetooth is a wireless LAN technology that connects devices


(called gadgets) in a small area. A Bluetooth network is called a
piconet.

 WiMAX is a wireless access network that may replace DSL and


cable in the future.

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6.100
Chapter 6: Summary (continued)

 Cellular telephony provides communication between two


devices. One or both may be mobile. A cellular service area is
divided into cells. Cellular telephony has gone through four
generations.

 A satellite network uses satellites to provide communication


between any points on Earth. We have discussed several
systems: including GEO, MEO, and LEO.

 Mobile IP is an enhanced version of the Internetworking


Protocol (IP). A mobile host has a home address on its home
network and a care-of address on its foreign network. When the
mobile host is on a foreign network, a home agent relays
messages (for the mobile host) to a foreign agent. A foreign
6.101
agent sends relayed messages
Copyright © The to a mobile
McGraw-Hill Companies, Inc. Permissionhost.
required for reproduction or display.

You might also like