Professional Documents
Culture Documents
The medium access control (MAC) is a sublayer of the data link layer of the open
system interconnections (OSI) reference model for data transmission. It is responsible
for flow control and multiplexing for transmission medium. It controls the transmission of
data packets via remotely shared channels. It sends data over the network interface
card.
MAC Addresses
MAC address or media access control address is a unique identifier allotted to a
network interface controller (NIC) of a device. It is used as a network address for data
transmission within a network segment like Ethernet, Wi-Fi, and Bluetooth.
MAC address is assigned to a network adapter at the time of manufacturing. It is
hardwired or hard-coded in the network interface card (NIC). A MAC address comprises
of six groups of two hexadecimal digits, separated by hyphens, colons, or no
separators. An example of a MAC address is 00:0A:89:5B:F0:11.
Algorithms
The algorithm of CSMA/CD is:
When a frame is ready, the transmitting station checks whether the channel is idle or busy.
If the channel is busy, the station waits until the channel becomes idle.
If the channel is idle, the station starts transmitting and continually monitors the channel to
detect collision.
If a collision is detected, the station starts the collision resolution algorithm.
The station resets the retransmission counters and completes frame transmission.
Though this algorithm detects collisions, it does not reduce the number of collisions.
It is not appropriate for large networks performance degrades exponentially when more
stations are added.
Token Ring
Token ring (IEEE 802.5) is a communication protocol in a local area network (LAN)
where all stations are connected in a ring topology and pass one or more tokens for
channel acquisition. A token is a special frame of 3 bytes that circulates along the ring
of stations. A station can send data frames only if it holds a token. The tokens are
released on successful receipt of the data frame.
Token Passing Mechanism in Token Ring
If a station has a frame to transmit when it receives a token, it sends the frame and then
passes the token to the next station; otherwise it simply passes the token to the next
station. Passing the token means receiving the token from the preceding station and
transmitting to the successor station. The data flow is unidirectional in the direction of
the token passing. In order that tokens are not circulated infinitely, they are removed
from the network once their purpose is completed. This is shown in the following
diagram −
Token Bus
Token Bus (IEEE 802.4) is a standard for implementing token ring over virtual ring in
LANs. The physical media has a bus or a tree topology and uses coaxial cables. A
virtual ring is created with the nodes/stations and the token is passed from one node to
the next in a sequence along this virtual ring. Each node knows the address of its
preceding station and its succeeding station. A station can only transmit data when it
has the token. The working principle of token bus is similar to Token Ring.
Token Passing Mechanism in Token Bus
A token is a small message that circulates among the stations of a computer network
providing permission to the stations for transmission. If a station has data to transmit
when it receives a token, it sends the data and then passes the token to the next
station; otherwise, it simply passes the token to the next station. This is depicted in the
following diagram −
Differences between Token Ring and Token Bus
Token Ring Token Bus
The token is passed over the physical ring formed The token is passed along the virtual ring of
by the stations and the coaxial cable network. stations connected to a LAN.
The stations are connected by ring topology, or The underlying topology that connects the stations
sometimes star topology. is either bus or tree topology.
The maximum time for a token to reach a station It is not feasible to calculate the time for token
can be calculated here. transfer.
Token Bus (IEEE 802.4) is a standard for implementing token ring over the virtual ring in
LANs. The physical media has a bus or a tree topology and uses coaxial cables. A
virtual ring is created with the nodes/stations and the token is passed from one node to
the next in a sequence along this virtual ring. Each node knows the address of its
preceding station and its succeeding station. A station can only transmit data when it
has the token. The working principle of the token bus is similar to Token Ring.
Ethernet is a set of technologies and protocols that are used primarily in LANs. It was
first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical
layer and the medium access control (MAC) sub-layer of the data link layer for wired
Ethernet networks. Ethernet is classified into two categories: classic Ethernet and
switched Ethernet.
Classic Ethernet is the original form of Ethernet that provides data rates between 3 to
10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum
throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the
type of medium used. Most varieties of classic Ethernet have become obsolete in
present communication scenario.
A switched Ethernet uses switches to connect to the stations in the LAN. It replaces the
repeaters used in classic Ethernet and allows full bandwidth utilization.
IEEE 802.3 Popular Versions
There are a number of versions of IEEE 802.3 protocol. The most popular ones are -
IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial
cable into which a connection can be tapped by drilling into the cable to the core. Here, 10 is
the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and 5
refers to the maximum segment length of 500m.
IEEE 802.3a: This gave the standard for thin coax (10BASE-2), which is a thinner variety
where the segments of coaxial cables are connected by BNC connectors. The 2 refers to the
maximum segment length of about 200m (185m to be precise).
IEEE 802.3i: This gave the standard for twisted pair (10BASE-T) that uses unshielded
twisted pair (UTP) copper wires as physical layer medium. The further variations were given
by IEEE 802.3u for 100BASE-TX, 100BASE-T4 and 100BASE-FX.
IEEE 802.3i: This gave the standard for Ethernet over Fiber (10BASE-F) that uses fiber optic
cables as medium of transmission.
The IEEE 802.11 group of standards defines the technologies for wireless LANs. For path
sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier sense multiple
access with collision avoidance). It also uses an encryption method i.e. wired equivalent
privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as building or an
office. WLANs allow users to move around in a confined area while they are still connected
to the network.
In some instance wireless LAN technology is used to save costs and avoid laying cable,
while in other cases, it is the only option for providing high-speed internet access to the
public. Whatever the reason, wireless solutions are popping up everywhere.
Examples of WLANs that are available today are NCR's waveLAN and Motorola's ALTAIR.
Advantages of WLANs
o Flexibility: Within radio coverage, nodes can communicate without further
restriction. Radio waves can penetrate walls, senders and receivers can be placed
anywhere (also non-visible, e.g., within devices, in walls etc.).
o Planning: Only wireless ad-hoc networks allow for communication without previous
planning, any wired network needs wiring plans.
o Design: Wireless networks allow for the design of independent, small devices which
can for example be put into a pocket. Cables not only restrict users but also
designers of small notepads, PDAs, etc.
o Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc.
whereas, networks requiring a wired infrastructure will usually break down
completely in disasters.
o Cost: The cost of installing and maintaining a wireless LAN is on average lower than
the cost of installing and maintaining a traditional wired LAN, for two reasons. First,
after providing wireless access to the wireless network via an access point for the
first user, adding additional users to a network will not increase the cost. And
second, wireless LAN eliminates the direct costs of cabling and the labor associated
with installing and repairing it.
o Ease of Use: Wireless LAN is easy to use and the users need very little new
information to take advantage of WLANs.
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired networks.
The main reason for this is the lower bandwidth due to limitations is radio
transmission, higher error rates due to interference and higher delay/delay variation
due to extensive error correction and detection mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many companies
have come up with proprietary solutions offering standardization functionality plus
many enhanced features. Most components today adhere to the basic standards IEEE
802.11a or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the
operation and restrict frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so, national and
international frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power
consuming, also wireless devices running on battery power. Whereas the LAN design
should take this into account and implement special power saving modes and power
management functions.
o License free operation: LAN operators don't want to apply for a special license to
be able to use the product. The equipment must operate in a license free band, such
as the 2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission, many
other electrical devices can interfere with them (such as vacuum cleaner, train
engines, hair dryers, etc.).Wireless LAN transceivers cannot be adjusted for perfect
transmission is a standard office or production environment.
Fundamentals of WLANs
1. HiperLAN
o HiperLAN stands for High performance LAN. While all of the previous technologies
have been designed specifically for an adhoc environment, HiperLAN is derived from
traditional LAN environments and can support multimedia data and asynchronous
data effectively at high rates (23.5 Mbps).
o A LAN extension via access points can be implemented using standard features of
the HiperLAN/1 specification. However, HiperLAN does not necessarily require any
type of access point infrastructure for its operation.
o HiperLAN was started in 1992, and standards were published in 1995. It employs the
5.15GHz and 17.1 GHz frequency bands and has a data rate of 23.5 Mbps with
coverage of 50m and mobility< 10 m/s.
o It supports a packet-oriented structure, which can be used for networks with or
without a central control (BS-MS and ad-hoc). It supports 25 audio connections at
32kbps with a maximum latency of 10 ms, one video connection of 2 Mbps with 100
ms latency, and a data rate of 13.4 Mbps.
o HiperLAN/1 is specifically designed to support adhoc computing for multimedia
systems, where there is no requirement to deploy a centralized infrastructure. It
effectively supports MPEG or other state of the art real time digital audio and video
standards.
o The HiperLAN/1 MAC is compatible with the standard MAC service interface, enabling
support for existing applications to remain unchanged.
o HiperLAN 2 has been specifically developed to have a wired infrastructure, providing
short-range wireless access to wired networks such as IP and ATM.
One of the primary features of HiperLAN/2 is its high speed transmission rates (up to 54
Mbps). It uses a modulation method called OFDM to transmit analog signals. It is connection
oriented, and traffic is transmitted on bidirectional links for unicast traffic and unidirectional
links toward the MSs for multicast and broadcast traff
This connection oriented approach makes support for QoS easy, which in turn depends on
how the HiperLAN/2 network incorporates with the fixed network using Ethernet, ATM, or
IP.
The HiperLAN/2 architecture shown in the figure allows for interoperation with virtually any
type of fixed network, making the technology both network and application independent.
HiperLAN/2 networks can be deployed at "hot spot" areas such as airports and hotels, as an
easy way of offering remote access and internet services.
2. Home RF Technology
o A typical home needs a network inside the house for access to a public network
telephone and internet, entertainment networks (cable television, digital audio and
video with the IEEE 1394), transfer and sharing of data and resources (printer,
internet connection), and home control and automation.
o The device should be able to self-configure and maintain connectivity with the
network. The devices need to be plug and play enabled so that they are available to
all other clients on the network as soon as they are switched on, which requires
automatic device discovery and identification in the system.
o Home networking technology should also be able to accommodate any and all lookup
services, such as Jini. Home RF products allow you to simultaneously share a single
internet connection with all of your computers - without the hassle of new wires,
cables or jacks.
o Home RF visualizes a home network as shown in the figure:
Advantages of Home RF
o In Home RF all devices can share the same connection, for voice or data at the same
time.
o Home RF provides the foundation for a broad range of interoperable consumer
devices for wireless digital communication between PCs and consumer electronic
devices anywhere in and around the home.
o The working group includes Compaq computer corp. Ericson enterprise network, IBM
Intel corp., Motorola corp. and other.
o A specification for wireless communication in the home called the shared wireless
access protocol (SWAP) has been developed.
4. Bluetooth
Bluetooth is one of the major wireless technologies developed to achieve WPAN (wireless
personal area network). It is used to connect devices of different functions such as
telephones, computers (laptop or desktop), notebooks, cameras, printers, and so on.
Architecture of Bluetooth
o Bluetooth devices can interact with other Bluetooth devices in several ways in the
figure. In the simplest scheme, one of the devices acts as the master and (up to)
seven other slaves.
o A network with a master and one or more slaves associated with it is known as a
piconet. A single channel (and bandwidth) is shared among all devices in the piconet.
o Each of the active slaves has an assigned 3-bit active member address. many other
slaves can remain synchronized to the master though remaining inactive slaves,
referred to as parked nodes.
o The master regulates channel access for all active nodes and parked nodes. Of two
piconets are close to each other, they have overlapping coverage areas.
o This scenario, in which nodes of two piconets intermingle, is called a scatternet.
Slaves in one piconet can participate in another piconet as either a master or slave
through time division multiplexing.
o In a scatternet, the two (or more) piconets are not synchronized in either time or
frequency. Each of the piconets operates in its own frequency hopping channel, and
any devices in multiple piconets participate at the appropriate time via time division
multiplexing.
o The Bluetooth baseband technology supports two link types. Synchronous connection
oriented (SCO) types, used primarily for voice, and asynchronous connectionless
(ACL) type, essentially for packet data.
What is Wi-Fi ?
Advertisements
Previous Page
Next Page
Channel Bandwidth
The WiFi standards define a fixed channel bandwidth of 25 MHz for 802.11b and 20
MHz for either 802.11a or g networks.
Radio Signals
Radio Signals are the keys, which make WiFi networking possible. These radio signals
transmitted from WiFi antennas are picked up by WiFi receivers, such as computers
and cell phones that are equipped with WiFi cards. Whenever, a computer receives
any of the signals within the range of a WiFi network, which is usually 300 — 500 feet
for antennas, the WiFi card reads the signals and thus creates an internet connection
between the user and the network without the use of a cord.
Access points, consisting of antennas and routers, are the main source that transmit
and receive radio waves. Antennas work stronger and have a longer radio transmission
with a radius of 300-500 feet, which are used in public areas while the weaker yet
effective router is more suitable for homes with a radio transmission of 100-150 feet.
WiFi Cards
You can think of WiFi cards as being invisible cords that connect your computer to the
antenna for a direct connection to the internet.
WiFi cards can be external or internal. If a WiFi card is not installed in your computer,
then you may purchase a USB antenna attachment and have it externally connect to
your USB port, or have an antenna-equipped expansion card installed directly to the
computer (as shown in the figure given above). For laptops, this card will be a PCMCIA
card which you insert to the PCMCIA slot on the laptop.
WiFi Hotspots
A WiFi hotspot is created by installing an access point to an internet connection. The
access point transmits a wireless signal over a short distance. It typically covers
around 300 feet. When a WiFi enabled device such as a Pocket PC encounters a
hotspot, the device can then connect to that network wirelessly.
Most hotspots are located in places that are readily accessible to the public such as
airports, coffee shops, hotels, book stores, and campus environments. 802.11b is the
most common specification for hotspots worldwide. The 802.11g standard is
backwards compatible with .11b but .11a uses a different frequency range and requires
separate hardware such as an a, a/g, or a/b/g adapter. The largest public WiFi
networks are provided by private internet service providers (ISPs); they charge a fee to
the users who want to access the internet.
Hotspots are increasingly developing around the world. In fact, T-Mobile USA controls
more than 4,100 hotspots located in public locations such as Starbucks, Borders,
Kinko's, and the airline clubs of Delta, United, and US Airways. Even select
McDonald's restaurants now feature WiFi hotspot access.
Any notebook computer with integrated wireless, a wireless adapter attached to the
motherboard by the manufacturer, or a wireless adapter such as a PCMCIA card can
access a wireless network. Furthermore, all Pocket PCs or Palm units with Compact
Flash, SD I/O support, or built-in WiFi, can access hotspots.
Some Hotspots require WEP key to connect, which is considered as private and
secure. As for open connections, anyone with a WiFi card can have access to that
hotspot. So in order to have internet access under WEP, the user must input the WEP
key code.
Wireless means transmitting signals using radio waves as the medium instead of wires.
Wireless technologies are used for tasks as simple as switching off the television or as
complex as supplying the sales force with information from an automated enterprise
application while in the field. Now cordless keyboards and mice, PDAs, pagers and
digital and cellular phones have become part of our daily life.
Point-to-multipoint bridge
This topology is used to connect three or more LANs that may be located on different
floors in a building or across buildings(as shown in the following image).
Mesh or ad hoc network
This network is an independent local area network that is not connected to a wired
infrastructure and in which all stations are connected directly to one another(as shown
in the following image).
Wireless Technologies
Wireless technologies can be classified in different ways depending on their range.
Each wireless technology is designed to serve a specific usage segment. The
requirements for each usage segment are based on a variety of variables, including
Bandwidth needs, Distance needs and Power.
Wireless Wide Area Network (WWAN)
This network enables you to access the Internet via a wireless wide area network
(WWAN) access card and a PDA or laptop.
These networks provide a very fast data speed compared with the data rates of mobile
telecommunications technology, and their range is also extensive. Cellular and mobile
networks based on CDMA and GSM are good examples of WWAN.
Wireless Personal Area Network (WPAN)
These networks are very similar to WWAN except their range is very limited.
Wireless Local Area Network (WLAN)
This network enables you to access the Internet in localized hotspots via a wireless
local area network (WLAN) access card and a PDA or laptop.
It is a type of local area network that uses high-frequency radio waves rather than
wires to communicate between nodes.
These networks provide a very fast data speed compared with the data rates of mobile
telecommunications technology, and their range is very limited. Wi-Fi is the most
widespread and popular example of WLAN technology.
Wireless Metropolitan Area Network (WMAN)
This network enables you to access the Internet and multimedia streaming services via
a wireless region area network (WRAN).
These networks provide a very fast data speed compared with the data rates of mobile
telecommunication technology as well as other wireless network, and their range is
also extensive.
What is Wi-Fi ?
Wi-Fi stands for Wireless Fidelity. Wi-Fi is based on the IEEE 802.11 family of
standards and is primarily a local area networking (LAN) technology designed to
provide in-building broadband coverage.
WiMAX is one of the hottest broadband wireless technologies around today. WiMAX
systems are expected to deliver broadband access services to residential and
enterprise customers in an economical way.
Loosely, WiMax is a standardized wireless version of Ethernet intended primarily as an
alternative to wire technologies (such as Cable Modems, DSL and T1/E1 links) to
provide broadband access to customer premises.
More strictly, WiMAX is an industry trade organization formed by leading
communications, component, and equipment companies to promote and certify
compatibility and interoperability of broadband wireless access equipment that
conforms to the IEEE 802.16 and ETSI HIPERMAN standards.
WiMAX would operate similar to WiFi, but at higher speeds over greater distances and
for a greater number of users. WiMAX has the ability to provide service even in areas
that are difficult for wired infrastructure to reach and the ability to overcome the
physical limitations of traditional wired infrastructure.
WiMAX was formed in April 2001, in anticipation of the publication of the original 10-66
GHz IEEE 802.16 specifications. WiMAX is to 802.16 as the WiFi Alliance is to 802.11.
WiMAX is
Acronym for Worldwide Interoperability for Microwave Access.
Based on Wireless MAN technology.
A wireless technology optimized for the delivery of IP centric services over a wide area.
A scalable wireless platform for constructing alternative and complementary broadband
networks.
A certification that denotes interoperability of equipment built to the IEEE 802.16 or
compatible standard. The IEEE 802.16 Working Group develops standards that address
two types of usage models −
o A fixed usage model (IEEE 802.16-2004).
o A portable usage model (IEEE 802.16e).
What is 802.16a ?
WiMAX is such an easy term that people tend to use it for the 802.16 standards and
technology themselves, although strictly it applies only to systems that meet specific
conformance criteria laid down by the WiMAX Forum.
The 802.16a standard for 2-11 GHz is a wireless metropolitan area network (MAN)
technology that will provide broadband wireless connectivity to Fixed, Portable and
Nomadic devices.
It can be used to connect 802.11 hot spots to the Internet, provide campus
connectivity, and provide a wireless alternative to cable and DSL for last mile
broadband access.
Why WiMax ?
WiMAX can satisfy a variety of access needs. Potential applications include extending
broadband capabilities to bring them closer to subscribers, filling gaps in cable, DSL and T1
services, WiFi, and cellular backhaul, providing last-100 meter access from fibre to the curb
and giving service providers another cost-effective option for supporting broadband
services.
WiMAX can support very high bandwidth solutions where large spectrum deployments (i.e.
>10 MHz) are desired using existing infrastructure keeping costs down while delivering the
bandwidth needed to support a full range of high-value multimedia services.
WiMAX can help service providers meet many of the challenges they face due to increasing
customer demands without discarding their existing infrastructure investments because it
has the ability to seamlessly interoperate across various network types.
WiMAX can provide wide area coverage and quality of service capabilities for applications
ranging from real-time delay-sensitive voice-over-IP (VoIP) to real-time streaming video and
non-real-time downloads, ensuring that subscribers obtain the performance they expect for
all types of communications.
WiMAX, which is an IP-based wireless broadband technology, can be integrated into both
wide-area third-generation (3G) mobile and wireless and wireline networks allowing it to
become part of a seamless anytime, anywhere broadband access solution.
Ultimately, WiMAX is intended to serve as the next step in the evolution of 3G mobile
phones, via a potential combination of WiMAX and CDMA standards called 4G.
WiMAX Goals
A standard by itself is not enough to enable mass adoption. WiMAX has stepped
forward to help solve barriers to adoption, such as interoperability and cost of
deployment. WiMAX will help ignite the wireless MAN industry by defining and
conducting interoperability testing and labeling vendor systems with a "WiMAX
Certified™" label once testing has been completed successfully.
WiMAX is similar to the wireless standard known as Wi-Fi, but on a much larger scale
and at faster speeds. A nomadic version would keep WiMAX-enabled devices
connected over large areas, much like today’s cell phones. We can compare it with Wi-
Fi based on the following factors.
IEEE Standards
Wi-Fi is based on IEEE 802.11 standard whereas WiMAX is based on IEEE 802.16.
However, both are IEEE standards.
Range
Wi-Fi typically provides local network access for a few hundred feet with the speed of
up to 54 Mbps, a single WiMAX antenna is expected to have a range of up to 40 miles
with the speed of 70 Mbps or more. As such, WiMAX can bring the underlying Internet
connection needed to service local Wi-Fi networks.
Scalability
Wi-Fi is intended for LAN applications, users scale from one to tens with one
subscriber for each CPE device. Fixed channel sizes (20MHz).
WiMAX is designed to efficiently support from one to hundreds of Consumer premises
equipments (CPE)s, with unlimited subscribers behind each CPE. Flexible channel
sizes from 1.5MHz to 20MHz.
Bit rate
Wi-Fi works at 2.7 bps/Hz and can peak up to 54 Mbps in 20 MHz channel.
WiMAX works at 5 bps/Hz and can peak up to 100 Mbps in a 20 MHz channel.
Quality of Service
Wi-Fi does not guarantee any QoS but WiMax will provide your several level of QoS.
As such, WiMAX can bring the underlying Internet connection needed to service local
Wi-Fi networks. Wi-Fi does not provide ubiquitous broadband while WiMAX does.
Comparison Table
Freature
WiMax Wi-Fi Wi-Fi
(802.16a) (802.11b) (802.11a/g)
25 MHz 20 MHz
Channel Adjustable
Bandwidth 1.25 M to 20 MHz
Radio Technology
OFDM Direct Sequence OFDM
(256-channels) Spread Spectrum (64-channels)
Modulation QPSK
BPSK, QPSK, BPSK, QPSK,
16-, 64-, 256-QAM 16-, 64-QAM
Encryption
Mandatory- 3DES Optional- RC4 Optional- RC4
Optional- AES (AES in 802.11i) (AES in 802.11i)
WiMAX is a wireless broadband solution that offers a rich set of features with a lot of
flexibility in terms of deployment options and potential service offerings. Some of the
more salient features that deserve highlighting are as follows −
Link-layer Retransmissions
WiMAX supports automatic retransmission requests (ARQ) at the link layer for
connections that require enhanced reliability. ARQ-enabled connections require each
transmitted packet to be acknowledged by the receiver; unacknowledged packets are
assumed to be lost and are retransmitted.
Robust Security
WiMAX supports strong encryption, using Advanced Encryption Standard (AES), and
has a robust privacy and key-management protocol.
The system also offers a very flexible authentication architecture based on Extensible
Authentication Protocol (EAP), which allows for a variety of user credentials,
including username/password, digital certificates, and smart cards.
IP-based Architecture
The WiMAX Forum has defined a reference network architecture that is based on an
all-IP platform. All end-to-end services are delivered over an IP architecture relying on
IP-based protocols for end-to-end transport, QoS, session management, security, and
mobility.