You are on page 1of 132

Chapter Two

Wireless Area Networks

1
Outline
• Spread Spectrum Techniques
• Wireless Personal Area Network (WPAN)
• Wireless Local Area Network (WLAN)
• Wireless Metropolitan Area Network (WMAN)

2
Spread spectrum
• Introduction
– Problems such as capacity limits, propagation effects,
synchronization occur with wireless systems
– Spread spectrum modulation spreads out the
modulated signal bandwidth so it is much greater
than the message bandwidth
– Independent code spreads signal at transmitter and
de-spreads signal at receiver
– In telecommunication and radio communication,
spread-spectrum techniques are methods by which a
signal (e.g. an electrical, electromagnetic, or acoustic
signal) generated with a particular bandwidth is
deliberately spread in the frequency domain, resulting
in a signal with a wider bandwidth.
3
Spread spectrum
 Is a communication technique that spreads a
narrowband communication signal over a wide
range of frequencies for transmission then de-
spreads it into the original data bandwidth at the
receive.
 Increases the bandwidth of the signal compared to
narrow band by spreading the signal
 Characterized by:
• wide bandwidth and
• low power
4
Narrowband vs Spread Spectrum

Narrowband
(High Peak Power)

Power
Spread Spectrum
(Low Peak Power)

Frequency
5
Spread Spectrum
• Input is fed into a channel encoder
– Produces analog signal with narrow bandwidth
• Signal is further modulated using sequence of digits
known as Spreading code or spreading sequence
– Generated by Pseudo noise, or Pseudo-random number
generator
• Effect of modulation is to increase bandwidth (spread
the spectrum) of signal to be transmitted
• On receiving end, the digit sequence is used to
demodulate the spread spectrum signal
• Signal is fed into a channel decoder to recover data
6
Spread Spectrum

7
• Advantages
– Immunity from various kinds of noise and multipath
distortion
• The earliest applications of spread spectrum were
military, where it was used for its immunity to
jamming.
– Can be used for hiding and encrypting signals
– Several users can independently use the same higher
bandwidth with very little interference
• This property is used in cellular telephony
applications, with a technique know as code
division multiplexing (CDM) or code division
multiple access (CDMA).
– Resistance to Jamming and Interception
8
• Side effects:
– coexistence of several signals without dynamic
coordination
– tap-proof I think it means harder to manage
• Two types
– Frequency Hopping Spread Spectrum (FHSS)
– Direct Sequence Spread Spectrum (DSSS)

9
Frequency Hopping Spread Spectrum (FHSS)
• Signal is broadcast over seemingly random series of
radio frequencies
– A number of channels allocated for the FH signal
– Width of each channel corresponds to bandwidth
of input signal
• Signal hops from frequency to frequency at fixed
intervals
– Transmitter operates in one channel at a time
– Bits are transmitted using some encoding scheme
– At each successive interval, a new carrier
frequency is selected

10
Frequency Hopping Spread Spectrum (FHSS)

11
• Channel sequence dictated by spreading code
• Receiver, hopping between frequencies in synchronization
with transmitter, picks up message
• Advantages Eavesdropping is the act of secretly or stealthily listening to the
private conversation or communications.
– Eavesdroppers hear only unintelligible blips
– Attempts to jam signal on one frequency succeed only at
– knocking out a few bits

12
13
Direct Sequence Spread Spectrum (DSSS)
• Each bit in original signal is represented by multiple
bits in the transmitted signal, using a spreading code
• Spreading code spreads signal across a wider
frequency band
– in direct proportion to number of bits used
• Therefore, a 10-bit spreading code spreads the signal
across a frequency band that is 10 times greater than
a 1-bit spreading code
• One technique for direct sequence spread spectrum
is to combine the digital information stream with
the spreading code bit stream using an exclusive-OR
(XOR).
14
Direct Sequence Spread Spectrum (DSSS)

15
Direct Sequence Spread Spectrum(DSSS)

16
Wireless Area Networks

17
IEEE: Institute of Electricals and Electronics Engineers
Outline

• Spread Spectrum Techniques


• Wireless Personal Area Network (WPAN)
• Wireless Local Area Network (WLAN)
• Wireless Metropolitan Area Network (WMAN)

18
Wireless Personal Area Network
(WPAN – IEEE 802.15)
• A network for interconnecting devices centered around an
individual person's workspace
• Devices on a PAN may include portable and mobile
devices, such as PCs, Personal Digital Assistants (PDAs),
peripherals, cell phones, pagers, and consumer electronic
devices.
• Based on the standard IEEE 802.15
• When any two WPAN-equipped devices come into close
proximity they can communicate
• Examples: Bluetooth (IEEE 802.15.1), UWB (IEEE
802.15.3a), and ZigBee (IEEE 802.15.4)
19
Bluetooth (802.15.1)
• Started with Ericsson's Bluetooth Project in 1994
• Named after Danish king Herald Blatand (AD 940-981)
who was fond of blueberries
• Provide a universal short-range wireless capability
• Using the 2.4-GHz band
– Available globally for unlicensed users
• Devices within 10m can share up to 720 kbps of capacity
• Intel, IBM, Nokia, Toshiba, and Ericsson formed Bluetooth
SIG (Special Interest Group) in May 1998
• Supports open-ended list of applications
– Data, audio, graphics, video
20
Bluetooth (802.15.1)
• The following are examples of some of the capabilities
Bluetooth can provide consumers:
– Make calls from a wireless headset connected remotely to
a cell phone.
– Eliminate cables linking computers to printers, keyboards,
and the mouse.
– Hook up MP3 players wirelessly to other machines to
download music.
– Set up home networks so that a couch potato can
remotely monitor air conditioning, the oven, and
children's Internet surfing.
– Call home from a remote location to turn appliances on
and off, set the alarm, and monitor activity.
21
Bluetooth (802.15.1)
• Key Features:
– Lower Power: 10 μA in standby, 50 mA while
transmitting
– Cheap: $5 per device
– Small: 9 mm2 single chips
• Bluetooth is designed to operate in an environment of
many users.
• Up to eight devices can communicate in a small network
called a piconet.
• Ten of these piconets can coexist in the same coverage
range of the Bluetooth radio.
• To provide security, each link is encoded and protected
against eavesdropping and interference.
22
• Applications
– Data and voice access points
• Real-time voice and data transmissions
– Cable replacement
• Eliminates need for numerous cable
attachments for connection
– Ad hoc networking
• Device with Bluetooth radio can establish
connection with another Bluetooth radio as
soon as it comes into range

23
Bluetooth (802.15.1)
• Frequency Range: 2402 - 2480 MHz
• Data Rate: 1 Mbps (Nominal) 720 kbps (User)
• Channel Bandwidth:1 MHz
• Range: Up to 10 m can be extended further
• Security: Challenge/Response Authentication. 128b
Encryption

24
Usage Models
• a usage model is set of protocols that implement a
particular Bluetooth-based application.
– File transfer – supports the transfer of directories, files,
documents, images, and streaming media formats
– Internet bridge – A PC is wireless connected to a mobile
phone or cordless modem to provide dial-up
networking and fax capability
– LAN access – enables devices on a piconet to access a
LAN
– Three-in-one phone: Telephone handsets that
implement this usage model may act as a cordless
phone connecting to a voice base station, as an
intercom device for connecting to other telephones, and
as a cellular phone 25
Usage Models
• Synchronization – provides a device-to-device
synchronization of PIM (Personal Information
Management) information, such as Phone book,
calendar, message and note information
• Headset – act as a remote device’s audio input and
output interface

26
Bluetooth (802.15.1)
• Piconet
– The basic unit of Bluetooth networking
– Formed by a master and many slaves Up to 7 active slaves.
– Slaves can only transmit when requested by master - Up
to 255 Parked slaves
– A slave may only communicate with the master and may
only communicate when granted permission by the master.
– Active slaves are polled by master for transmission
– Each station gets a 8-bit parked address
– The parked station can join in 2ms.
– Other stations can join in more time
– A device can participate in multiple piconets
– Master determines channel and phase
27
Bluetooth (802.15.1)
• Piconet

28
Bluetooth (802.15.1)
• Master
– Device in Piconet whose clock and hopping sequence
are used to synchronize all other devices(slaves) in
the Piconet
– It also carries out paging procedures and also
connection establishment
• Slaves
– Units within the piconet that are synchronized to the
master via its clock and hopping sequence
– After connection establishment, slaves are assigned a
temporary 3 bit member address to reduce the
number of addressing bits required
29
Bluetooth (802.15.1)
• Scatternet
– Connection of two or more piconet (up to 10)
– Device in one piconet may exist as master or slave
in another piconet
– Allows many devices to share same area
– Makes efficient use of bandwidth

30
Bluetooth (802.15.1)
• Scatternet

31
FHSS
• Bluetooth uses FHSS
• Has two uses
– Avoid interference and multipath effect
– Multiple access among co-located devices in
different piconets

32
Bluetooth (802.15.1)

• Bluetooth devices

33
Bluetooth (802.15.1)
• Channel Control
– The operation of a piconet can be understood in terms of the
states of operation during link establishment and maintenance
– There are two major states:
• Standby: The default state.
– This is a low-power state in which only the native clock is
running.
• Connection: The device is connected to a piconet as a master or a
slave.
– In addition, there are seven interim substates that are used to
add new slaves to a piconet
– To move from one state to the other, either commands from
the Bluetooth link manager are used or internal signals in the
link controller are used.
34
Bluetooth (802.15.1)
• The substates are as follows:
– Page: Device has issued a page.
• Used by the master to activate and connect to a slave.
• Master sends page message by transmitting slave's device
access code (DAC) in different hop channels.
– Page scan: Device is listening for a page with its own
DAC.
– Master response: A device acting as a master receives a
page response from a slave.
• The device can now enter the connection state or return to
the page state to page for other slaves.

35
Bluetooth (802.15.1)
– Slave response: A device acting as a slave responds to
a page from a master.
• If connection setup succeeds, the device enters the
connection state; otherwise it returns to the page
scan state.
– Inquiry: Device has issued an inquiry, to find the
identity of the devices within range.
– Inquiry scan: Device is listening for an inquiry.
– Inquiry response: A device that has issued an inquiry
receives an inquiry response.

36
Bluetooth State Transition Diagram 37
Bluetooth (802.15.1)
• Standby - Initial state
• Inquiry - Master sends an inquiry packet.
– Slaves scan for inquiries and respond with their address
and clock after a random delay (CSMA/CA)
• Page - Master in page state invites devices to join the
piconet.
– Page message is sent in 3 consecutive slots (3 frequencies).
– Slave enters page response state and sends page response
including its device access code.
• Master informs slave about its clock and address so that
slave can participate in piconet.
– Slave computes the clock offset.
• Connected - A short 3-bit logical address is assigned
38
Bluetooth (802.15.1)
• Once the slave is in the Connection state, it can be in
one of four modes of operation:
– Active – The slave participates in the piconet by
• Listening, transmitting and receiving packets
• The master periodically transmits to the slaves to maintain
synchronization.
– Sniff – The slave only listens on specified slots
• The slave can operate in a reduced-power status the rest of
the time.
– Hold – Reduced power status
• The slave may still participate in SCO (Synchronous
Connection Oriented) exchanges.
• During periods of no activity, the slave is free to idle in a
reduced power status or possibly participate in another
piconet.
39
Bluetooth (802.15.1)
• Park – a slave does not participate on piconet but still
retained as part of piconet
• The device is given a parking member address
(PM_ADDR) and loses its active member
(AM_ADDR) address.
• With the use of the park mode, a piconet may
have more than seven slaves.

40
Bluetooth (802.15.1)

41
ZigBee (IEEE 802.15.4)
• Low Power consumption
– 6 months to 5 years battery life for most applications
• Low Cost
– At least half the cost of Bluetooth solutions
• High density of nodes per network
– 250 nodes per network, multiple co-located networks
• Data rate requirements
– Few bits to 250kbps sufficient
– Specially build for control and sensor networks
• Simple protocol, Global Implementation
– 2.4GHz band
• Direct Sequence Spread Spectrum
• The objective of this technology is to monitor and
control devices 42
ZigBee (IEEE 802.15.4)
• Is a wireless technology standard that defines a set of
protocols for short range communications
• Is specially build for control and sensor networks
• The objective of this technology is to monitor and
control devices, Bluetooth is not suitable for this
• It addresses the need of very low cost
implementation of low power devices with low data
rate for short range wireless communications
• It is one of the most commonly used standard for
Internet of Things
• Open source standard that was developed by ZIGBEE
Alliance 43
ZigBee (IEEE 802.15.4)
• ZIGBEE Applications
– Home automation
• Supported devices
• Lights
• Door locks
• Switches
• Smoke detector
• Fans
• Appliances

44
ZigBee (IEEE 802.15.4)
• ZIGBEE Applications
– Medical Data Collection
(remote health monitoring)

45
ZigBee (IEEE 802.15.4)
• ZIGBEE Applications
– Industrial control Systems

• Purpose
– To collect information
– To perform control tasks inside a building
46
ZigBee (IEEE 802.15.4)
• ZIGBEE Devices

47
ZigBee (IEEE 802.15.4)
• ZigBee Devices and Network Topologies
– Types of Zigbee Devices
• Coordinator
• Routers
• End Devices

48
ZigBee (IEEE 802.15.4)
ZigBee Devices and Network Topologies
• Coordinator
– Most capable device
– Root of the network
– There is exactly one coordinator network in each
network
• Tasks:
– Channel selection – make channel scan and select the one
with low interference
– Assign an ID to the network
– Allocate unique address to each device
– Initiates and transfer messages in the network
49
ZigBee (IEEE 802.15.4)
ZigBee Devices and Network Topologies
• Routers
– Act as intermediate nodes between the
coordinator and the end devices
– Route traffic between different nodes
– Receive and store messages intended for their
children
– Can allow other routers and end devices to join
the network

50
ZigBee (IEEE 802.15.4)
ZigBee Devices and Network Topologies
• End Devices
– Contains just enough information to talk the parent node
– They may sleep( a standby), which makes end devices a
suitable choice for battery operated devices
– All traffic to an end device is first routed to its parent
– Devices can not transmit data directly to each other, data
has to go through the router. This is because in case one
device is sleep the data will be stored in the router until
sleep device become active
– The end device is responsible for requesting and pending
message from its parent

51
ZigBee (IEEE 802.15.4)
ZigBee Devices and Network Topologies
– A device can be
• a full-function device (FFD)
• reduced-function device (RFD)
– A network includes at least one FFD, operating as
the personal area network (PAN) coordinator.

52
ZigBee (IEEE 802.15.4)
• ZigBee Devices
– FFD
• Can operate in three modes: a PAN coordinator, a
coordinator, or a device.
• Can talk to reduced-function or full-function devices
• Can function in any topology
– RFD
• Is intended for applications that are extremely simple
and do not need to send large amounts of data.
• Can only talk to a FFD.
• Limited to star topology
• Cannot become network coordinator

53
ZigBee (IEEE 802.15.4)
• ZigBee Devices can be
– PAN Coordinator
• Only one in Network
• Initiates network
• Store information about the network
• All devices communicate with PAN coordinator
• Routing functionality
• Bridge to other networks
– Coordinator
• Should be an FFD
• Otherwise called as Router
• Optional component
• Routes between nodes
• Extends network coverage
• Manages local address allocation/ de-allocation
54
ZigBee (IEEE 802.15.4)
• ZigBee Devices can be
– Device
• Can be an FFD or RFD based on application
• Optimized for low power consumption
• Cheapest devices type
• Communicate with only coordinators

55
ZigBee (IEEE 802.15.4)
• Zigbee addresses three typical Traffic Types
– Periodic data
• The application dictates the rate, and the sensor
activates, checks for data and deactivates.
• e.g. sensors
– Intermittent data
• The application, or other stimulus, determines the rate
• The device needs to connect to the network only
when communication is necessitated.
• This type enables optimum saving on energy.
• e.g. light switch, smoke detectors 56
ZigBee (IEEE 802.15.4)
– Repetitive
• low latency data
• The rate is fixed in priori.
• Depending on allotted time slots, called GTS
(guaranteed time slot), devices operate for
fixed durations.
• e.g. mouse
• Address
– All devices must have 64 bit IEEE addresses
– Short (16 bit) addresses can be allocated to
reduce packet size

57
ZigBee (IEEE 802.15.4)
• Network Topologies
– ZigBee supports three types of topologies: star topology,
peer-to-peer topology, and cluster tree

Mesh

Star

Cluster Tree PAN coordinator


Full Function Device
Reduced Function Device

58
ZigBee (IEEE 802.15.4)
– Star topology,
• Communication is established between devices
and a single central controller, called the PAN
coordinator.
• The PAN coordinator may be powered by mains
while the devices will most likely be battery
powered.
• Applications that benefit from this topology are:
– Home automation,
– Personal computer (PC) peripherals,
– Toys, and games.
59
ZigBee (IEEE 802.15.4)
• Star Topology
– Advantage
• Easy to synchronize
• Low latency
– Disadvantage
• Small scale

60
ZigBee (IEEE 802.15.4)
• Peer-to-peer topology
• There is also one PAN coordinator.
• In contrast to star topology, any device can communicate
with any other device as long as they are in range of one
another.
• A peer-to-peer network can be ad hoc, self-organizing, and
self-healing.
• Applications such as
– industrial control and monitoring,
– wireless sensor networks and asset and
– inventory tracking would benefit from such a topology.
• It also allows multiple hops to route messages from any
device to any other device in the network.
• It can provide reliability by multipath routing.
61
ZigBee (IEEE 802.15.4)
• Mesh Topology
– Advantage
• Robust multi-hop communication
• Network is more flexible
• Lower latency
– Disadvantage
• Route discovery is costly
• Needs storage for routing table

62
ZigBee (IEEE 802.15.4)
• Cluster-tree topology
– is a special case of a peer-to-peer network in which most
devices are full-function devices and
– an RFD may connect to a cluster-tree network as a leaf
node at the end of a branch.
– Any of the full-function devices can act as a coordinator
and provide synchronization services to other devices and
coordinators.
– However, only one of these coordinators is the PAN
coordinator.

63
ZigBee (IEEE 802.15.4)
Cluster Tree
• Advantage
– Low routing cost
– Allow multi-hop communication
• Disadvantage
– Route reconstruction is costly
– Latency may be quite long

64
ZigBee and Bluetooth Comparison
• Optimized for different applications
– ZigBee
• Smaller packets over large network
• Mostly Static networks with many, infrequently used devices
• Home automation, toys, remote controls, etc.
– Bluetooth
• Larger packets over small network
• Ad‐hoc networks
• File transfer
• Screen graphics, pictures, hands-free audio, Mobile phones,
headsets, PDAs, etc.

65
ZigBee and Bluetooth Comparison
Feature(s) Bluetooth ZigBee
Power Profile days years
Complexity complex Simple
Nodes/Master 7 64000
Latency 10 seconds 30 ms – 1s
Range 10m 70m ~ 300m
Extendibility No Yes
Data Rate 1 Mbps 250 Kbps
Security 64bit, 128bit 128bit AES and
Application Layer
Operating 2.4GHz ISM 2.4 GHz ISM
Frequency
Network Topology Ad hoc Piconet Ad hoc, star, mesh,
Hybrid
Outline

• Spread Spectrum Techniques


• Wireless Personal Area Network (WPAN)
• Wireless Local Area Network (WLAN)
• Wireless Metropolitan Area Network (WMAN)

67
Wireless Local Area Network
(WLAN –IEEE 802.11)
• Flexible data communications systems implemented as
an extension or as an alternative for wired LANs
• Using radio frequency (RF) technology, WLANs transmit
and receive data over the air, minimizing the need for
wired connections
• Standard WLANs are capable of operating at speeds in
the range of 1–2 Mbps depending on the actual system
• The fastest WLANs use 802.11b high-rate standard to
move data through air at a maximum speed of 11 Mbps.
• Manufacturers are developing WLANs to provide data
rates up to 54 Mbps or higher.
68
Wireless Local Area Network (WLAN)
• Advantage
– Mobility – nomadic access
– Cost - effective network setup for hard-to-wire locations
– Reduced cost of ownership, particularly in a dynamic
environment requiring frequent modification due to
minimal wiring and installation costs per device and per
user
– WLANs are simple to install.
• Disadvantage
– Frequency allocation
– Interference and reliability
– Speed
– Security
– Power consumption (Battery power is a scarce resource)
69
Wireless Local Area Network (WLAN)
• Application
– LAN Extension
– Cross-building interconnect
– Nomadic Access (provides a wireless link between LAN hub
and a mobile data terminal equipped with an antenna, such as a
laptop computer or notepad computer)
– Ad hoc networking

70
CM-Control Module
UM – User Module 71
Wireless Local Area Network (WLAN)
• WLAN Equipment
• There are three main links that form the basis of the
wireless network. These are:
– LAN adapter: provide the interface between the network
operating system and an antenna to create a transparent
connection to the network.
– Access point (AP): receives, buffers, and transmits data
between the WLAN and the wired network
• A single AP can support between 15 to 250 users, depending
on technology, configuration, and use.
• A wireless AP can monitor movement of a client across its
domain and permit or deny specific traffic or clients from
communicating through it.
72
Wireless Local Area Network (WLAN)
– Outdoor LAN bridges: are used to connect LANs
in different buildings.
• An outdoor bridge can provide a less expensive
alternative to recurring leased line charges.

73
Wireless Local Area Network (WLAN)
• WLAN Topologies
– WLANs can be built with either of the following
topologies:
• Peer-to-peer (ad hoc) topology: - client devices within a cell
communicate directly to each other
• Access point-based topology: - uses access points to bridge
traffic onto a wired (Ethernet or Token Ring) or a wireless
backbone
– more commonly used
• Point-to-multipoint bridge topology: - Wireless bridges
connect LANs in one building to LANs in another building
even if the buildings are miles apart

74
Wireless Local Area Network (WLAN)
• WLAN Technologies
– Infrared (IR) LANs
– Spread spectrum LANs
– UHF Narrowband microwave

75
Wireless Local Area Network (WLAN)
• Infrared Technology
– is an invisible band of radiation that exists at the lower
end of the visible electromagnetic spectrum.
– is most effective when a clear line-of-sight exists between
the transmitter and the receiver.
– is a short-range technology
– When used indoors, it can be limited by solid objects such
as doors, walls, merchandise, or racking.
– In an outdoor environment, snow, ice, and fog may affect
the operation of an infrared based system.
– Infrared spectrum unregulated
– Equipment inexpensive and simple
– Reflected by light-colored objects
• Ceiling reflection for entire room coverage
76
Electromagnetic Spectrum

77
Wireless Local Area Network (WLAN)
– Infrared light does not penetrate walls or other
opaque objects. This has two advantages:
• First, infrared communications can be more easily
secured against eavesdropping than microwave;
• Second, a separate infrared installation can be
operated in every room in a building without
interference, enabling the construction of very large
infrared LANs.

78
IR WLAN
Transmission Techniques
• There are three alternative transmission techniques
commonly used for IR data transmission:
– The transmitted signal can be focused and aimed (as
in a remote TV control) (Directed Beam Infrared )
– It can be radiated Omni-directionally (Omni-
directional)
– It can be reflected from a light-colored ceiling
(Diffused)

79
IR WLAN
• Directed Beam Infrared - can be used to create point-to-
point links.
– A focused IR data link can have a range of
kilometers.
– Such ranges are not needed for constructing indoor
wireless LANs.
– However, an IR link can be used for cross-building
interconnect between bridges or routers located in
buildings within a line of sight of each other.

80
IR WLAN

81
IR WLAN
• Omni-directional - An Omni-directional configuration
involves a single base station that is within line of sight
of all other stations on the LAN.
– This station is mounted on the ceiling
– The base station acts as a multiport repeater.
– The ceiling transmitter broadcasts an Omni-directional
signal that can be received by all of the other IR
transceivers in the area.

82
IR WLAN
• Diffused - In this configuration, all of the IR transmitters
are focused and aimed at a point on a diffusely
reflecting ceiling
– IR radiation striking the ceiling is reradiated Omni-
directionally and picked up by all of the receivers in the
area.

83
Spread Spectrum LAN
• The most popular type of wireless LAN uses spread
spectrum techniques.
• Except for quite small offices, a spread spectrum
wireless LAN makes use of a multiple-cell
arrangement.
• Within a cell, the topology can be either peer-to-
peer or hub
• In commercial applications, spread spectrum
techniques currently offer data rates up to 2 Mbps

84
Narrowband Microwave
• Use of a microwave radio frequency band for signal
transmission
• Relatively narrow bandwidth, typically 12.5 kHz or
25 kHz
• Licensed or Unlicensed
• In order to have many frequencies that can be
allocated to users, the bandwidth given to a specific
user is very small
• Advantages
– Longest range
– Low cost solution for large sites with low to
medium data throughput requirements 85
Narrowband Microwave
• Disadvantages
– Large radio and antennas increase wireless client
size
– RF site license required for protected bands
– No multivendor interoperability
– Low throughput and interference potential

86
IEEE 802.11 (Wi – Fi)
• 802.11 standard focuses on the bottom two layers
of the OSI model, the physical layer (PHY) and
data link layer (DLL).

87
Wifi

88
802.11
• Two network architectures are defined in the IEEE 802.11
standard
– Infrastructure network
• Communication between wireless clients and
wired network resources
• Uses AP
• An AP and its associated wireless clients define the
coverage area.

89
802.11….
• Point-to-point (ad hoc) network
‒is used to support Mutual communication
between wireless clients
‒is created spontaneously and does not support
access to wired networks.
‒Doesn’t require AP

90
Wi-fi...

PoE(Power over Ethernet)= means the wireless access point need not have a separate
power supply. The Ethernet cable which is connected between the switch and AP will also
carry power in addition to data. 91
802.11
• Supports three basic topologies for WLANs
– The independent basic service set (IBSS)
– The basic service set (BSS)
– The extended service set (ESS)
• The MAC layer supports implementations of IBSS,
basic service set, and ESS configurations

92
802.11
• The basic service set (BSS)
• The smallest building block of a wireless LAN
• The configuration relies on an AP
• An AP that acts as the logical server for a single WLAN
cell or channel
• Communication between stations is via the AP
• An AP performs a bridging function and connects multiple
WLAN cells or channels, and connects WLAN cells to a wired
enterprise LAN.
• A BSS may be isolated or it may connect to a backbone
distribution system (DS) through an access point (AP).
• The DS can be a switch, a wired network, or a wireless
network.

93
802.11
• The independent basic service set (IBSS)
– When all the stations in the BSS are mobile stations,
with no connection to other BSSs, the BSS is called an
independent BSS (IBSS).
– Is referred as an Independent configuration or an ad
hoc network
– is analogous to a peer-to-peer office network
– No AP is involved
– Cover a limited area and are not connected to any
large network
– is typically a short-lived network, with a small number
of stations, that is created for a particular purpose.
94
802.11
The extended service set (ESS)
– The configuration consists of two or more basic
service sets that can be linked by either wired or
wireless backbones called a distributed system
– Typically, the distribution system is a wired
backbone LAN but can be any communications
network.
– The ESS hides the mobility of the mobile stations
from everything outside the ESS

95
STA
DS (usually Ethernet)
AP AP

STA
STA
STA
STA STA
STA
BSS
BSS

ESS

96
Three basic topologies for WLANs

97
IEEE 802.11 Distribution System
• 802..11 is suitable for an ad-hoc configuration of nodes
that may or may not be able to communicate with all
other nodes
• Nodes are free to move around
• The set of directly reachable nodes may change over
time
• To deal with this mobility and partial connectivity
– 802.11 defines additional structures on a set of nodes
– Instead of all nodes being created equal, some nodes
are allowed to roam and some are connected to a
wired network infrastructure, they are called Access
Points(AP) and they are connected to each other by a
so-called distribution system
98
Access Points Connected to a Distribution
Network
• Following figure illustrates a distribution system that
connects three access points, each of which services the
nodes in the same region
• Each of these regions is analogous to a cell in a cellular
phone system with the AP is playing the same role as a
base station

99
Access Points Connected to a Distribution
Network…
• Although two nodes can communicate directly with each
other if they are with in reach of each other, the idea
behind this configuration is
– Each nodes associates itself with one access point
– For node A to communicate with node E, A first sends a
frame to its AP-1 which forwards the frame across the
distribution system to AP-3, which finally transmits the
frame to E.

100
How does the Nodes Select their AP
• The technique for selecting an AP is called scanning
– The node sends a Probe(investigation) frame
– All APs within reach reply with a Probe Response frame
– The node selects one of the access points and sends that
AP an Association Request frame
– The AP replies with an Association Response frame

101
How does the Nodes Select their AP
• A node engages this protocol whenever it joins the
network, as well as
• When it becomes unhappy with its current AP?
– This might happen, for example, because the signal from
its current AP has weakened due to the node moving
away from it
– Whenever a node acquires a new AP, the new AP notifies
the old AP of the change via the distribution system

102
Node Mobility
• Consider the situation shown in the following figure
when node C moves from the cell serviced by AP-1 to
the cell serviced by AP-2
• As it moves, it sends Probe frames, which eventually
result in Probe Responses from AP-2
• At some point, C prefer AP-2 over AP-1, and so it
associates itself with that access point. This is called
active scanning since the node is actively searching for
an access point

103
Passive Scanning
• APs also periodically send a Beacon frame that
advertises the capabilities of the access point; these
include the transmission rate supported by the AP
– This is called Passive Scanning
– A node can change to this AP based on the Beacon frame
simply by sending it an Association Request frame back to
the access point

104
IEEE 802.11 Medium Access Control
• Ethernet uses CSMA-CD (Carrier Sense Multiple Access
with Collision Detection)
• Access method of IEEE 802.11 Wi-Fi: CSMA/CA (Carrier
Sense Multiple Access with Collision Avoidance)
• In wireless we can not detect collision because signal
the signal are propagated through air.
• The CSMA/CA protocol is very effective when the
medium is not heavily loaded since it allows stations to
transmit with minimum delay.

105
IEEE 802.11 Medium Access Control…

106
Wi-fi Adaptors

• Is a device that add wireless connectivity to a laptop or


desktop
• Typically it is used to add wi-fi to a desktop computer or
older laptop that never came with wi-fi
• To connect a wireless network, a computer or device must
have a wireless adaptor whether it is internal or external
• The most commonly used external option is a USB wi-fi
adaptor
107
Wireless Access point

• A device which release data between wired network and


wireless devices
• It is a wireless hub that is used by wireless devices to connect
an existing wired network
• A wireless AP Connects directly to an organization’s router
where the router is then connected directly to a modem.
Which gives the wireless devices access to the internet.
108
IEEE 802.11 Services
• IEEE 802.11 defines nine services that provide
functionality equivalent to wired LANs.
The service provider can be either the station or the
distribution system (DS).
– Station services are implemented in every 802.11 station,
including access point (AP) stations.
– Distribution services are provided between basic service
sets (BSSs);
• these services may be implemented in an AP or in another
special purpose device attached to the distribution system.

109
IEEE 802.11 Services
‒ Three of the services are used to control IEEE 802.11
LAN access and confidentiality.
– Six of the services are used to support delivery of MAC
service data units (MSDUs) between stations.
• IEEE 802.11 Services
Service Provider Used to Support
Association Distribution System MSDU Delivery
Authentication Station LAN Access and security
Deauthentication Station LAN Access and Security
Disassociation Distribution System MSDU Delivery
Distribution Distribution System MSDU Delivery
Integration Distribution System MSDU Delivery
MSDU Delivery Station MSDU Delivery
Privacy Station LAN Access and security
Reassociation Distribution System MSDU Delivery 110
IEEE 802.11 Services
• Station services (similar to wired network)
– Authentication: Used to establish the identity of stations
to each other.
– Deauthentication: This service is invoked whenever an
existing authentication is to be terminated.
– Privacy: Used to prevent the contents of messages from
being read by other than the intended recipient.
– Data delivery

111
IEEE 802.11 Services
• Distribution services
– Association
• Make logical connection between the AP to the station – the
AP will not receive any data from a station before the
association.
• Assist the DS to know where to deliver the mobile data
– Reassociation ( Similar to the association )
• Enables an established association to be transferred from one
AP to another,
• allowing a mobile station to move from one BSS to another.
• After Power Save
– Disassociation
• Manually disconnect (PC shutdown or adapter is ejected)
• A notification from either a station or an AP that an existing
association is terminated. 112
IEEE 802.11 Services
– Distribution (AP forwarding using the DS)
• is the primary service used by stations to exchange
MAC frames when the frame must traverse the DS
to get from a station in one BSS to a station in
another BSS.
– Integration
• enables transfer of data between a station on an
IEEE 802.11 LAN and a station on an integrated
IEEE 802.x LAN.

113
Types of Wi-Fi
• Wireless – Fidelity
• Based on the 802.11 standard:
– 802.11
– 802.11b
– 802.11a
– 802.11g
– 802.11n
– 802.11ac
– 802.11ax
114
802.11a
• is a Wi-Fi wireless network communication standard
• IEEE 802.11a makes use of the frequency band called the
Universal Networking Information Infrastructure (UNNI)
• UNNI is divided into three parts.
– The UNNI-1 band (5.15 to 5.25 GHz) is intended for indoor use;
– The UNNI-2 band (5.25 to 5.35 GHz) can be used either indoor
or outdoor,
– The UNNI-3 band (5.725 to 5.825 GHz) is for outdoor use.
• 802.11a installations historically were limited to corporate
environments due to comparatively higher hardware
equipment costs.
• An 802.11a wireless network supports a maximum theoretical
bandwidth of 54 Mbps
115
802.11a
• has several advantages over IEEE 802.11b/g:
– utilizes more available bandwidth than 802.11b/g.
– provides much higher data rates than 802.l1b and the
same maximum data rate as 802.l1g.
– uses a different, relatively uncluttered frequency
spectrum (5 GHz).
– Uses a regulated frequency range which avoid signal
interference from other consumer wireless products
like cordless phones.
• Brick walls and other obstructions affect 802.11a
wireless networks to a greater degree than they do
comparable 802.11b/g networks.
116
802.11b
• is a Wi-Fi wireless network communication technology
• was widely used in first-generation Wi-Fi home
networking products after its introduction in 1999.
• 802.11b LANs support a theoretical maximum data rate
of 11 Mbps
• transmitting in the unregulated 2.4 GHz frequency
range (like 802.11g),
• 802.11b transmitters can encounter radio interference
from other wireless household products like cordless
telephones, microwave ovens, garage door openers,
and baby monitors.
• Uses direct-sequence spread-spectrum technology
117
802.11g
• was ratified in 2003 as an IEEE standard for Wi-Fi
wireless networking.
• supports wireless local area network (WLAN)
communications among computers, broadband
routers and many other consumer devices.
• replaced the older 802.11b technology.
• Operates at 2.4 GHz band
• supports maximum network bandwidth of 54 Mbps
• Is backwards compatible with 802.11b

118
802.11n
• is an IEEE industry standard for Wi-Fi wireless local
network communications, ratified in 2009.
• is designed to replace the older 802.11a, 802.11b
and 802.11g Wi-Fi technologies.
• utilizes multiple wireless antennas in tandem to
transmit and receive data
• The associated term MIMO (Multiple Input,
Multiple Output) refers to the ability of 802.11n and
similar technologies to coordinate multiple
simultaneous radio signal
• MIMO increases both the range and throughput of
a wireless network. 119
802.11n
• An additional technique employed by 802.11n
involves increasing the channel bandwidth.
• As in 802.11a/b/g networking, each .11n device uses
a preset Wi-Fi channel on which to transmit.
• Each .11n channel will use a larger frequency range
than these earlier standards, also increasing data
throughput.
• 802.11n connections support maximum theoretical
network bandwidth up to 300 Mbps depending
primarily on the number of wireless radios
incorporated into devices
120
802.11ac
• is a standard for Wi-Fi wireless networking more
advanced than the previous generation 802.11n
standard
• Compared to 802.11n and its predecessors, 802.11ac
offers better network performance and capability
implemented through more advanced hardware
and device firmware.
• Formally ratified in 2014.
• was designed to perform similar to Gigabit Ethernet.
• offers theoretical data rates of up to 1 Gbps.
• operates in the 5 GHz signal range.

121
Summary of Wi-Fi Protocols

122
HiperLAN
• High Performance Radio LAN
• is a set of wireless local area network (WLAN)
communication standards
• European alternative for the IEEE 802.11 standards
• Defined by the European Telecommunication Standards
Institute (ETSI)
• There are two specifications: HiperLAN/1 and HiperLAN/2
• Uses 5GHz Band of the radio frequency (RF) spectrum
• Range 50 m
• Slow mobility (1.4 m/s)
• sound 32 kbit/s, 10 ns latency
• video 2 Mbit/s, 100 ns latency
• data 10 Mbit/s 123
HiperLAN
• HiperLAN/2 operates at up to 54 Mbps in the same RF
band
• HiperLAN/2 is compatible with 3G (third-generation)
WLAN systems for sending and receiving data, images,
and voice communications
• HyperLAN defines the operation of the lower portion of
the OSI reference model, namely the data link layer and
physical layer
• The data link layer is further divided into two parts, the
channel access control (CAC) sublayer and media access
control (MAC) sublayer.
• HIPERLAN/2 has three basic layers: physical layer (PHY),
data link control layer (DLC), and convergence layer (CL)
124
HiperLAN
Application Layer

Presentation Layer
higher layer protocols
Session Layer

Transport Layer Medium Access Control


(MAC) Sublayer
Network Layer
Channel Access Control
(CAC) Sublayer
Data Link Layer

Physical Layer Physical (PHY) Layer

OSI HIPERLAN
Reference Model Reference Model
125
WiMax – IEEE 802.16
• WiMax - Worldwide Interoperability for Microwave
Access
• Use wireless links with microwave or millimeter wave
radios
• Use licensed spectrum (typically) – 10 - 66 GHz, 2 -
11GHz
– 2.3 GHz, 2.5 GHz and 3.5 GHz
• Are metropolitan in scale
• Provide public network service to fee-paying customers
(typically)
• Use point-to-multipoint architecture with stationary
rooftop or tower-mounted antennas
• Provide efficient transport of heterogeneous traffic
supporting quality of service (QoS)
126
• Are capable of broadband transmissions (2 - 75 Mbps).
WiMax – IEEE 802.16
• Application
– Providing portable mobile broadband
connectivity across cities and countries through a
variety of devices
– Providing a wireless alternative to cable and DSL
for “last mile" broadband access
– Providing data, telecommunications (VoIP) and
IPTV services
– Providing a source of Internet connectivity

127
• Protocol architecture

128
WiMax – IEEE 802.16
• Convergence layer
– Map an upper layer's addresses into 802.16 addresses.
– Translate upper layer QoS parameters into native
802.16 MAC format.
– Adapt the time dependencies of the upper layer
traffic into the equivalent MAC service.

129
WiMax – IEEE 802.16

130
WiMax – IEEE 802.16
• Base stations (BS) and subscriber stations (SS)
• Centralized access control to prevents collisions

131
References
• William Stallings, Wireless Communication and
Networks , 2nd Edition.
– Chapter 7, 11, 13, 14, & 15
• Vijy Garg, Wireless Communication and Networking
– Chapter 19, 20 (20.6, 20.7) , 21
• http://en.wikipedia.org/wiki/WiMAX
• http://en.wikipedia.org/wiki/HiperLAN
• www.google.com
• http://www.tutorial-reports.com/wireless/zigbee/zigbee-
traffic-types.php
• http://compnetworking.about.com/od/wireless80211/
132

You might also like