You are on page 1of 47

Mobile Communications

Chapter 7: Wireless LANs


 Characteristics  HIPERLAN (Não é dado)
 IEEE 802.11  Bluetooth / IEEE 802.15.x
 PHY  IEEE 802.16/.20/.21/.22
 MAC  RFID
 Roaming
 Comparison
 .11a, b, g, h, i …

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.1


Mobile Communication Technology according to IEEE

WiFi
Local wireless networks 802.11a 802.11h
WLAN 802.11 802.11i/e/…/w
802.11b 802.11g

ZigBee
802.15.4 802.15.4a/b
Personal wireless nw.
WPAN 802.15 802.15.5
802.15.2 802.15.3 802.15.3a/b
802.15.1
Bluetooth
Wireless distribution networks
WMAN 802.16 (Broadband Wireless Access) WiMAX
+ Mobility
802.20 (Mobile Broadband Wireless Access)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.2


Characteristics of wireless LANs

Advantages
 very flexible within the reception area
 Ad-hoc networks without previous planning possible
 (almost) no wiring difficulties (e.g. historic buildings, firewalls)
 more robust against disasters like, e.g., earthquakes, fire - or users pulling
a plug...
Disadvantages
 typically very low bandwidth compared to wired networks
(1-10 Mbit/s) due to shared medium
 many proprietary solutions, especially for higher bit-rates, standards take
their time (e.g. IEEE 802.11)
 products have to follow many national restrictions if working wireless, it
takes a vary long time to establish global solutions like, e.g., IMT-2000

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.3


Design goals for wireless LANs

 global, seamless operation


 low power for battery use
 no special permissions or licenses needed to use the LAN
 robust transmission technology
 simplified spontaneous cooperation at meetings
 easy to use for everyone, simple management
 protection of investment in wired networks
 security (no one should be able to read my data), privacy (no one should
be able to collect user profiles), safety (low radiation)
 transparency concerning applications and higher layer protocols, but also
location awareness if necessary

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.4


Comparison: infrared vs. radio transmission

Infrared Radio
 uses IR diodes, diffuse light,  typically using the license free
multiple reflections (walls, ISM band at 2.4 GHz
furniture etc.) Advantages
Advantages  experience from wireless WAN
 simple, cheap, available in and mobile phones can be used
many mobile devices  coverage of larger areas
 no licenses needed possible (radio can penetrate
 simple shielding possible walls, furniture etc.)
Disadvantages Disadvantages
 interference by sunlight, heat  very limited license free
sources etc. frequency bands
 many things shield or absorb IR  shielding more difficult,
light interference with other electrical
 low bandwidth
devices

Example Example
 Many different products
 IrDA (Infrared Data Association)
interface available everywhere

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.5


Comparison: infrastructure vs. ad-hoc networks

infrastructure
network
AP: Access Point
AP

AP wired network
AP

ad-hoc network

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.6


802.11 - Architecture of an infrastructure network

Station (STA)
802.11 LAN  terminal with access mechanisms
802.x LAN
to the wireless medium and radio
contact to the access point
STA1 Basic Service Set (BSS)
BSS1
 group of stations using the same
Access Portal
radio frequency
Point Access Point
Distribution System  station integrated into the wireless
LAN and the distribution system
Access
ESS Point Portal
 bridge to other (wired) networks
BSS2 Distribution System
 interconnection network to form
one logical network (EES:
Extended Service Set) based
STA2 802.11 LAN STA3 on several BSS

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.7


802.11 - Architecture of an ad-hoc network

Direct communication within a limited


802.11 LAN
range
 Station (STA):
terminal with access mechanisms to
the wireless medium
STA1
 Independent Basic Service Set
IBSS1 STA3
(IBSS):
group of stations using the same
radio frequency
STA2

IBSS2

STA5

STA4 802.11 LAN

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.8


IEEE standard 802.11

fixed
terminal
mobile terminal

infrastructure
network

access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.9


802.11 - Layers and functions

MAC PLCP Physical Layer Convergence Protocol


 access mechanisms, fragmentation,  clear channel assessment signal
encryption (carrier sense)
MAC Management PMD Physical Medium Dependent
 synchronization, roaming, MIB,  modulation, coding
power management PHY Management
 channel selection, MIB
Station Management
 coordination of all management
functions

Station Management
LLC
DLC

MAC MAC Management

PLCP
PHY

PHY Management
PMD

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.10


802.11 - Physical layer (classical)

3 versions: 2 radio (typ. 2.4 GHz), 1 IR


 data rates 1 or 2 Mbit/s
FHSS (Frequency Hopping Spread Spectrum)
 spreading, despreading, signal strength, typ. 1 Mbit/s
 min. 2.5 frequency hops/s (USA), two-level GFSK modulation
DSSS (Direct Sequence Spread Spectrum)
 DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying),
DQPSK for 2 Mbit/s (Differential Quadrature PSK)
 preamble and header of a frame is always transmitted with 1 Mbit/s, rest
of transmission 1 or 2 Mbit/s
 chip sequence (11 symbols) : +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1
(Barker code)
 max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
Infrared
 850-950 nm, diffuse light, typ. 10 m range
 carrier detection, energy detection, synchronization

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.11


FHSS PHY packet format (Não)

Synchronization
 synch with 010101... pattern
SFD (Start Frame Delimiter)
 0000110010111101 start pattern
PLW (PLCP_PDU Length Word)
 length of payload incl. 32 bit CRC of payload, PLW < 4096
PSF (PLCP Signaling Field)
 data of payload (1 or 2 Mbit/s)
HEC (Header Error Check)
 CRC with x16+x12+x5+1

80 16 12 4 16 variable bits
synchronization SFD PLW PSF HEC payload

PLCP preamble PLCP header

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.12


DSSS PHY packet format
Synchronization
 synch., gain setting, energy detection, frequency offset compensation
SFD (Start Frame Delimiter)
 1111001110100000
Signal
 data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK)
Service Length
 future use, 00: 802.11 compliant  length of the payload
HEC (Header Error Check)
 protection of signal, service and length, x16+x12+x5+1
128 16 8 8 16 16 variable bits
synchronization SFD signal service length HEC payload

PLCP preamble PLCP header


128 +16 + 8 + 8 + 16 + 16 = 192 bit a 1 Mbps -> 192 us (em 802.11b a partir de “signal“ pode ser a 2 Mbps)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.13


802.11 - MAC layer I - DFWMAC

Traffic services
 Asynchronous Data Service (mandatory)
 exchange of data packets based on “best-effort”
 support of broadcast and multicast
 Time-Bounded Service (optional)
 implemented using PCF (Point Coordination Function)
Access methods
 DFWMAC-DCF CSMA/CA (mandatory)
 collision avoidance via randomized „back-off“ mechanism
 minimum distance between consecutive packets
 ACK packet for acknowledgements (not for broadcasts)
 DFWMAC-DCF w/ RTS/CTS (optional)
 Distributed Foundation Wireless MAC
 avoids hidden terminal problem
 DFWMAC- PCF (optional)
 access point polls terminals according to a list

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.14


802.11 - MAC layer II

Priorities
 defined through different inter frame spaces
 no guaranteed, hard priorities
 SIFS (Short Inter Frame Spacing)
 highest priority, for ACK, CTS, polling response
 PIFS (PCF IFS)
 medium priority, for time-bounded service using PCF
 DIFS (DCF, Distributed Coordination Function IFS)
 lowest priority, for asynchronous data service

Tslot = 9; SIFS = 16; PIFS = 25; DIFS = 34 us

DIFS DIFS
PIFS
SIFS
medium busy contention next frame
t
direct access if
medium is free  DIFS

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.15


802.11 - CSMA/CA access method I

contention window (CW)


DIFS DIFS (randomized back-off
mechanism)

medium busy next frame

direct access if t
medium is free  DIFS slot time

 station ready to send starts sensing the medium (Carrier Sense


based on CCA, Clear Channel Assessment)
 if the medium is free for the duration of an Inter-Frame Space (IFS),
the station can start sending (IFS depends on service type)
 if the medium is busy, the station has to wait for a free IFS, then the
station must additionally wait a random back-off time (collision
avoidance, multiple of slot-time) CW = 7, 15, 31, 63, 127
 if another station occupies the medium during the back-off time of
the station, the back-off timer stops (fairness)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.16


802.11 - Binary Exponential Backoff

Stations choose their backoff time randomly from contention


Window

Ideal contention window size is trade-off between acceptable load


and experienced delay

Initial contention window size (CWmin) is 7 slots (backoff time between


0 and 7)

After collision (no ack), contention window is “doubled” until CWmax


= 255 is reached: 7 -> 15 -> 31 -> 63 -> 127 -> 255

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.17


802.11 - competing stations - simple version (no RTS/CTS)

DIFS DIFS DIFS DIFS


boe bor boe bor boe busy
station1

boe busy
station2

busy
station3

boe busy boe bor


station4

boe bor boe busy boe bor


station5
t

busy medium not idle (frame, ack etc.) boe elapsed backoff time

packet arrival at MAC bor residual backoff time

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.18


802.11 - CSMA/CA access method II

Sending unicast packets


 station has to wait for DIFS before sending data
 receivers acknowledge at once (after waiting for SIFS) if the packet was
received correctly (CRC)
 automatic retransmission of data packets in case of transmission errors

DIFS
data
sender
SIFS
ACK
receiver
DIFS
other data
stations t
waiting time contention

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.19


802.11 – DFWMAC (Distributed Foundation Wireless MAC)

Sending unicast packets


 station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the medium)
 acknowledgement via CTS after SIFS by receiver (if ready to receive)
 sender can now send data at once, acknowledgement via ACK
 other stations store medium reservations distributed via RTS and CTS

DIFS
RTS data
sender
SIFS SIFS
CTS SIFS ACK
receiver

NAV (RTS) DIFS


other NAV (CTS) data
stations t
defer access contention
NAV – Network Allocation Vector

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.20


Fragmentation

DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS
CTS SIFS ACK1 SIFS ACK2
receiver

NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations t
contention

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.21


DFWMAC-PCF

t0 t1
SuperFrame

medium busy PIFS SIFS SIFS


D1 D2
point
coordinator SIFS SIFS
U1 U2
wireless
stations
stations‘ NAV
NAV
contention free period

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.22


802.11 - Frame format

Types
 control frames, management frames, data frames
Sequence numbers
 important against duplicated frames due to lost ACKs
Addresses
 receiver, transmitter (physical), BSS identifier, sender (logical)
Miscellaneous
 sending time, checksum, frame control, data
bytes 2 2 6 6 6 2 6 0-2312 4
Frame Duration/ Address Address Address Sequence Address
Data CRC
Control ID 1 2 3 Control 4

bits 2 2 4 1 1 1 1 1 1 1 1
Protocol To From More Power More
Type Subtype Retry WEP Order
version DS DS Frag Mgmt Data

MAC header + trailer = 34 octets

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.23


MAC address format

scenario to DS from address 1 address 2 address 3 address 4


DS
ad-hoc network 0 0 DA SA BSSID -
infrastructure 0 1 DA BSSID SA -
network, from AP
infrastructure 1 0 BSSID SA DA -
network, to AP
infrastructure 1 1 RA TA DA SA
network, within DS

DS: Distribution System


AP: Access Point
DA: Destination Address
SA: Source Address
BSSID: Basic Service Set Identifier
RA: Receiver Address (AP)
TA: Transmitter Address (AP)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.24


Endereços MAC 802.11

00 – adhoc (BSSID)
SA DA
DA, SA, BSSID

01 – wired to wireless BSSID


DA
SA
DA, BSSID, SA DA,SA

BSSID
10 – wireless to wired SA DA
BSSID, SA, DA DA,SA

11 – via wireless (bridge) TA RA


SA DA
RA, TA, DA, SA DA,SA DA,SA

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.25


Special Frames: ACK, RTS, CTS

Acknowledgement
bytes 2 2 6 4
ACK Frame Receiver
Duration CRC
Control Address

Request To Send
bytes 2 2 6 6 4
Frame Receiver Transmitter
RTS Duration CRC
Control Address Address

Clear To Send
bytes 2 2 6 4
Frame Receiver
CTS Duration CRC
Control Address

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.26


802.11 - MAC management

Synchronization
 try to find a WLAN, try to stay within a WLAN
 timer etc.
Power management
 sleep-mode without missing a message
 periodic sleep, frame buffering, traffic measurements
Association/Reassociation
 integration into a LAN
 roaming, i.e. change networks by changing access points
 scanning, i.e. active search for a network
MIB - Management Information Base
 managing, read, write (SNMP)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.27


Synchronization using a Beacon (infrastructure)

beacon interval

access
point B B B B

busy busy busy busy


medium
t
value of the timestamp B beacon frame (BSSID, Timestamp)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.28


Synchronization using a Beacon (ad-hoc)

beacon interval

B1 B1
station1

B2 B2
station2

busy busy busy busy


medium
t
value of the timestamp B beacon frame random delay

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.29


Power management

Idea: switch the transceiver off if not needed


States of a station: sleep and awake
Timing Synchronization Function (TSF)
 stations wake up at the same time
Infrastructure
 Traffic Indication Map (TIM)
 list of unicast receivers transmitted by AP
 Delivery Traffic Indication Map (DTIM)
 list of broadcast/multicast receivers transmitted by AP
Ad-hoc
 Ad-hoc Traffic Indication Map (ATIM)
 announcement of receivers by stations buffering frames
 more complicated - no central AP
 collision of ATIMs possible (scalability?)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.30


Power saving with wake-up patterns (infrastructure)

TIM interval DTIM interval

D B T T d D B
access
point
busy busy busy busy
medium

p d
station
t
T TIM D DTIM awake

B broadcast/multicast p PS poll d data transmission


to/from the station

PS – Power Saving

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.31


Power saving with wake-up patterns (ad-hoc)

ATIM
window beacon interval

B1 A D B1
station1

B2 B2 a d
station2

t
B beacon frame random delay A transmit ATIM D transmit data

awake a acknowledge ATIM d acknowledge data

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.32


Scanning

Scanning involves the active search for a BSS. IEEE 802.11 differentiates
between passive and active scanning.
Passive scanning - listening into the medium to find other networks, i.e.,
receiving the beacon of another network issued by access point.
Active scanning - sending a probe on each channel and waiting for a
response. Beacon and probe responses contain the information
necessary to join the new BSS.

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.33


Active Scanning

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.34


802.11 - Roaming

No or bad connection? Then perform:


Scanning
 scan the environment, i.e., listen into the medium for beacon signals or
send probes into the medium and wait for an answer
Reassociation Request
 station sends a request to one or several AP(s)
Reassociation Response
 success: AP has answered, station can now participate
 failure: continue scanning
AP accepts Reassociation Request
 signal the new station to the distribution system
 the distribution system updates its data base (i.e., location information)
 typically, the distribution system now informs the old AP so it can release
resources

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.35


Roaming:
Active Scanning / Authentication/ Reassociation

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.36


Handoff with IAPP (Inter Access Point Protocol), IEEE 802.11f

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.37


WLAN: IEEE 802.11b

Data rate Connection set-up time


 1, 2, 5.5, 11 Mbit/s, depending on  Connectionless/always on
SNR Quality of Service
 User data rate max. approx. 6  Typ. Best effort, no guarantees
Mbit/s (unless polling is used, limited
support in products)
Transmission range
Manageability
 300m outdoor, 30m indoor
 Limited (no automated key
 Max. data rate ~10m indoor distribution, sym. Encryption)
Frequency Special Advantages/Disadvantages
 Free 2.4 GHz ISM-band  Advantage: many installed systems,
lot of experience, available
Security
worldwide, free ISM-band, many
 Limited, WEP insecure, SSID vendors, integrated in laptops,
Availability simple system
 Disadvantage: heavy interference
 Many products, many vendors
on ISM-band, no service
guarantees, slow relative speed
only

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.38


IEEE 802.11b – PHY frame formats

Long PLCP PPDU format


128 16 8 8 16 16 variable bits
synchronization SFD signal service length HEC payload

PLCP preamble PLCP header

192 µs at 1 Mbit/s DBPSK 1, 2, 5.5 or 11 Mbit/s

Short PLCP PPDU format (optional)


56 16 8 8 16 16 variable bits
short synch. SFD signal service length HEC payload

PLCP preamble PLCP header


(1 Mbit/s, DBPSK) (2 Mbit/s, DQPSK)

96 µs 2, 5.5 or 11 Mbit/s

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.39


Channel selection (non-overlapping)

Europe (ETSI)

channel 1 channel 7 channel 13

2400 2412 2442 2472 2483.5


22 MHz [MHz]
US (FCC) / Canada (IC)

channel 1 channel 6 channel 11

2400 2412 2437 2462 2483.5


22 MHz [MHz]

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.40


WLAN: IEEE 802.11a
Data rate Connection set-up time
 6, 9, 12, 18, 24, 36, 48, 54 Mbit/s,  Connectionless/always on
depending on SNR
 User throughput (1500 byte packets): 5.3
Quality of Service
(6), 18 (24), 24 (36), 32 (54)  Typ. best effort, no guarantees (same as
 6, 12, 24 Mbit/s mandatory all 802.11 products)
Transmission range Manageability
 100m outdoor, 10m indoor  Limited (no automated key distribution,
 E.g., 54 Mbit/s up to 5 m, 48 up to 12 m, sym. Encryption)
36 up to 25 m, 24 up to 30m, 18 up to 40
m, 12 up to 60 m Special Advantages/Disadvantages
Frequency  Advantage: fits into 802.x standards, free
 Free 5.15-5.25, 5.25-5.35, 5.725-5.825 ISM-band, available, simple system,
GHz ISM-band uses less crowded 5 GHz band
Security  Disadvantage: stronger shading due to
 Limited, WEP insecure, SSID higher frequency, no QoS
Availability
 Some products, some vendors

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.41


IEEE 802.11a – PHY frame format

4 1 12 1 6 16 variable 6 variable bits


rate reserved length parity tail service payload tail pad

PLCP header

PLCP preamble signal data


12 1 variable symbols

6 Mbit/s 6, 9, 12, 18, 24, 36, 48, 54 Mbit/s

250 Ksymbol/s -> Tsymbol = 4 ms -> PLCP+signal = 13x4 = 52 ms

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.42


Operating channels for 802.11a / US U-NII

36 40 44 48 52 56 60 64 channel

5150 5180 5200 5220 5240 5260 5280 5300 5320 5350 [MHz]
16.6 MHz

center frequency =
5000 + 5*channel number [MHz]
149 153 157 161 channel

5725 5745 5765 5785 5805 5825 [MHz]


16.6 MHz

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.43


OFDM in IEEE 802.11a (and HiperLAN2)

OFDM with 52 used subcarriers (64 in total)


 48 data + 4 pilot
 (plus 12 virtual subcarriers)
 312.5 kHz spacing
pilot 312.5 kHz

-26 -21 -7 -1 1 7 21 26 subcarrier


channel center frequency number

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.44


WLAN: IEEE 802.11 – developments (03/2005)

802.11c: Bridge Support


 Definition of MAC procedures to support bridges as extension to 802.1D
802.11d: Regulatory Domain Update
 Support of additional regulations related to channel selection, hopping sequences
802.11e: MAC Enhancements – QoS
 Enhance the current 802.11 MAC to expand support for applications with Quality of
Service requirements, and in the capabilities and efficiency of the protocol
 Definition of a data flow (“connection”) with parameters like rate, burst, period…
 Additional energy saving mechanisms and more efficient retransmission
802.11f: Inter-Access Point Protocol
 Establish an Inter-Access Point Protocol for data exchange via the distribution
system
802.11g: Data Rates > 20 Mbit/s at 2.4 GHz; 54 Mbit/s, OFDM
 Successful successor of 802.11b, performance loss during mixed operation with 11b
802.11h: Spectrum Managed 802.11a
 Extension for operation of 802.11a in Europe by mechanisms like channel
measurement for dynamic channel selection (DFS, Dynamic Frequency Selection)
and power control (TPC, Transmit Power Control)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.45


WLAN: IEEE 802.11– developments (03/2005)
802.11i: Enhanced Security Mechanisms
 Enhance the current 802.11 MAC to provide improvements in security.
 TKIP enhances the insecure WEP, but remains compatible to older WEP systems
 AES provides a secure encryption method and is based on new hardware
802.11j: Extensions for operations in Japan
 Changes of 802.11a for operation at 5GHz in Japan using only half the channel
width at larger range
802.11k: Methods for channel measurements
 Devices and access points should be able to estimate channel quality in order to be
able to choose a better access point of channel
802.11m: Updates of the 802.11 standards
802.11n: Higher data rates above 100Mbit/s
 Changes of PHY and MAC with the goal of 100Mbit/s at MAC SAP
 MIMO antennas (Multiple Input Multiple Output), up to 600Mbit/s are currently
feasible
 However, still a large overhead due to protocol headers and inefficient mechanisms
802.11p: Inter car communications
 Communication between cars/road side and cars/cars
 Planned for relative speeds of min. 200km/h and ranges over 1000m
 Usage of 5.850-5.925GHz band in North America

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.46


WLAN: IEEE 802.11– future developments (03/2005)
802.11r: Faster Handover between BSS
 Secure, fast handover of a station from one AP to another within an ESS
 Current mechanisms (even newer standards like 802.11i) plus incompatible devices from
different vendors are massive problems for the use of, e.g., VoIP in WLANs
 Handover should be feasible within 50ms in order to support multimedia applications efficiently
802.11s: Mesh Networking
 Design of a self-configuring Wireless Distribution System (WDS) based on 802.11
 Support of point-to-point and broadcast communication across several hops
802.11t: Performance evaluation of 802.11 networks
 Standardization of performance measurement schemes
802.11u: Interworking with additional external networks
802.11v: Network management
 Extensions of current management functions, channel measurements
 Definition of a unified interface
802.11w: Securing of network control
 Classical standards like 802.11, but also 802.11i protect only data frames, not the control frames.
Thus, this standard should extend 802.11i in a way that, e.g., no control frames can be forged.

Note: Not all “standards” will end in products, many ideas get stuck at working group level
Info: www.ieee802.org/11/, 802wirelessworld.com, standards.ieee.org/getieee802/

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.47

You might also like