1 / 54

Wireless LANs (WLANs)

Wireless LANs (WLANs). Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only be used by adopters of the book. Orientation. LANs Are Governed by Layer 1 and 2 Standards So they are governed by OSI Standards

ceciliad
Download Presentation

Wireless LANs (WLANs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless LANs (WLANs) Chapter 5Updated January 2009 Raymond Panko’sBusiness Data Networks and Telecommunications, 7th editionMay only be used by adopters of the book

  2. Orientation • LANs Are Governed by Layer 1 and 2 Standards • So they are governed by OSI Standards • Chapter 3 (Layer 1 Transmission) • Chapter 4 • Ethernet 802.3 standards are OSI standards • Chapter 5 • Wireless 802.11 LAN (WLAN) standards are OSI standards • But not all wireless technologies are OSI standards • Operation, security, and management • Bluetooth and other wireless options

  3. Basic 802.11 WLAN Operation

  4. 5-1/5-2: 802.11 Wireless LANs (WLANs) • Wireless LAN Technology • 802.11 is the dominant WLAN technology today • Standardized by the 802.11 Working Group • Popularly known as Wi-Fi

  5. 5-1/5-2: 802.11 Wireless LANs (WLANs) Wireless hosts connect by radio to access points

  6. 5-3: 802.11 Wireless Access Points and NICs

  7. 5-1/5-2: 802.11 Wireless LANs (WLANs) 1 WLANs usually supplement wired LANs instead of replacing them. The access point connects wireless users to the firm’s main wired LAN (Ethernet) This gives the mobile client user access to the firm’s servers on the wired LAN and the firm’s router for Internet access

  8. 5-1/5-2: 802.11 Wireless LANs (WLANs) Companies can build large WLANs by placing access points judiciously around the building

  9. 5-1/5-2: 802.11 Wireless LANs (WLANs) Transmission speed: up to 300 Mbps but usually 10 Mbps to 100 Mbps. Distances between station and access point: 30 to 100 meters.

  10. Wireless Transmission Concepts

  11. 5-4: Recap of Radio Propagation Concepts • Frequency • Radio waves are measured in terms of frequency • Measured in hertz (Hz)—the number of complete cycles per second • Most Common Frequency Range for WLANs: • High megahertz to low gigahertz range

  12. Electromagnetic Spectrum The McGraw-Hill Companies, Inc., 1998 WCB/McGraw-Hill

  13. 5-4: Recap of Radio Propagation Concepts from Chapter 3 • Propagation Problems • Absorptive attenuation • Shadow zones (dead spots) • Multipath interference • As Frequency Increases • Greater attenuation through absorptive attenuation • Deader shadow zones

  14. 5-5: The Frequency Spectrum, Service Bands, and Channels

  15. 5-6: Channel Bandwidth and Speed • Signal Bandwidth • Chapter 3 showed a wave operating at a single frequency • Real signals spread over a range of frequencies • As speed increases, the signal spreads more

  16. 5-6: Channel Bandwidth and Speed • Channel Bandwidth • Channel bandwidth is the highest frequency in a channel minus the lowest frequency • An 88.0 MHz to 88.2 MHz channel has a bandwidth of 0.2 MHz (200 kHz)

  17. 5-6: Channel Bandwidth Speed • Broadband and Narrowband Channels • Broadband means wide channel bandwidth and therefore high speed • Narrowband means narrow channel bandwidth and therefore low speed • Today, any speed, whether in channels or not, is called narrowband or broadband • Narrowband is below 200 kbps • Broadband is above 200 kbps

  18. 5-6: Channel Bandwidth and Speed • The Golden Zone • Most organizational radio technologies operate in the golden zone in the high megahertz to low gigahertz range • Golden zone frequencies are high enough for there to be large total bandwidth • Golden zone frequencies are low enough to allow fairly good propagation characteristics • Growing demand creates intense competition for frequencies in the Golden Zone

  19. 5-6: Channel Bandwidth and Speed • Channel Bandwidth and Spectrum Scarcity • Why not make all channels broadband? • There is a limited amount of spectrum at desirable frequencies • Making each channel broader than needed would mean having fewer channels or widening the service band • Service band design requires tradeoffs between speed requirements, channel bandwidth, and service band size

  20. Licensed and Unlicensed Bands and Spread Spectrum Transmission

  21. 5-8: Licensed and Unlicensed Bands • Licensed Radio Bands • If two nearby radio hosts transmit in the same channel, their signals will interfere • Most radio bands are licensed bands, in which hosts need a license to transmit • The government limits licenses to avoid interference • Television bands, AM radio bands, etc., are licensed • In cellular telephone bands, which are licensed, only the central transceivers are licensed, not the mobile phones

  22. 5-8: Licensed and Unlicensed Bands • Unlicensed Radio Bands • Some service bands are set aside as unlicensed bands • Hosts do not need to be licensed to be turned on or moved • 802.11 operates in unlicensed radio bands • This allows access points and hosts to be moved freely

  23. 5-9: 802.11 in the 2.4 GHz and 5 GHz Unlicensed Bands • The 2.4 GHz Unlicensed Band • Defined the same in almost all countries (2.400 GHz to 2.485 GHz) • This sameness reduces radio costs • Propagation characteristics are good • For 20 MHz 802.11 channels, only three nonoverlapping channels are possible • Channels 1, 6, and 11

  24. 5-9: 802.11 in the 2.4 GHz and 5 GHz Unlicensed Bands • The 2.4 GHz Unlicensed Band • There will be mutual channel interference between nearby access points transmitting in the same 20 MHz channel • With only 3 channels, it is difficult or impossible to put nearby access points on different channels in you have many that are near each other • Also, potential interference problems from microwave ovens, cordless telephones, etc.

  25. 5-10: Mutual Interference in the 2.4 GHz Unlicensed Band If two nearby access points operate on the same channel, the access points and their stations will interfere with each other

  26. 5-9: 802.11 in the 2.4 GHz and 5 GHz Unlicensed Bands • The 5 GHz Unlicensed Band • Radios in the 5 GHz band are expensive because frequencies in different countries are different and because higher-frequency technology is more expensive than lower-frequency technology • Also, smaller market sales mean more expensive devices • Shorter propagation distance than in the 2.4 GHz band because of greater absorptive attenuation at higher frequencies • Deader shadow zones because of higher frequencies

  27. 5-9: 802.11 in the 2.4 GHz and 5 GHz Unlicensed Bands • The 5 GHz Unlicensed Band • More bandwidth than in the 2.4 GHz band, so between 11 and 24 non-overlapping channels • Allows many nearby access points to operate on non-overlapping channels • Or, some access points can operate on two channels • They serve some clients with one channel, some with the other • This allows them to serve more clients with good throughput

  28. IEEE 802.11 • IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. • Two kinds of services • Basic Service Set (BSS) • Extended Service Set (ESS)

  29. Basic service sets (BSSs)

  30. Extended service sets (ESSs)

  31. A BSS without an AP is called an ad hoc network; a BSS with an AP is called aninfrastructure network.

  32. Wireless LAN = WiFi (wireless fidelity) Ad-hoc networks are “on the fly” networks where multiple devices with wireless LAN cards are configured to communicate directly with each other. There is no central point in which all the devices communicate through; each device talks to the other devices directly.

  33. Ad-hoc networks are primarily used for file sharing between two users or for playing games in mobile locations. • Although they require no hardware except two hosts with wireless NICs, there are significant limitations associated with ad-hoc networks: • No automatic IP addressing available; addresses must be manually set for each host on the network. • No Filtering: Noability to limit access to the network through the use of MAC address filtering or other security techniques • No ability to connect the wireless network to a wired network

  34. For these reasons, ad-hoc networks represent a small number of the networks in use today. Even most home users have implemented infrastructure networks using access points In an infrastructure network configuration, wireless hosts communicate through access points (APs). An access point, sometimes referred to as a base station, is a device that connects to a wired network and bridges traffic between the wired and wireless networks.

  35. Typical Access Point Operation

  36. 5-14: Typical 802.11 Wireless LAN Operation with Wireless Access Points 802.11 and 802.3 have different frames 1. The access point receives an 802.11 frame carrying the packet 2. The access point removes the packet, places the packet into an 802.3 frame and passes the frame on

  37. 5-15: Hosts and Access Points Transmit in a Single Channel The access point and all the hosts it serves transmit in a single channel If two devices transmit at the same time, their signals will collide, becoming unreadable Media access control (MAC) methods govern when a device may transmit; It only lets one device transmit at a time 5-37

  38. Why not using CSMA/CD? Hidden station problem: [discussed next] Signal fading: The distance between stations can be great. Signal fading could prevent a station at one end from hearing a collision at the other end.

  39. Hidden Terminal Problem Other senders’ information are hidden from the current sender, so that transmissions at the same receiver cause collisions. A B C

  40. The figure shows an example of the hidden station problem. Station B has a transmission range shown by the left oval (sphere in space); every station in this range can hear any signal transmitted by station B. Station C has a transmission range shown by the right oval (sphere in space); every station located in this range can hear any signal transmitted by C. Station C is outside the transmission range of B; likewise, station B is outside the transmission range of C. Station A, however, is in the area covered by both Band C; it can hear any signal transmitted by B or C.

  41. Assume that station B is sending data to station A. In the middle of this transmission, station C also has data to send to station A. However, station C is out of B's range and transmissions from B cannot reach C. Therefore C thinks the medium is free. Station C sends its data to A, which results in a collision at A because this station is receiving data from both B and C. In this case, we say that stations Band C are hidden from each other with respect to A. Hidden stations can reduce the capacity of the network because of the possibility of collision.

  42. Wireless LANs use collision avoidance CSMA/CA instead of CSMA/CD CSMA/CA and NAV CTS CTS DIFS: Distributed Interframe Space NAV: Network Allocation Vector SIFS: Short Interframe Space RTS: Request to Send CTS: Clear-to-Send

  43. CSMA/CA and NAV • Before sending a frame, the source station senses the medium by checking the energy level at the carrier frequency. The channel uses a persistence strategy with back-off until the channel is idle. After the station is found to be idle, the station waits for a period of time called the distributed interframe space (DIFS); then the station sends a control frame called the request to send (RTS). • After receiving the RTS and waiting a period of time called the short interframe space (SIFS), the destination station sends a control frame, called the clear to send (CTS), to the source station. This control frame indicates that the destination station is ready to receive data. • The source station sends data after waiting an amount of time equal to SIFS. • The destination station, after waiting an amount of time equal to SIFS, sends an acknowledgment to show that the frame has been received. Acknowledgment is needed in this protocol because the station does not have any means to check for the successful arrival of its data at the destination. On the other hand, the lack of collision in CSMAlCD is a kind of indication to the source that data have arrived.

  44. Network Allocation Vector How do other stations defer sending their data if one station acquires access? In other words, how is the collision avoidance aspect of this protocol accomplished? The key is a feature called NAV. When a station sends an RTS frame, it includes the duration of time that it needs to occupy the channel. The stations that are affected by this transmission create a timer called a network allocation vector (NAV) that shows how much time must pass before these stations are allowed to check the channel for idleness. Each time a station accesses the system and sends an RTS frame, other stations start their NAV. In other words, each station, before sensing the medium to see if it is idle, first checks its NAV to see if it has expired.

  45. Collision During Handshaking What happens if there is collision during the time when RTS or CTS control frames are in transition, often called the handshaking period? Two or more stations may try to send RTS frames at the same time. These control frames may collide. However, because there is no mechanism for collision detection, the sender assumes there has been a collision if it has not received a CTS frame from the receiver. The back-off strategy is employed, and the sender tries again.

  46. BLUETOOTH Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously.

  47. Piconet

  48. Scatternet

  49. Main 802.11 Standards

  50. 5-18: Specific 802.11 Wireless LAN Standards • 802.11g • Most popular 802.11 standard today • 54 Mbps rated speed with much slower throughput • Generally sufficient for Web browsing • Inexpensive • All access points support it

More Related