Ieee 802.11
Ieee 802.11
MODULE III
IEEE 802.11
The IEEE standard 802.11 (IEEE, 1999) specifies the most famous family of WLANs in which
many products are available. This standard belongs to the group of 802.x LAN standards, e.g.,
802.3 Ethernet or 802.5 Token Ring.
System architecture
Wireless networks can exhibit two different basic system architectures as shown in: infrastructure-
based or ad-hoc. Several nodes, called stations (STAi), are connected to access points (AP).
Stations are terminals with access mechanisms to the wireless medium and radio contact to the
AP. The stations and the AP which are within the same radio coverage form a basic service set
(BSSi). The BSSs are connected via a distribution system. A distribution system connects several
BSSs via the AP to form a single network and thereby extends the wireless coverage area. This
network is now called an extended service set (ESS) and has itsown identifier, the ESSID.
Without knowing the ESSID (and assuming nohacking) it should not be possible to participate in
the WLAN. The distribution system connects the wireless networks via the APs with a portal,
which forms the interworking unit to other LANs.Stations can select an AP and associate with it.
The APs support roaming the distribution system handles data transfer between the different APs.
APs provide synchronization within a BSS, support power management, and can control medium
access to support time-bounded service.
IEEE 802.11 allows the building of ad-hoc networks between stations, thus forming one or more
independent BSSs (IBSS) . In this case, an IBSS comprises a group of stations using the same
radio frequency. Stations STA1, STA2, and STA3 are in IBSS1, STA4 and STA5 in IBSS2. This
means for example that STA3 can communicate directly with STA2 but not with STA5. Several
IBSSs can either be formed via the distance between the IBSSs or by using different carrier
frequencies . IEEE 802.11 does not specify any special nodes that support routing, forwarding of
data or exchange of topology information as, e.g., HIPERLAN 1 or Bluetooth .
\
2
Protocol architecture
The IEEE 802.11 standard only covers the physical layer PHY and medium access layer MAC .
The physical layer is subdivided into the physical layer convergence protocol (PLCP) and the
physical medium dependent sublayer PMD . The basic tasks of the MAC layer comprise medium
access, fragmentation of user data, and encryption. The PLCP sublayer provides a carrier sense
signal, called clear channel assessment (CCA), and provides a common PHY service access point
(SAP) independent of the transmission technology. Finally, the PMD sublayer handles modulation
and encoding/decoding of signals. The MAC management supports the association and re-
association of a station to an access point and roaming between different access points. It also
controls authentication mechanisms, encryption, synchronization of a station with regard to an
access point, and power management to save battery power. MAC management also maintains the
MAC management information base (MIB).
The main tasks of the PHY management include channel tuning and PHY MIB maintenance.
Finally, station management interacts with both management layers and is responsible for
additional higher layer functions (e.g., control of bridging and interaction with the distribution
system in the case of an access point).
\
3
1 Physical layer
IEEE 802.11 supports three different physical layers: one layer based on infra red and two layers
based on radio transmission . All PHY variants include the provision of the clear channel
assessment signal (CCA). The three versions of a PHY layer defined in the standard are :
● Synchronization: The PLCP preamble starts with 80 bit synchronization, which is a 010101...
bit pattern. This pattern is used for synchronization of potential receivers and signal detection
by the CCA.
● Start frame delimiter (SFD): The following 16 bits indicate the start of the frame and provide
frame synchronization. The SFD pattern is 0000110010111101.
● PLCP_PDU length word (PLW): This first field of the PLCP header indicates the length of the
payload in bytes including the 32 bit CRC at the end of the payload. PLW can range between 0
and 4,095.
● PLCP signalling field (PSF): This 4 bit field indicates the data rate of the payload following●
Header error check (HEC): Finally, the PLCP header is protected by a 16 bit checksum with the
standard ITU-T generator polynomial G(x) = x16 + x12 + x5 + 1.
\
4
frequency . In the case of IEEE 802.11 DSSS, spreading is achieved using the 11-chip
Barker sequence (+1, –1, +1, +1, –1, +1, +1, +1, –1, –1, –1).
Synchronization: The first 128 bits are not only used for synchronization, but also gain setting,
energy detection (for the CCA), and frequency offset compensation. The synchronization field
only consists of scrambled 1 bits.
● Start frame delimiter (SFD): This 16 bit field is used for synchronization at the beginning of a
frame and consists of the pattern 1111001110100000.
● Signal: Originally, only two values have been defined for this field to indicate the data rate of
the payload.
● Service: This field is reserved for future use; however, 0x00 indicates an IEEE 802.11
compliant frame.
● Length: 16 bits are used in this case for length indication of the payload in microseconds.
● Header error check (HEC): Signal, service, and length fields are protected by this checksum .
c) Infra red
The PHY layer, which is based on infra red (IR) transmission, uses near visible light at 850–950
nm. Infra red light is not regulated apart from safety restrictions (using lasers instead of LEDs).
The standard does not require a line-of-sight between sender and receiver. The maximum range
is about 10 m if no sunlight or heat sources interfere with the transmission. Typically, such a
network will only work in buildings, e.g., classrooms, meeting rooms etc. Frequency reuse is very
simple – a wall is more than enough to shield one IR based IEEE802.11 network from another.
(Bluetooth technology).
\
5
For all access methods, several parameters for controlling the waiting time
before medium access are important. Figure 7.9 shows the three different parameters that define
the priorities of medium access. The values of the parameters depend on the PHY and are defined
in relation to a slot time.
Short inter-frame spacing (SIFS): The shortest waiting time for medium access (so the highest
priority) is defined for short control messages, such as acknowledgements of data packets or
polling responses. For DSSS it is 10 μs and for FHSS it is 28 μs.
PCF inter-frame spacing (PIFS): A waiting time between DIFS and SIFS (and thus a medium
priority) is used for a time-bounded service. An access point polling other nodes only has to wait
PIFS for medium. It is defined as SIFS plus one slot time.
DCF inter-frame spacing (DIFS): This parameter denotes the longest waiting time (has the
lowest priority ) for medium access . This waiting time is used for asynchronous data service within
a contention period .It is defined as SIFS plus two slot times.
\
6
\
7
More data: In general, this field is used to indicate a receiver that a sender has more data to
send than the current frame. This can be used by an access point to indicate to a station in
power-save mode that more packets are buffered. Or it can be used by a station to indicate to
an access point after being polled that more polling is necessary as the station has more data
ready to transmit.
Wired equivalent privacy (WEP): This field indicates that the standard security mechanism of
802.11 is applied. However, due to many weaknesses found in the WEP algorithm higher layer
security should be used to secure an 802.11 network .
Order: If this bit is set to 1 the received frames must be processed in strict order.
MAC management
MAC management plays a central role in an IEEE 802.11 station as it more or less controls all
functions related to system integration and the main functions are :
Synchronization: Functions to support finding a wireless LAN, synchronization of internal
clocks, generation of beacon signals.
Power management: Functions to control transmitter activity for power conservation, e.g.,
periodic sleep, buffering, without missing a frame.
Roaming: Functions for joining a network (association), changing access points, scanning for
access points.
Management information base (MIB): All parameters representing the current state of a
wireless station and an access point are stored within a MIB for internal and external access. A
MIB can be accessed via standardized protocols such as the simple network management protocol
(SNMP).
Bluetooth
Bluetooth technology discussed here aims at so-called ad-hoc piconets, which are local area networks
with a very limited coverage and without the need for an infrastructure. This is a different type of network
is needed to connect different small devices in close proximity (about 10 m) without expensive wiring or
the need for a wireless infrastructure . Infra red data association (IrDA) interface with transmission rates
of, e.g., 115 kbit/s or 4 Mbit/s. There are various problems with IrDA: its very limited range (typically 2 m
for built-in interfaces), the need for a line-of-sight between the interfaces, and, it is usually limited to two
participants, i.e., only point-to-point connections are supported.
User scenarios
Many different user scenarios can be imagined for wireless piconets or WPANs
Connection of peripheral devices :In a wireless network like bluetooth, no wires are needed for
data transmission.
Support of ad-hoc networking: Imagine several people coming together, discussing issues,
exchanging data (schedules, sales figures etc.). Forinstance, students might join a lecture, with
the teacher distributing data totheir personal digital assistants (PDAs). Wireless networks can
support thistype of interaction;
Bridging of networks: Using wireless piconets, a mobile phone can be connected to a PDA or
laptop in a simple way. Mobile phones will not have full WLAN adapters built in, but could have
\
8
a Bluetooth chip. The mobile phone can then act as a bridge between the local piconet and, e.g.,
the global GSM network .
Networking
A piconet is a collection of Bluetooth devices which are synchronized to the same hopping
sequence. One device in the piconet can act as master (M), all other devices connected to the
master must act as slaves (S).
The master determines the hopping pattern in the piconet and the slaves have to synchronize
to this pattern. Group of piconets with overlapping coverage is called scatternet .
Link manager protocol The link manager protocol (LMP) manages various aspects of the
radio link between a master and a slave and the current parameter setting of the devices.
The following groups of functions are covered by the LMP:
Authentication, pairing, and encryption: LMP has to control the exchange of random numbers
and signed responses. LMP is not directly involved in the encryption process, but sets the
encryption mode (no encryption, point-to-point, or broadcast), key size, and random speed.
\
9
Synchronization: Devices can also exchange timing information related to the time differences
(slot boundaries) between two adjacent piconets.
Capability negotiation: Not all Bluetooth devices will support all features that are described in
the standard, so devices have to agree the usage of, e.g., multi-slot packets, encryption, voice
encoding, park/sniff/hold mode etc .
Quality of service negotiation: Different parameters control the QoS of a Bluetooth device at
these lower layers.
Power control: A Bluetooth device can measure the received signal strength. Depending on this
signal level the device can direct the sender of the measured signal to increase or decrease its
transmit power.
Link supervision: LMP has to control the activity of a link, it may set up new links, or it may declare
the failure of a link.
State and transmission mode change: Devices might switch the master/slave role, detach
themselves from a connection, or change the operating mode.
Every device, which is currently not participating in a piconet (and not switched off), is in standby
mode.
A device wants to establish a piconet: A user of the device wants to scan for other devices in the
radio range. The device starts the inquiry procedure by sending an inquiry access code (IAC) that
is common to all Bluetooth devices.
As soon as a device detects an inquiry it returns a packet containing its device address and timing
information required by the master to initiate a connection. From that moment on, the device
acts as slave. If the inquiry was successful, a device enters the page mode.
During the page -After finding all required devices the master is able to set up connections to
each device, i.e., setting up a piconet. Depending on the device addresses received the master
calculates special hopping sequences to contact each device individually. The slaves answer and
synchronize with the master’s clock, i.e., start with the hopping sequence defined by the master.
The master may continue to page more devices that will be added to the piconet. As soon as a
device synchronizes to the hopping pattern of the piconet it also enters the connection state.
The connection state comprises the active state and the low power states park, sniff, and hold.
In the active state the slave participates in the piconet by listening, transmitting, and receiving.
To save battery power, a Bluetooth device can go into one of three lowpower states:
PARK state : low power consumption state .The device releases its MAC address but remain
synchronized with the piconet . The device is still a member of the piconet, but gives room for
another device to become active .
HOLD state: The power consumption is a little higher . The device does not release its MAC
address and can resume sending at once after transition out of HOLD state .
SNIFF state: The sniff state has the highest power consumption of the low power states. Here,
the device listens to the piconet at a reduced rate . The interval for listening into the medium
can be programed and is application dependent.
\
10
STANDBY
BY
INQUIRY
PAGE
TRANSMIT CONNECTED
HOLD SNIFF
PARK
Packet header
3 4 1 1 1 8
MAC address LINK Type Flow ARQN SEQN HEC
ARQN : Acknowledgemet NO , SEQN : Sequence NO, HEC : header error check sequence
\
11
HiperLAN Family
Hiperlan 1 Hiperlan2 HiperAccess HiperLink
Description Wireless Ethernet Wireless ATM Wireless Local Loop Wireless Point-to-Point
PROTOCOL ARCHITECTURE
HIGHER LAYERS
HIPERLAN MAC layer offers its services to the next higher layer at the MAC service access point
(MSAP ) .This is typically the LLC layer .MAC service include communication service over a
single HIPER LAN ,the transport of MAC service data unit (MSDU). The HIPERLAN MAC entities
(HM entity ) use the MAC protocol to exchange an HMPDU –HIPERLAN MAC PDU .
\
12
The HIPERLAN CAC layer was specifically designed to provide channel access with priorities and
to free the higher layers from special wireless channel characteristics .The CAC service accepts
HIPERLAN CAC service data units HCSDU at the HCSAP-HIPERLAN channel service access point
and the hc entities exchange HCPDUs using the CAC protocol .
Finally the physical layer PHY offers mechanisms to transfer bitstreams and specifies radio
channels ,modulation techniques ,transmit power etc.
HCSDU
HCSAP
CAC SERVICE HCSAP
CAC layer
HC-entity HC-entity
HCPDU -CAC protocol
PHY service
\
13
LBR data burst : consists of a low bit rate part comprising a receiver identification .
Fig : LBR-HBR data units
HBR
Channel access control sublayer : two service primitives for data transfer in the CAC sub
layer
HC-UNITDATA .req – (source and destination HCSAP,HCSDU,HIPERLAN identifier ,channel acces
priority ) :used for sending data .
HC –UNITDATA.ind –(source and destination HCSAP ,HCSDU ,HIPERLAN identifier ) :indicates
incoming data .