ITT575 - Chapter 3
ITT575 - Chapter 3
ITT575 - Chapter 3
Computing
Chapter 3
802.
802.11 Wireless LANs
Contents
23 Future
Mobile Works
ad hoc Networks (MANET)
1
Learning Outcomes
Frequency Hopping
LAN Notebook
Direct Sequence AP
2
What Are We Going to Learn Today
Notebook Notebook
Notebook Notebook
Topology
3
Wireless Networking Topologies
4
Wireless Metropolitan Area Network (WMAN)
5
Wireless Local Area Network (WLAN)
• Networks with hundred’s of feet of
coverage
• Provides end user access to LANs
• Coverage for buildings and campuses
• Great fit for 802.11 technology
• 802.11 WLAN provides balance of:
– Performance
– Cost
– Availability
– Technology evolution
6
IEEE 802.11 Topologies
• The purpose of 802.11 is to interconnect radio cards
• Every wireless device has a radio card
• All wireless devices are referred to as Stations (STA)
• Three topologies defined by 802.11 – Service Sets
– Basic Service Set (BSS)
– Extended Service Set (ESS)
– Independent Basic Service Set (IBSS)
• Nonstandard Topologies
– Bridging, Repeating, Workgroup bridging
– Mesh networking (growing in importance)
7
Basic Service Set (BSS)
• Single AP with one or more client stations
• AP connects to DS
• Stations that are members of the BSS are associated
– Created a layer 2 connection
• Stations do not communicate with each other
– Must go through AP
8
Extended Service Set (ESS)
• ESS - is comprised of a number BSS’s
• ESS stations must have the same SSID
• The BSSID is the “name” of the BSS (not same as SSID)
• APs can be positioned so that cells overlap to facilitate
roaming
– Wireless devices choose AP based on signal strength
– Stations going from one BSS to another will deal with Handoff
ESS
Wired LAN SSID
BSS2
(BSSID2)
BSS3
BSS1 (BSSID3)
(BSSID1)
9
Medium Access Control
10
Carrier Sense Multiple Access with
Collision Detection (CSMA-CD)
• Procedure
– Listen to medium and wait until it is free
– Then start talking, but listen to see if someone else starts talking
too
– If a collision occurs, stop and then start talking after a random
back off time
• This scheme is used for hub based Ethernet
• Advantages
– More efficient than basic CSMA
• Disadvantages
– Requires ability to detect collisions
CSMA/CD
• Carrier Sense - Devices sense the carrier
(cable) to see if it is clear
• Multiple Access - Many devices access the
carrier (cable) at the same time
• Collision Detection - Detect if a collision occurs
by monitoring the carrier (voltage on the cable)
11
CSMA/CD (Continued)
• Can we borrow media access methods
from fixed networks?
• Problems in wireless networks
– a radio cannot usually transmit and receive at the
same time
– signal strength decreases proportionally to the square
of the distance or even more
– the sender would apply CS and CD, but the collisions
happen at the receiver
– it might be the case that a sender cannot “hear” the
collision, i.e., CD does not work
– furthermore, CS might not work if, e.g., a terminal is
“hidden”
12
Collision Detection Problem in 802.11
• Transmit signal is MUCH stronger than received
signal
• Due to high path loss in the wireless
environment (up to 100dB)
• Impossible to “listen” while transmitting because
you will drown out anything you hear
• Also transmitter may not even have much of a
signal to detect due to geometry
CSMA/CA
• Carrier Sense - Devices sense the carrier to see
if it is clear
• Multiple Access - Many devices access the
carrier at the same time
• Collision Avoidance - The sender before
transmitting contacts the receiver and ask for an
acknowledgement – if not received the request
is repeated after a random time interval
13
Carrier Sense Multiple Access with
Collision Avoidance (CSMA-CA)
• Procedure
– Similar to CSMA but instead of sending
packets control frames are exchanged
– RTS = request to send
– CTS = clear to send
– DATA = actual packet
– ACK = acknowledgement
A B
14
Carrier Sense Multiple Access with Collision
Avoidance (CSMA-CA)
• Disadvantages
– Not as efficient as CSMA-CD
– Doesn’t solve all the problems of MAC in
wireless networks (more to come)
– PCF (optional)
• access point polls terminals according to a list
IEEE802.11 MAC
Architecture
15
Access Methods in 802.11
16
DCF CSMA/CA - Carrier Sense
• In IEEE 802.11, carrier sensing is performed
– at the air interface (physical carrier sensing), and
– at the MAC layer (virtual carrier sensing)
• Physical carrier sensing
– detects presence of other users by analyzing all detected packets
– Detects activity in the channel via relative signal strength from other
sources
• Virtual carrier sensing is done by sending MPDU duration
information in the header of RTS/CTS and data frames
• Channel is busy if either mechanisms indicate it to be
– at the air interface (physical carrier sensing), and
– Duration field indicates the amount of time (in microseconds) required
to complete frame transmission
– Stations in the BSS use the information in the duration field to adjust
their network allocation vector (NAV)
Example
• Suppose Martha is sending a frame to George.
• Vivian also receives frame with NAV = 10ms.
– does not attempt transmission until the NAV has decremented to 0.
Note: Stations only update NAV when the duration field value received greater than what is currently stored in their NAV.
17
DCF CSMA/CA - Distributed Coordination Function (DCF)
• Transmitting station must wait a specific amount of time after the medium becomes
available.
• This time value is known as the DCF Interframe Space (DIFS).
• Once the DIFS interval elapses, the medium becomes available for station access
contention.
Example (Continued)
• Vivian and George might want to transmit frames when Martha's transmission is
complete.
– Both stations should have the same NAV values, and both will physically sense when the medium is idle.
– There is a high probability that both stations will attempt to transmit when the medium becomes idle,
causing a collision.
• To avoid this situation, DCF uses a random backoff timer.
– The random backoff algorithm randomly selects a value from 0 to the contention window (CW) value.
• Vivian ready to transmit.
– Her NAV timer has decremented to 0, and the PHY also indicates the medium is idle.
– Vivian selects a random backoff time (in this case, CW is 7) and waits the selected number of slot times
before transmitting.
• After four slot times pass, Vivian can transmit. Random Backoff
• But what if George's station has a random backoff time of two time slots? with DCF Medium Access
– Vivian updates her NAV with that new value.
– Vivian must wait for her NAV to decrement to 0 and her PHY to report that the medium is available again
before she can resume her backoff. (In this example, Vivian must wait an additional two slot times before
attempting to transmit)
DCF Medium
Access Process
18
DCF CSMA/CA - Acknowledgment Frame
• Why it is needed? A packet might get lost during transmission.
• Introduced by 802.11 to make sure that data transmissions would not get
lost .
• How does it works?
– When a destination host receives a packet, it sends back a notification to the
sending unit.
– If the sender does not receive an ACK, it will know that this packet was not
received and will transmit it again.
• All this takes place at the MAC layer.
• What happen if an ACK has not been received?
– The sending unit will grab the radio medium before any other unit can and it
resends the packet.
– This allows recovery from interference without the end user being aware that a
communications error has occurred. HOW?
ACK frames are allowed to skip the random backoff process and wait a short interval
after the frame has been received to transmit the acknowledgment.
The short interval the receiving station waits is known as the short interframe space
(SIFS) .
The SIFS interval is shorter than a DIFS interval by two slot times.
It guarantees the receiving station the best possible chance of transmitting on the
medium before another station does.
Labu Labi
19
Dealing with Hidden Terminals
• CSMA/CA works when every station can receive
transmissions from every other station
• Not always true
• Hidden terminal
– some stations in an area cannot hear
transmissions from others
• Exposed terminal
– some (but not all) stations can hear
transmissions from stations not in the local
area
Workstation A
Signal Diameter
Workstation B
Signal Diameter
A C
Workstation C
Signal Diameter
B
20
Hidden Node Problem (Continued)
• A and C cannot hear each other.
• A sends to B, C cannot receive A.
• C wants to send to B, C senses a “free”
medium (CS fails)
• Collision occurs at B.
• A cannot receive the collision (CD fails).
• A is “hidden” for C.
A C
A C D
– A starts sending to B.
– C senses carrier, finds medium in use and has
to wait for A->B to end.
– D is outside the range of A, therefore waiting
is not necessary.
21
Solution for Hidden & Exposed Terminals
• C first sends a Request-to-Send (RTS) to B Note: IFS = Interframe Space (IFS)
RTS RTS
A CTS CTS C D
B DATA
ACK
Mechanisms for CA
• Use of Request-To-Send (RTS) and Confirm-to-Send
(CTS) mechanism
– When a station wants to send a packet, it first sends an RTS.
The receiving station responds with a CTS. Stations that can
hear the RTS or the CTS then mark that the medium will be busy
for the duration of the request (indicated by Duration ID in the
RTS and CTS)
– Stations will adjust their Network Allocation Vector (NAV): time
that must elapse before a station can sample channel for idle
status
• this is called virtual carrier sensing
– RTS/CTS are smaller than long packets that can collide
• Use of InterFrame Spaces (IFS)
22
802.11 – RTS/CTS
23
802.11 - Priorities
24
IEEE802.11 Access Timing Interval
Five time intervals
The slot time, defined in
the PHY layer
The short interframe space
(SIFS) defined by the PHY
layer
The priority interframe
space (PIFS)
The distributed interframe
space (DIFS)
The extended interframe
space (EIFS). Used by a
station to set its NAV when
it receives a frame
containing errors, allowing
the possibility for the
ongoing MAC frame
exchange to complete
before another
transmission attempt.
25
Access Methods in 802.11
– PCF (optional)
• access point polls terminals according to a list
26
How CSMA/CA Works
• CSMA/CA components
– Carrier sense
– DCF
– Acknowledgment frames
– Request to Send/Clear to Send (RTS/CTS) medium
reservation
– Frame fragmentation
– Point coordination function (PCF)
Fragmentation
• Frame fragmentation is a MAC layer function that is
designed to increase the reliability of frame transmission
across the wireless medium.
• A frame is broken up into smaller fragments and transmitted
individually.
• WHY? If any fragment of the frame encounters any errors or
a collision, only the fragment needs to be retransmitted, not
the entire frame.
DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS
CTS SIFS ACK1 SIFS ACK2
receiver
NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations t
contention
27
Frame Fragmentation Process
• Each fragmented frame has a MAC header, FCS, and a fragment number to indicate
position order in the MSDU (MAC Service Data Unit).
• Each fragment is sent independently and requires a separate Acknowledgement (ACK)
from the receiving station.
• The receiving station will combine the fragments in the same order based on the fragment
number.
• Although frame fragmentation helps to improve frame error rate, it does however increases
the MAC overhead due to a greater number of ACK frames being sent and also the MAC
header and CRC being incurred on every fragmented frames.
Fragmentation
28
Cisco Aironet 350 Client Adapters
• PCMCIA card for Laptops and PDAs
• PCI adapter for Desktops
• Mini-PCI for embedded applications
• Driver Support
–Windows 95, 98, Me, NT 4.0, 2000, XP
–Windows CE 2.11, 3.0 (Pocket PC)
–Linux
–Mac OS 9, X
• Utilities include user configuration and site survey tool for simple
installation and upgrade
• Workgroup Bridge
29
Past Year Question
JAN 2013 (Part A)
• Briefly describe the following terms:
Basic Service Set (BSS) (2 Marks)
A topologies defined by 802.11 that requires an AP to
connect with one or more client stations.
30
Past Year Question
JUL 2013 (Part B)
• Access points (APs) are typically used to connect a wireless LAN to a
wired LAN infrastructure. The 802.11 protocol used to communicate
between a wireless node and an AP uses Request-to-Send (RTS) and
Clear-to-Send (CTS) frames as well as acknowledgments of frames.
Why does the 802.11 protocol use these frames when the 802.3
(Ethernet) protocol does not?
To solve Hidden terminal problem (1 pt) and Exposed Terminal problem.
Using RTS and CTS eliminates both problems. The station wishing to
transmit sends an RTS frame that includes information about the receiving
station and the length of time required to transmit. Any other station within
range hears the RTS and knows the medium is going to be in use for the
time specified. The receiving station receives the RTS and when ready to
receive the transmission sends a CTS frame that also includes the
transmission time. In this case any station with the receiving stations area
then knows the medium will be in use for the specified time. In this way all
stations that overlap with either the sender or the receiver will not transmit
until the specified time has passed allow the transmission to complete
without error.
31
Wireless Networks
Wireless networks can be divided in two
fundamental categories:
Infrastructure-based
• Use fixed base stations (infrastructure) which are responsible for
coordinating communication between the mobile hosts (nodes).
• For example, cellular networks are infrastructure-based networks built from
PSTN backbone switches, MSCs, base stations, and mobile hosts.
• Each node has its strict specific responsibility in the network. WLANs
typically also fall into this category.
Wireless Networks
An Ad-hoc network
An infrastructure wireless
network
32
When do we need Ad Hoc Networks
• No infrastructure is available? –E.g., in disaster
areas
• It is too expensive/inconvenient to set up? –E.g.,
in remote, large construction sites
• There is no time to set it up? –E.g., in military
operations
33
Ad Hoc Networks
• An Ad-hoc network is a local area network or
some other small network, especially one with
wireless (or temporary plug in connections), in
which some of the network devices are the part of
the network only for the duration of a
communications session.
• Allows new network devices to be quickly added.
• Each user has a unique network address that is
recognized as the part of the network.
34
Problems/Challenges for Ad Hoc Networks
• Without a central infrastructure, things become much more difficult
• Problems are due to
Lack of central entity for organization available
Without a central entity (like a base station), participants must organize
themselves into a network (self-organization)
Pertains to (among others):
Medium access control –no base station can assign transmission resources, must be
decided in a distributed fashion
Finding a route from one participant to another
Limited range of wireless communication
For many scenarios, communication with peers outside immediate
communication range is required
Direct communication limited because of distance, obstacles
Mobility of participants
In many (not all!) ad hoc network applications, participants move around
Direct communication limited because of distance, obstacles
Battery-operated entities
In many (not all!) ad hoc network applications, participants move around
Energy-efficient networking protocols
E.g., use multi-hop routes with low energy consumption (energy/bit)
•E.g., take available battery capacity of devices into account
35
Mobile Ad Hoc Networks (MANET)
• Host movement frequent
• Topology change frequent
B
A B A
36
MANETs Routing Protocols
• Ad-hoc Networks require efficient routing protocols
because determining successful routing paths and
delivering messages in a decentralized environment
where network topology fluctuates is not a well defined
problem.
• An optimal route at a certain time may not work seconds
later.
• Discussed below are three categories that existing ad-
hoc network routing protocols fall into:
– Table Driven Protocols
– On Demand Protocols
– Hybrid Protocols
Hybrid
DSDV, WRP, ABR, DSR,
Protocols
STAR AODV, TORA
ZRP
37
Table Driven Routing Protocol
• Also known as Pro-active routing protocols/algorithms
• Requires each node to maintain one or more tables to
store routing information.
• Each node uses routing information to store the location
information of other nodes in the network and this
information is then used to move data among different
nodes in the network.
• Have lower latency since routes are maintained at all
times
• Disadvantages
– Respective amount of data for maintenance
– Slow reaction on restructuring and failures
38
Hybrid Routing Protocols
• Combine proactive and reactive protocols to try and
exploit their strengths.
• Divide the network into zones, and use one protocol
within the zone, and another between them.
39
AODV (Continued)
The source broadcasts a route packet
The neighbors in turn broadcast
source RREQ the packet till it reaches the
destination
destination
RREP
Reply packet follows
the reverse path of
route request packet
recorded in broadcast
packet
40
AODV - Path Discovery
RREQ structure
<src_addr, src_sequence_#, broadcast_id, dest_addr,
dest_sequence_#, hop_cnt>
src_addr and broadcast_id uniquely identifies a RREQ
41
AODV - Path Discovery
1. Reverse Path Setup
These entries are maintained for at least enough time, for the
RREQ to traverse the network and produce a reply
42
AODV - Route Discovery
43
AODV - Route Discovery
44
AODV - Route Maintenance
45
AODV - Control Messages
Three message types are defined by AODV:
RREQ
When a route is not available for the desired destination, a
route request packet is flooded (broadcast) throughout the
network.
RREP
It a node either is, or has a valid route to, the destination, it
unicasts a route reply message back to the source.
RERR
When a path breaks, the nodes on both sides of the links
issues a route error to inform their end nodes of the link
break.
46
AODV - Local Connectivity Maintenance
47
Past Year Question
JAN 2013 (Part A)
• State 5 challenges of Mobile Ad Hoc Networks.
Lack of central entity for organization available
Finding a route from one participant to another
Limited range of wireless communication
Effect to topological changes
Power Consciousness
Frequency of updates (Overhead)
48
Past Year Question
JUL 2013 (Part B)
• By using the following diagram
(Figure 1), explain the
processes involve in the route
discovery process in the AODV
protocol. Assuming that N1
(node 1) is trying to find a route
to N6 (node 6). You must relate
your answer with Route
Request Messages (RREQ)
and Route Reply Messages
(RREP).
49
Thank You!
50