Module-3 - Short Notes
Module-3 - Short Notes
Advantages of WLANs
Flexibility: Within radio coverage, nodes can communicate without further restriction.
Radio waves can penetrate walls, senders and receivers can be placed anywhere
Planning: Wireless ad-hoc networks no need any previous planning but wired network
needs wiring plans cabling with the right plugs and probably interworking units
Design: Small Devices, independent of devices can use it at anywhere.
Robustness: Wireless networks can survive disasters, e.g., earthquakes or users pulling a
plug. If the wireless devices survive, people can still communicate.
Cost: After providing wireless access to the infrastructure via an access point for the first
user, adding additional users to a wireless network will not increase the cost.
Disadvantages
• Quality of service: higher error rates due to interference and higher delay/delay
variation
• Proprietary solutions: No standard products. Lot of adaptors are required.
• Restrictions: Several government and non-government institutions worldwide
regulate the operation and restrict frequencies to minimize interference.
• Safety and security: The open radio interface makes eavesdropping much easier
in WLANs. All standards must offer (automatic) encryption, privacy
mechanisms, support for anonymity etc.
Design goals
• Global operation: WLAN products should sell in all countries so, national and
international frequency regulations have to be considered.
• Low power: Devices communicating via a WLAN are typically also wireless devices
running on battery power.
• License-free operation: The equipment must operate in a license-free band, such as the 2.4
GHz ISM (Industry Scientific and Medical) band.
• Robust transmission technology: It use radio transmission, many other electrical devices
can interfere with them. Antennas are typically omnidirectional, not directed. Senders and
receivers may move.
• Simplified spontaneous cooperation: WLANs should not require complicated setup
routines but should operate spontaneously after power-up.
• Easy to use: Wireless LANs are made for simple use. They should not require complex
management, but rather work on a plug-and-play basis.
• Protection of investment: The wireless LANs should support the same data types and
services that standard LANs support.
• Safety and security: Wireless LANs should be safe to operate, especially regarding low
radiation if used, Users should not be able to read personal data during transmission, i.e.,
encryption mechanisms should be integrated. The networks should also take into account
user privacy,
• Transparency for applications: Existing applications should continue to run over WLANs,
the only difference being higher delay and lower bandwidth.
Applications
• Internet Access: Every member of a family or small business can easily share a single high-speed connection
Everybody can simultaneously have access to the Internet and roam anywhere in the house or office.
• Voice over Wireless: transmission of voice conversations
• Inventory Control: The connections between the manufacturing equipment and main control systems are
wireless, the company can reconfigure the assembly process at any time from anywhere, saving time and
money.
• Health Care: Hospitals are deploying wireless networks to improve operational efficiency and convenience
• Education: Schools and Colleges using Wi-Fi
• Utilities: Identifies the activities and usage of machines and send the report
• Field Service: No need to go anywhere
• Field Sales: Sales professionals are always on the move and meeting with customers
• Vending: Status about the vending machine
• Home Security
• Public Networks
• Location-Based Services (Identifying the location of a particular object)
Infrastructure and ad-hoc networks
Adhoc wireless networks
IEEE802.11
802.11 LAN
Portal
Synchronization: The first 128 bits are not only used for synchronization, but also gain setting,
energy detection and frequency offset compensation. The synchronization field only consists of
scrambled 1 bits.
SFD: 1111001110100000
Signal: Indicate the data rate of the payload 0x0A indicates 1 Mbit/s (and thus DBPSK) 0x14
indicates 2 Mbit/s (and thus DQPSK)
Service: This field is reserved for future use
Length : Length of Payload
Header error check (HEC): checksum
Infra red
• The PHY layer, which is based on infrared (IR) transmission, uses near visible
light at 850–950 nm.
• Infrared light is not regulated apart from safety restrictions (using lasers instead of
LEDs). The standard does not require a line-of-sight between sender and receiver.
• This allows for point-to-multipoint communication. The maximum range is about 10m
if no sunlight or heat sources interfere with the transmission.
• Typically, such a network will only work in buildings, e.g., classrooms, meeting rooms
etc.
• Frequency reuse is very simple a wall is more than enough to shield one IR based
IEEE 802.11 network from another.
Medium access control layer
• Mac has to control medium access, but it can also offer support for roaming,
authentication, and power conservation.
• The basic services provided by the MAC layer are the mandatory
asynchronous data service and an optional time-bounded service.
• Three basic access mechanisms have been defined for IEEE 802.11 (the
mandatory basic method based on a version of CSMA/CA, distributed
coordination function (DCF) & point coordination function (PCF))
• DCF only offers asynchronous service, while PCF offers both asynchronous
and time-bounded service
● Short inter-frame spacing (SIFS): The shortest waiting time for medium access, highest
priority is defined for short control messages, such as acknowledgements of data packets or
polling responses. For DSSS SIFS is 10 µs and for FHSS it is 28 µs.
● PCF inter-frame spacing (PIFS): A waiting time between DIFS and SIFS, medium priority
is used for a time-bounded service. PIFS is defined as SIFS plus one slot time. (point
coordination function)
● DCF inter-frame spacing (DIFS): This parameter denotes the longest waiting time and has
the lowest priority for medium access. This waiting time is used for asynchronous data
service within a contention period. DIFS is defined as SIFS plus two slot times. (Distributed
coordination function)
Basic DFWMAC-DCF using CSMA/CA (Distributed foundation wireless
medium access control)
If the medium is busy, nodes have to wait for the duration of DIFS, entering a
contention phase
Each node now chooses a random backoff time within a contention window
The node continues to sense the medium. As soon as a node senses the channel is
busy, it has lost this cycle and has to wait for the next chance.
But if the randomized additional waiting time for a node is over and the medium
is still idle, the node can access the medium immediately.
Basic DFWMAC–DCF with several competing senders
Now all three stations choose a backoff time within the contention window and start
counting down their backoff timers.
station-1 as sum of boe (the elapsed backoff time) and bor (the residual backoff time). The
same is shown for station-5.
Station-2 has a total backoff time of only boe and gets access to the medium first.
IEEE 802.11 unicast data transfer
After DIFS the sender can issue a request to send (RTS) control packet.
Every node receiving this RTS has to set its net allocation vector (NAV) in
accordance with the duration field.
NAV specifies at when the station can try to access the medium again.
Fragmentation of user data
DFWMAC-PCF with polling
At time t0 the contention-free period of the super frame should theoretically start, but another station is still transmitting
data.
PCF also defers to DCF, and the start of the super frame may be postponed.
The only possibility of avoiding variations is not to have any contention period at all.
After the medium has been idle until t1, the point coordinator has to wait for PIFS before accessing the medium. As PIFS
is smaller than DIFS, no other station can start sending earlier.
MAC frames
Duration/ID: The field value is less than 32,768, the medium is occupied (in µs). The value is
above 32,768 are reserved for identifiers. This field is used for setting the NAV for the virtual
reservation mechanism using RTS/CTS.
Address 1 to 4: The four address fields contain standard IEEE 802 MAC addresses. (mobile
stations and access point)
Sequence control: Due to the acknowledgement mechanism frames may be duplicated. Sequence
number is used to filter duplicates.
Protocol version: This 2 bit field indicates the current protocol version and is fixed to 0 by
now.
Type: 00-Management, 01- Control, 10-data. The value 11 is reserved.
Subtype: 0000 for association request & data frame, 1000 for beacon. 1011 for RTS is a
control frame and 1100 for CTS.
To DS/From DS
More fragments: This field is set to 1 it indicates, that another fragment is have to follow.
Retry: This bit is set to 1 for retransmission frames. Used to eliminate duplicate frames.
Power management: Set to 1 indicates that the station goes into power-save mode. Set to 0,
indicates the station stays active.
More data: This field is used to indicate a receiver that a sender has more data to send than
the current frame.
Wired equivalent privacy (WEP): This field indicates that the standard security mechanism
of 802.11 is applied.
Order: If this bit is set to 1 the received frames must be processed in strict order.
HIPERLAN 1
• HIPERLAN 1 as a wireless LAN supporting priorities and packet life time for data
transfer at 23.5 Mbit/s, including forwarding mechanisms, topology discovery, user
data encryption, network identification and power conservation mechanisms.
• HIPERLAN 1 should operate at 5.1–5.3 GHz with a range of 50 m in buildings at 1
W transmit power.
Phases of the HIPERLAN
Prioritization
Determine the highest priority of a data packet ready to be sent by competing
nodes.
HIPERLAN 1 offers five different priorities for data packets ready to be sent.
• The objective of the prioritization phase is to make sure that no node with a
lower priority gains access to the medium while packets with higher priority are
waiting at other nodes
• In the first step of the prioritization phase, the priority detection, time is divided
into five slots, slot 0 (highest priority) to slot 4 (lowest priority)
• If a node has the access priority p, it has to listen into the medium for p slots.
• If the node senses the medium is idle for the whole period of p slots, the node
asserts the priority by immediately transmitting a burst for the duration.
Contention (Elimination): Select the highest current priority for transmission.
Several nodes may now enter the elimination phase
Time is divided into 12 slots,
The probability of bursting within a slot is 0.5
• Each contending node sends an elimination burst with length n as determined via the
probabilities and then listens to the channel during the survival verification interval
• A contending node survives the elimination phase only if, it senses the channel is idle
during its survival verification period. Otherwise, the node is eliminated.
• The nodes which are survive this elimination phase, can continue with the next phase.
Yield Phase
During the yield phase, the remaining nodes only listen into the medium
without sending any additional bursts.
Each node in the yield phase, senses the channel during the whole period, it
has survived only if the medium is free. Otherwise, it withdraws for the rest of
the current transmission cycle.
At least one node will survive this phase and can start to transmit data.
Transmission
Transmit the packet selected node.
The sender expects to receive an immediate acknowledgement from the
destination, called an acknowledgement (AK-HCPDU) (HIPERLAN 1 CAC
protocol data unit)
Bluetooth
● Radio: Specification of the air interface, i.e., frequencies, modulation, and transmit power.
● Baseband: Description of basic connection establishment, packet formats, timing, and basic QoS
parameters.
• Link manager protocol: Link set-up and management between devices
also perform security functions and parameter negotiation.
• Host controller interface (HCI) Provides interface between the
baseband and L2CAP to access the hardware status and control registers.
• Logical link control and adaptation protocol (L2CAP): Adaptation of
higher layers to the baseband
• RFCOMM supports multiple serial ports over a single physical channel.
• Service discovery protocol: Device discovery in close proximity plus
querying of service characteristics.
• Telephony control protocol specification – binary (TCS BIN)
describes a bit-oriented protocol that defines call control signaling for
the establishment of voice and data calls between Bluetooth devices. It
also describes mobility and group management functions.
• AT modem commands: Used by Telephony applications
• BNEP: Bluetooth network encapsulation protocol
• OBEX: (object exchange protocol) Used to exchange the Calendar and
business card objects (vCalendar/vCard).