Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

Size: px
Start display at page:

Download "Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)"

Transcription

1 Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, School of Computer Science, Telecommunications, and Information Systems DePaul University ABSTRACT This paper presents an analysis of the technical requirements for Internet Protocol (IP) and Medium Access Control (MAC) protocol to support Dedicated Short Range Communications (DSRC) which is a critical element of the Intelligent Transportation System (ITS). This study classifies the DSRC applications into four categories: unicast vehicle-to-vehicle, unicast roadside-to-vehicle, broadcast vehicle-to-vehicle, and broadcast roadside-to-vehicle. A detailed message flow diagram is developed for each category. This paper also analyzes various optional procedures in the standard where these procedures should be considered requirements in DSRC. A major contribution of this study is to introduce a new feature, bridging with layer-3 forwarding, to support multi-hop DSRC communications.. 1 Introduction Intelligent Transportation System (ITS) involves applying advanced information, networking, and other technologies to improve the economic and safety of the transportation system [1][2], which includes, but not limited to highways, railroads, and rural/urban/suburban roads. The foundation of ITS is a communication system for real-time information gathering and analysis where such a system shall use radio frequency (RF) for wireless communications. This paper discusses the technical requirements of a new wireless standard, Dedicated Short Range Communications (DSRC), and its applications in supporting ITS. In recognition of this need, Federal Communication Commission (FCC) allocated 75 MHz spectrum in the 5.9GHz band for DSRC in 1998 [3], which is above the Unlicensed National Information Infrastructure (UNII) band used by the IEEE a standard [4] GHz UNII lower band (4 channels) a GHz UNII mid-band (4 channels) GHz UNII upper band (4 channels) GHz DSRC (7 channels) Figure 1. DSRC Spectrum band This new spectrum is different from the legacy DSRC spectrum as shown in Table 1 [5]. Table 1. Legacy and New DSRC Standards Legacy New Band MHz 5,850-5,925 GHz Spectrum 12 MHz 75 MHz Data Rate 0.5M bps 1-54 Mbps Max Range 100 m 1,000 m Min 500 m 10 m Separation nonoverlapping Channel 1 or 2 7 The DSRC standard supports vehicles with an on-board device (OBD) to communicate with a roadside unit (RSU), or other traveling vehicles. FCC provides several examples of DSRC applications: travelers' alerts, automatic toll collection, traffic congestion detection, emergency dispatch services, and electronic inspection of moving trucks through data transmissions with roadside inspection facilities. We classify these applications into unicast (one sender and one receiver) vs. broadcast (one sender and many receivers) and RSU-to- (R2V) vs. -to- (V2V) as shown in Table 2.

2 Table 2. Examples of DSRC Applications R2V V2V Unicast toll payment, and road side inspection data sharing, paging, and VoIP Broadcast safety message, road service, and travel information emergency and service vehicles In general, DSRC applications should meet the following requirements: 1. Low Latency Real-time information should be received by traveling vehicles or RSU with low or minimum latency. If the latency is too long, the vehicle may be out of the RF range before the communication is complete. 2. High mobility Study has shown that signalto-noise ratio goes up and throughput goes down as traveling speed increases [6]. As a result, applications in a fixed wireless environment may not work properly in a mobile environment. We need to consider the factor of high mobility in DSRC application development. 3. High reliability Information from emergency vehicle or RSU has impact on public safety, so their reception by the traveling vehicle should be guaranteed. The distance and data rate requirements for the DSRC applications are given in Table 3. Table 3. Range and Data Rate Requirements Range Data Rate Toll Payment 30 m 1 Mbps Emergency 1,000 m 6 Mbps Roadside Safety 300 m 18 Mbps Message V2V Private Voice and Data 100 1,000m 6-54M bps In 2001, the DSRC standards writing group, a sub-group of ASTM, selected the IEEE a as the technology for national interoperability of DSRC applications. The extension of the MAC layer for DSRC is currently under the IEEE Project P The protocol architecture of DSRC is given in Figure 2. Note that the applications could be directly over the MAC layer without TCP/UDP or IP. The Robust Header Compression (ROHC), or RFC 3095, is used for voice applications, and not needed for data-only applications. UDP ROHC Applications TCP Figure 2. DSRC Protocol Architecture MAC Overview The IEEE standard [7] is widely used in the Wireless Local Area Network (WLAN), and it is a shared medium (RF channel) environment where all stations compete to access the medium, but only one station can transmit data at a time. If two or more stations try to send the data at the same time, collision would occur and data is lost. In the wired world (as specified in [8]), a station can detect collision signals and run a back-off algorithm to address the collision problem. In WLAN, collision is like noise, and stations cannot distinguish collisions from other noise. As a result, the standard adopts the method of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and provides two access methods, Distributed Coordination Function (DCF) and Point Coordination Function (PCF). DCF is a required procedure of the standard. In the DCF scheme, all stations content for the medium. If the medium is busy, each station runs a back-off algorithm to avoid collisions. PCF is an optional procedure of the standard. In the PCF scheme, there is a central Point Coordinator (PC). The PC sends a beacon message to inform all stations to stop their DCF activities. The PC then polls each station for data transmission. During this Contention Free Period (CFP), stations are not allowed for data transmission until they are polled. The PCF scheme is similar to the token ring protocol [9][10], and is more effective in supporting real-time DSRC applications. The standard provides an optional handshaking procedure which uses two control messages, Request to Send (RTS) and Clear to Send (CTS). A station first sends an RTS IP MAC MAC Extension (802.11) (P1609.4) PHY MAC (5.9G (802.11) Hz) PHY (5.9G Hz)

3 message to the receiver which responds back with a CTS message. After the handshaking procedure, the sender starts data transmission. This RTS/CTS procedure adds overhead to the communication and yields poorer performance than the basic DCF procedure [15]. However, it is needed in two cases: high contention and hidden station environments. The V2V communication on highway has a linear network topology, and the hidden station problem is common as illustrated in Figure 3 [11]. A B C Figure 3. Hidden Station Problem In this example, A could not sense the activity of C which does not see A either. When both vehicles try to send data to B, it causes frame collision and data is lost. The solution to this problem is the RTS/CTS handshaking procedure. When B responds back to A with CTS, C also sees the CTS which contains a timer for C to hold its activity. Because of the linear topology of traveling vehicles on the highway, the RTS/CTS procedure is needed for V2V applications. The standard supports two operation modes: ad hoc and infrastructure. The ad hoc mode is used for direct connection among a group of wireless stations. The infrastructure mode requires the use of a wireless access point (WAP) which is a layer-2 bridge device to forward frames between wireless stations and wired LAN. The operation of the infrastructure mode requires four MAC address fields, instead of two address fields in The following three communication scenarios show how to use these four address fields (A1, A2, A3, and A4). a. A (WS) => B (WS) (ad hoc mode) b. A => W1 => B (one WAP) c. A => W2 => W3 => B (multiple WAPs) Table Addressing Schemes Scenario A1 A2 A3 A4 a B A BSS- --- ID b (A=>W1) W1 A B -- b (W1=>B) B W1 A --- c (A=>W2) W2 A B --- c (W2=>W3) W3 W2 B A c (W3=>B) B W3 A --- Scenario-a is an ad hoc operation for V2V communications. Scenario-b is an infrastructure operation where W1 is a WAP. In general, an RSU operates as a WAP which provides the layer 2 bridging function between vehicles and roadside information servers. In the current practice, a wireless station is manually configured in ad hoc or infrastructure mode, but not both. This practice is not practical for DSRC because a vehicle needs to operate in both ad hoc mode (V2V applications) and infrastructure mode (R2V applications). To address this issue, we propose a new procedure for the switch-over of the operation modes. An OBD, by default, operates in the ad hoc mode. RSU sends a beacon message periodically which contains Target Beacon Transmission Time (TBTT). When an OBD receives the beacon message, the OBD shall switch to the infrastructure mode and starts its Network Allocation Vector (NAV) as specified by TBTT. During the NAV, the station stops its own activities unless it is polled by RSU. After NAV, the OBU switches back to the ad hoc mode. Scenario-c has a complex addressing scheme and the devices in the middle (W2 and W3) are usually called wireless bridge or wireless repeater to distinguish themselves from the low cost WAP. We identify a critical issue with supporting Scenario-c in the mobile environment. If an OBD functions as a wireless bridge (scenario-c), it could dynamically create a layer-2 loop with other OBDs within the RF range. This layer-2 loop causes broadcast storms and floods the network with duplicate messages. In the wired environment, this issue is addressed by the Spanning Tree Algorithm and Protocol (STP) [12], while STP is not supported in yet. Therefore, Scenario-c cannot be supported in DSRC.

4 3 Requirement Analysis The major categories of DSRC applications are given in Table 2. This section presents detailed technical requirements for each category of DSRC applications. 3.1 Highway Toll Highway toll is a R2V unicast application. The requirement is to send vehicle identification to the toll booth and charge the toll to the vehicle account. Because of the financial implication, it requires a security mechanism to protect vehicle identification. The Wired Equivalent Privacy (WEP) of the current uses private (shared) key and is considered too weak for this application. The new i standard which is based on 802.1X [13] and advanced encryption protocols is too complex. Our proposal is to use public key (a.k.a. key pair) to encrypt vehicle identification. The use of public key can be summarized as follows: G[ F(V.ID + Public key) + Private key] = V.ID where F is an encryption algorithm and G is a decryption algorithm. A vehicle receives the public key from the security server at the toll booth, and uses it to encrypt the message of vehicle account information. When the security server receives the encrypted message, it uses the private key to decrypt the vehicle account information. As discussed earlier, R2V should operate with PCF, instead of DCF, for communication between vehicles and the toll access point (AP). The AP periodically sends the beacon message to start the contention free period (CFP). When a vehicle receives the beacon message, it stops its DCF activities immediately, and sends an association message to the AP. Note that it is possible to have multiple vehicles send association messages to the AP which uses a polling algorithm to respond to each association request. The detailed message flow diagram is illustrated in Figure 4. We should note that the beacon message for the toll application is not the same as the current PCF beacon (type=00 and subtype=1000). Beacon, in the context of this paper, represents the start of a Contention Free Period (CFP) where vehicles should stop their DCF activities immediately. Beacons for different DSRC applications should use different codes for type and subtype. Signal Light Pass/fail signal Security Server Access Point beacon association request association response (security key) encrypted vehicle identification ACK disassociation Figure 4. Message Flow for Highway Toll In this toll application, a vehicle may continue receiving the beacon message after completing the transaction. In this case, the OBD still needs to stop its activity for the duration specified by the beacon timer to avoid collisions, but the OBD does not need to send an association message. Our lab experiment shows that the latency of is approximately one ms for small messages (up to 128 bytes), and this latency is about the same for a, b, and g. Based on this data, we estimate that the complete message flow of Figure 4 would take no more than 10 ms. The PCF interval for each vehicle could be set at 25 ms to protect frame loss due to collision or noise. When a vehicle travels at 100km/hour toward a toll booth with an RF range of 30m, the message flow should be completed in one second: 30 m 100 km/hour 1 sec For the distance span of 30m, there should be no more than 3 vehicles. As a result, we could conservatively engineer 5 time slots for PCF per second where each time slot is 25 ms. This engineering rule sets the interval between beacons at 200 ms, and it would have little impact (in terms of spectrum utilization) on other DSRC applications. Another important note of the proposed mechanism is that this application does not need an IP layer. Another unicast R2V application is automatic inspection of moving trucks through data transmissions with RSU. The message flow is similar to the highway toll except that a truck needs to transmit more information to the RSU.

5 3.2 Safety Message and Travel Information This application of safety message transmission requires a Roadside Unit (RSU) functioning as an information server which sends broadcast information to incoming vehicles. This information could be weather, road sign, road warning, traffic congestion report, and/or other information of interest to drivers. Because of the characteristics of the broadcast messages, the vehicle does not need a handshaking procedure and there is no need for association either. However, the vehicle must stop its own activity to avoid collisions with the broadcast data. Another important note is that these broadcast messages are for the vehicle itself and not to be forwarded. If the destination MAC address is FF-FF-FF-FF-FF-FF, this broadcast message would be forwarded by any device functioning as a layer-2 bridge (such as WAP). In order to prevent the forwarding of such broadcast messages, we propose to use the reserved Universal Address (a.k.a. Bridge Group Address) [14], and this group of addresses has the format of C2-XX-XX-XX. When an OBD receives a MAC frame with this address, the OBD accepts the frame and sends it to upper layer. Another requirement is an UDP socket server on OBD. This socket server is always on and waiting for incoming information messages. We need a standard destination port number (e.g., UDP=555) for the vehicle to receive broadcast messages. The addresses of the broadcast message and the message flow diagram are given in Figure 5. DA: C2-XX-XX-XX DA (IP): UDP Dst. Port = XXXX Information server Access Point Broadcast Information SA: (MAC) SA (IP): Safety or Travel Information beacon ACK (optional) Figure 5. Message Flow of Safety Information When an OBD receives the beacon message, it should stop its own activity immediately and wait for the broadcast message. The ACK from the vehicle is an optional procedure which could be required by the law to confirm the reception of the safety information. The message flow is expected to complete in 5 ms. Because the RF detection range is up to 300m, the time window for a vehicle to get the safety message is up to 10 seconds. If we engineer the information server to broadcast the message at a one-second interval, a vehicle would receive this safety message 10 times and its reception is almost guaranteed. Unlike the toll application, a vehicle should continue displaying the broadcast message to remind the driver for highway safety. Because of the long interval between beacons and the short interval for the message flow, this application has even less interference to other DSRC applications than the toll application. 3.3 Emergency and Service The application of emergency or service vehicles is also a broadcast service which informs other vehicles of their arrival. Emergency vehicle may travel at a very high speed and is coming from behind. Service vehicle may travel at a very low speed and is in the front. The message flow for both applications is similar to RSU except for the following two differences: An emergency vehicle operates in the ad hoc mode, instead of the infrastructure mode. Therefore, a vehicle does not need to change its operation mod when receives a beacon message from an emergency vehicle. The interval between beacons should be shorter than the RSU application because of a higher probability of lost beacons. Emergency beacon Safety Information (broadcast message) ACK (optional) Figure 6. Message Flow of Emergency As discussed earlier, the concept of beacon is to initiate a contention free communication service, and it is not limited to PCF. Different

6 DSRC services will have different beacon messages and use different codes for the type and subtype fields in the MAC frame. 3.4 Private V2V Communications There are various V2V applications. One example is the replacement of CB radio with VoIP. Network gaming is another potential V2V application. The V2V scenarios are covered in the following diagram: Figure 7. V2V Scenarios Each box in Figure 7 represents a traveling vehicle, and the dotted line represents an effective RF channel between two vehicles. As discussed earlier, V2V operates in the ad hoc mode. In this example A can reach C & D, but cannot reach E & F due to the RF range. The current standard is sufficient to support direct V2V communications. Security is required for unicast applications, and the current WEP is considered acceptable for personal applications. Business applications should use a stronger security mechanism, such as Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Protocol (AEP). 3.5 Extension of V2V We also studied how to expand the V2V application where a vehicle is served as a bridge to extend the communication distance. This multi-hop application was considered in another paper [16] but there was no detailed study on it. If OBD of -C (see Figure 7) can be configured as a WAP, s A & B could communicate with s E & F. However, our analysis shows that an OBD cannot and should not be dynamically configured as a WAP for the following reasons: o A B C D When WAP is present, the operation mode changes from ad hoc to infrastructure. It is too much overhead for a vehicle to continuously monitor its neighboring vehicles to determine when to use the ad hoc mode and when to use the infrastructure mode. E F o When operating in the infrastructure mode, an OBD can associate with only one WAP. Given that multiple vehicles could function as a WAP, it would be very confusing for an OBD to select a WAP in real-time. In the standard, the selection of WAP is a manual process and is not supported with a dynamic procedure. o Address Resolution Protocol (ARP) could also be an issue as it involves broadcast messages. When multiple OBDs could forward the same broadcast message, it could easily create a broadcast storm and congest the whole network. Although the standard does not support the bridging capability between vehicles, we identify a new feature in Windows XP, called bridging with layer3 forwarding (L3F). In this case, all OBUs are operating in the ad hoc mode, and each OBU maintains a L3F table. A vehicle periodically sends a control messages to inform its neighboring vehicles of its IP and MAC addresses. This control message also uses the reserved Universal MAC Address: C2- XX-XX so that a receiver knows the message is to update its L3F table only. If an entry is not referenced after the specified timer (say 3 min), the entry is removed from the L3F table. The L3F tables of OBD-A and OBD-C are given below: Table 5. L3F Table of OBD-A ( A) IP address MAC address BSSID Timer IP-B MAC-B xxxx 3 min IP-C MAC-C xxxx 3 min IP-D MAC-D xxxx 3 min Table 6. L3F Table of OBD-C ( C) IP address MAC address BSSID Timer IP-A MAC-A xxxx 3 min IP-B MAC-B xxxx 3 min IP-D MAC-D xxxx 3 min IP-E MAC-E xxxx 3 min IP-F MAC-F xxxx 3 min When OBD-A ( A) needs to communicate with OBD-F ( F), it first sends an ARP request. Both OBD-C and OBD- D receive the ARP request, and their L3F tables have the destination IP address. As a result, both respond with their own MAC address back to OBD-A, but only one entry (say OBD-C) is recorded in the ARP table of OBD-A. OBD-A then sends the data frame using the MAC address of OBD-C.

7 A1 A2 A3 A4 DA: OBD-C SA: OBD-A BSSID not used When this frame arrives at OBD-C, it checks the destination IP address with the L3F table and then replaces DA with the MAC address of OBD-F and SA with its own MAC address. The source and destination IP addresses stay the same. OBD-C then forwards this frame to OBD- F via the wireless medium. A1 A2 A3 A4 DA: OBD-F SA: OBD-C BSSID not used OBD-F accepts this frame and knows it is from OBD-A because the source IP address is from OBD-A. When F moves within the RF range of A, its control message (from F to A) will update A s ARP table. With the update, OBD-C does not provide the L3F function for A or F any more. We conducted extensive functional and performance tests of bridging with L3F at our wireless lab. The results meet our expectation, and the performance (latency and throughput) is comparable to that of layer-2 forwarding. 4 Conclusions This paper presents four categories of DSRC applications: unicast R2V, unicast V2V, broadcast R2V, and broadcast V2V. Each category of applications has unique IP and MAC requirements as illustrated by a message flow diagram. A major contribution of this paper is to identify a new feature, bridging with layer-3 forwarding, to extend the communication distance in a wireless environment. This feature is available in the Windows XP operating system and can be easily ported to OBD to support the V2V applications. In this paper, we consider each OBD operates in a single RF channel. In theory, an OBD could operate in multiple frequency channels and support more than one application simultaneously. The use of multiple RF channels in DSRC is another topic of our further study and research. [2] B. Abdulhai, ITGS, Eh! Meet Canada s Flagship ITS Centre and Testbed, IEEE Intelligent Systems, January 2003, pp [3] FCC Engineering and Technology News, Report No. ET 98-7, July 11, 1998 [4] Wireless LAN Specifications for High- Speed Physical Layer in the 5GHz Band, IEEE a [5] Home/ General Info/DSR General What is.htm [6] J. P. Singh, et. al. Wireless LAN Performance under Varied Stress Conditions in Vehicular Traffic Scenarios, IEEE VTC, Fall 2002 [7] Wireless LAN MAC and PHY Specifications, IEEE [8] CASA/CD Access Method and Physical Layer Specifications, IEEE [9] Token Ring Access Method and PHY Specifications,: IEEE [10] Duke Lee, et. al., A Wireless Token Ring Protocol for Intelligent Transportation Systems. The 4 th IEEE International Conference on Intelligent Transportation Systems, August, [11] Ting-Chao Hou, et. al., Transmission Behavior of IEEE WLAN Stations in String Topologies, the 2004 International Conference on Wireless Networks, June 2004 [12] MAC Bridges, IEEE 802.1D [13] Port-Based Network Access Control, IEEE 802.1X i (WLAN security) is still a draft standard. [14] MAC Bridges, IEEE 802.1D-1998, Table 7-9, p. 52 [15] G. Bianchi, Performance Analysis of the IEEE Distributed Coordination Function, IEEE ISAC, vol. 18, no. 3, March [16] J. Zhou and S. Roy, MAC for Dedicated Short Range Communications in Intelligent Transport System, IEEE Communications, December 2003, pp REFERENCES [1] F-Y Wang, et. al. The VISTA Project and Its Applications, IEEE Intelligent Systems, November 2002, pp

Design Approach for MAC Design in Vehicle Safety System Using Dedicated Short Range Communications (DSRC)

Design Approach for MAC Design in Vehicle Safety System Using Dedicated Short Range Communications (DSRC) Design Approach for MAC Design in Vehicle Safety System Using Dedicated Short Range Communications (DSRC) Padmini kumari J, S.S.Dorle Dr. A. G. Keskar Megha. B. Chakole JDIT, Yeotmal GHRCE, Nagpur VNIT,

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.  Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Md. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne University, Australia

Md. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne University, Australia Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC with and without Retransmissions Md. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne

More information

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba DSRC - WAVE VITMMA10 Okos város MSc mellékspecializáció Simon Csaba Overview DSRC Dedicated Short-Range Communications ASTM Standard E2213-03, based on 802.11a ITS communications on 5.9/5.8GHz band WAVE

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Local Area Networks. Lecture 17 Fall Token Ring and FDDI Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals Wireless LAN Unit 2: Wireless Fundamentals Wireless connections which technology? Areas covered: Basic radio parameters. This area covers the main type of wireless communications. IEEE 802.11b issues.

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Internet Structure. network edge:

Internet Structure. network edge: Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected

More information

Lecture (08) Wireless Traffic Flow and AP Discovery

Lecture (08) Wireless Traffic Flow and AP Discovery Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0 Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

MAC Protocols for VANETs

MAC Protocols for VANETs MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change 802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -

More information

Hubs, Bridges, and Switches (oh my) Hubs

Hubs, Bridges, and Switches (oh my) Hubs Hubs, Bridges, and Switches (oh my) Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. Differ in regards to: collision domain isolation layer

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

WLAN The Wireless Local Area Network Consortium

WLAN The Wireless Local Area Network Consortium WLAN The Wireless Local Area Network Consortium 802.11 Base AP MAC Layer Test Suite Version 3.5 Technical Document Last Updated: February 18, 2012 Wireless LAN Consortium 121 Technology Drive, Suite 2

More information