Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Size: px
Start display at page:

Download "Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II"

Transcription

1 Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE Part II This lecture continues the study of wireless LANs by looking at IEEE I Architecture and Services Working Group Chapter 14 Wi-Fi and the IEEE Wireless LAN Standard (continued) Started in 1990 To develop MAC protocol and physical medium specifications. And use existing 802 LLC functions. Initial interest was to use unlicensed frequencies. Called the ISM (Industrial, Scientific, and Medical) bands in U.S. The Working Group has an ever-expanding list of standards. Lecture 4, Page 1 of 20

2 This is that latest list of active groups from the web site ( since some in the above table are no longer active k, Radio Resource Measurement of Wireless LANs - Radio Resource Measurement enhancements to provide mechanisms to higher layers for radio and network measurements m, Maintenance PAR n, High Throughput p, Wireless Access in the Vehicular Environment - enhancements to required to support Intelligent Transportation Systems (ITS) applications r, Fast Roaming Fast Handoff s, Mesh Networking T, Wireless Performance Prediction u, Wireless Interworking With External Networks v, Wireless Network Management w, Protected Management Frames y, Contention Based Protocol Study Group Here is a table of terminology. Lecture 4, Page 2 of 20

3 Wi-Fi Alliance The first standard to gain industry acceptance was b. 2.4 GHz, up to 11 Mbps. There was concern whether products would successfully interoperate Linksys Access Point with a Cisco PCMCIA card? Wireless Ethernet Compatibility Alliance (WECA) formed in Renamed the Wi-Fi (Wireless Fidelity) Alliance. Certifies interoperability for b products. Certified products are called Wi-Fi. - Over 100 products certified. Certification has been extended to g products g is at 2.4 GHz, up to 54 Mbps. The Wi-Fi Alliance is concerned with markets for WLANs in enterprises, homes, and public hot spots. The Architecture See Figure 14.4 Lecture 4, Page 3 of 20

4 The smallest building block of a WLAN is a. Stations executing the same MAC protocol. Stations competing for access to the same shared wireless medium. Two BSSs can overlap geographically. - A single station can participate in more than one BSS. - Using different frequency bands. BSSs connect through a Distribution System (DS). Can be a switch, a wired network, or a wireless network. The is the bridge and relay point. Stations do not communicate directly with each other. - But through the AP. An AP is part of a station. - STA1 and STA5 above. If there is no connection to other BSSs, the BSS is called an. Stations can communicate directly. No AP is necessary. An Extended Service Set (ESS) consists of two or more BSSs connected by a distribution system. The ESS appears as a single logical LAN to LLC. Lecture 4, Page 4 of 20

5 IEEE Services Nine services are provided to give functionality equivalent to wired LANs. Two ways the services are categorized. 1. Provided by a station or by provided by the distribution system. 2. LAN access and security versus delivery of MAC packets (called MAC Service Data Units MSDUs). MSDU Delivery Service MSDUs are the blocks of data passed down from the MAC user (like the LLC layer) to the MAC layer. This service executes the delivery. And if the MSDU is too large, it may be broken into smaller frames. - This process is called. Services for distribution of messages within a DS Distribution Between BSSs. - APs are aware of each other and work together. - Specifics of the DS are beyond the scope of the standard. Integration Between an LAN and another 802.x LAN. - Takes care of translation and media conversion logic. Lecture 4, Page 5 of 20

6 Services for Association To transfer MSDUs, stations must be known to the WLAN. - To know where a destination station is located. A station must be associated. - Before it can deliver or accept data. Types of mobility to support. - No transition only movement within the range of a BSS. - BSS transition to another BSS in the same ESS. - Addressing capabilities must recognize the new location. - Hopefully with a fast, seamless transition (no disruption of service from the viewpoint of the users, on the order of 10 s of milliseconds). - ESS transition to another ESS. - Likely will cause a service disruption in this case. Services - Association - Associate with an AP. - APs share information with other APs. - Reassociation - Transfer an association to another AP. - Disassociation - Hopefully tell AP when leaving. - MAC management facility also protects itself against stations that disappear without disassociating. Services for Access and Privacy WLANs cannot rely on a physical connection for security. - In wired LANs, a station must be physically connected to be valid on the network. - WLANs are open to anyone within radio range. Services - Authentication - Establishes the identity of stations to each other. - Several authentication schemes are supported. - And also allows for expansion of the functionality. - The standard does not mandate any particular authentication scheme. - But whatever is used must be mutually acceptable to stations and APs. - Deauthentication Lecture 4, Page 6 of 20

7 - Privacy - Prevents contents of messages to be read by unintended recipients. - Encryption can optionally be used. II Medium Access Control Reliable Data Delivery Two main functions 1. Reliable Data Delivery 2. Sharing of the Wireless Medium (Medium Access Control) Reliable Data Delivery The wireless medium is extremely unreliable. For what reasons might frames (MAC layer packets) be lost? Noise Interference from other transmitters Propagation loss (weak signals) Signal reflections and fading We will discuss these in more detail in later lectures. Lecture 4, Page 7 of 20

8 Higher layer protocols like TCP will retransmit packets if they are not received properly at their ultimate destination. A path to a destination may cover many networks and wired or wireless links. But why might we want to retransmit just over the single wireless link? Timers waiting to recover lost packets end-to-end might take several seconds. MAC layer can retransmit more quickly. Simple Acknowledgements Destination stations send acknowledgement (ACK) frames back to their source stations. Both stations are on the network. This is an atomic operation. Atomic an operation that is an indivisible unit. The data frame must be received, then the ACK must be sent back and received. - Before any other frames are sent. - Before anyone else can send anything over the medium. If the source does not receive the ACK within a certain period of time, it retransmits. Based on the size of the data frame and expected size of the ACK frame, the source knows when the ACK should have been received. This is a two-frame exchange for reliability. If we need more reliability, a four frame exchange can be used, as discussed below. Lecture 4, Page 8 of 20

9 RTS/CTS Additional Reliability Problem: All users may not be able to hear each other. X Problem (a) above: Hidden node problem C is sending to B. A cannot hear C and thinks it could also transmit to B. A s and C s packets will collide at B. Problem (b): Exposed node problem. B wishes to send to C. A is transmitting to station X. If B listens, it will think the radio channel is busy. So it will falsely conclude it cannot send to C. But C would hear no interference if B sent a packet to it. - C would not hear the one from A, since C is out of range from A. So, B could have transmitted but will not. Lecture 4, Page 9 of 20

10 Note that this scenario does not apply to In , nodes B and C could still not communicate. Why? Because C would need to send an ACK to B, which would collide with the packet from A. Nonetheless, the exposed node problem was discussed here since it is commonly discussed. Solution: RTS and CTS Potential senders send a Request to Send (RTS). - Tells how long of a message it wishes to send. Potential receiver sends a Clear to Send (CTS) in response. - Also tells how long of a message will be sent. Assumption: If I hear something from Y, I am in Y s range and Y is in mine. Becomes a four-frame exchange RTS, CTS, Data, ACK. How does this RTS/CTS approach solve the hidden node problem? In (a), A will hear the CTS sent from B and will assume that if A sends a packet to B it will collide. Lecture 4, Page 10 of 20

11 How does this solve the exposed node problem? In (b), B will hear the RTS sent from A to X. But B will not hear the CTS from X, so B can assume that whatever it sends will not affect X. Notes: This assumes all stations have the same range. Collisions still might occur between RTS messages. Summary: Hear a CTS, don t send, since you are within range of the receiver of another communication. Only hear an RTS: - For one-way communication, assume okay, since the receiver of the other communication is out-of-range. - For two-way, don t send. The ACK will cause a problem even if the forward communication would not. For : The CTS and RTS clear out areas around active senders and receivers for no one to try to also communicate. This approach is called CSMA/CA Carrier Sense Multiple Access (CSMA) - Stations listen to the channel Collision Avoidance (CA) - RTS/CTS are used to prevent collisions of data packets Lecture 4, Page 11 of 20

12 Most implementations of do not use the RTS/CTS procedure. Why? Less time delays, better throughput. Communication is usually with the AP. Exposed node is not an opportunity. Stations are usually within range. III Medium Access Control Random Access Two ways to share a medium 1. Distributed Access all nodes participate in the decisions to transmit packets. Good for ad hoc networks. May also be attractive for WLANs that have primarily bursty traffic. 2. Centralized Access regulation by a centralized decision maker. This is natural when a group of stations are connected together through a base station. Especially useful if some traffic is time sensitive or high priority. Examples: Voice over IP, video. Lecture 4, Page 12 of 20

13 So which did implement? And the decision is... Result is DFWMAC (Distributed Function Wireless MAC). Distributed access mechanism with centralized control built on top. Distributed Coordination Function (DCF) Lower sublayer of the MAC layer. Uses a contention algorithm. Ordinary asynchronous traffic uses DCF. Point Coordination Function (PCF) Centralized MAC algorithm. Provides contention-free service. Exploits features of DCF also. Lecture 4, Page 13 of 20

14 Distributed Coordination Function (DCF) Makes use of simple CSMA If a station has a frame to transmit. Listen to the medium. - If the medium is idle, station may transmit. - Otherwise wait until the current transmission is complete. Once sending, collision detection is not used. - Unlike wired Ethernet which uses collision detection (CSMA/CD). - In CD, one would stop the communication once a collision is detected. - Because wireless signals are hard to distinguish from noise. - Hard to detect incoming colliding signals and separate them from a station s own transmission. - So, just relies upon ACK s to indicate successful transmission. - Which means the station completes the entire transmission and completes the entire waiting period for an ACK. - This is wasteful, but unavoidable. DCF makes use of a type of time delays called an There are several types of IFSs. - More on that a little later in the lecture. Lecture 4, Page 14 of 20

15 Figure 14.6 gives the rules for CSMA access. Special notes Exponential backoff - More details are given here than in the book, see Giuseppe Bianchi, Performance Analysis of the IEEE Distributed Coordination Function, IEEE Journal On Selected Areas In Communications, Vol. 18, No. 3, March Wait a random time while the medium is idle, here s how. - Initialize a counter randomly selected in [0, CW-1]. - CW is the Congestion Window and starts at a given initial value (usually 16 or 32). - During every slot time the channel is sensed idle, decrease by the counter by 1. Lecture 4, Page 15 of 20

16 - If a channel is sensed busy, stop decrementing the counter until the channel is idle again, which might be considered a freeze time. - Once the counter reaches zero, transmit the frame. - If a collision occurs, start over with CW new =2* CW old. - A collision is assumed if an ACK is not received. - Keep doubling CW at each collision, up to a maximum value (usually 1024). - Called Exponential Backoff because in general an exponential increase is involved: CW i = 2 i * CW initial. - Also is more accurately called because each time the window is increased by a factor of 2. - Research is considering other values than 2. - Research is also considering different beginning CW and max CW. - What does exponential backoff accomplish? Stations wait long enough to give everyone a fair share of the wireless medium. - At the expense of what? At the expense of longer delays. - We at UMKC are studying several issues. - How stations share the medium under this scheme. - What if stations misbehave and do not follow standard behavior. Like what would be an example of misbehavior? Not expanding the CW, even keeping the CW=1. Lecture 4, Page 16 of 20

17 - How can stations have different control parameters (min CW, max CW, etc.) to fit their quality requirements, yet not hurt the performance of others. We call this MAC friendliness. There is not always a backoff on the first attempt - If the channel is idle for an IFS, then transmit immediately. - Why is this a good idea? If the channel is lightly loaded, then there is no unnecessary waiting for backoff. Functional priority-based access is provided using three types of IFSs SIFS Short IFS - Used for immediate response actions. PIFS Longer IFS used for the PCF. DIFS Longest IFS used for the DCF. Lecture 4, Page 17 of 20

18 Different types of messages get earlier access to the channel, based which type of IFS they use. The following use SIFS. - ACKs Recipients send back ACKs after only an SIFS. - Keeps the send/ack combination atomic. - Multiple MAC frames If an LLC protocol data unit is fragmented into multiple MAC frames, fragments (and all their ACKs) are sent before other packets using SIFS. - Keeps the whole LLC frame atomic. - CTS Sent after an SIFS in response to an RTS. - Poll response Associated with PCF as discussed later. PCF has priority over DCF because the PIFS is shorter than the DIFS. EIFS - There is an additional Interframe Space not shown in the above figure, called the Extended Interframe Space (EIFS). - This is longer than the DIFS (and all other IFSs). - It is to be used after a frame has been indicated by the physical layer to have been received as bad. Point Coordination Function The point coordinator issues polling messages. A polled station gets to send when it receives a poll, after only SIFS. Stations are polled in a round robin fashion, with PIFS between polls. It is unclear from the book if this could be weighted round robin. - In weighted round robin, some stations may get more than one chance to send during a given cycle. PCF uses polling to control the performance of time-sensitive traffic. - Like audio, video, etc. As long as the point coordinator sends polls, DCF is shut out. Because PCF messages will always be sent with PIFS spacing before DCF messages get a chance with DIFS spacing. But PCF operations will only occupy part of the time. Based on a time called a. - See part (b) of the Figure 14.7 above. Lecture 4, Page 18 of 20

19 PCF will occupy the first part of the superframe. - Then DCF operations will be allowed while the point coordinator idles. If the medium is busy at the end of a superframe, the next PCF period will be delayed. PCF is not used very often in networks. Even though APs are used, they usually don t use polling. Little WLAN traffic (so far) needs such time-sensitive performance. - Especially if the bit rate of the WLAN is high enough that performance is good enough anyway. The IEEE e standard was developed as another way to provide better quality of service without using PCF. - Details on this in the next lecture. Medium Access Control Logic Figure 14.6 above shows that the exponential backoff is not used if a station finds the medium idle when it first wishes to send a packet. Let s confirm this form the standard. The standards can be obtained from the UMKC campus (or using the UMKC VPN) from under Standards. - Virtually all papers ever published by the IEEE are also available there. It is called Basic Access. Here is some of what the standard says Basic access Basic access refers to the core mechanism a STA uses to determine whether it may transmit. In general, a STA may transmit a pending MPDU when it is operating under the DCF access method, either in the absence of a PC, or in the CP of the PCF access method, when the STA determines that the medium is idle for greater than or equal to a DIFS period, or an EIFS period if the immediately preceding medium-busy event was caused by detection of a frame that was not received at this STA with a correct MAC FCS value. If, under these conditions, the medium is determined by the carrier-sense mechanism to be busy when a STA desires to initiate the initial frame of one of the frame exchanges described in 9.7, exclusive of the CF period, the random backoff algorithm described in shall be followed. There are conditions, specified in and , where the random backoff algorithm shall be followed even for the first attempt to initiate a frame exchange sequence. Lecture 4, Page 19 of 20

20 Next lecture: Last part (Part 3) of , related to the MAC frame, physical layers, other standards, and security. Lecture 4, Page 20 of 20

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Overview of Wireless LANs

Overview of Wireless LANs Wireless LANs Chapter 17 CS420/520 Axel Krings Page 1 Overview of Wireless LANs use wireless transmission medium issues of high prices, low data rates, occupational safety concerns, & licensing requirements

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 5: Wireless LANs and IEEE 802.11 Part III This lecture completes the study of wireless LANs, looking at the developing and security

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Functions of physical layer:

Functions of physical layer: Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (11 th Week) Wireless LANs 11.Outline Overview IEEE 802.11 Architecture and Services IEEE 802.11 Medium Access Control

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 3: Wireless LANs and IEEE 802.11 Part I Now we study a significant new area of wireless communications over the past 10 years Wireless

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 17 Wireless LANs Eighth Edition by William Stallings Overview of Wireless LANs use wireless transmission medium Wireless LAN were little used issues of high prices,

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Master thesis 60 credits

Master thesis 60 credits UNIVERSITY OF OSLO Department of informatics Capacity and performance study of IEEE 802.11e in WLANs and ad hoc networks Master thesis 60 credits Frank Roar Mjøberg 2. May 2007 Abstract Today, WLANs allow

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Local Area Networks. Lecture 17 Fall Token Ring and FDDI Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Solutions to Exercise Session 4,

Solutions to Exercise Session 4, Solutions to Exercise Session 4, 27.4.2012 I.1. Chapter 14: 2, 4, 5, 7, 8, 21, 23, 24-26 2. a 4. b, c 5. c 7. b 8. a 21. a 23. a 24. 25. 26. Token bus networks are intended for factory automation; hence

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless network overview Slide from 2 nd book 1 IT352 Network Security Najwa AlGhamdi IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

IEEE Wireless LANs Part I: Basics

IEEE Wireless LANs Part I: Basics IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect 168 430 Computer Networks Chapter 17 Wireless LANs Overview A wireless LAN uses wireless transmission medium Used to have high prices, low data rates, occupational safety concerns, and licensing requirements

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal WIRELESS LANS By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal Introduction Why wireless? World will become fully mobile Increase in wireless devices usage Wireless will succeed; integrates into many

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information