WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department

Size: px
Start display at page:

Download "WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department"

Transcription

1 ACOE 422 Wireless Computer Networks WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department Resources: Mobile Communications, J. Schiller book slides Prof. A. Pitsillides Univ. of Cyprus

2 WIRELESS LAN (WLAN) Selected topics Introduction WLAN Standards WLAN definition WLAN characteristics WLAN design goals Infrared vs radio transmission Infrastructure based vs ad hoc networks IEEE WLAN Roaming WLAN Security Other technologies 2

3 Introduction Several WLAN standards: IEEE b offering 11 Mbit/s at 24GHz 2.4 The same radio spectrum is used by Bluetooth A short range technology to set up wireless personal area networks with gross data rates less than 1 Mbit/s IEEE released a new WLAN standard, a, operating at 5 GHz and offering gross data rates of 54Mbit/s uses the same physical layer as HiperLAN2 does tries to give QoS guarantees IEEE g offering up to 54 Mbit/s at 2.4 GHz. 3

4 WLAN Standards d Wireless LAN 2.4 GHz 5 GHz b g HiSWANa a HiperLAN2 (54 Mbps) (2 Mbps) (11 Mbps) (22-54 Mbps) (54 Mbps) (54 Mbps) (54 Mbps) HomeRF 2.0 Bluetooth HomeRF 1.0 (10 Mbps) (1 Mbps) (2 Mbps) e f h i (QoS) (IAPP) (TPC-DFS) (Security) 4

5 WLAN definition A fast growing market introducing the flexibility of wireless access into office, home, or production environments. Typically restricted in their diameter to buildings, a campus, single rooms etc. The global goal of WLANs is to replace office cabling and, additionally, to introduce a higher flexibility for ad hoc communication in, e.g., group meetings. 5

6 WLAN characteristics Advantages: very flexible within radio coverage ad hocnetworks without previousplanningplanning possible wireless networks allow for the design of small, independent devices more robust against disasters (e.g., earthquakes, fire) Disadvantages: typically very low bandwidth compared to wired networks (~11 54 Mbit/s) due to limitations in radio transmission, higher error rates due to interference, and higher delay/delay variation due to extensive error correction and error detection mechanisms offer lower QoS many proprietary solutions offered by companies, especially for higher bit rates, standards take their time (e.g., IEEE ) slow standardization procedures standardized functionality plus many enhanced features these additional features only work in a homogeneous environment (i.e., when adapters from the same vendors are used for all wireless nodes) products have to follow many national restrictions if working wireless, it takes a very long time to establish global solutions 6

7 WLAN design goals global, seamless operation of WLAN products lowpower for battery use (special power saving modes and power management functions) no special permissions or licenses needed (license free band) robust transmission technology easy to use for everyone, simple management protection of investment in wired networks (support the same data types and services) security no one should be able to read other s data, privacy no one should be able to collect user profiles, safety low radiation 7

8 Infrared vs radio transmission Infrared light uses IR diodes, diffuse light reflected at walls, furniture etc, or directed light if a LOS exists btn sender and receiver Advantages simple, cheap, available in many mobile devices (PDAs, laptops, mobile phones) no licenses needed Disadvantages interference by sunlight, heat sources etc. many things shield or absorb IR light cannot penetrate obstacles (e.g., walls) low bandwidth (~115kbit/s 115kbit/s, 4Mbit/s) Example IrDA (Infrared Data Association) interface available everywhere Radio typically using the license free frequency band at 2.4 GHz Advantages experience from wireless WAN (microwave links) and mobile phones can be used coverage of larger areas possible (radio can penetrate (thinner) walls, furniture etc.) higher transmission rates (~11 54 Mbit/s) Disadvantages very limited license free frequency bands shielding more difficult, interference with other senders, or electrical devices Example IEEE , HIPERLAN, Bluetooth 8

9 Infrastructure based vs ad hoc wireless networks (I) Infrastructurebased wireless networks AP AP wired network AP: Access Point AP Infrastructure networks provide access to other networks. Communication typically takes place only between the wireless nodes and the access point, but not directly between the wireless nodes. The access point does not just control medium access, but also acts as a bridge to other wireless or wired networks. 9

10 Infrastructure based vs ad hoc wireless networks (II) Several wireless networks may form one logical wireless network: The access points together with the fixed network in between can connect several wireless networks to form a larger network beyond actual radio coverage. Network functionality lies within the access point (controls network flow), whereas the wireless clients can remain quite simple. Use different access schemes with or without collision. Collisions i may occur if medium access of the wireless nodes and the access point is not coordinated. If only the access point controls medium access, no collisions are possible. Useful lfor quality of service guarantees (e.g., minimum i bandwidth hfor certain nodes) The access point may poll the single wireless nodes to ensure the data rate. 10

11 Infrastructure based vs ad hoc wireless networks (III) Infrastructure based wireless networks lose some of the flexibility l wireless networks can offer in general: They cannot be used for disaster relief in cases where no infrastructure isleft left. 11

12 Infrastructure based vs ad hoc wireless networks (III) Ad hoc wireless networks No need of any infrastructure to work greatest possible flexibility Each node communicate with other nodes, so no access point controlling medium access is necessary. The complexity of each node is higher implement medium access mechanisms, forwarding data 12

13 Infrastructure based vs ad hoc wireless networks (IV) Nodes within an ad hoc network can only communicate if they can reach each other physically if they are within each other s radio range if other nodes can forward the message IEEE and HiperLAN2 are typically infrastructurebased networks, which additionally support ad hoc networking Bluetooth is a typical wireless ad hoc network 13

14 IEEE () (I) As the standards number indicates, this standard belongs to the group of 802.x LAN standards. This means that the standard specifies the physical and medium access layer adapted dto the special ilrequirements of wireless LANs, but offers the same interface as the others to higher h layers to maintain i interoperability. The primary goal of the standard was the specification of a simple and robust WLAN which offers time bounded and asynchronous services. 14

15 WLAN components Figure 2.11 Photographs of popular b WLAN equipment. Access points and a client card are shown on left, and PCMCIAClient Client card is shownon on right. (Courtesy ofcisco Systems, Inc.) 15

16 IEEE (II) System Architecture of an infrastructure network STA 1 ESS LAN 802.x LAN BSS 1 Access Portal Point Distribution System Access Point BSS 2 STA LAN STA 3 Station (STA) terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS) group of stations using the same radio frequency Access Point station integrated into the wireless LAN and the distribution system Portal bridge to other (wired) networks Distribution System interconnection network to form one logical network (EES: Extended Service Set) based on several BSS 16

17 IEEE (III) Stations can select an AP and associate with it. The APs support roaming (i.e., changing access points), the distribution system then handles data transfer between the different APs. Furthermore, APs provide synchronization within a BSS, support power management, and can control medium access to support time bounded service. 17

18 IEEE (IV) IEEE allows the building of ad hoc networks between stations, thus forming one or more BSSs. In this case, a BSS comprises a group of stations using the same radio frequency. Several BSSs can either be formed via the distance between the BSSs or by using different carrier frequencies. 18

19 IEEE (V) IEEE standard mobile terminal fixed terminal application TCP IP LLC access point LLC infrastructure network application TCP IP LLC MAC MAC MAC MAC PHY PHY PHY PHY 19

20 IEEE (VI) Protocol architecture Applications should not notice any difference apart from the lower bandwidth and perhaps higher access time from the wireless LAN. WLAN behaves like a slow wired LAN. Consequently, the higher layers (application, TCP, IP) look the same for the wireless node as for the wired node. The differences are in physical and link layer different media and access control 20

21 IEEE (VII) The physical layer provides a carrier sense signal, handles modulation and encoding/decoding gof signals. The basic tasks of the MAC medium access control protocol comprise medium access, fragmentation of user data, and encryption. The standard also specifies management layers. The MAC management supports the association iti and reassociation of a station to an access point and roaming between different APs. Furthermore, it controls authentication mechanisms, encryption, synchronization of a station with regard to an AP, and power management to save battery power. 21

22 Physical layer IEEE (VIII) Includes the provision of the Clear Channel Assessment CCA signal (energy detection). This signal is needed for the MAC mechanisms controlling medium access and indicates if the medium is currently idle. 22

23 IEEE (IX) MediumAccess Control The basic services provided by the MAC layer are the mandatory asynchronous data service and an optional time bounded service. IEEE offers only the asynchronous data service in ad hoc network mode Both servicetypes can be offered using an infrastructure based network together with the access point coordinating medium access. The asynchronous service supports broadcast and multicast packets, and packet exchange is based on a best effort model dl no delay bounds can be given for transmission cannot guarantee a maximum access delay or minimum transmission bandwidth Need for a time bounded service provision 23

24 IEEE (X) Medium Access Control (cnt d) Three basic access mechanisms have been defined for IEEE CSMA/CA (mandatory) Optional method avoiding the hidden terminal problem A contention free polling method for time bounded service access point polls terminals according to a list The first two methods are also summarized as distributed coordination function (DCF) The third method is called point coordination function (PCF) DCF only offers asynchronous service, while PCF offers both asynchronous and time bounded dservice, but needs an access point to control medium access and to avoid contention. 24

25 IEEE (XI) Medium Access Control o (cnt d) The medium can be busy or idle (detected by the CCA) If the medium is busy this can be due to data frames or other control frames During a contention phase several nodes try to access the medium Short inter frame spacing (SIFS) the shortest waiting time for medium access defined for short control messages (e.g., ACK of data packets) DCF inter frame spacing (DIFS) the longest waiting time used for asynchronous data service within a contention period SIFS + two slot times PCF inter frame spacing (PIFS) an access point polling other nodes only has to wait PIFS for medium access (for a time bounded service) SIFS + one slot time 25

26 IEEE (XII) Medium Access Control (cnt d) The mandatory access mechanism of IEEE is based on carrier sense multiple access with collision avoidance (CSMA/CA). a random access scheme with carrier sense (with the help of the Clear Channel Assessment CCA signal of the physical layer) and collision avoidance through random back off. The standard defines also two control frames: RTS: Request To Send CTS: Clear To Send 26

27 IEEE (XIII) Broadcast data transfer (DCF) DIFS DIFS contention window (randomized back-off mechanism) medium busy next frame direct access if medium is free DIFS slot time station ready to send starts sensing the medium (Carrier Sense based on CCA-Clear Channel Assessment) if the medium is free for the duration of a Distributed Inter-Frame Space (DIFS), the station can start sending if the medium is busy, the station has to wait for a free DIFS, then the station must additionally wait a random back-off time (collision avoidance) if another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness during the next phase this node will continue its timer from where it stopped) t 27

28 IEEE (XIV) Unicast data transfer sender receiver other stations DIFS data SIFS waiting time ACK DIFS contention station has to wait for DIFS before sending data data receivers acknowledge after waiting for a duration of a Short Inter-Frame Space (SIFS), if the packet was received correctly t 28

29 IEEE (XV) Sending unicast packets with RTS/CTS control frames sender receiver DIFS RTS SIFS CTS SIFS data SIFS ACK NAV (RTS) DIFS other NAV (CTS) data stations t defer access contention station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium and the ACK related to it). Every node receiving this RTS now has to set its net allocation vector it specifies the earliest point at which the node can try to access the medium again acknowledgement via CTS after SIFS by receiver (if ready to receive) sender can now send data at once, acknowledgement via ACK Other stations store medium reservations distributed via RTS and CTS 29

30 Masters thesis dgoodman/fainberg.pdf 30

31 31

32 Coverage Figure 2.13 A predicted coverage plot for three access points in a modern large lecture hall. (Courtesy of Wireless Valley Communications, Inc., 2000, all rights reserved.) 32

33 IEEE enhancements () (I) IEEE b 11Mbit/s in 24GH 2.4GHz frequency band widely used IEEE a offers up to 54 Mbit/s 5 GHz band Shading is much more severe compared to 2.4 GHz Depending on the SNR, propagation conditions and the distance bt between sender and receiver, data rates may drop fast 33

34 IEEE enhancements (II) IEEE e MAC enhancements for providing some QoS No QoS in the DCF operation mode Some QoS guarantees can be given only via polling using PCF For applications such as audio, video, or media stream, distribution IEEE g service classes have to be provided For this reason, MAC layer must be enhanced offers up to 54 Mbit/s 2.4 GHz band Benefits from the better propagation characteristics at 2.4 GHz compared to 5 GHz Backward compatible to b 34

35 Reassociation Response Reassociation Request 35 WLAN Roaming (I)

36 WLAN Roaming (II) No or bad connection? Then perform: Scanning scan the environment, i.e., listen into the medium for beacon signals or send probes into the medium and wait for an answer Reassociation Request station sends a request to one or several AP(s) Reassociation Response success: AP has answered, station can now participate failure: continue scanning AP accepts Reassociation Request signal the new station to the distribution system the distribution system updates its data base (i.e., location information) typically, the distribution system now informs the old AP so it can release resources 36

37 WLAN Roaming (III) L2 handover If handover from one AP to another belonging to the same subnet, then handover is completed at L2 L3 handover If new AP is in another domain, then the handover must be completed at L3, due to the assignment of an IP belonging to the new domain hence routing to the new IP. Mobile IP deals with these issues more later 37

38 WLAN Security (I) Not so efficient i compared with Ethernet security due to the nature of the medium & the requirements of the users Security mechanisms Service Set Identifiers (SSID) Used to name the network and provide initial authentication for each client Wired Equivalent Privacy Pi (WEP) Data encryption technique using shared keys and a pseudorandom number as an initialization vector 64 bit key level encryption BUT several vendors now support 128 bit key level encryption Also a VPN could operate on top of the WLAN providing increased security IEEE developing new standards e (Enhanced Security, QoS) i (Advanced Encryption Standard AES) Requires physical replacement of Access Points and WLAN Cards 38

39 WLAN Security (II) Late-2001 Mid-2002 Q Q IEEE 802.1X ratified Mutual Authentication Key Management WEP Encryption WEP Attacks go public Rapid re-keying 802.1X authentication WEP Encryption WEP key tumbling via 802.1X key management Wi-Fi Protected Access 802.1X Authentication 802.1X key Management TKIP data protection IEEE i 802.1X authentication Enhanced 802.1X key management AES-based Encryption Enhanced support infrastructure 39

40 OTHER WIRELESS TECHNOLOGIES 40

41 HIPERLAN High Performance LAN (I) The European Telecommunications Standards Institute (ETSI) standardized HIPERLAN as a WLAN allowing for node mobility and supporting ad hoc and infrastructurebased topologies. It is a wireless LAN supporting priorities and packet life time for data transfer at 23.5 Mbit/s, including forwarding mechanisms, topology discovery, user data encryption, network identification and power conservation mechanisms. HIPERLANs operate at GHz with a range of 50m in buildings at 1 W transmit power. 41

42 HIPERLAN High Performance LAN (II) The service offered by a HIPERLAN is compatible with the standard MAC services known fromieee x LANs. The HIPERLAN Channel Access Control mechanism was specifically designed dto provide channel access with ih priorities. The CAC contains the access scheme EY NPMA, which is unique for HIPERLAN. 42

43 HIPERLAN High Performance LAN (III) Elimination yield non preemptive priority multiple access (EY NPMA) not only a complex acronym, but also the heart of the channel access providing priorities and different access schemes. divides the medium access of different competing nodes into three phases: Prioritization: i i i Determine the highest h priority i of a data packet ready to be sent on competing nodes Contention: Eliminate all but one of the contenders, if more than one sender has the highest current priority. Transmission: Finally, transmit the packet of the remaining node. 43

44 HIPERLAN High Performance LAN (IV) The contention phase is further subdivided into an elimination phase and a yield phase. The purpose of the elimination phase is to eliminate as many contending nodes as possible. The result is a more or less constant tnumber of remaining i nodes, almost tindependent d of the initial number of competing nodes. The yield phase completes the work of the elimination phase with the goal of only one remaining node. 44

45 HIPERLAN High Performance LAN (IV) The contention phase is further subdivided into an elimination phase and a yield phase. The purpose of the elimination phase is to eliminate as many contending nodes as possible. The result is a more or less constant tnumber of remaining i nodes, almost tindependent d of the initial number of competing nodes. The yield phase completes the work of the elimination phase with the goal of only one remaining node. 45

46 BLUETOOTH () (I) Bluetooth technology aims at so called ad hoc piconets, which are local area networks with a very limited coverage and without the need for an infrastructure. Needed to connect different small devices in close proximity without expensive wiring or the need for a wireless infrastructure. Represents a single chip, low cost, radio based wireless network technology. 46

47 BLUETOOTH (II) Up to now Bluetooth is not a standard like IEEE or HIPERLAN, but it soon become a de facto standard established by the industry and promoted by the Bluetooth consortium. Bluetooth uses the license free frequency band at 2.4GHz allowing for worldwide operation. 47

48 BLUETOOTH (III) Physical layer: A frequency hopping\time division duplex scheme is used for transmission with a fast hopping rate of 1,600 hops per second. The time between two hops is called a slot, which is an interval of 625μs, thus each slot uses a different frequency. On average, the frequency hopping sequence visits each hop carrier with an equal probability. All devices using the same hopping sequence with the same phase form a Bluetooth piconet. 48

49 BLUETOOTH (IV) With transmitting power of up to 100 mw, Bluetooth devices have a range of up to 10m (or even up to 100m with special transceivers). Having this power and relying on battery power, a Bluetooth device cannot be in an active transmit mode all the time. Bluetooth defines several low power states for the device. 49

50 BLUETOOTH (V) States of a possible Bluetooth device and possible transitions: Standby mode: Every device which is currently not participating in a piconet (and not switched off) In this mode, a device listens for paging messages. Connections can be initiated by any device which becomes the master. This is done by sending page messages if the device already knows the address of the receiver, or inquiry messages followed by a page message if the receiver s address is unknown. 50

51 BLUETOOTH (VI) To save battery power, a Bluetoth device can go into one of three low power states if no data is ready to be sent: PARK state: The device has the lowest duty cycle, and thus the lowest power consumption. The device releases its MAC address, but remains synchronized with the piconet. The device occasionally listens to the traffic of the master device to resynchronize and check for broadcast messages. HOLD state: The power consumption of this state is a little higher. The device does not release its MAC address and can resume sending at once after transition out of the HOLD state. SNIFF state: It has the highest power consumption of the low power states. The device listens to the piconet at a reduced rate. 51

52 BLUETOOTH (VII) STANDBY unconnected inquiry page connecting transmit connected active PARK HOLD SNIFF low power 52

53 BLUETOOTH (VIII) MAC layer: Several mechanisms control medium access in a Bluetooth system. First of all, one device within a piconet acts as a master, all other devices (up to seven) act as slaves. The master determines the hopping sequence as well as the phase of the sequence. All Bluetooth devices have the same networking capabilities, i.e., they can be master orslave slave. The unit establishing the piconet automatically becomes the master and controls medium access; all other devices will be slaves. 53

54 WLAN technologies summary () (I) The basic goals of all three LAN types (WLAN, HIPERLAN, BUETOOTH) arethe provision of a much higher flexibility for nodes within a network. All WLANs suffer from limitations of the air interface and higher complexity compared to their wired counterparts but allow for a new degree of freedom for their users within rooms, buildings etc. 54

55 WLAN technologies summary (II) The three technologies differ in some respects. HIPERLAN comprises many interesting i features, is much more powerful than IEEE , has a higher data rate (23.5 Mbit/s) but it is questionable if it will ever be a commercial success. The 5 GHz band required for HIPERLAN is not available worldwide compared to the 2.4 GHz used for IEEE

56 WLAN technologies summary (III) No standardization body has set up any specification regarding Bluetooth. The primary goal of Bluetooth is not a complex standard covering many aspects of wireless networking, but a quick ik and very cheap solution enabling ad hoc personal communication i within ihi a short range in the license free 2.4 GHz band. 56

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs EEC173B/ECS152C, Winter 2006 Wireless LANs Evolution of Technology & Standards IEEE 802.11 Design Choices Architecture & Protocols PHY layer MAC layer design Acknowledgment: Selected slides from Prof.

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Characteristics of Wireless LANs

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards Wireless LANs Characteristics 802.11 PHY MAC Roaming Standards Bluetooth 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller, FU-Berlin www.jochenschiller.de

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change 802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -

More information

Internet Protocol Stack

Internet Protocol Stack Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal WIRELESS LANS By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal Introduction Why wireless? World will become fully mobile Increase in wireless devices usage Wireless will succeed; integrates into many

More information

WLAN. Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network).

WLAN. Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network). WLAN Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network). Our presentation is split into the following key areas. First I will

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Efficient Power MAC Protocol in Ad-hoc Network s

Efficient Power MAC Protocol in Ad-hoc Network s Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

Enabling Technologies

Enabling Technologies Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Topic 4. Wireless LAN IEEE

Topic 4. Wireless LAN IEEE Topic 4 Wireless LAN IEEE 802.11 What we will learn in this lecture: Basics of IEEE 802.11 MAC layer CSMA/CA Security WEP protocol Wireless LANs: Characteristics Types Infrastructure based Adhoc Advantages

More information

Lecture (08) Wireless Traffic Flow and AP Discovery

Lecture (08) Wireless Traffic Flow and AP Discovery Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame

More information

Functions of physical layer:

Functions of physical layer: Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions

More information

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Overview of Wireless LANs

Overview of Wireless LANs Wireless LANs Chapter 17 CS420/520 Axel Krings Page 1 Overview of Wireless LANs use wireless transmission medium issues of high prices, low data rates, occupational safety concerns, & licensing requirements

More information

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Optimized MAC Protocol with Power Efficiency in Mobile Ad-hoc Network Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur,

More information

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information