You are on page 1of 38

Unit-III

Wireless LANS
Prepared
by
K.V.Ranga Rao
Asst.Professor, CSE
VFSTR University :: Vadlamudi

Contents

Infra red vs. radio Lans


IEEE 802.11 Standards Architecture
Physical Layer
MAC Layer
Versions of IEEE 802.11
Blue Tooth Introduction
Pico net
Scatter net
Protocol architectures & Layers

03/10/16

03/10/16

Infra red vs Radio lans

Infra red
Infra red technology uses diffuse light reflected at walls,
furniture etc or directed light if LOS exists between sender
and receiver
simple & extremely cheap
pdas, laptops, note books and mobiles etc have an infra
red data association interface
Electrical devices do not interfere with infra red
transmission
No licenses are required for infra red technology
Has low band width compared to other LAN technologies
Can not penetrate walls or other obstacles
quite easily shielded
03/10/16

Radio LANS
Can cover larger areas, penetrate walls, furniture s,
plants etc
Additional coverage is gained by reflection
Does not need LOS if frequencies are not much high.
Higher transmission rate than infra red
Shielding is not simple
Radio transmission can interfere with other senders or
electrical devices can destroy the data transmitted via
radio.
Only permitted in certain frequency bands
very limited ranges of license free bands are available
03/10/16
world wide.

03/10/16

IEEE 802.11 Architecture

Infrastructure based architecture

Adhoc Architecture

03/10/16

Infrastructure based architecture

03/10/16

Infrastructure based architecture


Several nodes, called stations are connected to access
points
stations and AP which are in same coverage area form a
basic service set BSS
BSS1 & BSS2 are connected via a distribution System
A distribution system connects several bsss with AP to
form a single network and extend wireless coverage
area
This network now is called Extended Service Set ( ESS)
ESSID is name of network and used to separate different
networks
Distribution System connects wireless networks via Aps
with a portal, which forms internetworking unit with other
03/10/16
9
Lans.

Adhoc Architecture

03/10/16

10

Adhoc Architecture
An independent Basic service set comprises a group of
stations using same radio frequency
STA1, STA2 and STA3 are in IBSS1 and STA4, STA5
are in IBSS2
STA3 can directly communicate with STA2 but not with
STA5
several IBSSs can either be formed via distance
between IBSSs or by using different carrier frequencies
IEEE 802.11 does not specify special nodes that support
routing, forwarding of data or exchange of topology
information
03/10/16

11

Protocol Architecture

03/10/16

12

03/10/16

13

Protocol Architecture
An IEEE 8O2.11 Wireless Lan is connected to 802.3
Ethernet via a bridge
LLC covers the differences of medium access control
layers needed for different media
IEEE 802.11 Standard only covers physical layer PHY
and Medium access layer MAC
Physical layer is sub divided in to
physical Layer convergence Protocol
physical Medium dependent sub layers

03/10/16

14

Protocol Architecture
The basic tasks of MAC layer are

Medium access

Fragmentation of user data


Encryption

PLCP Sub layer Provides a carrier sense signal, called clear


channel assessment (CCA) and provides a common PHY service
access point (SAP) independent of transmission technology
PMD Sub layer handles modulation and encoding/ decoding of
signals
Apart from protocol sub layers ,the standard specifies
management layers and station management

03/10/16

15

Protocol Architecture

03/10/16

16

MAC management supports association and


reassociation of a station to an access point and
roaming between different access points

It also controls authentication mechanism, encryption,


synchronization of a station with regard to an access
point
MAC management also maintains MAC management
information base (MIB)
main tasks of Phy management includes
channel tuning
PHY MIB maintenance
the Station Management interacts with both
management layers and responsible for additional higher
layer functions
03/10/16

17

Physical Layer
IEEE 802.11 supports three different physical Layers
one layer is based on infra red and two layers are based
on radio transmission
Frequency Hopping Spread Spectrum
Allows coexistence of multiple networks in same area
by separating different networks using different hoping
sequences

03/10/16

18

Format of IEEE 802.11 Phy frame using FHSS

03/10/16

19

03/10/16

20

Direct Sequence Spread spectrum

03/10/16

21

03/10/16

22

Infra red
PHY layer based on infra red transmission uses near
visible light at 850-950 nm.

Does not require line of sight between sender and


receiver
Allows point to multi point communication

03/10/16

23

MAC Layer
Several tasks of MAC layer are

to control medium access


to offer support for roaming, authentication, power conservation

The basic services offered by MAC layer are


mandatory asynchronous service
optional time bounded service
Basic access mechanisms for MAC layer are
- Mandatory basic method based on versions of CSMA/CA
- An optional method avoiding hidden terminal problem
- A contention free polling method for time bounded service
The first two methods are called as Distributed Coordination function and
third method is called point coordination function

03/10/16

24

Versions of IEEE 802.11

03/10/16

25

Standard

03/10/16

Description

IEEE 802.11

Standard for wireless LAN operations


At data rate up to 2 MBPS in 2.4 GHZ ISM Band

IEEE 802.11a

data rate up to 5.4MBPS in 5 GHZ un licensed


national infra structure band

IEEE 802.11 b

data rate up to 11 MBPS in 2.4 GHZ IMS Band

IEEE 802.11 c

Bridge operation at 802.11 MAC layer

IEEE 802.11 d

physical Layer : Extend operation of 802.11


wlans to new regulatory domain

IEEE 802.11e

Mac: enhance to improve quality of service and


enhance security mechanisms

IEEE 802.11 f

Recommended practices for multi vendor


access point operability

IEEE 802.11 g

High rate extension to 802.11 b


26

Standard

03/10/16

Description

IEEE 802.11h

Physical/MAC : enhance 802.11 a to add indoor and


outdoor channel selection and to improve spectrum
and transmit power management

IEEE 802.11i

Enhance 802.11 medium access control to enhance


security and authentication mechanisms

IEEE 802.11 j

Physical : enhance 802.11a to confirm to Japanese


requirements

IEEE 802.11 k

Radio resource management enhancement to provide


interface to higher layers for radio and network
measurements

IEEE 802.11 m

Maintenance of 802.11 1999 standard with technical


& editorial correction

IEE 802.11 n

Physical/MAC: Enhance to enable higher through put

IEEE 802.11 l

Wireless personal area network standard based on


blue tooth specification ,operating in 2.4 GHZ ISM
band

IEEE 802..11 X

Port based network access control defines


infrastructures in order to provide means of
authenticating & authorizing devices attached to a
LAN port that has point to point connection

27

Blue Tooth

03/10/16

28

Introduction
Bluetooth is a short-range and low power wireless technology originally
developed for exchanging data over short distances from fixed and
mobile devices, creating personal area networks (PANs).
Short-range radio frequency technology that operates at 2.4 GHz on
an unlicensed Industrial Scientific Medical (ISM) band.
Effective range of Bluetooth devices is 10 meters.
It was originally conceived as a wireless alternative to data cables.
Bluetooth uses a radio technology called frequency-hopping spread spectrum.
Supports data rate of 1 Mb/s(originally).
The Bluetooth specifications are developed and licensed by the Bluetooth
Special Interest Group (SIG).
03/10/16

29

History
The word "Bluetooth" is taken from the 10th century Danish
King Harald Bluetooth, he had been influential in uniting
Scandinavian tribes into a single kingdom.
Bluetooth was named so because
1) Bluetooth technology was developed in Scandinavia.
2) Bluetooth technology is able to unite differing industries
such as the cell phone, computing, and automotive markets.

03/10/16

30

Pico Net
Definition
Two or more Bluetooth units
sharing the same channel
One device acts as a master and the devices connected
to it act as slaves.
Slaves can not directly send data to each other.
In effect, the master acts as a switch for the piconet
and all traffic must pass through the master.
There can be up to 7 active slaves in a piconet but only
one master.
03/10/16

31

Piconet

03/10/16

32

Forming a blue tooth piconet

03/10/16

33

Scatter net

A set of two or more interconnected piconets form scatter nets.


A Bluetooth unit can be a slave in two or more piconets, but it
can be a master in only one.
Devices that participate in two or more piconets may act as
gateways.
Bluetooth units can only transmit and receive data in one
piconet at a time.
Piconets may be identified by the master's identity and clock.
Devices give notification of inactivation to master before
becoming inactive in its piconet for a finite length of time.
03/10/16

34

scatter net

03/10/16

35

Protocol Architecture

03/10/16

36

Bluetooth Protocols
Radio Protocol
Responsible for the modulation and demodulation of data into RF
signals.
The radio layer describes the physical characteristics a Bluetooth
devices receiver-transmitter component must have.
BASEBAND PROTOCOL
Responsible for channel coding and decoding.
Digitizes the signals received by the radio for passing up the stack.
Formats the data it receives from the Link Controller (upper protocol)
for transmission over the channel.
Link Controller
Responsible for establishing and maintaining the links between
Bluetooth units.
03/10/16

37

Bluetooth Protocols
The Link Manager Protocol (LMP)
Handles link setup, authentication, link configuration and security
procedures.
Establishes all connections with the help of baseband protocol.
Host Controller Interface
The Host Controller Interface (HCI) defines uniform methods for accessing
and controlling the lower layers of the protocol stack (baseband and the
link manager).
Logical Link Control and Adaptation Protocol (L2CAP)
Responsible for:
Establishing connections across existing ACL (Asynchronous
Connection-oriented) links or requesting an ACL link if one does not
already exist.
Allow many different applications to use a single ACL link through
multiplexing.
Repackaging the data packets it receives from the higher layers into the
form expected by the lower layers.
03/10/16

38

You might also like