Wireless Communication Protocols and Technologies by Tatiana Madsen & Hans Peter Schwefel • Mm1 Introduction. Wireless LANs (TKM) • Mm2 Wireless Personal Area Networks and Bluetooth (TKM) • Mm3 IP Mobility Support (HPS) • Mm4 Ad hoc Networks (TKM) • Mm5 Overview of GSM, GPRS, UMTS (HPS) WCPT Spring 2004 Page 1 Tatiana K. Madsen Hans Peter Schwefel Course material • Download slides www.kom.auc.dk/~tatiana • Books – Jochen Schiller, ”Mobile Communications”, Addison-Wesley, 1st edition 2000, 2nd edition WCPT Spring 2004 Page 2 Tatiana K. Madsen Hans Peter Schwefel Mobile vs Wireless user mobility: users communicate (wireless) “anytime, anywhere, with anyone” Wireless Mobile device portability: devices can be connected anytime, anywhere to the network • Mobile vs Stationary • Wireless vs Wired WCPT Spring 2004 Page 3 Tatiana K. Madsen Hans Peter Schwefel Mobile vs Wireless Wireless vs. mobile WCPT Spring 2004 Examples stationary computer notebook in a hotel wireless LANs in historic buildings Personal Digital Assistant (PDA) Page 4 Tatiana K. Madsen Hans Peter Schwefel Outline • • • • Introduction - Historical perspectives Properties of wireless medium Basic MAC protocols for wireless communication WLAN – IEEE 802.11 standard • Additional information • http://grouper.ieee.org/groups/802/11/ • B. Crow et al, “IEEE 802.11 Wireless Local Area Networks”, IEEE Comm. Magazine, September 1997 WCPT Spring 2004 Page 5 Tatiana K. Madsen Hans Peter Schwefel Chronological list of events of wireless systems 1860s J.C. Maxwell postulates electromagnetic waves 1880s H.R. Hertz provides proof of electromagnetic waves 1895 G. Marconi demonstrates wireless communication and applies for patent 1913 Establishment of marine radio telegraphy 1921 Detroit police conducts field trials with mobile radio 1946 Bell Lab. deploys first commercial mobile radio telephone system 1950 Microwave links are developed 1980s Wide deployment of analog cellular systems 1992 Introduction of 2nd generation digital cellular systems 1993 Introduction of multiservices capabilities in the 2nd generation systems 2000 Third generation cellular systems with multimedia capabilities are introduced 2003 Start of commercial deployment of 3rd generation systems Source: B. Furht, Handbook of Internet and Multimedia Systems and Applications. IEEE Press, 1999 WCPT Spring 2004 Page 6 Tatiana K. Madsen Hans Peter Schwefel Key problems • Key problem - Path loss – Advent of the electron tube amplifier (de Forest, 1915) • Key problem – Thermal noise – Claude Shannon, ”A mathematical theory of communication”, 1949 – Advent of the Large Scale Integrated (LSI) circuits and Digital Signal Processing (DSP) • Key problem – The limited spectrum – Only one ”ether, unwanted interference between different users” – International Telecommunication Union (ITU) deals with these problems WCPT Spring 2004 Page 7 Tatiana K. Madsen Hans Peter Schwefel Development of mobile communications Mobile Communications Networks First Generation • • • • Analogue Basic voice telephony Low capacity Limited local and regional coverage • E.g. NMT, AMPS, TACS, C-net Second Generation • Digital: Third Generation • Digital: – Circuit switched • Voice plus basic data applications: – Fax – SMS (small message services) – Circuit-switched data • Low data speed • Regional coverage, with trans-national roaming • E.g. GSM, D-AMPS, PDC, IS 95 CDMA – Packet and circuit switched • Advanced data — i.e. multimedia applications • Fast data access • Global coverage • E.g. UMTS (WCDMA, TD/CDMA), IMT-2000 Wireless data already be introduced in second generation mobile Source: “Mobile data feels pressure from the need for speed”, Network News, 2 June 1998 (CAP Gemini, September 1999) WCPT Spring 2004 Page 8 Tatiana K. Madsen Hans Peter Schwefel Mobility & Range High Speed Vehicular Rural GSM Vehicular Urban Possible UMTS extension for high speed data access with roaming capability UMTS Fixed urban Pedestrian Indoor Personal Area IEEE 802.11a/b (WLAN), Hiperlan2,MMAC DECT BRAN Bluetooth 0.5 B-PAN PAN 2 10 20 155 1000 Mb/s Total data rate per cell WCPT Spring 2004 Page 9 Tatiana K. Madsen Hans Peter Schwefel Mobile phones per 100 people 1999 2002: 50-70% penetration in Western Europe Germany Greece Spain Belgium France Netherlands Great Britain Switzerland Ireland Austria Portugal Luxemburg Italy Denmark Norway Sweden Finland 0 WCPT Spring 2004 10 20 30 40 Page 10 50 60 Tatiana K. Madsen Hans Peter Schwefel Worldwide wireless subscribers 700 600 http://www.3g.co.uk 500 Americas Europe 400 Japan 300 others total 200 100 0 1996 WCPT Spring 2004 1997 1998 1999 2000 2001 Page 11 Tatiana K. Madsen Hans Peter Schwefel Simple reference model Application Application Transport Transport Network Network Network Network Data Link Data Link Data Link Data Link Physical Physical Physical Physical Medium Radio WCPT Spring 2004 Page 12 Tatiana K. Madsen Hans Peter Schwefel Signal propagation ranges • • • Transmission range – communication possible – low error rate Detection range – detection of the signal possible – no communication possible Interference range – signal may not be detected – signal adds to the background noise WCPT Spring 2004 sender transmission distance detection interference Broadcast nature of channel Page 13 Tatiana K. Madsen Hans Peter Schwefel Signal propagation • • • • • • • • • Propagation in free space always like light (straight line) Receiving power proportional to 1/d² (d = distance between sender and receiver) Receiving power additionally influenced by fading (frequency dependent) shadowing reflection at large obstacles refraction depending on the density of a medium scattering at small obstacles diffraction at edges shadowing WCPT Spring 2004 reflection refraction Page 14 scattering diffraction Tatiana K. Madsen Hans Peter Schwefel Multipath propagation • Signal can take many different paths between sender and receiver due to reflection, scattering, diffraction LOS pulses multipath pulses signal at sender signal at receiver • Time dispersion: signal is dispersed over time interference with “neighbor” symbols, Inter Symbol Interference (ISI) • The signal reaches a receiver directly and phase shifted distorted signal depending on the phases of the different parts WCPT Spring 2004 Page 15 Tatiana K. Madsen Hans Peter Schwefel Wireless medium • Time varying channel – Radio signals propagate according to reflection, diffraction and scattering – The received signal power attenuates as – Multipath propagation – Fading 1 , const , 2 for free space r • Burst channel errors • Broadcast nature of channel • Half-duplex operation WCPT Spring 2004 Page 16 Tatiana K. Madsen Hans Peter Schwefel Wireless networks in comparison to fixed networks • Higher loss-rates due to interference – emissions of, e.g., engines, lightning • Restrictive regulations of frequencies – frequencies have to be coordinated, useful frequencies are almost all occupied • Low transmission rates • Higher delays, higher jitter • Lower security, simpler active attacking – radio interface accessible for everyone, base station can be simulated, thus attracting calls from mobile phones • Always shared medium – secure access mechanisms important WCPT Spring 2004 Page 17 Tatiana K. Madsen Hans Peter Schwefel Hidden and exposed terminals • Hidden terminals – A sends to B, C cannot receive A – C wants to send to B, C senses a “free” medium – collision at B, A cannot receive the collision – A is “hidden” for C A B C • Exposed terminals – B sends to A, C wants to send to another terminal (not A or B) – C has to wait, CS signals a medium in use – but A is outside the radio range of C, therefore waiting is not necessary – C is “exposed” to B WCPT Spring 2004 Page 18 Tatiana K. Madsen Hans Peter Schwefel Near and far terminals • Terminals A and B send, C receives – signal strength decreases proportional to the square of the distance – the signal of terminal B therefore drowns out A’s signal – C cannot receive A A B C • If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer • Also severe problem for CDMA-networks - precise power control needed! WCPT Spring 2004 Page 19 Tatiana K. Madsen Hans Peter Schwefel Classification of Wireless MAC protocols MAC Protocols Fixed assignment TDMA CDMA FDMA WCPT Spring 2004 Demand assignment Random assignment s-ALOHA ALOHA GAMA Token CSMA FAMA Polling Page 20 Tatiana K. Madsen Hans Peter Schwefel Access methods SDMA/FDMA/TDMA • SDMA (Space Division Multiple Access) – segment space into sectors, use directed antennas – cell structure • FDMA (Frequency Division Multiple Access) – assign a certain frequency to a transmission channel between a sender and a receiver – permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) • TDMA (Time Division Multiple Access) – assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time WCPT Spring 2004 Page 21 Tatiana K. Madsen Hans Peter Schwefel Random Access - Aloha User 1 User 2 packet 1 Base station packet 2 successful transmission t0 t0+tp1 • Unslotted Aloha • Slotted Aloha WCPT Spring 2004 packet 1 rescheduled packet 1 collision t1 packet 2 rescheduled successful transmission successful transmission time t1+tp2 S G exp(2G ) S G exp(G ) Page 22 Tatiana K. Madsen Hans Peter Schwefel Throughput curves of Aloha WCPT Spring 2004 Page 23 Tatiana K. Madsen Hans Peter Schwefel Carrier Sense Multiple Access (CSMA) • Aloha schemes “impolite” behavior • CSMA “listen before talk” – Process of listening to the channel is not demanding – Carrier sensing does not relieve us from collisions – Variations of CSMA are due to behavior of users when the channel is busy • Non-persistent • 1-persistent • p-persistent WCPT Spring 2004 Page 24 Tatiana K. Madsen Hans Peter Schwefel Non-persistent CSMA • If the channel is busy, a terminal refrains from transmitting a packet and behaves exactly as if the packet collided. a a a T • a - vulnerable period WCPT Spring 2004 Page 25 Tatiana K. Madsen Hans Peter Schwefel 1-persistent CSMA • Non-persistent CSMA: there are situations when the channel is idle, although one or more users have packets to transmit. • 1-persistent: if the channel is idle, the user waits and transmits as soon as the channel becomes idle. WCPT Spring 2004 Page 26 Tatiana K. Madsen Hans Peter Schwefel Slotted systems • The wireless channel is said to be slotted if transmission attempts can take place at discrete instance in time. • A slotted system requires network-wide time synchronization – in centralized network BS is used as a reference – in distributed networks it is more difficult • slotted non-persistent and 1-persistent CSMA WCPT Spring 2004 Page 27 Tatiana K. Madsen Hans Peter Schwefel Throughput curves WCPT Spring 2004 Page 28 Tatiana K. Madsen Hans Peter Schwefel CSMA with Collision Detection • Whenever the transmission of two or more packets overlap in time, all packets are lost and must be retransmitted • In some local area networks (such as Ethernet) users can detect interference among several transmission (including their own) while transmission is in progress • If a collision is detected during transmission, the transmission is aborted. • Consensus reenforcement procedure • Transmission period in the case of collision: 2 cd cr WCPT Spring 2004 Page 29 Tatiana K. Madsen Hans Peter Schwefel Comparison of Throughput-Load curves WCPT Spring 2004 Page 30 Tatiana K. Madsen Hans Peter Schwefel Collision detection in radio systems • Wire: transmitted and received signals are of the same order of magnitude • Wireless: the received signal is considerably weak compared with the transmitted • in radio systems CD is usually not implemented • ACK is required WCPT Spring 2004 Page 31 Tatiana K. Madsen Hans Peter Schwefel Characteristics of wireless LANs • • Advantages – very flexible within the reception area – Ad-hoc networks without previous planning possible – (almost) no wiring difficulties (e.g. historic buildings, firewalls) – more robust against disasters like, e.g., earthquakes, fire Disadvantages - users expect the same services and capabilities – typically very low bandwidth compared to wired networks (1-10 Mbit/s) – many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE 802.11) – products have to follow many national restrictions if working wireless, it takes a vary long time to establish global solutions like WCPT Spring 2004 Page 32 Tatiana K. Madsen Hans Peter Schwefel Design goals for wireless LANs – – – – – – – – global, seamless operation low power for battery use no special permissions or licenses needed to use the LAN robust transmission technology simplified spontaneous cooperation at meetings easy to use for everyone, simple management protection of investment in wired networks security (no one should be able to read my data), privacy (no one should be able to collect user profiles), safety (low radiation) – existing applications should work WCPT Spring 2004 Page 33 Tatiana K. Madsen Hans Peter Schwefel IEEE 802.11 standard • • • • 802.3 Ethernet 802.5 Token ring 802.11 WLAN 802.15 WPAN IEEE=Institute of Electrical and Electronics Engineers • Standards specify PHY and MAC, but offers the same interface to higher layers to maintain interoperability access point application application TCP TCP IP IP LLC LLC LLC 802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC 802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY WCPT Spring 2004 Page 34 Tatiana K. Madsen Hans Peter Schwefel 802.11 - Layers and functions PHY DLC • • MAC –access mechanisms, fragmentation, encryption MAC Management –association, re-association of a station to an AP, roaming –authentication, encryption –synchronization, power management WCPT Spring 2004 LLC MAC MAC Management PLCP PHY Management PMD • • • Station Management • Page 35 PLCP Physical Layer Convergence Protocol –clear channel assessment signal (carrier sense) PMD Physical Medium Dependent sublayer –modulation, coding of signals PHY Management –channel selection Station Management –coordination of all management functions Tatiana K. Madsen Hans Peter Schwefel System architecture 802.11 - Architecture of an infrastructure network 802.11 LAN 802.x LAN STA1 BSS1 Portal Access Point Distribution System Access Point ESS BSS2 STA2 WCPT Spring 2004 802.11 LAN STA3 •Station (STA) – terminal with access mechanisms to the wireless medium and radio contact to the access point •Basic Service Set (BSS) – group of stations using the same radio frequency •Access Point – station integrated into the wireless LAN and the distribution system •Portal – bridge to other (wired) networks •Distribution System – interconnection network to form one logical network (EES: Extended Service Set) based on several BSS Page 36 Tatiana K. Madsen Hans Peter Schwefel 802.11 - Architecture of an ad-hoc network 802.11 LAN STA1 • Direct communication within a limited range –Station (STA): terminal with access mechanisms to the wireless medium –Independent Basic Service Set (IBSS): group of stations using the same radio frequency STA3 IBSS1 STA2 IBSS2 STA5 STA4 802.11 LAN WCPT Spring 2004 Page 37 Tatiana K. Madsen Hans Peter Schwefel 802.11 - Physical layer • • • • 3 versions: 2 radio (typ. 2.4 GHz), 1 IR – data rates 1 or 2 Mbit/s FHSS (Frequency Hopping Spread Spectrum) – separate different networks by using different hopping sequences – 79 hopping channels; 3 different sets with 26 hopping sequences per set DSSS (Direct Sequence Spread Spectrum) – method using separation by code – preamble and header of a frame is always transmitted with 1 Mbit/s, rest of transmission 1 or 2 Mbit/s – chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code) – max. radiated power 1 W (USA), 100 mW (EU), min. 1mW Infrared – 850-950 nm, diffuse light, typ. 10 m range, indoor – carrier detection, synchronization WCPT Spring 2004 Page 38 Tatiana K. Madsen Hans Peter Schwefel IEEE 802.11 MAC • 802.11 supports 2 different fundamental MAC schemes: • The Distributed Coordination Function (DCF): all users have to contend for accessing the channel. This is an implementation of ad hoc networks. • The Point Coordination Function (PCF): is based on polling and is performed by an AP inside the BSS. In the IEEE 802.11 implementation of PCF is optionally. • The PCF is required to coexist with the DCF: when the PCF is available in a network, there still is a portion of the time allocated to the DCF. WCPT Spring 2004 Page 39 Tatiana K. Madsen Hans Peter Schwefel Access methods – DFWMAC-DCF CSMA/CA (mandatory) – basic access method • collision avoidance via randomized „back-off“ mechanism • minimum distance between consecutive packets • ACK packet for acknowledgements (not for broadcasts) – DFWMAC-DCF w/ RTS/CTS (optional) – handshaking access method • avoids hidden terminal problem – DFWMAC- PCF (optional) • access point polls terminals according to a list WCPT Spring 2004 Page 40 Tatiana K. Madsen Hans Peter Schwefel Traffic services – Asynchronous Data Service (mandatory) • exchange of data packets based on “best-effort” • support of broadcast and multicast – Time-Bounded Service (optional) • implemented using PCF (Point Coordination Function) WCPT Spring 2004 Page 41 Tatiana K. Madsen Hans Peter Schwefel Carrier Sensing • Carrier sensing is performed at both the air interface, reffered to as physical carrier sensing, and at the MAC sublayer, reffered to as virtual carrier sensing. • Physical c.s. detects activity in the channel via relative signal strength from other sources • Virtual c.s. - from header information of frames. The duration field indicates the amount of time (in microseconds) after the end of the present frame the channel will be utilized. This time is used to adjust network allocation vector (NAV). • The channel is marked busy if one of the c.s. indicate the channel is busy. WCPT Spring 2004 Page 42 Tatiana K. Madsen Hans Peter Schwefel Priorities • Priorities – priority access to the channel is controlled through the use of interframe space - mandatory periods of idle time. – SIFS (Short Inter Frame Spacing) • highest priority, for ACK, CTS, polling response – PIFS (PCF IFS) • medium priority, for time-bounded service using PCF – DIFS (DCF, Distributed Coordination Function IFS) • lowest priority, for asynchronous data service DIFS DIFS medium busy PIFS SIFS contention t direct access if medium is free DIFS WCPT Spring 2004 next frame Page 43 Tatiana K. Madsen Hans Peter Schwefel Random backoff time mechanism • • • • After DIFS period, a station computes a random backoff time time is slotted to Slot_Time - to define IFS and backoff time the r.b. Is an integer value that corresponds to a number of time slots initially it is 0-7 – if the timer reached zero and medium is idle --> transmit – if the medium becomes busy --> freeze the timer – if collision --> new backoff time 0-15 • the idle period after DIFS is called contention window • this method promotes fairness WCPT Spring 2004 Page 44 Tatiana K. Madsen Hans Peter Schwefel 802.11 - CSMA/CA basic access method DIFS contention window (randomized back-off mechanism) DIFS medium busy next frame t direct access if medium is free DIFS slot time – station ready to send starts sensing the medium (Carrier Sense based on CCA, Clear Channel Assessment) – if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending (IFS depends on service type) – if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time) – if another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness) WCPT Spring 2004 Page 45 Tatiana K. Madsen Hans Peter Schwefel DFWMAC • Network Allocation Vector (NAV) is time field that indicates the duration of the current transmission • Backoff procedure is used to randomized access to the channel Medium busy sender DIFS RTS data SIFS receiver other stations CTS SIFS NAV (RTS) NAV (CTS) defer access WCPT Spring 2004 SIFS Page 46 ACK DIFS t Tatiana K. Madsen Hans Peter Schwefel Trade-offs with RTS/CTS + Collisons are avoided + Hidden station problem is solved – Bandwidth reduction – Not with multicast and broadcast Usage With large frames When collisions are likely WCPT Spring 2004 Page 47 Tatiana K. Madsen Hans Peter Schwefel Fragmentation • • • Large frames handed down from the LLC to the MAC may require fragmentation to increase transmission reliability Fragmentation_threshold the channel is not released until the whole frame is transmitted successfully or the source fails to receive ACK for a fragment. DIFS sender RTS frag1 SIFS receiver CTS SIFS frag2 SIFS ACK1 SIFS SIFS ACK2 NAV (RTS) NAV (CTS) NAV (frag1) NAV (ACK1) other stations DIFS contention WCPT Spring 2004 Page 48 data t Tatiana K. Madsen Hans Peter Schwefel DFWMAC-PCF • The beginning of a super frame is indicated by a beacon transmitted by AP. (synchronization) • the minimum duration of PCF period is time required to send 2 frames + overhead + PCF-end-frame • the maximum duration - time must be allotted for at least one frame to be transmitted during DCF period t0 t1 medium busy point coordinator wireless stations stations‘ NAV WCPT Spring 2004 PIFS SuperFrame SIFS D1 SIFS D2 SIFS SIFS U1 U2 NAV Page 49 Tatiana K. Madsen Hans Peter Schwefel DFWMAC-PCF t2 point coordinator D3 PIFS SIFS D4 WCPT Spring 2004 t4 CFend SIFS U4 wireless stations stations‘ NAV t3 NAV contention free period Page 50 contention period t Tatiana K. Madsen Hans Peter Schwefel 802.11 - MAC management • Synchronization – try to find a LAN, try to stay within a LAN – timer etc. • Power management – sleep-mode without missing a message – periodic sleep, frame buffering, traffic measurements • Association/Reassociation – integration into a LAN – roaming, i.e. change networks by changing access points – scanning, i.e. active search for a network WCPT Spring 2004 Page 51 Tatiana K. Madsen Hans Peter Schwefel Synchronization using a Beacon (infrastructure) beacon interval access point medium B B busy busy B busy B busy t value of the timestamp WCPT Spring 2004 B beacon frame Page 52 Tatiana K. Madsen Hans Peter Schwefel Synchronization using a Beacon (adhoc) beacon interval station1 B1 B1 B2 station2 medium busy busy B2 busy busy t value of the timestamp WCPT Spring 2004 B beacon frame Page 53 random delay Tatiana K. Madsen Hans Peter Schwefel Power management • • • • • Idea: switch the transceiver off if not needed States of a station: sleep and awake Timing Synchronization Function (TSF) – stations wake up at the same time Infrastructure – Traffic Indication Map (TIM) • list of unicast receivers transmitted by AP – Delivery Traffic Indication Map (DTIM) • list of broadcast/multicast receivers transmitted by AP Ad-hoc – Ad-hoc Traffic Indication Map (ATIM) • announcement of receivers by stations buffering frames • more complicated - no central AP • collision of ATIMs possible (scalability?) WCPT Spring 2004 Page 54 Tatiana K. Madsen Hans Peter Schwefel Power saving with wake-up patterns (infrastructure) TIM interval access point DTIM interval D B T busy medium busy T d D B busy busy p station d t WCPT Spring 2004 T TIM D B broadcast/multicast DTIM awake p PS poll Page 55 d data transmission to/from the station Tatiana K. Madsen Hans Peter Schwefel Power saving with wake-up patterns (ad-hoc) ATIM window station1 beacon interval B1 station2 A B2 B2 D a B1 d t B beacon frame awake WCPT Spring 2004 A transmit ATIM random delay a acknowledge ATIM D transmit data d acknowledge data Page 56 Tatiana K. Madsen Hans Peter Schwefel 802.11 - Roaming • • • • • No or bad connection? Then perform: Scanning – scan the environment, i.e., listen into the medium for beacon signals or send probes into the medium and wait for an answer Reassociation Request – station sends a request to one or several AP(s) Reassociation Response – success: AP has answered, station can now participate – failure: continue scanning AP accepts Reassociation Request – signal the new station to the distribution system – the distribution system updates its data base (i.e., location information) – typically, the distribution system now informs the old AP so it can release resources WCPT Spring 2004 Page 57 Tatiana K. Madsen Hans Peter Schwefel IEEE 802.11 Authentication Open System Authentication Authentication request (Open System Authentication) Authentication response WCPT Spring 2004 Page 58 Tatiana K. Madsen Hans Peter Schwefel IEEE 802.11 Authentication Shared Key Authentication Authentication request (Shared Key Authentication) “challenge” text string WEP encryption of challenge text “challenge” text string, encrypted with shared key Positive or Negative response based on decryption result WCPT Spring 2004 Page 59 WEP decryption of encrypted text Tatiana K. Madsen Hans Peter Schwefel IEEE 802.11 a and b IEEE 802.11b IEEE 802.11a Time Table Standard in 1997 Standard in 2001 Frequency Band and bandwidth 2.4 GHz 5 GHz Speed 11 Mbps 54 Mbps Modulation Techniques Spread Spectrum OFDM (Orthogonal Division Multiplexing Distance Coverage Up to 100 meters 20 meters - speed goes down with increased distance Interoperability Current problems resolved in future expected to be Problems now but expect resolution soon Cost Cheaper - $300 for access point and $75 for adapter More expensive - $500 in 01/2002 - Interference with other devices Band is more polluted - significant interference here Less interference because of few devices in this band WCPT Spring 2004 Page 60 Frequency Tatiana K. Madsen Hans Peter Schwefel WLAN: IEEE 802.11 – future developments • • • • • • • 802.11d: Regulatory Domain Update – completed 802.11e: MAC Enhancements – QoS – ongoing – Enhance the current 802.11 MAC to expand support for applications with Quality of Service requirements, and in the capabilities and efficiency of the protocol. 802.11f: Inter-Access Point Protocol – ongoing – Establish an Inter-Access Point Protocol for data exchange via the distribution system. 802.11g: Data Rates > 20 Mbit/s at 2.4 GHz; 54 Mbit/s, OFDM – ongoing 802.11h: Spectrum Managed 802.11a (DCS, TPC) – ongoing 802.11i: Enhanced Security Mechanisms – ongoing – Enhance the current 802.11 MAC to provide improvements in security. Study Groups – 5 GHz (harmonization ETSI/IEEE) – closed – Radio Resource Measurements – started – High Throughput – started WCPT Spring 2004 Page 61 Tatiana K. Madsen Hans Peter Schwefel