wireless local area networks - School of Electrical and Computer

advertisement
WIRELESS LOCAL AREA NETWORKS
Ian F. Akyildiz
Broadband & Wireless Networking Laboratory
School of Electrical and Computer Engineering
Georgia Institute of Technology
Tel: 404-894-5141; Fax: 404-894-7883
Email: ian@ece.gatech.edu
Web: http://www.ece.gatech.edu/research/labs/bwn
WIRELESS LANs
Infrastructure
Network
AP
AP
AP: Access Point
wired network
AP
Ad-hoc Network
IFA’2004
2
Wireless LAN - IEEE 802.11
Reference Architecture
 The terminology and some of the specific
features are unique to this standard and are
not reflected in all commercial products.
 However, it is useful
to be familiar with
the standard since its
features are
representative of the
Wireless LAN
capabilities required.
IFA’2004
3
Reference Architecture of
Wireless LANs
STA1
BSS1
Portal
Access
Point
Distribution System
Access
Point
BSS2
STA2
STA3
ESS
IFA’2004
Station (STA)
– terminal with access mechanisms
to the wireless medium and
radio contact to the access
point
Basic Service Set (BSS)
– group of stations using the same
radio frequency
Access Point
– station integrated into the
wireless LAN and the
distribution system
Portal
– bridge to other (wired) networks
Distribution System
– interconnection network to form
one logical network (ESS:
Extended Service Set) based
on several BSS
4
Reference Architecture
 The smallest building block of a wireless LAN is a
basic service set (BSS), which consists of some
number of stations executing the same MAC protocol
and competing for access to the same shared medium.
 A basic service set may be isolated or it may connect
to a backbone distribution system through an access
point.
 The access point functions as a bridge.
 The MAC protocol may be fully distributed or
controlled by a central coordination function housed in
the access point.
IFA’2004
5
Reference Architecture
 The basic service set generally corresponds to what
is referred to as a cell in the literature.
 An extended service set (ESS) consists of two or
more basic service sets interconnected by a
distribution system.
 Typically, the distribution system is a wired
backbone LAN.
 The extended service set appears as a single logical
LAN to the logical link control (LLC) level.
IFA’2004
6
Reference Architecture
The standard defines three types of stations
based on mobility:
 No transition: A station of this type is either stationary or
moves only within the direct communication range of the
communicating stations of a single BSS.
 BSS transition: This is defined as a station movement from
one BSS to another BSS within the same ESS. In this
case, delivery of data to the station requires that the
addressing capability be able to recognize the new location
of the station.
 ESS transition: This is defined as a station movement from
a BSS in one ESS to a BSS within another ESS. This case
is supported only in the sense that the station can move.
IFA’2004
7
Protocol Architecture
fixed
terminal
mobile terminal
infrastructure
network
access point
application
application
TCP
TCP
IP
IP
LLC
LLC
LLC
MAC
MAC
802.3 MAC
802.3 MAC
PHY
PHY
802.3 PHY
802.3 PHY
IFA’2004
8
Protocol Layers and Functions
PLCP
Physical Layer Convergence
Protocol
 MAC
clear channel assessment
signal (carrier sense)
– access mechanisms,
fragmentation, encryption
PMD
 MAC Management
modulation, coding
MAC
MAC Management
PLCP
PHY Management
PMD
IFA’2004
PHY Management
Station Management
PHY
DLC
– synchronization, roaming,
MIB, power management
LLC
Physical Medium Dependent
channel selection, MIB
Station Management
coordination of all
management functions
9
Basics of Wireless LANs
 Coverage area, data rate, and battery
consumption.
 Characterized by small coverage areas
(~200m), but relatively high bandwidths
(data rates) (upto 50Mbps currently)
 Major standards
– WLAN: IEEE 802.11 and HIPERLAN.
– WPAN: IEEE 802.16 (Bluetooth) and
HomeRF
IFA’2004
10
Advantages of WLANs
– Very flexible within the reception area
– Users can access high speed multimedia applications
anywhere at anytime, with easy implementation, low
cost, and wide user acceptance
- Generally works in industrial, scientific, and
medical (ISM) band, which is un-licensed and
available for public.
– (Almost) no wiring difficulties (e.g. historic buildings,
firewalls)
IFA’2004
11
WLANs – Advantages
 Buildings with large open areas, such as
manufacturing plants, stock exchange
trading floors, and warehouses
 Historical buildings with insufficient
twisted pair and where drilling holes for
new wiring is prohibited
 Small offices where installation and
maintenance of wired LANs is not
economical
IFA’2004
12
Disadvantages of WLANs
– Typically very low bandwidth compared to wired
networks (1-10 Mbit/s)
– Many proprietary solutions, especially for higher bitrates, standards take their time.
– Products have to follow many national restrictions if
working wireless, it takes a very long time to
establish global solutions.
– Interference Problems
IFA’2004
13
Family of Wireless LAN
(WLAN) Standards 802.11
–
–
–
–
–
–
–
802.11a - 5GHz- Ratified in 1999
802.11b - 11Mb 2.4GHz- ratified in 1999
802.11d - Additional regulatory domains
802.11e - Quality of Service
802.11f - Inter-Access Point Protocol (IAPP)
802.11g - Higher Data rate (>20mBps) 2.4GHz
802.11h - Dynamic Frequency Selection and
Transmit Power Control mechanisms
– 802.11i - Authentication and security
IFA’2004
14
WLANs – Current Use













Home wireless networks.
Enterprise wireless networks.
Public access.
Hospitals.
Warehouses.
Consulting and audit teams
Dynamic environments, ad agencies, etc.
Universities
Historic buildings, older buildings.
Meeting rooms.
Retail stores
Restaurants and car rental agencies
Data backup.
IFA’2004
15
In-Building Deployment –
Service Objectives












Greater coverage
High-speed rates
Scalable and manageable bandwidth
Enable new (high-end) services (and keep running the
good old ones)
Service differentiation
Smooth deployment and low maintenance
Interoperable systems
Plug & Play
Extends the local area network
Freedom to access the corporate network
Comparable to those of wired networks
Secure access to important information (e-mail,
corporate data, Internet)
IFA’2004
16
Some Facts

By 2005, more than 1/3rd of Internet users will have
Internet connectivity through a wireless enabled device
(750 million users)!!! (Source: Intermarket group)

By the end of 2001, more than half of the workforce in
the US uses a wireless net device – primarily cellular
phones! (Source: Cahners Intat Group)

By the year 2004 revenue from wireless data will reach
$34B, and by the year 2010 the number of wireless data
subscribers will hit 1B!!
IFA’2004
17
Design Goals for Wireless LANs
– Global, seamless operation (must sell in all countries)
– Low power for battery use (power saving modes and power
management functions)
– No special permissions or licenses needed to use the LAN
– Robust transmission technology (avoid interference)
– Simplified spontaneous cooperation at meetings
– Easy to use for everyone, simple management
– Protection of investment in wired networks (interoperable
with wired LANs)
– Security (no one should be able to read my data), privacy
(no one should be able to collect user profiles), safety (low
radiation)
IFA’2004
18
Topologies
- Single-Cell Wireless LAN
IFA’2004
19
Topologies
- Single-Cell Wireless LAN
 In Figure there is a backbone wired LAN, such as Ethernet, that
supports servers, workstations, and one or more bridges or routers to
link with other networks.
 In addition, there is a control module (CM) (Access Point (AP) before)
that acts as an interface to a wireless LAN. (CM = AP)
 The control module includes either bridge or router functionality to link
the wireless LAN to the backbone.

In addition, it includes some sort of access control logic, such as a
polling or token-passing scheme, to regulate the access from the end
systems.
 Note that some of the end systems are stand-alone devices such as a
workstation or a server.
 In addition, hubs or other user modules (UM) (PORTAL before) that
control a number of stations off a wired LAN may also be part of the
wireless LAN configuration.
IFA’2004
20
Topologies
- Multiple Cell Wireless LAN
Figure 2
IFA’2004
21
Topologies
- Multiple Cell Wireless LAN
 In this case there are multiple control
modules interconnected by a wired LAN.
 Each control module supports a number of
wireless end systems within its transmission
range.
 For example, with an infrared LAN,
transmission is limited to a single room;
therefore, one cell is needed for each room in
an office building that requires wireless
support.
IFA’2004
22
WLANs – 802.11
Protocol Architecture
Real Time Traffic
Normal Data Traffic
(Asynchronous)
Point Coordination
Function (PCF)
MAC
Distributed Coordination Function (DCF)
Physical Layer (PHY)
IFA’2004
23
IEEE 802.11
- Physical Medium
Specification
Three Physical Media:
 INFRARED
Narrowband Microwave
Spread Spectrum
IFA’2004
24
Infrared

Infrared signals used to transmit data (similar to TV remotes!)

Higher data rates possible (than spread spectrum)


Line of sight point-to-point configuration required (or reflection
surface that reflects signals)
Too sensitive to obstacles, line-of-sight requirement, etc.

850-950 nm, diffuse light (to allow point-to-multipoint
communication)

10 m maximum range with no sunlight or heat interfere
IFA’2004
25
Narrowband Microwave
 Typically used to link two WLANs together (for
example, to link WLANs in two buildings)
 Microwave dishes required at both ends of link
 Unlike spread spectrum which operates in the
unlicensed ISM band, narrowband microwave requires
FCC licensing
 Exclusive license typically effective within a 17.5 mile
radius
IFA’2004
26
Spread Spectrum
 Distributed signals over multiple frequencies (to avoid
eavesdropping or jamming)
 Frequency Hopping Spread Spectrum (FHSS)
– Sender transmits over a seemingly random series of frequencies
– Intended receiver aware of sequence of frequencies and hops
accordingly
– Allows the coexistence of multiple networks in the same area by
using different hopping sequences
 Direct Sequence Spread Spectrum (DSSS)
– Sender transmits redundant information called “chips” between
actual data bits
– Intended receiver aware of spread removes redundant information
accordingly
– Preamble and header of a frame is always transmitted with 1
Mbit/s, rest of transmission 1 or 2 Mbit/s
IFA’2004
27
Wireless LAN Classification

Infrared (IR) LANs
– An individual cell of an IR LAN is limited to a single room,
since infrared light does not penetrate opaque walls.
 Spread Spectrum LANs
– In most cases these LANs operate in the ISM (industrial,
scientific, and medical) bands, so no FCC licensing is
required for their use in the United States.
 Narrowband Microwave LANs
– These LANs operate at microwave frequencies but do no
use spread spectrum. Some of these products operate at
frequencies that require FCC licensing; others use one of
the unlicensed ISM bands.
– Table 1 summarizes some of the key characteristics of
these three technologies; the details are explored in the
next three subsections.
IFA’2004
28
Comparison: Infrared
vs. Radio Transmission
 Infrared
– uses IR diodes, diffuse light,
multiple reflections (walls,
furniture etc.)
 Advantages
– simple, cheap, available in many
mobile devices
– no licenses needed
 Disadvantages
– interference by sunlight, heat
sources etc.
– many things shield or absorb IR
light
– low bandwidth
– Line of Sight Problem
 Example
– IrDA (Infrared Data
Association) interface available
everywhere: PDAs, calculators,
laptops, mobile phones...
IFA’2004
 Radio
– typically using the license
free ISM band at 2.4 GHz
 Advantages
– experience from wireless
WAN and mobile phones can
be used
– coverage of larger areas
possible (radio can penetrate
walls, furniture etc.)
 Disadvantages
– very limited license free
frequency bands
– shielding more difficult,
interference with other
electrical devices
 Example
– WaveLAN, HIPERLAN,
Bluetooth
29
Overview of WLAN Classification
IFA’2004
30
Wireless LAN MAC
 CSMA as Wireless MAC?
 Hidden and Exposed Terminal
Problems make the use of CSMA an
inefficient technique
IFA’2004
31
Hidden Terminal Problem
Collision
A





B
C
A talks to B
C senses the channel
C does not hear A’s transmission (out of range)
C talks to B
Signals from A and B collide
IFA’2004
32
Exposed Terminal Problem
A




B
C
Not
possible
D
B talks to A
C wants to talk to D
C senses channel and finds it to be busy
C stays quiet (when it could have ideally
transmitted)
IFA’2004
33
Hidden and Exposed
Terminal Problems
 Hidden Terminal
– More collisions
– Wastage of resources
 Exposed Terminal
– Underutilization of channel
– Lower effective throughput
IFA’2004
34
MACA - Collision Avoidance
 MACA (Multiple Access with Collision Avoidance) uses short
signaling packets for collision avoidance
– RTS (request to send): a sender request the right to send
from a receiver with a short RTS packet before it sends a
data packet
– CTS (clear to send): the receiver grants the right to send
as soon as it is ready to receive
 Signaling packets contain
– sender address
– receiver address
– packet size
 Variants of this method can be found in IEEE802.11 as
DFWMAC (Distributed Foundation Wireless MAC)
IFA’2004
35
Hidden Terminal
Revisited …
A





RTS
CTS
DATA
B
CTS
C
A sends RTS
B sends CTS
C overheads CTS
C inhibits its own transmitter
A successfully sends DATA to B
IFA’2004
36
Hidden Terminal Revisited
 How does C know how long to wait before it
can attempt a transmission?
 A includes length of DATA that it wants to
send in the RTS packet
 B includes this information in the CTS
packet
 C, when it overhears the CTS packet,
retrieves the length information and uses it
to set the inhibition time
IFA’2004
37
Exposed Terminal Revisited
A
RTS
CTS





B
RTS
C
Cannot hear CTS
D
Tx not
inhibited
B sends RTS to A (overheard by C)
A sends CTS to B
C cannot hear A’s CTS
C assumes A is either down or out of range
C does not inhibit its transmissions to D
IFA’2004
38
Collisions
 Still possible – RTS packets can collide!
 Binary exponential backoff performed by
stations that experience RTS collisions
 RTS collisions not as bad as data collisions
in CSMA (since RTS packets are typically
much smaller than DATA packets)
IFA’2004
39
Drawbacks
 Collisions still possible if CTS packets
cannot be heard but carry enough to
cause significant interference
 If DATA packets are of the same
size as RTS/CTS packets, significant
overheads
IFA’2004
40
WLANs – 802.11
Protocol Architecture
Real Time Traffic
Contention Free Service
Normal Data Traffic
(Asynchronous)
Contention Service
Point Coordination
Function (PCF)
MAC
Distributed Coordination Function (DCF)
Physical Layer (PHY)
IFA’2004
41
IEEE 802.11
- Medium Access Control
– Distributed Mode: Distributed Coordination Function (DCF)
* Based on CSMA/CA protocol
* Uses a contention algorithm to provide access to all traffic.
* Ordinary asynchronous traffic uses DCF directly.
– Coordinated Mode: Point Coordination Function (PCF)
*
*
*
*
Supports real time traffic
Based on polling which is controlled by a centralized point coordinator.
Uses a centralized MAC algorithm and provides contention-free service.
PCF is built on top of DCF and exploits features of DCF to assure
access for its users.
Both the DCF and PCF can operate concurrently within
the same BSS to provide alternative contention and
contention-free periods
NOTE:
IFA’2004
42
802.11 - MAC Layer Overview
– DFWMAC-DCF CSMA/CA (Mandatory)
(Distributed Foundation Wireless Medium Access Control
- Distributed Coordinated Function CSMA/CA)
– DFWMAC-DCF w/ RTS/CTS (Optional)
Distributed Foundation Wireless MAC
Avoids Hidden Terminal problem
– DFWMAC- PCF (Optional)
Access point polls terminals according to a list
IFA’2004
43
802.11 - CSMA/CA
Access Method DFWMAC-DCF CSMA/CA
– A station with a frame to transmit senses the medium.
– If the medium is idle, it waits to see if the medium
remains idle for a time equal to IFS. If so, the station
may transmit immediately.
– If the medium is busy (either because the station initially
finds the medium busy or because the medium becomes
busy during the IFS idle time), the station defers
transmission and continues to monitor the medium until the
current transmission is over.
– Once the current transmission is over, the station delays
another IFS.
– If the medium remains idle for this period, the station
backs off using a binary exponential backoff scheme and
again senses the medium.
– If the medium is still idle, the station may transmit.
IFA’2004
44
802.11 - CSMA/CA
Access Method I
DIFS
DIFS
medium busy
direct access if
medium is free  DIFS
IFA’2004
contention window
(randomized back-off
mechanism)
next frame
t
slot time
45
802.11 - CSMA/CA Access Method II
Interframe Spaces (IFS)
 Priorities
– Defined through different inter frame spaces
– SIFS (Short Inter Frame Spacing)
 highest priority, for ACK, CTS, polling response
– PIFS (PCF IFS) - Point Coordination Function Inter-Frame
spacing
 medium priority, for real time service using PCF
 SIFS + one slot time
– DIFS (DCF, Distributed Coordination Function IFS)
 lowest priority, for asynchronous data service
 SFIS + two slot times
IFA’2004
46
Interframe Spaces (IFS)
DIFS
DIFS
medium busy
PIFS
SIFS
direct access if
medium is free  DIFS
IFA’2004
contention
next frame
t
47
IEEE 802.11
- Medium Access Control
In Figure we illustrate the use of these time values.
IFA’2004
48
802.11 - CSMA/CA
Access Method II
– Station has to wait for DIFS before sending data
– Receivers acknowledge at once (after waiting for SIFS) if
the packet was received correctly (CRC))
– Automatic retransmission of data packets in case of
transmission errors
DIFS
sender
data
SIFS
receiver
ACK
DIFS
other
stations
waiting time
IFA’2004
data
t
contention
49
802.11 – DFWMAC w/
RTS/CTS
– Station can send RTS (request to send) with reservation parameter
after waiting for DIFS (reservation determines amount of time the
data packet needs the medium)
– Every node receiving the RTS has to set its Net Allocation Vector
(NAV) in accordance with the duration of the field (NAV specifies
the earliest point at which the station can try to access the
medium
– If receiver receives RTS, it sends CTS (Clear to Send) after
SIFS. CTS again contains duration field and all stations receiving
this packet need to adjust their NAV
– Sender can now send data after SIFS, acknowledgement via ACK
by receiver after SIFS
IFA’2004
50
IEEE 802.11
- Medium Access Control
 Clear to Send (CTS)
– A station can ensure that its data frame will get through by
first issuing a small request to send (RTS) frame.
– The station to which this frame is addressed should respond
immediately with a CTS frame if it is ready to receive.
– All other stations receive the RTS and defer using the
medium until they see a corresponding CTS or until a
timeout occurs.
– PIFS is used by the centralized controller in issuing polls
and takes precedence over normal contention traffic.
– However, those frames transmitted using SIFS have
precedence over a PCF poll.
– Finally, the DIFS interval is used for all ordinary
asynchronous traffic.
IFA’2004
51
802.11 – DFWMAC w/
RTS/CTS
DIFS
sender
RTS
data
SIFS
receiver
other
stations
IFA’2004
CTS SIFS
SIFS
NAV (RTS)
NAV (CTS)
defer access
ACK
DIFS
data
t
contention
52
IEEE 802.11
- Medium Access Control
 Point Coordination Function
– PCF is an alternative access method implemented
on top of the DCF.
– The operation consists of polling with the
centralized polling master (point coordinator).
– The point coordinator makes use of PIFS when
issuing polls.
– Because PIFS is smaller than DIFS, the point
coordinator can seize the medium and lock out
all asynchronous traffic while it issues polls and
receives responses.
IFA’2004
53
IEEE 802.11
- Medium Access Control
 Point Coordination Function (Cont.)
– A wireless network is configured so that a number of
stations with time-sensitive traffic are controlled by the
point coordinator while remaining traffic contends for
access using CSMA.
– The point coordinator could issue polls in a round-robin
fashion to all stations configured for polling.
– When a poll issued, the polled station may respond using
SIFS.
– If the point coordinator receives a response, it issues
another poll using PIFS.
– If no response is received during the expected turnaround
time, the coordinator issues a poll.
IFA’2004
54
IEEE 802.11
- Medium Access Control
 Point Coordination Function (Cont.)
Figure 18 illustrates the use of the superframe.
IFA’2004
Figure 18
55
IEEE 802.11
- Medium Access Control
 Point Coordination Function (Cont.)
– At the beginning of a superframe, the point
coordinator may optionally seize control
and issues polls for a given period of time.
– This interval varies because of the variable
frame size issued by responding stations.
– The remainder of the superframe is
available for contention-based access.
IFA’2004
56
IEEE 802.11
- Medium Access Control
 Point Coordination Function (Cont.)
– At the end of the superframe interval, the
point coordinator contends for access to
the medium using PIFS.
– If the medium is idle, the point
coordinator gains immediate access and a
full superframe period follows.
– However, the medium may be busy at the
end of a superframe.
– In this case, the point coordinator must
wait until the medium is idle to gain
access; this results in a foreshortened
superframe period for the next cycle.
IFA’2004
57
DFWMAC-PCF I
 The access mechanisms presented so far cannot
guarantee a maximum access delay or minimum
transmission bandwidth.
 To provide a time bounded service, the standards
specify a Point Coordination Function (PCF) on top of
the DCF mechanisms.
 Using PCF requires an access point that can controls
medium access and polls the single nodes. Ad Hoc
networks cannot use this function.
IFA’2004
58
DFWMAC-PCF I
 At time t0 the contention-free period should start,
but another station is transmitting data
 After the medium has been idle, the PCF has to
wait for PIFS before accessing the medium.
 The point coordinator now sends data D1 to the
first station. The station can answer after SIFS.
After waiting for SIFS, the point coordinator can
poll the second station by sending D2.
 The second station replies with U2
IFA’2004
59
DFWMAC-PCF I
t0 t1
medium busy PIFS
point
coordinator
wireless
stations
stations‘
NAV
IFA’2004
SuperFrame
SIFS
D1
SIFS
SIFS
D2
SIFS
U1
U2
NAV
60
DFWMAC-PCF II
 Polling continues with the third node which has nothing to answer.
 After waiting for PIFS, the point coordinator can issue an end
marker (CFend), indicating that the contention period may start
again.
 The cycle starts again with the next superframe
t2
point
coordinator
wireless
stations
stations‘
NAV
IFA’2004
D3
PIFS
SIFS
D4
t3
t4
CFend
SIFS
U4
NAV
contention free period
contention
period
t
61
WLAN: IEEE 802.11b

Data rate
–
–

Transmission range
–
–

Free 2.4 GHz ISM-band


Connection set-up time
–
Connectionless/always on
–
Typ. Best effort, no guarantees
(unless polling is used, limited
support in products)
Quality of Service
Manageability
–

–
Limited, WEP (Wired Equivalent
Privacy) insecure, SSID
Availability
–
Many products, many vendors
IFA’2004
Limited (no automated key
distribution, sym. Encryption)
Special Advantages/Disadvantages
Security
–

300m outdoor, 30m indoor
Max. data rate ~10m indoor
Frequency
–

1, 2, 5.5, 11 Mbit/s, depending
on SNR
User data rate max. approx. 6
Mbit/s

–
Advantage: many installed
systems, lot of experience,
available worldwide, free ISMband, many vendors, integrated
in laptops, simple system
Disadvantage: heavy
interference on ISM-band
(Industrial, Scientific, Medical
band), no service guarantees,
slow relative speed only
62
WLAN: IEEE 802.11a

Data rate
–
–
6, 9, 12, 18, 24, 36, 48, 54
Mbit/s, depending on SNR
User throughput (1500 byte
packets): 5.3 (6), 18 (24), 24
(36), 32 (54)
6, 12, 24 Mbit/s mandatory
–
100m outdoor, 10m indoor
–

Transmission range

E.g., 54 Mbit/s up to 5 m, 48 up to 12
m, 36 up to 25 m, 24 up to 30m, 18 up
to 40 m, 12 up to 60 m

Frequency

Security

Availability
–
Free 5.15-5.25, 5.25-5.35,
5.725-5.825 GHz ISM-band
–
Limited, WEP insecure, SSID
–
Some products, some vendors
IFA’2004
 Connection set-up time
– Connectionless/always on
 Quality of Service
– Typ. best effort, no
guarantees (same as all
802.11 products)
 Manageability
– Limited (no automated key
distribution, sym.
Encryption)
 Special
Advantages/Disadvantages
– Advantage: fits into 802.x
standards, free ISM-band,
available, simple system,
uses less crowded 5 GHz
band
– Disadvantage: stronger
shading due to higher
frequency, no QoS
63
WLAN: IEEE 802.11 – Future
Developments (08/2002)


802.11d: Regulatory Domain Update – completed
802.11e: MAC Enhancements – QoS – ongoing
–

802.11f: Inter-Access Point Protocol – ongoing
–



Establish an Inter-Access Point Protocol for data exchange via the
distribution system.
802.11g: Data Rates > 20 Mbit/s at 2.4 GHz; 54 Mbit/s, OFDM – ongoing
802.11h: Spectrum Managed 802.11a (DCS, TPC) – ongoing
802.11i: Enhanced Security Mechanisms – ongoing
–

Enhance the current 802.11 MAC to expand support for applications with
Quality of Service requirements, and in the capabilities and efficiency of the
protocol.
Enhance the current 802.11 MAC to provide improvements in security.
Study Groups
–
–
–
5 GHz (harmonization ETSI/IEEE) – closed
Radio Resource Measurements – started
High Throughput – started
IFA’2004
64
WLANs – 802.11
Compatibility
 802.11a and 802.11b share the same MAC layer
 Significant differences at the physical layer.
– 802.11b: 2.4 GHz, ISM band,
– 802.11a: 5 GHz, U-NII band
– possible to operate both on the same network
concurrently (using the same access points)
 Interoperability
– WECA (Wireless Ethernet Compatibility Alliance):
organization behind Wi-Fi that certifies products
meeting the 802.11b specification
IFA’2004
65
WLANs – Comparison
of Technologies
Characteristic
802.11
802.11b
802.11a
HiperLAN/2
Spectrum
2.4GHz
2.4GHz
5GHz
5GHz
Max Physical Rate
2Mb/s
11Mb/s
54Mb/s
32Mb/s
Max data rate layer 3
1.2Mb/s
5Mb/s
32Mb/s
32Mb/s
Medium access
CSMA/MA
TDMA/TDD
Connectivity
Conn.-less
Conn.-less
Conn.-less
Conn.-oriented
Multicast
Yes
Yes
Yes
Yes
QoS support
No
No
No
Yes
Frequency selection
FH/DSSS
DSSS
Single carrier
Single carrier with
Dynamic Frequency
Selection
Authentication
No
No
No
NAI/IEEE
address/X.509
Encryption
40bit RC4
40bit RC4
40bit RC4
DES, 3DES
Handover support
No
No
No
No
Fixed network support
Ethernet
Ethernet
Ethernet
Ethernet, IP, ATM
UMTS, FireWire, PPP
Management
802.11MIB
802.11MIB
802.11MIB
HiperLAN/2MIB
Radio link quality control
No
No
No
Link adaptation
IFA’2004
66
WLANs – Interference
 An important issue in all wireless systems
because nearby users occupy same bandwidth
and cause co-channel interference.
 For WLANs, in addition to co-channel
interference, other types of interference exist
mainly due to the use of unlicensed ISM band.
Interference to WLANs comes from the
following major sources:
– Co-channel interference.
– Interference from non-wLAN devices in the
same frequency band
– Interference between different wLANs in
the same frequency band.
IFA’2004
67
WLANs – Interference
Reduction

Regulatory and standards
– Change frequency segment of a channel (proposed by
FCC for Bluetooth)
 Usage and practices
– When one wLAN is working, others are banned. Not
practical. Modal operation of wLANs can be a good
alternative
 Technical approaches.
– Driver layer: software above the MAC layer can be
installed for different types of wLANs. Thus,
software switch from one wLAN to another wLAN is
required.
– MAC layer: more attractive but it is an on-going
research topic.
– Physical layer: signal processing techniques and antiIFA’2004 jamming schemes used
68
WLANs – Environmental Issues
 Has been proved that WLAN is safe for health
– Radiation used by this technology, fall well within the limits
of safety guidelines (both in terms of frequency content
and power level) specified by Radio Frequency Safety
Standards and Recommendations.
– Radiation in this frequency range is non-ionizing (as they do
not have enough energy to break the chemical bonds of
genetic material of body cells).
– Vendors designing their products to operate within the
power limit set by the Safety Standards.
 Others
– No wires to hide and maintain
– Looks much better and cleaner compared to the wired one.
– Positive impact on user psychology due to user mobility,
reduced-cost of ownership, real-time-access to
information,
IFA’2004
69
WLANs – Major Suppliers
Three types of products in WLANs:
– Access Point
– LAN Adapters and
– LAN Bridges.
IFA’2004
70
WLANs –Access Point Products
Major
Suppliers
Agere
Products
Standard
Throughput
WEP
Encryption
AP-1000
Operating
Frequency
2.4GHz
802.11b
11Mbps
-
Avaya
I/700022270
2.4GHz
802.11b
11Mbps
-
Nokia
A032
2.4GHz
802.11b
11Mbps
64- and 128-bit
Nortel
e-mobility DSSS
AP DR4000E02
2.4GHz
802.11b
11Mbps
-
Intel
PRO/Wireless
2011B
PRO/Wireless
5000
I-GATE 11M
2.4GHz
802.11b
11Mbps
64- and 128-bit
5.2 GHz
802. 11b
54 Mbs
64- and 128-bit
2.4GHz
802.11b
11Mbps
11Mbps
2.4GHz
802.11b
11Mbps
64-bit
Fujitsu
Access Point
6000
MBH8MB01
2.4GHz
Bluetooth
732.2kbps
-
Compaq
WL510
2.4GHz
802.11b
11Mbps
128bit
Agere
AP-1000
2.4GHz
802.11b
11Mbps
128bit
Apple
AirPort
2.4GHz
802.11b
11Mbps
-
IBM
AP500
2.4GHz
802.11b
11Mbps
-
Cisco
Aironet® 350
Series
2.4GHz
802.11b
11Mbps
-
Intel
Siemens
3Com
IFA’2004
71
WLANs – LAN Adapter
Products
Major
suppliers
Products
Operating
Frequency
Standard
Throughput
Range
Intel
PRO/Wireless
2011B LAN
PC Card
2.4GHz
802.11b
11Mbps
-
Intel
PRO/Wireless
5000 LAN
PCI Adapter
5.2GHz
802.11a
54Mbps
100 feet
Compaq
WL110
2.4GHz
802.11b
11Mbps
-
Agere
ORiNOCO PC
Card
2.4GHz
802.11b
11Mbps
-
Apple
Airport Client
Card
2.4GHz
802.11b
11Mbps
-
Cisco
Aironet® 350
Series
2.4GHz
802.11b
11Mbps
-
IFA’2004
72
WLANs –Bridge Products
Major
suppliers
Products
Operating
Frequency
Standard
Throughput
Range
Intel
Wireless
Gateway
2.4GHz
802.11b
11Mbps
-
Compaq
WL310
2.4GHz
802.11b
11Mbps
160m(525feet)
Agere
RG-1100
Broadband
Gateway
2.4GHz
802.11b
11Mbps
550m(1750ft)
Agere
ORiNOCO
PC Card
2.4GHz
802.11b
11Mbps
-
Cisco
Aironet®
350 Series
Wireless
Bridge
2.4GHz
802.11b
11Mbps
25 miles (40.2
km)
IFA’2004
73
WLANs – Market Segment
by Wireless LAN Association (wLANA )
IFA’2004
74
WLANs – Market Forecast
 Seen as "The Technology" of the future.
– Trend support: Decrease of product price and increase
of network speed,
– Apart from current sectors, more and more new
markets are opening up for this technology. Some of
these are shipping and receiving area, distribution
center, cafeteria, home, train, bus, airport, sport
complexes, trade shows, coffee shops, etc.
 Huge market potential
– Make WLAN as a viable option to connect the
developing nations to the developed part of the world,
making the concept "Global Village" a reality.
 Estimated a five-fold increase in its market by 2005
IFA’2004
75
WLANs – Technology Forecast
 WLAN will have higher speeds
– Wi-Fi5 for IEEE 802.11a up to 54Mbps
– 5.7-GHz band promises to allow for the next
breakthrough data rate of 100 Mbps.
 Provide multimedia and access to 3G-4G Systems
– HIPERLAN/2 to provide high speed access (up to 54
Mbit/s at PHY layer) to 3G mobile core networks, and
Internet.
 More security guarantees.
– Enhancements to Wired Equivalent Privacy (WEP)
IFA’2004
76
WLANs – Technology Forecast
 Even more decreased size, cost, power
consumption
 New approaches in handling network
parameters dynamically to improve
throughput.
 Improved reliability
 Efficient and concurrent uses of
bandwidth via Wideband Orthogonal
Frequency Division Multiplexing (WOFDM)
IFA’2004
77
WLANs – Service Analysis
 Convergence for voice and data networks
– As voice, audio and video are shared among
WLAN-enabled phones, MP3 players, web
cameras, interactive TVs, etc, wireless
applications will move beyond traditional
computer networking.
 Replacement of proprietary cables.
 Portable access to wireless LAN.
 Multimedia over wireless networks.
 Wireless remote data access.
 Data Backup.
IFA’2004
78
WLANs – Network
Design Plan Analysis
 Key parameters:
–
–
–
–
number of expected users
area of coverage
quality of service
service types
 Network topology for WLAN can broadly
be classified into:
– Ad-Hoc WLAN
– Client-Server based WLAN
IFA’2004
79
WLANs – Performance Metrics
 Overall coverage area
– Can be evaluated in terms of received signal
strength intensity (RSSI)
 Throughput
– Can be evaluated by measuring TCP
connection throughputs since wLANs establish
a client-server communication link via TCP
connection,
 Implementations of handoff and dropping are
the responsibility of manufacturers, since they
vary according to different equipments
IFA’2004
80
WLANs – Network
Security Aspects
 Service set identifier (SSID) (can be configured into 802.11
APs)
 Use VPN technologies built into or on top of WLAN products
 Wired equivalent privacy (WEP) of 802.11 or the common
128-bit extension
– Uses shared keys and a pseudo random number (PRN) as
an initial vector (IV) to encrypt the data portion of network
packets, but does not encrypt 802.11b header
– Each station (clients and APs) has a number of keys to
encrypt data before it is transmitted
– Each station can only receive a packet being encrypted
with its appropriate key. Without proper key, the packet
will be discarded
– Some vendors also provide key servers to implement
centralized key management, such as Cisco.
IFA’2004
81
WLANs – Price Comparison
Vendor Name
Access Points
PC card
PCI Adapter
3Com
$545.00
$169.00
$199.00
Wireless
Bridge
$1095.00
Apple
$301.00
$99.00
--
--
Avaya
$685.00
$144.00
$59.00
--
Cisco
$717.00
$193.00
$269.00
$458.00
Compaq
$729.00
$166.00
$208.00
--
Ericsson
$929.00
$186.00
--
--
IBM
$1015.00
$182.00
--
--
Nokia
$751.00
$212.00
$199.00
--
Nortel
$1065.00
$289.00
--
$638.00
Symbol
$1025.00
$181.00
$271.00
$655.00
Zoom
$410.00
$136.00
$136.00
$1888.00
IFA’2004
82
WLANs – Total Cost
 Much smaller (around one year) payback period
– Even though initial capital cost for the WLAN may be
more, but the running cost for the WLAN is much less
 Cost-effective large scale network deployment
– Example: organizations for around 300 users benefited
annual savings of up to $4.9 million, which corresponds
to per user saving of $15,989.00.
 Low initial installation cost (wiring)
– University of Akron, covered their four-story library
with WLAN with a total cost of $80,000, using Cisco
Airnet 350 series and the estimated cost for wired
network for that was $800,000
IFA’2004
83
Conclusions
 Users demand ubiquity: mergence of the
wireless communication services; indoor and
outdoor
 Greater demand for integration with Bluetooth,
wLAN and cellular system
 Technology to meet these demand available
today
 Some key issues:
– interoperability between different wireless
network systems (MORE WORK NEEDED)
– Security: More work needed. An ideal
solution: combination of VPN and IPSec
IFA’2004
84
Conclusions
 Since the needs from various enterprises and
end users are quite different, the service
providers should prepare various network
deployments
– Many issues to be considered: network
capacity, the connectivity to wired network,
QoS, security, price and performance.
 A competitive solution provides seamless endto-end connectivity from mobile users to wired
ones.
 A web-based, centralized network management
is another consideration most customers want
IFA’2004
85
WLANs - Challenging
Issues
 Relatively low data rate.
– Some can achieve very high data rate, e.g., the rate
of IEEE 802.11 WLANs can be as high as 11Mbps,
while some products such as Bluetooth can only
achieve medium speed data rate.
 Lack of support for real time services.
– IEEE 802.11 products, which are based on the
CSMA/CA protocol, are unable to provide QoS
guarantees for voice, video, and other real time
services. (IEEE 802.11 working group E is still working
QoS enhancement)
 Interference between different types of WLANs
 Lack of Interoperability between WLANs
IFA’2004
86
Download