4.4 WIRELESS LANS 4.4.1 The 802.11 Architecture • The main wireless LAN standard is 802.11. • Informally the technology is called WiFi (wireless fidelity). • 802.11 networks can be used in two modes. – infrastructure mode. – ad hoc mode. • Infrastructure mode is the most popular mode which is used to connect clients, such as laptops and smart phones, to another network, such as a company intranet or the Internet. 2 Infrastructure Mode • In infrastructure mode, each client is associated with an AP (Access Point) that is in turn connected to the other network. The client sends and receives its packets via the AP. • Several access points may be connected together, typically by a wired network called a distribution system, to form an extended 802.11 network. In this case, clients can send frames to other clients via their APs. 3 4.4.1 The 802.11 Architecture 4 Ad Hoc Mode • The ad hoc mode is a collection of computers that are associated so that they can directly send frames to each other. • There is no access point. Since Internet access is the killer application for wireless, ad hoc networks are not very popular. 5 4.4.1 The 802.11 Architecture 6 4.4.1 The 802.11 Protocol Stack(Data Link Layer) • The data link layer In 802.11 as well as in all the 802 protocols is split into two or more sublayers: – the MAC (Medium Access Control) sublayer determines how the channel is allocated, that is, who gets to transmit next. – Above it is the LLC (Logical Link Control) sublayer, whose job it is to • hide the differences between the different 802 variants technologies • and make them indistinguishable as far as the network layer is concerned (provide an interface to the network layer). 7 4.4.1 The 802.11 Protocol Stack (physical layer) • Several transmission techniques have been added to the physical layer as 802.11 has evolved since it first appeared in 1997. – infrared in the manner of television remote controls. – frequency hopping in the 2.4-GHz band. – direct sequence spread spectrum at 1 or 2 Mbps in the 2.4-GHz band, It is now known as 802.11b. 8 4.4.1 The 802.11 Protocol Stack • To give wireless junkies a much-wanted speed boost, new transmission OFDM (Orthogonal Frequency Division Multiplexing)scheme introduced in 1999 and 2003. – 802.11a and uses a different frequency band, 5 GHz. – 802.11g with 2.4 GHz. Both give rates up to 54 Mbps. • Most recently, transmission techniques that simultaneously use multiple antennas at the transmitter and receiver for a speed boost were finalized as 802.11n in Oct. 2009. With four antennas and wider channels, the 802.11 standard now defines rates up to a startling 600 Mbps. 9 4.4.1 The 802.11 Protocol Stack 10 4.4.5 Services • The 802.11 standard defines the services that the clients, the access points, and the network connecting them must be a conformant wireless LAN. These services cluster into several groups. 11 4.4.5 Services • The association service – Used by mobile stations to connect themselves to APs. – It is used just after a station moves within radio range of the AP. – The capabilities include • • • • the data rates supported security arrangements power-saving capabilities quality of service support, and more. – The station sends a request to associate with the AP. The AP may accept or reject the request. 12 4.4.5 Services • The Reassociation service – lets a station change its preferred AP. – useful for mobile stations moving from one AP to another AP in the same extended 802.11 LAN, like a handover in the cellular network. 13 4.4.5 Services • The Authentication service – Stations authenticate before they can send frames via the AP, but authentication is handled in different ways depending on the choice of security scheme. If the 802.11 network is ‘‘open,’’ anyone is allowed to use it. Otherwise, credentials are needed to authenticate. – The recommended scheme, called WPA2 (WiFi Protected Access 2) – With WPA2, the AP can talk to an authentication server that has a username and password database to determine if the station is allowed to access the network. 14 4.4.5 Services • The integration service – handles any translation that is needed for a frame to be sent outside the 802.11 LAN, or to arrive from outside the 802.11 LAN. – The common case here is connecting the wireless LAN to the Internet. • Data delivery service. – This service lets stations transmit and receive data using the protocols described earlier. 15 4.4.5 Services • The privacy service – Wireless is a broadcast signal. For information sent over a wireless LAN to be kept confidential, it must be encrypted. – manages the details of encryption and decryption. – The encryption algorithm for WPA2 is based on AES (Advanced Encryption Standard). – The keys that are used for encryption are determined during the authentication procedure. 16 4.4.5 Services • QOS traffic scheduling service. – To handle traffic with different priorities, It uses the protocols we described to give voice and video traffic preferential treatment compared to besteffort and background traffic. • A companion service – provides higher-layer timer synchronization. This lets stations coordinate their actions, which may be useful for media processing.. 17 4.4.5 Services • The transmit power control service – gives stations the information they need to meet regulatory limits on transmit power that vary from region to region. • The dynamic frequency selection service – give stations the information they need to avoid transmitting on frequencies in the 5-GHz band that are being used for radar in the proximity. 18 4.5 BROADBAND WIRELESS broadband • broadband refers to telecommunication in which a wide bandwidth of frequencies that are available to transmit information. • Broadband can allow remote stations(devices) to connect to a central station at high speeds. 20 Broad Band Technologies • Telephone System Broad Band Technologies – Plain old telephone service (POTS) – Integrated Services for Digital Network (ISDN) – Digital subscriber line (DSL) • Cable Television Technology • Satellites Technology • Cellular Communication Technology – (BroadBand Wireless) 21 4.5 BROADBAND WIRELESS • The problem is that running fiber or coax to millions of homes and businesses is prohibitively expensive. What is a competitor to do? • The answer is broadband wireless. Erecting a big antenna on a hill just outside of town is much easier and cheaper than digging many trenches and stringing cables. 22 4.5 BROADBAND WIRELESS • Thus, companies provide multimegabit wireless communication services for voice, Internet, movies on demand, etc. • The Broadband Wireless standard metropolitan area network (MAN) is 802.16. • Informally the technology is called WiMAX (Worldwide Interoperability for Microwave Access). 23 4.5.1 Comparison of 802.16 with 802.11 (similarities) • At this point you may be thinking: why devise a new standard? Why not just use 802.11? – Like 802.11, WiMAX connect devices to the Internet at megabit/sec speeds wirelessly, instead of using cable or DSL. The devices may be mobile, or at least portable. – The packets may carry traffic, VoIP calls, or streaming media to support a range of applications. – Also like 802.11, 802.16 is based on OFDM technology to ensure good performance in spite of wireless signal different problems. 24 4.5.1 Comparison of 802.16 with 802.11 (differences) • However, WiMAX unlike 802.11. WiMAX achieves high capacity by the efficient use of spectrum, so that a large number of subscribers in a coverage area can all get high throughput. How? – WiMAX base stations are more powerful than 802.11 Access Points (APs)( The typical distances are at least 10 times larger than for an 802.11 network). – The WiMAX base station uses more power and better antennas, and it performs more processing to handle errors and weaker signals over larger distances. – WiMAX maximizes throughput, by carefully schedules transmissions by the base station for each particular subscriber. 25 4.5.2 The 802.16 Architecture • The 802.16 architecture : Base stations connect directly to the provider’s backbone network, which is in turn connected to the Internet. • The base stations communicate with stations over the wireless air interface. Two kinds of stations exist: – Subscriber stations remain in a fixed location, for example, broadband Internet access for homes. – Mobile stations can receive service while they are moving, for example, a car equipped with WiMAX. 26 4.5.2 The 802.16 Architecture 27 4.5.2 The 802.16 Protocol Stack (Physical Layer) • The general structure is similar to that of the other 802 networks, but with more sublayers. • The bottom layer (physical layer) deals with transmission, and here we have shown only the popular offerings of 802.16, fixed and mobile WiMAX. – There is a different physical layer for each offering. Both layers operate in licensed spectrum below 11 GHz and use OFDM, but in different ways. 28 4.5.2 The 802.16 Protocol Stack 29 4.5.2 The 802.16 Protocol Stack (Data Link Layer) • The data link layer consists of three sublayers. – Security layer – MAC common layer – The service-specific convergence sublayer • The bottom one (Security layer) deals with privacy and security, which is far more crucial for public outdoor networks than for private indoor networks. It manages encryption, decryption, and key management. 30 4.5.2 The 802.16 Protocol Stack (Data Link Layer)2 • The MAC common sublayer. This part is where the main protocols, such as channel management, are located. • the base station completely controls the system; It can schedule the downlink (i.e,base to subscriber) channels very efficiently and plays a major role in managing the uplink (i.e., subscriber to base) channels as well. • An unusual feature of this MAC sublayer is that, (unlike those of the other 802 protocols), it is completely connection oriented, in order to provide quality of service guarantees for telephony and multimedia communication. 31 4.5.2 The 802.16 Protocol Stack (Data Link Layer)3 • The service-specific convergence sublayer takes the place of the logical link sublayer in the other 802 protocols. Its function is to – provide an interface to the network layer. – Different convergence layers are defined to integrate seamlessly with different upper layers. (hide the differences between the different 802 technologies) 32 4.6 BLUETOOTH Wireless Networks PAN 802.15.x 10m LAN 802.11 100m MAN 802.16 2-6km WAN 2G, 3G 2km/link national areas Overview of wireless networks 34 Bluetooth • Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. • The key features of Bluetooth technology are – Short Range and Small Networks – robustness, – low power, – and low cost. • IEEE 802.15 is the 15th working group of the IEEE 802 which specializes in Wireless PAN (Personal Area Network including Bluetooth) standards. • The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other. www.bluethooth.com 35 Bluetooth Application Areas • Data and voice access points – Real-time voice and data transmissions • Cable replacement – Eliminates need for numerous cable attachments for connection • Ad hoc networking – Device with Bluetooth radio can establish connection with another when in range 36 What does Bluetooth do for you? Landline Cable Replacement Data/Voice Access Points Personal Ad-hoc Networks 37 4.6.1 Bluetooth Architecture • The basic unit of a Bluetooth system is a piconet; – A Piconet: it consists of a master node (for synchronization purposes) and up to seven active slave nodes within a distance of 10 meters. • Multiple piconets can exist in the same (large) room and can even be connected via a bridge node that takes part in multiple piconets; – A Scatternet : is interconnected collection of piconets. 38 4.6.1 Bluetooth Architecture 39 4.6.1 Bluetooth Architecture • In addition to the seven active slave nodes in a piconet, there can be up to 255 parked nodes in the net. These are devices that the master has switched to a low power state to reduce the drain on their batteries. • In parked state, a device cannot do anything except respond to an activation or signals from the master. 40 4.6.1 Bluetooth Architecture • The reason for the master/slave design is that the designers intended to facilitate the implementation of complete Bluetooth chips for under $5. • The consequence of this decision is that the slaves are fairly dumb, basically just doing whatever the master tells them to do. • All communication is between the master and a slave; direct slave-slave communication is not possible. 41 Features of Bluetooth Technology • Bluetooth is based upon small, high performance integrated radio transceivers, each of which is allocated a unique 48-bit address derived from the IEEE 802 standards. • It operates in the unrestricted 2.4 GHz ISM "free band", which is available globally, although slight variation of location and width of band apply. • Bluetooth uses the unlicensed ISM (Industrial, Scientific and Medical) band, 2400 - 2483.5 MHz, thereby maximizing communication compatibility worldwide • The range is set at 10 meters to optimize for target market of mobile and business user. The range can, however, be increased to 100 meters. • Gross data rate is 1Mbit/s, with second generation providing increase to 2Mbit/s, and further to 3Mbits/s 42