Title: Special Topics on Wireless Ad-hoc Networks
1Special Topics on Wireless Ad-hoc Networks
Lecture 6 Wireless Area Networks (WPANs WLANs)
- University of Tehran
- Dept. of EE and Computer Engineering
- By
- Dr. Nasser Yazdani
2Covered topic
- How to build a small wireless network?
- Different current wireless technologies
- References
- Chapter 3 of the book
- Bluetooth
- Design alternative for Wireless local area
networks,
3Outlines
- Some basic issues
- Wireless area network standards
- Bluetooth
- ZigBee
- 802.11 standard
4Ideal Wireless Area network?
- Wish List
- High speed (Efficiency)
- Low cost
- No use/minimal use of the mobile equipment
battery - Can work in the presence of other WLAN
(Heterogeneity) - Easy to install and use
- Etc
5Wireless LAN Design Goals
- Wireless LAN Design Goals
- Portable product Different countries have
different regulations concerning RF band usage. - Low power consumption
- License free operation
- Multiple networks should co-exist
6Wireless LAN Design Alternatives
- Design Choices
- Physical Layer diffused Infrared (IR) or Radio
Frequency (RF)? - Radio Technology Direct-Sequence or
Frequency-Hopping? - Which frequency range to use?
- Which MAC protocol to use.
- Peer-Peer architecture or Base-Station approach?
Univ. of Tehran
Computer Network
6
7Physical Layer Alternatives
- IR
- Simple circuitry, cost-effective, no regulatory
constraints, no Rayleigh fading (waves are
small), also nice for micro-cellular networks...
(multiple cells can exist in a room providing
more bandwidth) - RF
- more complicated circuitry, regulatory
constraints (2.4 GHz Industrial Scientific
Medical, ISM, bands) in the U.S.
8Physical Layer Alternatives
IR RF
Cost lt10 lt20
Regulation None No license on ISM bands
Interference Ambient Light Radiators
coverage Spot Wide Area
Performance Moderate Depends on Bandwidth
Multiple networks Limited Possible
9Spread spectrum technology
- Problem of radio transmission frequency
dependent fading can wipe out narrow band signals
for duration of the interference - Solution spread the narrow band signal into a
broad band signal using a special code - Side effects
- coexistence of several signals without dynamic
coordination - tap-proof
- Alternatives Direct Sequence, Frequency Hopping
signal
interference
spread signal
power
power
spread interference
detection at receiver
f
f
10DSSS (Direct Sequence Spread Spectrum)
- XOR of the signal with pseudo-random number
(chipping sequence) - generate a signal with a wider range of
frequency spread spectrum
11FHSS (Frequency Hopping Spread Spectrum)
- Discrete changes of carrier frequency
- sequence of frequency changes determined via
pseudo random number sequence - Two versions
- Fast Hopping several frequencies per user bit
- Slow Hopping several user bits per frequency
- Advantages
- frequency selective fading and interference
limited to short period - simple implementation
- uses only small portion of spectrum at any time
12FHSS Example
13Comparison between Slow Hopping and Fast Hopping
- Slow hopping
- Pros cheaper
- Cons less immune to narrowband interference
- Fast hopping
- Pros more immune to narrowband interference
- Cons tight synchronization ? increased complexity
14Radio Technology
- Spread Spectrum Technologies
- Frequency Hopping The sender keeps changing the
carrier wave frequency at which its sending its
data. Receiver must be in synch with transmitter,
and know the ordering of frequencies. - Direct-Sequence The receiver listens to a set of
frequencies at the same time. The subset of
frequencies that actually contain data from the
sender is determined by spreading code, which
both the sender and receiver must know. This
subset of frequencies changes during
transmission. - Non-Spread Spectrum requires licensing
15Frequency Hopping versus Direct Sequence
- DS advantages
- Lower cost
- FH advantages
- Higher capacity
- Interference avoidance capability If some
frequency has interference on it, simply don't
hop there. - Multiple networks can co-exist Just use a
different frequency hopping pattern.
16Wireless Standards
17Distance vs. Data Rate
18Mobility vs. Data Rate
Univ. of Tehran
Computer Network
18
19Bluetooth
- Goals
- Ad-hoc wireless connectivity for everything!
- Original goal
- Low-cost replacement for annoying wire between
cellphone and headset - Result Two modes of operation
- Point to point (serial wire replacement)
- Point to multipoint (ad-hoc networking)
20Bluetooth devices
- Cellphones
- Headsets
- PDAs
- Laptops
- Two-way pagers
- Pads, tabs, etc
21Bluetooth design Specs
- Started with Ericsson's Bluetooth Project in 1994
! - Named after Danish king Herald Blatand (AD
940-981) who was fond of blueberries - Radio-frequency communication between cell phones
over short distances - Intel, IBM, Nokia, Toshiba, and Ericsson formed
Bluetooth SIG in May 1998 - Version 1.0A of the specification came out in
late 1999. - IEEE 802.15.1 approved in early 2002 is based on
Bluetooth - Key Features
- Lower Power 10 µA in standby, 50 mA while
transmitting - Cheap 5 per device
- Small 9 mm2 single chips
22Bluetooth design Specs
- Frequency Range 2402 - 2480 MHz (total 79 MHz
band) 23 MHz in some countries, e.g., Spain - Data Rate1 Mbps (Nominal) 720 kbps (User)
- Channel Bandwidth1 MHz
- Range Up to 10 m can be extended further
- RF hopping 1600 times/s gt 625 µs/hop
- Security Challenge/Response Authentication. 128b
Encryption - TX Output Power
- Class 1 20 dBm Max. (0.1W) 100m
- Class 2 4 dBm (2.5 mW)
- Class 3 0 dBm (1mW) 10m
Univ. of Tehran
Computer Network
22
23Piconet
- Piconet is formed by a master and many slaves
- Up to 7 active slaves. Slaves can only transmit
when requested by master - Up to 255 Parked slaves
- Active slaves are polled by master for
transmission - Each station gets a 8-bit parked address gt 255
parked slaves/piconet - The parked station can join in 2ms.
- Other stations can join in more time.
- A device can participate in multiple piconets gt
complex schedule
Univ. of Tehran
Computer Network
23
24Frequency Hopping Sequences
- 625 µs slots
- Time-division duplex (TDD) gtDownstream and
upstream alternate - Master starts in even numbered slots only.
- Slaves start in odd numbered slots only
- lsb of the clock indicates even or odd
- Slaves can transmit in one slot right after
receiving a packet - from master
- Packets 1 slot, 3 slot, or 5 slots long
- The frequency hop is skipped during a packet.
Univ. of Tehran
Computer Network
24
25Bluetooth Operational States
Univ. of Tehran
Computer Network
25
26Bluetooth Operational States (Cont)
- Standby Initial state
- Inquiry Master sends an inquiry packet. Slaves
scan for inquiries and respond with their address
and clock after a random delay (CSMA/CA) - Page Master in page state invites devices to
join the piconet. Page message is sent in 3
consecutive slots (3 frequencies). Slave enters
page response state and sends page response
including its device access code. - Master informs slave about its clock and address
so that slave can participate in piconet. Slave
computes the clock offset. - Connected A short 3-bit logical address is
assigned - Transmit
27Bluetooth Packet Format
- Packets can be up to five slots long. 2745 bits.
- Access codes
- Channel access code identifies the piconet
- Device access code for paging requests and
response - Inquiry access code to discover units
- Header member address (3b), type code (4b), flow
control, ack/nack (1b), sequence number, and
header error check (8b) 8b Header is encoded
using 1/3 rate FEC resulting in 54b - Synchronous traffic has periodic reserved slots.
- Other slots can be allocated for asynchronous
traffic - 54b 0-2754b
72b
Access Code Baseband/link Control Header Data Payload
Univ. of Tehran
Computer Network
27
28Bluetooth Energy Management
- Three inactive states
- Hold No ACL. SCO (Sync data) continues. Node can
do something else scan, page, inquire - Sniff Low-power mode. Slave listens only after
fixed sniff intervals. - Park Very Low-power mode. Gives up its 3-bit
active member address and gets an 8-bit parked
member address. - Packets for parked stations are broadcast to
3-bit zero address. -
Sniff
Univ. of Tehran
Computer Network
28
29Bluetooth Protocol Stack
- RF Frequency hopping GFSK modulation
- Baseband Frequency hop selection, connection,
MAC -
Univ. of Tehran
Computer Network
29
30Baseband Layer
- Each device has a 48-bit IEEE MAC address 3
parts - Lower address part (LAP) 24 bits
- Upper address part (UAP) 8 bits
- Non-significant address part (NAP) - 16 bits
- UAPNAP Organizationally Unique Identifier
(OUI) from IEEE - LAP is used in identifying the piconet and other
operations - Clock runs at 3200 cycles/sec or 312.5 µs (twice
the hop rate)
Univ. of Tehran
Computer Network
30
31Bluetooth Protocol Stack
- Logical Link Control and Adaptation Protocol
(L2CAP) - Protocol multiplexing
- Segmentation and reassembly
- Controls peak bandwidth, latency, and delay
variation - Host Controller Interface
- RFCOMM Layer
- Presents a virtual serial port
- Sets up a connection to another RFCOMM
- Service Discovery Protocol (SDP) Each device has
one SDP which acts as a server and client for
service discovery messages - IrDA Interoperability protocols Allow existing
IrDA applications to work w/o changes
Univ. of Tehran
Computer Network
31
32Bluetooth Protocol Stack
- IrDA object Exchange (IrOBEX) and Infrared Mobile
Communication (IrMC) for synchronization - Audio is carried over 64 kbps over SCO links over
baseband - Telephony control specification binary (TCS-BIN)
implements call control including group
management (multiple extensions, call forwarding,
and group calls) - Application Profiles Set of algorithms, options,
and parameters. Standard profiles Headset,
Cordless telephony, Intercom, LAN, Fax, Serial
line (RS232 and USB).
Univ. of Tehran
Computer Network
32
33Bluetooth Reality Frequencies
- ISM band is not the same everywhere!
- Smaller band in Japan
- Defense band in France!
- How does radio know where it is and local laws?
- Airplanes and FAA
- Conflicts with 802.11
- More powerful 802.11 stomps on Bluetooth
Univ. of Tehran
Computer Network
33
34More Bluetooth Realities
- Cost
- Hard to produce cheap single-chip radio
- Mix of analog and digital circuits
- Not meeting noise margin requirements
- Currently requires two chips
- Total redesign of boards/products!
- Ad-hoc networking is hard
- Still lots of issues about networking protocols
- First Bluetooth deployments will be P-to-P
35More Bluetooth Realities
- Encryption
- Bluetooth devices use short keys for link layer
encryption (export issues) - Authentication
- How do two Bluetooth devices exchange keys?
- Push a button on both simultaneously
- Small window of vulnerability
- What about ceiling mounted base stations?
36Bluetooth summary
- Will be very cool when it arrives
- Will enable low-cost ad-hoc wireless networking
- Lots of problems to be worked out first
37ZigBee
- Ultra-low power, low-data rate, industrial
monitoring and control applications requiring
small amounts of data, turned off most of the
time (lt1 duty cycle), e.g., wireless light
switches, meter reading, patient monitoring - IEEE 802.15.4
- Less Complex. 32kB protocol stack vs 250kB for
Bluetooth - Range 1 to 100 m, up to 65000 nodes.
- Tri-Band
- 16 Channels at 250 kbps in 2.4GHz ISM
- 10 Channels at 40 kb/s in 915 MHz ISM band
- One Channel at 20 kb/s in European 868 MHz band
- ! Ref ZigBee Alliance, http//www.ZigBee.org
Univ. of Tehran
Computer Network
37
38ZigBee
Two types of devices Full Function Devices (FFD)
for network routing and link coordination Reduced
Function Devices (RFD) Simple send/receive device
s
Univ. of Tehran
Computer Network
38
39LAN Industry
- WANs are offered as service
- Cost of infrastructure
- Coverage area
- LANs are sold as end products
- You own, no service charge
- Analogy with PSTN/PBX
- WLAN vs. WAN Cellular Networks
- Data rate (2 Mbps vs. 54 Mbps)
- Frequency band regulation (Licensing)
- Method of data delivery (Service vs. own)
40LAN standard
41Early Experiences
- IBM Switzerland,Late 1970
- Factories and manufacturing floors
- Diffused IR technology
- Could not get 1 Mbps
- HP Labs, Palo Alto, 1980
- 100 Kbps DSSS around 900 Mhz
- CSMA as MAC
- Experimental licensing from FCC
- Frequency administration was problematic, thus
abandoned - Motorola, 1985
- 1.73 GHz
- Abandoned after FCC difficulties
42Architectures
- Distributed wireless Networks also called Ad-hoc
networks - Centralized wireless Networks also called last
hop networks. They are extension to wired
networks.
43Base-Station Approach Advantages over Peer-Peer
- No hidden terminal base station hears all mobile
terminals, are relays their information to ever
mobile terminal in cell. - Higher transmission range
- Easy expansion
- Better approach to security
- Problem?
- Point of failure,
- Feasibility?
44Wireless LAN Architecture
Ad Hoc
Laptop
Laptop
Server
DS
Pager
Laptop
PDA
Laptop
45Access Point Functions
- Access point has three components
- Wireless LAN interface to communicate with nodes
in its service area - Wireline interface card to connect to the
backbone network - MAC layer bridge to filter traffic between
sub-networks. This function is essential to use
the radio links efficiently
46Medium Access Control
- Wireless channel is a shared medium
- Need access control mechanism to avoid
interference - MAC protocol design has been an active area of
research for many years. See Survey.
47MAC A Simple Classification
Wireless MAC
Centralized
Distributed
On Demand MACs, Polling
Guaranteed or controlled access
Random access
Our focus
SDMA, FDMA, TDMA, Polling
48Wireless MAC issues
- Half duplex operations difficult to receive data
while sending - Time varying channel Multipath propagation,
fading - Burst Channel error BER is as high as 10-3. We
need a better strategy to overcome noises. - Location dependant carrier sensing signal decays
with path length. - Hidden nodes
- Exposed nodes
- Capture when a receiver can cleanly receive data
from two sources simultaneously, the farther one
sounds a noise.
49Performance Metrics
- Delay ave time on the MAC queue
- Throughput fraction used for data transmission.
- Fairness Not preference any node
- Stability handle instantaneous loads greater
than its max. capacity. - Robust against channel fading
- Power consumption or power saving
- Support for multimedia
50Wireless LAN Architecture, Cont
Logical Link Control Layer
MAC Layer Consist of two sub layer, physical
Layer and physical convergence layer
- Physical convergence layer, shields LLC from the
specifics of the physical medium. Together with
LLC it constitutes equivalent of Link Layer of OSI
51Power Management
- Battery life of mobile computers/PDAs are very
short. Need to save - The additional usage for wireless should be
minimal - Wireless stations have three states
- Sleep
- Awake
- Transmit
52Power Management, Cont
- AP knows the power management of each node
- AP buffers packets to the sleeping nodes
- AP send Traffic Delivery Information Message
(TDIM) that contains the list of nodes that will
receive data in that frame, how much data and
when? - The node is awake only when it is sending data,
receiving data or listening to TDIM.
53802.11 Features
- Power management NICs to switch to lower-power
standby modes periodically when not transmitting,
reducing the drain on the battery. Put to sleep,
etc. - Bandwidth To compress data
- Security
- Addressing destination address does not always
correspond to location.
54IEEE 802.11 Topology
- Independent basic service set (IBSS) networks
(Ad-hoc) - Basic service set (BSS), associated node with an
AP - Extended service set (ESS) BSS networks
- Distribution system (DS) as an element that
interconnects BSSs within the ESS via APs.
55Starting an IBSS
- One station is configured to be initiating
station, and is given a service set ID (SSID) - Starter sends beacons
- Other stations in the IBSS will search the medium
for a service set with SSID that matches their
desired SSID and act on the beacons and obtain
the information needed to communicate - There can be more stations configured as
starter.
56ESS topology
- connectivity between multiple BSSs, They use a
common DS
57Starting an ESS
- The infrastructure network is identified by its
extended service set ID (ESSID) - All APs will have been set according to this
ESSID - On power up, stations will issue probe requests
and will locate the AP that they will associate
with.
58802.11 Logical Architecture
- PLCP Physical Layer Convergence Procedure
- PMD Physical Medium Dependent
- MAC provides asynchronous, connectionless service
- Single MAC and one of multiple PHYs like DSSS,
OFDM, IR - and FHSS.
59802.11 MAC Frame Format
Bytes
342346
32
6
Preamble PLCP header MPDU
6
2
6
6
4
2
2
6
Bytes
Encrypted to WEP
Bits
2
1
2
4
1
1
60802.11 MAC Frame Format
- Address Fields contains
- Source address
- Destination address
- AP address
- Transmitting station address
- DS Distribution System
- User Data, up to 2304 bytes long
61Special Frames ACK, RTS, CTS
bytes
2
2
6
4
Frame Control
Duration
Receiver Address
CRC
- Acknowledgement
- Request To Send
- Clear To Send
ACK
bytes
2
2
6
6
4
Frame Control
Duration
Receiver Address
Transmitter Address
CRC
RTS
bytes
2
2
6
4
Frame Control
Duration
Receiver Address
CRC
CTS
62IEEE 802.11 LLC Layer
- Provides three type of service for exchanging
data between (mobile) devices connected to the
same LAN - Acknowledged connectionless
- Un-acknowledged connectionless, useful for
broadcasting or multicasting. - Connection oriented
- Higher layers expect error free transmission
63IEEE 802.11 LLC Layer, Cont..
- Each SAP (Service Access Point) address is 7
bits. One bit is added to it to indicate whether
it is order or response. - Control has three values
- Information, carry user data
- Supervisory, for error control and flow control
- Unnumbered, other type of control packet
64IEEE 802.11 LLC lt-gt MAC Primitives
- Four types of primitives are exchanged between
LLC and MAC Layer - Request order to perform a function
- Confirm response to Request
- Indication inform an event
- Response inform completion of process began by
Indication
65Reception of packets
- AP Buffer traffic to sleeping nodes
- Sleeping nodes wake up to listen to TIM (Traffic
Indication Map) in the Beacon - AP send a DTIM (Delivery TIM) followed by the
data for that station. - Beacon contains, time stamp, beacon interval,
DTIM period, DTIM count, sync info, TIM broadcast
indicator
66Frame type and subtypes
- Three type of frames
- Management
- Control
- Asynchronous data
- Each type has subtypes
- Control
- RTS
- CTS
- ACK
67Frame type and subtypes, Cont..
- Management
- Association request/ response
- Re-association request/ response transfer from
AP to another. - Probe request/ response
- privacy request/ response encrypting content
- Authentication to establish identity
- Beacon (Time stamp, beacon interval, channels
sync info, etc.)
68Frame type and subtypes, Cont..
- Management
- TIM (Traffic Indication Map) indicates traffic to
a dozing node - dissociation
69802.11 Management Operations
- Scanning
- Association/Reassociation
- Time synchronization
- Power management
70Scanning in 802.11
- Goal find networks in the area
- Passive scanning
- Not require transmission
- Move to each channel, and listen for Beacon
frames - Active scanning
- Require transmission
- Move to each channel, and send Probe Request
frames to solicit Probe Responses from a network
71Association in 802.11
1 Association request
2 Association response
AP
3 Data traffic
Client
72Reassociation in 802.11
1 Reassociation request
New AP
3 Reassociation response
5 Send buffered frames
2 verifypreviousassociation
Client
6 Data traffic
Old AP
4 send buffered frames
73Time Synchronization in 802.11
- Timing synchronization function (TSF)
- AP controls timing in infrastructure networks
- All stations maintain a local timer
- TSF keeps timer from all stations in sync
- Periodic Beacons convey timing
- Beacons are sent at well known intervals
- Timestamp from Beacons used to calibrate local
clocks - Local TSF timer mitigates loss of Beacons
74Power Management in 802.11
- A station is in one of the three states
- Transmitter on
- Receiver on
- Both transmitter and receiver off (dozing)
- AP buffers packets for dozing stations
- AP announces which stations have frames buffered
in its Beacon frames - Dozing stations wake up to listen to the beacons
- If there is data buffered for it, it sends a poll
frame to get the buffered data
75Authentication
- Three levels of authentication
- Open AP does not challenge the identity of the
node. - Password upon association, the AP demands a
password from the node. - Public Key Each node has a public key. Upon
association, the AP sends an encrypted message
using the nodes public key. The node needs to
respond correctly using it private key.
76Inter Frame Spacing
- SIFS Short inter frame space dependent on PHY
- PIFS point coordination function (PCF) inter
frame space SIFS slot time - DIFS distributed coordination function (DCF)
inter frame space PIFS slot time - The back-off timer is expressed in terms of
number of time slots.
77802.11 Frame Priorities
- Short interframe space (SIFS)
- For highest priority frames (e.g., RTS/CTS, ACK)
- PCF interframe space (PIFS)
- Used by PCF during contention free operation
- DCF interframe space (DIFS)
- Minimum medium idle time for contention-based
services
DIFS
PIFS
contentwindow
Frame transmission
Busy
SIFS
Time
78SIFS/DIFS
- SIFS makes RTS/CTS/Data/ACK atomic
- Example Slot Time 1, CW 5, DIFS3, PIFS2,
SIFS1,
79Priorities in 802.11
- CTS and ACK have priority over RTS
- After channel becomes idle
- If a node wants to send CTS/ACK, it transmits
SIFS duration after channel goes idle - If a node wants to send RTS, it waits for DIFS gt
SIFS
80SIFS and DIFS
DATA1
ACK1
backoff
RTS
DIFS
SIFS
SIFS
81Energy Conservation
- Since many mobile hosts are operated by
batteries, MAC protocols which conserve energy
are of interest - Two approaches to reduce energy consumption
- Power save Turn off wireless interface when
desirable - Power control Reduce transmit power
82Power Control with 802.11
- Transmit RTS/CTS/DATA/ACK at least power level
needed to communicate with the receiver - A/B do not receive RTS/CTS from C/D. Also do not
sense Ds data transmission - Bs transmission to A at high power interferes
with reception of ACK at C
B
C
D
A
83A Plausible Solution
- RTS/CTS at highest power, and DATA/ACK at
smallest necessary power level - A cannot sense Cs data transmission, and may
transmit DATA to some other host - This DATA will interfere at C
- This situation unlikely if DATA transmitted at
highest power level - Interference range sensing range
Data sensed
B
C
D
A
Data
RTS
Ack
Interference range
84- Transmitting RTS at the highest power level also
reduces spatial reuse - Nodes receiving RTS/CTS have to defer
transmissions
85Bridge Functions
- Speed conversion between different devices,
results in buffering. - Frame format adaptation between different
incompatible LANs - Adding or deleting fields in the frame to convert
between different LAN standards
8602.11 Activities IEEE
- 802.11c Bridge Operation (Completed. Added to
IEEE 802.1D) - 802.11d Global Harmonization (PHYs for other
countries. Published as IEEE Std 802.11d-2001) - 802.11e Quality of Service. IEEE Std
802.11e-2005 - 802.11f Inter-Access Point Protocol (Published
as IEEE Std Std 802.11F-2003) - 802.11h Dynamic Frequency Selection and transmit
power control to satisfy 5GHz band operation in
Europe. Published as IEEE Std 802.11h-2003 - 802.11i MAC Enhancements for Enhanced Security.
Published as IEEE Std 802.11i-2004 - 802.11j 4.9-5 GHz operation in Japan. IEEE Std
802.11j-2004 - 802.11k Radio Resource Measurement interface to
higher layers. Active.
8702.11 Activities IEEE
- 802.11m Maintenance. Correct editorial and
technical issues in 802.11a/b/d/g/h. Active. - 802.11n Enhancements for higher throughput (100
Mbps). Active. - 802.11p Inter-vehicle and vehicle-road side
communication at 5.8GHz. Active. - 802.11r Fast Roaming. Started July 2003.
Active. - 802.11s ESS Mesh Networks. Active.
- 802.11T Wireless Performance Metrics. Active.
- 802.11u Inter-working with External Networks.
Active. - 802.11v Wireless Network Management enhancements
for interface to upper layers. Extension to
80211.k. Active. - Study Group ADS Management frame security.
Active - Standing Committee Wireless Next Generation WNG
Globalization jointly w ETSI-BRAN and MMAC.
Active.
88802.11n
- Trend HDTV and flat screens are taking off Media
Center Extenders from Linksys and other vendors - Application HDTV and streaming video (over
longer distances than permitted by 802.15.3
WPANs) - 11n Next Generation of 802.11
- At least 100 Mbps at MAC user layer ? 200 Mbps
at PHY ? 4x to 5x faster than 11a/g - (802.11a/g have 54 Mbps over the air and 25 Mbps
to user) - Pre-11n products already available
- Task Group n (TGn) setup Sept 2003
- Expected Completion March 2007
89802.11n
- Uses multiple input multiple output antenna
(MIMO) - Data rate and range are enhanced by using spatial
- multiplexing (N antenna pairs) plus antenna
diversity - Occupies one WLAN channel, and in compliance with
802.11 - Backwards compatible with 802.11 a,b,g
- One access point supports both standard WLAN and
MIMO devices
90HIPERLAN
- 1995 ETSI technical group RES 10 (Radio Equipment
and Systems) developed HIPERLAN/1 wireless LAN
standards using 5 channels in 5.15-5.3 GHz
frequency range - Technical group BRAN (Broadband Radio Access
Network) is standardizing HIPERLAN/2 for wireless
ATM - ETSI URL for Hiperlan information
http//www.etsi.org/frameset/home.htm?
/technicalactiv/Hiperlan/hiperlan2.htm
Univ. of Tehran
Computer Network
90
91HIPERLAN Characteristics
- HIPERLANs with same radio frequencies might
overlap - Stations have unique node identifiers (NID)
- Stations belonging to same HIPERLAN share a
common HIPERLAN identifier (HID) - Stations of different HIPERLANs using same
frequencies cause interference and reduce data
transmission capacity of each HIPERLAN - Packets with different HIDs are rejected to avoid
confusion of data
Univ. of Tehran
Computer Network
91
92HIPERLAN Protocol Layers
- Data link layer logical link control (LLC) sub
layer MAC sub layer channel access control
(CAC) sub layer
network
LLC
data link
MAC
physical
CAC
Univ. of Tehran
Computer Network
92
93HIPERLAN Protocol Layers, Cont..
- MAC sub layer
- Keeps track of HIPERLAN addresses (HID NID) in
overlapping HIPERLANs - Provides lookup service between network names and
HIDs - Converts IEEE-style MAC addresses to HIPERLAN
addresses - Provides encryption of data for security
Univ. of Tehran
Computer Network
93
94HIPERLAN Protocol Layers, Cont..
- MAC sub layer
- Provides multi hop routing certain stations
can perform store-and-forwarding of frames - Recognizes user priority indication (for
time-sensitive frames)
Univ. of Tehran
Computer Network
94
95HIPERLAN Protocol Layers, Cont..
- CAC sub layer
- Non-preemptive priority multiple access (NPMA)
gives high priority traffic preference over low
priority - Stations gain access to channel through channel
access cycles consisting of 3 phases
Univ. of Tehran
Computer Network
95
96HIPERLAN CAC Protocol
Cycle
Prioritization Phase
Transmission Phase
Contention Phase
1
2
3
4
Data
ACK
AP
1
2
3
4
5
Time
Univ. of Tehran
Computer Network
96
97HIPERLAN Protocol Layers, Cont
- CAC is designed to give each station (of same
priority) equal chance to access the channel - First stations with highest priority data are
chosen. The rest will back off until all higher
priority data is transmitted. - Stations with the same priority level data,
compete according to a given rule to choose
survivors - Survivors wait a random number of time slots and
then listen to see if the channel is idle
Univ. of Tehran
Computer Network
97
98HIPERLAN Protocol Layers, Cont
- If the channel is idle then it starts
transmitting. - Those who could not transmit wait until next
period
Univ. of Tehran
Computer Network
98
99HIPERLAN/2
- To support QoS, Handoff and integrate WLAN with
next generation Cellular sys. - Supporting IP ATM at 54Mbps
- Use TDMA as MAC
- DLC (Data Link Control) layer constitutes a
logical link Between AP and MT to ensure a
connection oriented Communication.
Univ. of Tehran
Computer Network
99
100Related Standards Activities
- IEEE 802.11
- http//grouper.ieee.org/groups/802/11/
- Hiperlan/2
- http//www.etsi.org/technicalactiv/hiperlan2.htm
- BlueTooth
- http//www.bluetooth.com
- IETF manet (Mobile Ad-hoc Networks) working group
- http//www.ietf.org/html.charters/manet-charter.ht
ml