CH-15
Wireless LANs
15.1 INTRODUCTION
15.1.1 Architectural Comparison
15.1.2 Characteristics
15.1.3 Access Control
15.2 IEEE 802.11 PROJECT
15.2.1 Architecture
15.2.2 MAC Sub layer
15.2.3 Addressing Mechanism
15.2.4 Physical Layer
15.3 BLUETOOTH
15.3.1 Architecture
15.3.2 Bluetooth Layers
2
 Wireless communication is one of the fastest-
growing technologies.
 The demand for connecting devices without
the use of cables is increasing everywhere.
 Wireless LANs can be found on college
campuses, in office buildings, and in many
public areas.
3
 Medium:
 The medium is air
 The signal is generally broadcast
 Communication is done using share medium
 Hosts
 A host is not physically connected to the network
 It can move freely and can use the services provided
by the network.
4
 Isolated LANs: It is called an ad hoc network, is a set of hosts that communicate
freely with each other.
 Connection to Other Networks: A wireless LAN may be connected to a wired
infrastructure network to a wireless infrastructure network
5
 WLANs can be classified into two types:
 Infrastructure networks contains access points(APs) and mobile
station(STAs).
 Ad hoc LANs do not need any fixed infrastructure.
 Infrastructure networks
 Provide access to other networks
 Include forwarding functions
 Medium access control
 Ad hoc network is a group of computers each with wireless
adapter, connected as an independent wireless LAN.
 Each node can communicate with other nodes
6
 Few Characteristics of wireless LANs:
 Attenuation
 The strength of electromagnetic signals decreases rapidly because the signal
disperses in all directions; only a small portion of it reaches the receiver.
 Interference
 Another issue is that a receiver may receive signals not only from the intended sender,
but also from other senders if they are using the same frequency band.
 Multipath Propagation
 A receiver may receive more than one signal from the same sender because
electromagnetic waves can be reflected back from obstacles such as walls, the ground,
or objects.
 This makes the signal less recognizable.
 Error
 Errors and error detection are more serious issues in a wireless network than in a wired
network. 7
 How a wireless host can get access to the shared medium (air).
 We discussed in Chapter 12 that the Standard Ethernet uses the
CSMA/CD algorithm
 In this method, each host contends to access the medium and sends its
frame if it finds the medium idle.
 If a collision occurs, it is detected and the frame is sent again. Collision
detection in CSMA/CD serves two purposes.
 If a collision is detected, it means that the frame has not been received
and needs to be resent.
 If a collision is not detected, it is a kind of acknowledgment that the
frame was received.
8
 The CSMA/CD algorithm does not work in wireless LANs for three reasons:
1. To detect a collision, a host needs to send and receive at the same time, which means
the host needs to work in a duplex mode.Wireless hosts do not have enough power to
do so (the power is supplied by batteries).They can only send or receive at one time.
2. Because of the hidden station problem, in which a station may not be aware of another
station’s transmission due to some obstacles or range problems, collision may occur but
not be detected.
3. The distance between stations can be great. Signal fading could prevent a station at
one end from hearing a collision at the other end.
 To overcome the above three problems, Carrier Sense MultipleAccess with Collision
Avoidance (CSMA/CA) was invented for wireless LANs 9
Wireless LANs
 IEEE has defined the specifications for a wireless LAN, called
IEEE 802.11, which covers the physical and data-link layers.
 It is sometimes called wireless Ethernet
 The public uses the term WiFi (short for wireless fidelity) as a
synonym for wireless LAN.
11
Wi-Fi Access points
Wi-Fi Router
 The standard defines two kinds of services
 Basic Service Set (BSS)
 Extended Service Set (ESS)
12
 Ad hoc architecture
 The BSS without an AP is a stand-alone network and cannot send data to
other BSSs..
 Infrastructure BSS
 A BSS with anAP is sometimes referred to as an infrastructure BSS.
13
(Ad hoc mode) (Infrastructure mode)
 An extended service set (ESS) is made up of two or more BSSs with APs.
 The BSSs are connected through a distribution system
 The extended service set uses two types of stations:
 Mobile Station: Normal stations inside a BSS
 Stationary Station : Are AP stations that are part of a wired LAN
14
 IEEE 802.11 defines three types of stations based on their
mobility in a wireless LAN:
 No-Transition
 BSS-Transition
 ESS-Transition Mobility
 A station with no-transition mobility is either stationary (not
moving) or moving only inside a BSS.
 A station with BSS-transition mobility can move from one
BSS to another, but the movement is confined inside one ESS.
 A station with ESS-transition mobility can move from one
ESS to another.
15
 IEEE 802.11 defines two MAC sub layers:
 Distributed coordination function (DCF)
 Point coordination function (PCF)
 Figure shows the relationship between the two MAC
sublayers, the LLC sublayer, and the physical layer.
16
 Distributed coordination function (DCF) is sublayer of MAC
 DCF uses CSMA/CA as the access method
 Problem in CSMA/CA
 Collision During
Handshaking
 Hidden-Station Problem
17
 The point coordination function (PCF) is an optional access method that can
be implemented in an infrastructure network.
 It is implemented on top of the DCF and is used mostly for time-sensitive
transmission.
 PCF has a centralized, contention-free polling access method
 The AP performs polling for stations that are capable of being polled.
 The stations are polled one after another, sending any data they have to the AP.
 PIFS is use to give priority to PCF over DCF, another interframe space.
 PIFS (PCF IFS) is shorter than DIFS.
 This means that if, at the same time, a station wants to use only DCF and an AP
wants to use PCF, the AP has priority.
18
 Priority of PCF over DCF, stations that only
use DCF may not gain access to the medium.
 To prevent this, a repetition interval has been
designed to cover both contention-free PCF
and contention-based DCF traffic.
 The repetition interval, which is repeated
continuously, starts with a special control
frame, called a beacon frame.
 When the stations hear the beacon frame,
they start their NAV for the duration of the
contention-free period of the repetition
interval.
 During the repetition interval, the PC (point
controller) can send a poll frame, receive data,
send an ACK, receive an ACK.
 At the end of the contention-free period,
the PC sends a CF end (contention-free
end) frame to allow the contention-based
stations to use the medium.
19
20
 Bluetooth is a wireless LAN technology
 Designed for connecting devices with different functionalities:
 Telephone, mouse, keyboard, camera, etc.
 Standard  IEEE 802.15.1
 The standard defines a wireless personal-area network (PAN)
operable in an area the size of a room or a hall.
21
 Bluetooth defines two types of networks:
 Piconet
 Scatternet.
22
 A piconet, or a small net, can
have up to eight stations.
 One station will be the primary;
the rest are called secondaries.
 All the secondary stations
synchronize their clocks and
hopping sequence with the
primary.
 The communication between
the primary and secondary
stations can be one-to-one or
one-to-many.
 additional secondaries can be in
the parked state
 For communication should
moved from the parked state
to the active state
 only eight stations can be
active in a piconet
23
 Piconets can be combined to form what is called a scatternet.
 A secondary station in one piconet can be the primary in another piconet.
 A station can be a member of two piconets.
24
 L2CAP:The Logical Link Control and Adaptation
Protocol, or L2CAP (L2 here means LL), is roughly
equivalent to the LLC sublayer in LANs.
 It is used for data exchange on an ACL link; SCO channels
do not use L2CAP
25
 The 16-bit length field defines the size of the
data, in bytes, coming from the upper layers.
 Data can be up to 65,535 bytes.
 The channel ID (CID) defines a unique identifier
for the virtual channel created at this level
26
 The L2CAP has specific duties:
 Multiplexing
 Segmentation and
 Reassembly
 Quality of service (QoS)
 Group Management
27

More Related Content

PPTX
Network layer
PPTX
Lecture 05 - Chapter 3 - Models of parallel computers and interconnections
DOCX
OsI reference model
PPTX
Ch 18 intro to network layer - section 1
PPTX
PPT
OSI Physical Layer
PPT
Osi model 7 Layers
PPT
Ip addressing classful
Network layer
Lecture 05 - Chapter 3 - Models of parallel computers and interconnections
OsI reference model
Ch 18 intro to network layer - section 1
OSI Physical Layer
Osi model 7 Layers
Ip addressing classful

What's hot (20)

PPTX
Error Detection and Correction - Data link Layer
PPTX
Structure of Telephone System.pptx
PPTX
Circuit Switching
PPTX
IPV6 ADDRESS
PPTX
Address resolution protocol (ARP)
DOCX
Network hardware
PPTX
Introduction to Data-Link Layer
PPT
Sliding window protocol
PPTX
Transport layer protocol
PPT
Transport layer (computer networks)
PPTX
Presentation on arp protocol
PPTX
Ipv4 presentation
PPTX
Network Layer
PPT
Chapter 14
PPTX
Multiple Access Protocal
PPTX
Network layer - design Issues
PPTX
Tcp IP Model
PPTX
Routing algorithm
PPT
Chapter 5
Error Detection and Correction - Data link Layer
Structure of Telephone System.pptx
Circuit Switching
IPV6 ADDRESS
Address resolution protocol (ARP)
Network hardware
Introduction to Data-Link Layer
Sliding window protocol
Transport layer protocol
Transport layer (computer networks)
Presentation on arp protocol
Ipv4 presentation
Network Layer
Chapter 14
Multiple Access Protocal
Network layer - design Issues
Tcp IP Model
Routing algorithm
Chapter 5
Ad

Similar to Wireless LANs (20)

PDF
CN 5151(15) Module I part 1.3 21072020.pdf
PPTX
Mobile Computing (Part-2)
PPTX
Introduction to wireless LANs ASU FE.pptx
PDF
WiFi - IEEE 802.11
PDF
Mobile Communication
PPT
awsn module 1.ppt
PPT
Wireless Local Area Networks.ppt for Computer Networks
PPTX
It2402 mobile communication unit2
PDF
Computer Communication Networks-Wireless LAN
PPTX
Wlan wireless network
PPT
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
PPT
Wireless local area network IEEE802.11WLAN.ppt
PPT
PPT
PPTX
wireless networks, mobile computing.pptx
PPT
3. Introduction Wireless Local Area Networks.ppt
PPT
3. Wireless Local Area Networks WLAN.ppt
PPT
wireless.ppt
PDF
6. WLAN annd 7__________. Mobile IP.pdf
PDF
Networks snsnnsnsndndndndnndn pdf
CN 5151(15) Module I part 1.3 21072020.pdf
Mobile Computing (Part-2)
Introduction to wireless LANs ASU FE.pptx
WiFi - IEEE 802.11
Mobile Communication
awsn module 1.ppt
Wireless Local Area Networks.ppt for Computer Networks
It2402 mobile communication unit2
Computer Communication Networks-Wireless LAN
Wlan wireless network
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Wireless local area network IEEE802.11WLAN.ppt
wireless networks, mobile computing.pptx
3. Introduction Wireless Local Area Networks.ppt
3. Wireless Local Area Networks WLAN.ppt
wireless.ppt
6. WLAN annd 7__________. Mobile IP.pdf
Networks snsnnsnsndndndndnndn pdf
Ad

More from Meenakshi Paul (20)

PPT
Introduction to Artificial Intelligences
PPTX
Binary Arithmetic
PPTX
19 Network Layer Protocols
PPT
Other Wireless Networks
PPTX
Wired LANs
PPTX
PPTX
Number System
PPTX
Media Access Control (MAC Layer)
PPTX
Data Link Control
PPTX
Introduction to the Data Link Layer
PPT
Switching
PPTX
Transmission Media
PPTX
Bandwidth Utilization Multiplexing and Spectrum Spreading
PPTX
IP classes
PPT
Theory building
PPT
Information Systems and Knowledge Management
PPT
Ch01 The Role of Business Research
PPTX
05 analog transmission
PPTX
04 digital transmission
PPTX
03 Introduction to Physical layer
Introduction to Artificial Intelligences
Binary Arithmetic
19 Network Layer Protocols
Other Wireless Networks
Wired LANs
Number System
Media Access Control (MAC Layer)
Data Link Control
Introduction to the Data Link Layer
Switching
Transmission Media
Bandwidth Utilization Multiplexing and Spectrum Spreading
IP classes
Theory building
Information Systems and Knowledge Management
Ch01 The Role of Business Research
05 analog transmission
04 digital transmission
03 Introduction to Physical layer

Recently uploaded (20)

PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
PPTX
chapter 1.pptx dotnet technology introduction
PDF
electrical machines course file-anna university
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Lesson 3 .pdf
PPTX
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
Solar energy pdf of gitam songa hemant k
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPT
UNIT-I Machine Learning Essentials for 2nd years
PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
PPTX
Wireless sensor networks (WSN) SRM unit 2
PPTX
Quality engineering part 1 for engineering undergraduates
PDF
IAE-V2500 Engine Airbus Family A319/320
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
chapter 1.pptx dotnet technology introduction
electrical machines course file-anna university
Design ,Art Across Digital Realities and eXtended Reality
Environmental studies, Moudle 3-Environmental Pollution.pptx
Lesson 3 .pdf
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
CS6006 - CLOUD COMPUTING - Module - 1.pptx
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Solar energy pdf of gitam songa hemant k
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
Environmental studies, Moudle 3-Environmental Pollution.pptx
Software-Development-Life-Cycle-SDLC.pptx
UNIT-I Machine Learning Essentials for 2nd years
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
Wireless sensor networks (WSN) SRM unit 2
Quality engineering part 1 for engineering undergraduates
IAE-V2500 Engine Airbus Family A319/320
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)

Wireless LANs

  • 2. 15.1 INTRODUCTION 15.1.1 Architectural Comparison 15.1.2 Characteristics 15.1.3 Access Control 15.2 IEEE 802.11 PROJECT 15.2.1 Architecture 15.2.2 MAC Sub layer 15.2.3 Addressing Mechanism 15.2.4 Physical Layer 15.3 BLUETOOTH 15.3.1 Architecture 15.3.2 Bluetooth Layers 2
  • 3.  Wireless communication is one of the fastest- growing technologies.  The demand for connecting devices without the use of cables is increasing everywhere.  Wireless LANs can be found on college campuses, in office buildings, and in many public areas. 3
  • 4.  Medium:  The medium is air  The signal is generally broadcast  Communication is done using share medium  Hosts  A host is not physically connected to the network  It can move freely and can use the services provided by the network. 4
  • 5.  Isolated LANs: It is called an ad hoc network, is a set of hosts that communicate freely with each other.  Connection to Other Networks: A wireless LAN may be connected to a wired infrastructure network to a wireless infrastructure network 5
  • 6.  WLANs can be classified into two types:  Infrastructure networks contains access points(APs) and mobile station(STAs).  Ad hoc LANs do not need any fixed infrastructure.  Infrastructure networks  Provide access to other networks  Include forwarding functions  Medium access control  Ad hoc network is a group of computers each with wireless adapter, connected as an independent wireless LAN.  Each node can communicate with other nodes 6
  • 7.  Few Characteristics of wireless LANs:  Attenuation  The strength of electromagnetic signals decreases rapidly because the signal disperses in all directions; only a small portion of it reaches the receiver.  Interference  Another issue is that a receiver may receive signals not only from the intended sender, but also from other senders if they are using the same frequency band.  Multipath Propagation  A receiver may receive more than one signal from the same sender because electromagnetic waves can be reflected back from obstacles such as walls, the ground, or objects.  This makes the signal less recognizable.  Error  Errors and error detection are more serious issues in a wireless network than in a wired network. 7
  • 8.  How a wireless host can get access to the shared medium (air).  We discussed in Chapter 12 that the Standard Ethernet uses the CSMA/CD algorithm  In this method, each host contends to access the medium and sends its frame if it finds the medium idle.  If a collision occurs, it is detected and the frame is sent again. Collision detection in CSMA/CD serves two purposes.  If a collision is detected, it means that the frame has not been received and needs to be resent.  If a collision is not detected, it is a kind of acknowledgment that the frame was received. 8
  • 9.  The CSMA/CD algorithm does not work in wireless LANs for three reasons: 1. To detect a collision, a host needs to send and receive at the same time, which means the host needs to work in a duplex mode.Wireless hosts do not have enough power to do so (the power is supplied by batteries).They can only send or receive at one time. 2. Because of the hidden station problem, in which a station may not be aware of another station’s transmission due to some obstacles or range problems, collision may occur but not be detected. 3. The distance between stations can be great. Signal fading could prevent a station at one end from hearing a collision at the other end.  To overcome the above three problems, Carrier Sense MultipleAccess with Collision Avoidance (CSMA/CA) was invented for wireless LANs 9
  • 11.  IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data-link layers.  It is sometimes called wireless Ethernet  The public uses the term WiFi (short for wireless fidelity) as a synonym for wireless LAN. 11 Wi-Fi Access points Wi-Fi Router
  • 12.  The standard defines two kinds of services  Basic Service Set (BSS)  Extended Service Set (ESS) 12
  • 13.  Ad hoc architecture  The BSS without an AP is a stand-alone network and cannot send data to other BSSs..  Infrastructure BSS  A BSS with anAP is sometimes referred to as an infrastructure BSS. 13 (Ad hoc mode) (Infrastructure mode)
  • 14.  An extended service set (ESS) is made up of two or more BSSs with APs.  The BSSs are connected through a distribution system  The extended service set uses two types of stations:  Mobile Station: Normal stations inside a BSS  Stationary Station : Are AP stations that are part of a wired LAN 14
  • 15.  IEEE 802.11 defines three types of stations based on their mobility in a wireless LAN:  No-Transition  BSS-Transition  ESS-Transition Mobility  A station with no-transition mobility is either stationary (not moving) or moving only inside a BSS.  A station with BSS-transition mobility can move from one BSS to another, but the movement is confined inside one ESS.  A station with ESS-transition mobility can move from one ESS to another. 15
  • 16.  IEEE 802.11 defines two MAC sub layers:  Distributed coordination function (DCF)  Point coordination function (PCF)  Figure shows the relationship between the two MAC sublayers, the LLC sublayer, and the physical layer. 16
  • 17.  Distributed coordination function (DCF) is sublayer of MAC  DCF uses CSMA/CA as the access method  Problem in CSMA/CA  Collision During Handshaking  Hidden-Station Problem 17
  • 18.  The point coordination function (PCF) is an optional access method that can be implemented in an infrastructure network.  It is implemented on top of the DCF and is used mostly for time-sensitive transmission.  PCF has a centralized, contention-free polling access method  The AP performs polling for stations that are capable of being polled.  The stations are polled one after another, sending any data they have to the AP.  PIFS is use to give priority to PCF over DCF, another interframe space.  PIFS (PCF IFS) is shorter than DIFS.  This means that if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the AP has priority. 18
  • 19.  Priority of PCF over DCF, stations that only use DCF may not gain access to the medium.  To prevent this, a repetition interval has been designed to cover both contention-free PCF and contention-based DCF traffic.  The repetition interval, which is repeated continuously, starts with a special control frame, called a beacon frame.  When the stations hear the beacon frame, they start their NAV for the duration of the contention-free period of the repetition interval.  During the repetition interval, the PC (point controller) can send a poll frame, receive data, send an ACK, receive an ACK.  At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow the contention-based stations to use the medium. 19
  • 20. 20
  • 21.  Bluetooth is a wireless LAN technology  Designed for connecting devices with different functionalities:  Telephone, mouse, keyboard, camera, etc.  Standard  IEEE 802.15.1  The standard defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall. 21
  • 22.  Bluetooth defines two types of networks:  Piconet  Scatternet. 22
  • 23.  A piconet, or a small net, can have up to eight stations.  One station will be the primary; the rest are called secondaries.  All the secondary stations synchronize their clocks and hopping sequence with the primary.  The communication between the primary and secondary stations can be one-to-one or one-to-many.  additional secondaries can be in the parked state  For communication should moved from the parked state to the active state  only eight stations can be active in a piconet 23
  • 24.  Piconets can be combined to form what is called a scatternet.  A secondary station in one piconet can be the primary in another piconet.  A station can be a member of two piconets. 24
  • 25.  L2CAP:The Logical Link Control and Adaptation Protocol, or L2CAP (L2 here means LL), is roughly equivalent to the LLC sublayer in LANs.  It is used for data exchange on an ACL link; SCO channels do not use L2CAP 25
  • 26.  The 16-bit length field defines the size of the data, in bytes, coming from the upper layers.  Data can be up to 65,535 bytes.  The channel ID (CID) defines a unique identifier for the virtual channel created at this level 26
  • 27.  The L2CAP has specific duties:  Multiplexing  Segmentation and  Reassembly  Quality of service (QoS)  Group Management 27