Professional Documents
Culture Documents
6 - Wireless LAN Technology
6 - Wireless LAN Technology
Informatika
Teknik
Preview
Last Lecture Group Discussion
GSM Evolution CDMA2000 Evolution Indonesian GSM & CDMA2000 Networks 4G Technology (LTE & WiMax)
Cross-building interconnect
Nomadic Access Ad hoc networking
Informatika
Teknik
LAN Extension
Wireless LAN linked into a wired LAN on same premises
Wired LAN Backbone Support servers and stationary workstations Wireless LAN Stations in large open areas Manufacturing plants, stock exchange trading floors, and warehouses
Informatika
Teknik
Informatika
Teknik
Cross-Building Interconnect
Connect LANs in nearby buildings Wired or wireless LANs Point-to-point wireless link is used Devices connected are typically bridges or routers
Informatika
Teknik
Nomadic Access
Wireless link between LAN hub and mobile data terminal
Uses: Transfer data from portable computer to office server Extended environment such as campus
Informatika
Teknik
Ad Hoc Networking
Temporary peer-to-peer network set up to meet
immediate need
Example: Group of employees with laptops convene for a meeting; employees link computers in a temporary network for duration of meeting
Informatika
Teknik
Throughput Number of nodes Connection to backbone LAN Service area Battery power consumption Transmission robustness and security Collocated network operation License-free operation Handoff/roaming Dynamic configuration
Informatika
Teknik
10
Informatika
Teknik
11
Doesnt penetrate walls More easily secured against eavesdropping Less interference between different rooms
Teknik
Informatika
12
radiation
Sunlight and indoor lighting Ambient radiation appears as noise in an infrared receiver Transmitters of higher power required Limited by concerns of eye safety and excessive power consumption Limits range
Informatika
Teknik
13
Ominidirectional
Diffused
Informatika
Teknik
14
Informatika
Teknik
15
Ominidirectional
Single base station within line of sight of all other stations
on LAN
Station typically mounted on ceiling Base station acts as a multiport repeater Ceiling transmitter broadcasts signal received by IR transceivers IR transceivers transmit with directional beam aimed at ceiling base unit
Informatika
Teknik
16
Diffused
All IR transmitters focused and aimed at a point on
Informatika
Teknik
17
Informatika
Teknik
18
Informatika
Teknik
19
transmission
Relatively narrow bandwidth Licensed
Unlicensed
Informatika
Teknik
20
Licensed Narrowband RF
Licensed within specific geographic areas to avoid
potential interference
In the US: Motorola had 600 licenses in 18-GHz range Covers all metropolitan areas Can assure that independent LANs in nearby locations dont interfere Encrypted transmissions prevent eavesdropping
Informatika
Teknik
21
Unlicensed Narrowband RF
RadioLAN introduced narrowband wireless LAN in 1995 Uses unlicensed ISM spectrum Used at low power (0.5 watts or less) Operates at 10 Mbps in the 5.8-GHz band Range = 50 m to 100 m
Informatika
Teknik
22
Informatika
Teknik
23
Informatika
Teknik
24
Protocol Architecture
Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium
Informatika
Teknik
25
Protocol Architecture
Functions of medium access control (MAC) layer:
On transmission, assemble data into a frame with address and
error detection fields On reception, disassemble frame and perform address recognition and error detection Govern access to the LAN transmission medium
control
Informatika
Teknik
26
Informatika
Teknik
27
Informatika
Teknik
28
protocols:
Must support multiaccess, shared-medium nature of the link Relieved of some details of link access by MAC layer
Informatika
Teknik
29
LLC Services
Unacknowledged connectionless service
No flow- and error-control mechanisms Data delivery not guaranteed
Connection-mode service
Logical connection set up between two users Flow- and error-control provided
Informatika
Teknik
30
HDLC
type 2 operation
LLC supports unacknowledged connectionless service type 1 operation LLC supports acknowledged connectionless service type 3 operation
access points
LSAPs
Teknik
Informatika
31
Extended service set (ESS) Two or more basic service sets interconnected by DS
Informatika
Teknik
32
Informatika
Teknik
33
Informatika
Teknik
34
Informatika
Teknik
35
Association-Related Services
Association Establishes initial association between station and AP Reassociation Enables transfer of association from one AP to another, allowing station to move from one BSS to another
Informatika
36
Informatika
Teknik
37
Informatika
Teknik
38
Frame exchange protocol Source station transmits data Destination responds with acknowledgment (ACK) If source doesnt receive ACK, it retransmits frame Four frame exchange Source issues request to send (RTS) Destination responds with clear to send (CTS) Source transmits data Destination responds with ACK
Informatika
Teknik
39
Access Control
Informatika
Teknik
40
Informatika
Teknik
41
Distributed coordination function IFS (DIFS) Longest IFS Used as minimum delay of asynchronous frames contending for access
Informatika
Teknik
42
IFS Usage
SIFS Acknowledgment (ACK) Clear to send (CTS) Poll response
PIFS Used by centralized controller in issuing polls Takes precedence over normal contention traffic DIFS Used for all ordinary asynchronous traffic
Informatika
Teknik
43
Informatika
Teknik
44
Duration/connection ID
Addresses
Sequence control
Frame body Frame check sequence
Informatika
Teknik
45
Type
Subtype To DS
From DS
More fragments Retry
1 if leaving DS
1 if fragments follow 1 if retransmission of previous frame
Informatika
Teknik
46
Informatika
Teknik
47
poll (PS-Poll)
Request to send
Clear to send Acknowledgment
(RTS)
(CTS) (CF)-ack
Contention-free
CF-end + CF-ack
(CF)-end
Informatika
Teknik
48
Informatika
49
Association response
Reassociation request Reassociation response
Probe request
Probe response Beacon
Informatika
Teknik
50
Dissociation
Authentication Deauthentication
Informatika
Teknik
51
Informatika
Teknik
52
Authentication
Open system authentication Exchange of identities, no security benefits Shared Key authentication Shared Key assures authentication
Informatika
Teknik
53
Informatika
Teknik
54
IEEE 802.11a
IEEE 802.11b IEEE 802.11g
Sep 1999
Sep 1999 Jun 2003
IEEE 802.11n
IEEE 802.11ac
Oct 2009
Nov 2011 (DRAFT)
Informatika
Teknik
55
56
57
58
802.11g/n (OFDM)
802.11n (OFDM)
Informatika
59
Summary
This Lecture Wireless LAN
Application Protocol Architecture
Informatika
Teknik