0% found this document useful (0 votes)
2 views

IoT Networking Technologies 1 .Pptx[1]

The document discusses various IoT networking technologies, focusing on wireless networks, including infrastructure-based and ad hoc networks. It highlights Bluetooth technology, its architecture, protocols, and connection procedures, detailing how devices communicate and manage data exchange. Additionally, it covers different types of wireless networks such as mesh, sensor, and vehicular networks, emphasizing their applications and challenges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

IoT Networking Technologies 1 .Pptx[1]

The document discusses various IoT networking technologies, focusing on wireless networks, including infrastructure-based and ad hoc networks. It highlights Bluetooth technology, its architecture, protocols, and connection procedures, detailing how devices communicate and manage data exchange. Additionally, it covers different types of wireless networks such as mesh, sensor, and vehicular networks, emphasizing their applications and challenges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 128

IoT Networking

Technologies
Md. Sazzadur Rahman, Ph.D
Professor
IIT-JU

1
Acknowledgements

• David B. Johnson, Rice University, Multihop Wireless Ad Hoc


Networking: Current Challenges and Future Opportunities
• Carlos Pomalaza-Ráez, University of Oulu, Finland, MAC
protocols for Mobile Ad hoc Network
• Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedtand Piet Demeester,
Ghent University, An Overview of Mobile Ad Hoc Networks:
Applications and Challenges
• Semtech, https://www.semtech.com/lora
• The Bluetooth SIG,
https://www.bluetooth.com/bluetooth-resources
Prof. Md. Sazzadur Rahman, Ph.D
• Any type of computer network that utilizes some form of wireless network
connection
• Infrastructure-based wireless networks

Cellular Network Wireless LAN

Wireless
Networks
Infrastructure-based wireless networks

• Centralized base station or access point


• Communication via base station or access point
• Require planning, installation, and management

Wireless
Networks
(cont.)
Infrastructure-based wireless networks

• Centralized base station or access point


• Communication via base station or access point
• Require planning, installation, and management

Wireless
Networks
(cont.)
Wireless ad hoc network

• A decentralized type of wireless networks


• Ad hoc because it does not rely on a pre existing network infrastructure
Wireless such as routers or access points
Networks
(cont.) Multi hop mobile ad hoc network

• Nearby users directly communicate not only to exchange their own data
but also to relay the traffic of other network nodes that cannot directly
communicate
• Mobile ad hoc network is used when

⚬ Infrastructure is not available


■ Remote areas
■ Unplanned meetings
Wireless ■ Disaster relief
Networks ■ Military operations

(cont.) ⚬ User does not want to use available infrastructure


■ Time or cost to access service

⚬ There is a need to extend coverage of an infrastructure


■ Allow users to be further away from infrastructure
Mobile ad hoc networking paradigms

• Mesh network
Wireless • Sensor network
• Vehicular network
Networks • Opportunistic network
(cont.)
Mesh network is a network topology in which the infrastructure nodes
connect directly, dynamically and non-hierarchically to as many other nodes
as possible and cooperate with one another to efficiently route data

Wireless
Networks
(cont.)

https://turbofuture.com/internet
Sensor networks consist of spatially distributed devices communicating
through wireless radio and cooperatively sensing physical or environmental
conditions

Wireless
Networks
(cont.)
• Vehicular ad hoc network is a multihop ad hoc network made up of
vehicles
• Opportunistic mobile social networks are a form of mobile ad hoc networks
that exploit the human social characteristics, such as similarities, daily
routines, mobility patterns, and interests to perform the message routing
and data sharing

Wireless
Networks
(cont.)
Wireless
Networks
(cont.)

https://blog-gn.dronacharya.info/index.php/iot-communication-protocols/
Wireless
Networks
(cont.)

https://www.bluetooth.com/blog/wireless-connectivity-options-for-iot-applicat
ions/
Wireless Bluetooth Technology
Networks
(cont.)
• Bluetooth is a wireless LAN technology used for exchanging data
between fixed and mobile devices over short distances

Bluetooth • A Bluetooth LAN is an ad hoc network


Technology
• Low-cost and low-power
(cont.)
• IEEE 802.15.1

• This technology was invented by Ericson in 1994


https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
100 percent of smart phones,
tablets, and laptops include
Bluetooth

https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
Bluetooth is meeting market demand for

Bluetooth ⚬ Audio Streaming


⚬ Data Transfer
Technology ⚬ Location Services
(cont.) ⚬ Device Networks
• Bluetooth defines two types of networks

Bluetooth ⚬ Piconet
Technology ⚬ Scatternet
(cont.)
• A Bluetooth network is called a Piconet

⚬ A piconet can have up to eight stations


⚬ Secondary stations synchronize their clocks and hopping
sequence with primary
⚬ The communication between primary and secondary can be
Bluetooth ■ one-to-one
Technology ■ one-to-many

(cont.)
• Piconets can be combined to form what is called a Scatternet

⚬ A secondary station in one piconet can be the primary in


another piconet
⚬ This station can receive messages from the primary in the
first piconet and deliver them to secondary stations in the
second piconet
Bluetooth
Technology
(cont.)
• Bluetooth Architecture

• The Bluetooth protocol stack


Bluetooth • The protocol stack defines how technology works
Technology • The Bluetooth profiles
(cont.) • The profiles define how to use Bluetooth technology to
accomplish specific tasks
Bluetooth
Technology
(cont.)

L2CAP: Logical Link Control and Adaptation Protocol


• Radio layer

⚬ The radio layer is roughly equivalent to the physical layer of the Internet model
⚬ The radio module in a Bluetooth device is responsible for modulation and
demodulation of data into RF signals
⚬ Bluetooth devices operate at 2.4 GHz in the license-free, globally available ISM
Bluetooth radio band
Technology ■ The advantage of operating in this band is worldwide availability and
compatibility
(cont.) ■ A potential disadvantage is that Bluetooth devices must share this band
with many other RF emitters such as ZigBee and WiFi
⚬ Physical range of 10 m
■ Bluetooth 5.0
• 40–400 m
Bluetooth uses the frequency-hopping spread spectrum (FHSS) method in the physical
layer to avoid interference from other devices or networks.

⚬ After a Bluetooth device sends or receives a packet, it and the device(s) it is


communicating with hop to another frequency before next packet is sent
Bluetooth ⚬ Bluetooth hops 1600 times per second, which means that each device changes its
Technology modulation frequency 1600 times per second
(cont.) ⚬ This scheme has two main advantages

a. It ensures that any interference will be short-lived


Any packet that doesn't arrive safely at its destination can be resent at the
next frequency
b. It provides a base level of security because it's very difficult for an
eavesdropping device to predict which frequency the Bluetooth devices will use next
• There are three classes of BT devices

⚬ Class 1
■ Laptops and desktops
■ Range 100 meters
Bluetooth ■ Power 100mW (20dBm)
⚬ Class 2
Technology
■ Phones and headsets
(cont.) ■ Range 20~50 meters
■ Power 2.5mW (4 dBm)
⚬ Class 3
■ Extremely low power devices
■ Range 1~10 meters
■ Power 1mW (0 dBm)
Baseband layer
• The baseband layer is roughly equivalent to the MAC sublayer in LANs
• Bluetooth uses a form of TDMA
Time division duplex TDMA
• The primary and secondary communicate using time slots

Bluetooth
Technology
(cont.)

• Single-Secondary Communication
⚬ The time is divided into slots of 625 μs
⚬ The primary uses even numbered slots and secondary uses odd-numbered
slots
Baseband layer
⚬ Multiple-Secondary Communication
■ The primary uses the even-numbered slots
■ All secondary units listen on even-numbered slots, but only one
secondary sends in any odd-numbered slot

In slot 0, primary sends a frame to


Bluetooth secondary 1
In slot 1, only secondary 1 sends a
Technology frame to primary because previous
(cont.) frame was addressed to secondary 1
In slot 2, primary sends a frame to
secondary 2
In slot 3, only secondary 2 sends a
frame to primary
If secondary has no frame to send,
channel is silent.
• The Bluetooth specification defines two types of links between BT devices

⚬ Synchronous connection-oriented (SCO)


■ A synchronous connection-oriented link is used when avoiding latency is
more important
Bluetooth ■ A physical link is created between the primary and a secondary by reserving
Technology specific slots at regular intervals
■ No retransmission if packet is damaged
(cont.) ■ Voice information

⚬ Asynchronous connectionless link (ACL) is used when error-free delivery is


more important than avoiding latency
■ Retransmission if packet is damaged
Frame Format
⚬ Access code 72-bit field normally contains synchronization bits and the identifier of the
primary to distinguish the frame of one piconet from another
⚬ Header is 54-bit field
■ The 3-bit address subfield can define up to seven secondary units
■ The 4-bit type subfield defines the type of data coming from the upper layers
■ F 1-bit subfield is for flow control
■ A 1-bit subfield is for acknowledgment.
Bluetooth • Bluetooth uses Stop-and-Wait ARQ
Technology ■ S 1-bit subfield holds a sequence number
(cont.) ■ HEC 8-bit header error correction subfield is a checksum to detect errors in each
18-bit header section
⚬ Data or Payload can be 0 to 2744 bits long
• The Logical Link Control and Adaptation Protocol (L2CAP)

⚬ It is used for data exchange on an ACL link


⚬ SCO channels do not use L2CAP
⚬ Services
Bluetooth ■ Multiplexing
Technology ■ Segmentation and reassembly
(cont.) ■ Quality of service
■ Group management
• Multiplexing
⚬ At the sender site, it accepts data from one of the upper-layer protocols,
frames them, and delivers them to the baseband layer
⚬ At the receiver site, it accepts a frame from the baseband layer, extracts the
data, and delivers them to the appropriate protocol layer
• Segmentation and Reassembly
Bluetooth ⚬ The maximum size of payload field in baseband layer is 2774 bits or 343
bytes
Technology
⚬ Application layers sometimes need to send a data packet that can be up to
(cont.) 65,535 bytes
⚬ The L2CAP divides these large packets into segments and adds extra
information to define the location of the segments in the original packet
⚬ The L2CAP segments the packet at the source and reassembles them at the
destination
• Quality of service
Bluetooth allows the stations to define a quality-of-service level
If no quality-of-service level is defined, Bluetooth defaults to what is called
Bluetooth best-effort service
Technology • Group Management
Another functionality of L2CAP is to allow devices to create a type of
(cont.)
logical addressing between themselves
For example, two or three secondary devices can be part of a multicast
group to receive data from the primary
• Bluetooth defines several protocols for the upper layers that use the services of
L2CAP

⚬ Service discovery protocol (SDP) is used to discover services


■ An SDP client communicates with an SDP server using a reserved channel
Bluetooth on an L2CAP link to find out what services are available
■ When the client finds the desired service, it requests a separate connection
Technology to use the service. The reserved channel is dedicated to SDP
(cont.) communication so that a device always knows how to connect to the SDP
service on any other device
■ An SDP server maintains its own SDP database, which is a set of service
records that describe the services the server offers.
• Bluetooth defines several protocols for the upper layers that use the services of
L2CAP

⚬ Radio frequency communication (RFCOMM) is a simple set of transport


Bluetooth protocols providing emulated RS-232 serial ports
Technology
⚬ Telephony control protocol (TCS) is used to set up and control speech and data
(cont.) calls between Bluetooth devices
• Address

⚬ Bluetooth device address (BD_ADDR)


Bluetooth ■ 48 bit IEEE MAC address
⚬ Active Member address (AM_ADDR)
Technology ■ 3 bits active slave address
(cont.) ■ all zero broadcast address
⚬ Parked Member address (PM_ADDR)
■ 8 bit parked slave address
• A connection between two devices occur in the following fashion
⚬ Nothing is known about a remote device
■ The inquiry and page procedure
⚬ Some details are known about a remote device
■ The paging procedure
• Two nodes cannot exchange messages until they agree to a
1. INQUIRY to discover nodes in proximity
2. PAGING to establish connections
Bluetooth
Connection
• Inquiry procedure enables a device to discover which devices are in range,
and determine the addresses and clocks for the devices
⚬ A device send inquiry packets and then receive inquiry reply
⚬ Device sends inquiry packets on 16 different frequencies
(16 channel train)

Bluetooth
Connection Inquiry Scan
• A device periodically listens for inquiry packets at a single frequency –
(cont.) chosen out of 6 frequencies
• Device stays in the state long enough for a inquiring device to cover 16
frequencies
• It will re-enter inquiry scan state even after responding to an inquire
Inquiry Response

• When a device receives inquire, it will wait between 0 and 0.32 seconds
before sending an FHS packet as a response
Bluetooth This is done to avoid collision with another device that also wants to send
an FHS packet
Connection • FHS Packet contains
(cont.) Device ID
Clock
• After inquiring procedure, inquiring device knows all discoverable devices
within range
Paging procedure
⚬ A unit that establishes a connection will carry out a page procedure and
will automatically be the master of the connection
⚬ Connection process involves a 6 steps of communication between the
master and the slave

Bluetooth
Connection
(cont.)
• Step 1
⚬ A source device broadcasts a PAGE message to destination device
⚬ Once page response is received, source device stops paging

Bluetooth
Connection
(cont.)
Step 2
• The destination node sends response to master or source device
• The response includes destination or slave ID
Step 3
• Master sends an FHS packet to destination or slave node

Bluetooth
Connection
(cont.)
• Step 4
⚬ The destination sends a final response to the master
⚬ Using the data from the FHS packet, the slave or destination node adopts
the master’s frequency hopping pattern and synchronizes to its clock

Bluetooth
Connection
(cont.)
• Step 5
⚬ When the master receives the packet, it jumps back to its frequency
hopping pattern and assigns the slave an Active Member Address (AMA)
for the piconet
⚬ Master sends out a poll packet to ensure that the slave is on its frequency
hopping pattern

Bluetooth
Connection
(cont.)
Step 6
• Once the slave receives the poll packet, the slave replies with any kind of
packet to ensure that it is on the right channel
• A new synchronized connection is established between the master and the
slave at the end of step 6

Bluetooth
Connection
(cont.)
• A device in connection state can be in following modes

⚬ Active mode is a regular connected mode, where device is actively


transmitting or receiving data
⚬ Sniff mode is a power-saving mode, where device is less active. It
sleeps and only listen for transmissions at a set interval
Bluetooth ⚬ Hold mode is a temporary, power-saving mode where a device sleeps
Technology for a defined period and then returns back to active mode when that
interval has passed. The master can command a slave device to hold.
⚬ Park mode is a deepest of sleep modes. A master can command a
slave to park, and that slave will become inactive until master tells it
to wake back up
Bonding and pairing :
• Bonded devices automatically establish connection whenever they are in
range
• Bonds are created through one-time a process called pairing
• Pairing usually requires an authentication process where a user must validate
the connection between devices

The Bluetooth Profiles :


Bluetooth ⚬ The profiles define how to use Bluetooth technology to accomplish specific tasks
Technology ⚬ A wide range of profiles
⚬ Each profile specification contains following information
(cont.) ■ Dependencies on other profiles
• Every profile depends on the base profile, called the generic access profile,
and some also depend on intermediate profiles
■ Suggested user interface formats
• Each profile describes how a user should view the profile so that a
consistent user experience is maintained
■ Specific parts of the Bluetooth protocol stack used by the profile
• To perform its task, each profile uses particular options and parameters at
• Service discovery application profile describes how an application should use the
SDP to discover services on a remote device.
• Headset profile describes how a Bluetooth enabled headset should communicate with
a computer or other Bluetooth device such as a mobile phone
• File transfer profile provides guidelines for applications that need to exchange
objects such as files and folders

Bluetooth
Technology
(cont.)
https://medium.com/jaycon-systems
Version Year Major Improvements

Faster connection and discovery, adaptive frequency hopping, intr


1.2 2003
oduced flow control and retransmission modes

2.0 2004 2.1 Mbps peak data rates

2.1 2007 3.0 Mbps peak data rates

24 Mbps peak data rates using Wi-Fi PHY + Bluetooth PHY for l
3.0 2009
ower rates

Lower energy consumption, broadcasting, lower connection laten


4.0 2010
cy

Improved security, low energy packet length extension, link layer


4.2 2014
privacy

48 Mbps peak data rates, energy efficiency, higher broadcasting


5.0 2016 message capacity, larger range and strong point-to-point connecti
on and reliability
https://medium.com/jaycon-systems
IEEE 802.11 Architecture and Services

Wireless
Networks
(cont.)
• IEEE 802 is a family of Institute of Electrical and
Electronics Engineers (IEEE) standards for local
area networks (LAN), personal area network
(PAN), and metropolitan area networks (MAN)
• In 1990, IEEE 802 Committee formed a new
working group, IEEE 802.11, specifically devoted
Bluetooth to wireless LANs, with a charter to develop a
MAC protocol and physical medium specification
IEEE 802.11
Architecture
and Services
Key IEEE
802.11
Standards
• Wi-Fi is a family of wireless network protocols, based on the IEEE
802.11 family of standards
• Wi-Fi is a brand name created by a marketing firm

Wi-Fi
• There is always a concern whether products from different vendors will
successfully interoperate
• Wireless Ethernet Compatibility Alliance (WECA)
Wi-Fi ⚬ Industry consortium formed in 1999
Alliance • Renamed the Wi-Fi Alliance
⚬ Created a test suite to certify interoperability for 802.11 products
The smallest building block is a basic service set (BSS)

802.11
Architecture

IEEE 802.11 Architecture


• Basic service set (BSS) consists of some number of stations executing same
MAC protocol and competing for access to same shared wireless medium
• A BSS may be isolated or it may connect to a backbone distribution system (DS)
through an access point (AP)
⚬ The DS can be a switch, a wired network, or a wireless network
• In a BSS, client stations do not communicate directly with one another

802.11
Architecture

• In an IBSS, stations communicate directly


⚬ No AP is involved
⚬ An IBSS is typically an ad hoc network
• An extended service set (ESS) consists of two or more basic service sets
interconnected by a distribution system
To integrate the IEEE 802.11 architecture with a traditional wired LAN, a portal is
802.11 Infrastructure Mode
at least one wireless AP and one wireless client

IEEE 802.11
Operating
Modes

802.11 Ad Hoc Mode


wireless clients communicate directly with each other without the use of a wireless
AP
• Each layer has Service Data Unit (SDU) as input
• Each layer makes Protocol Data Unit (PDU) as output to communicate with the
corresponding layer at the other end
• SDUs may be fragmented or aggregated to form a PDU
• PDUs have a header specific to th

IEEE 802.11
Terminology
IEEE 802.11 defines nine services that need to be provided by WLAN

IEEE 802.11
Services
Distribution of Messages Within a DS
Services involved with the distribution of messages within a DS
• Distribution service requires information about stations within the
ESS that is provided by the association-related services
• Station must be associated before DS can deliver data to or accept
data from it

Association- • Association Station must establish an association with an AP within a


Related particular BSS
Services ⚬ The AP can then communicate this information to other APs
within the ESS to facilitate routing and delivery of addressed
frames
• Reassociation Enables an established association to be transferred
from one AP to another, allowing a mobile station to move from one
BSS to another
• Disassociation A notification from either a station or an AP that an
existing association is terminated
IEEE 802.11
Medium
Access
Control
• 802.11 physical and MAC layers are unreliable
⚬ Noise, interference, and other propagation effects result in the loss of a
significant number of frames
⚬ The issue can be addressed at a higher layer such as TCP
Reliable ■ Timers used for retransmission at higher layers are typically on the order of
Data seconds

Delivery • More efficient to deal with errors at MAC level

• 802.11 includes frame exchange protocol


⚬ Station receiving frame returns acknowledgment (ACK) frame
⚬ Exchange treated as atomic unit
⚬ If no ACK within short period of time, retransmit
• To further enhance reliability, a four frame
exchange may be used

• RTS alerts all stations within range of


Reliable source that exchange is under way
Data
• CTS alerts all stations within range of
Delivery
destination
(cont.)
• Other stations don’t transmit to avoid
collision

• RTS and CTS exchange is a required


function of MAC but may be disabled
• Two types of proposals for a MAC algorithm

⚬ Distributed access protocol which distribute the decision to transmit over


Access all the nodes using a carrier sense mechanism
⚬ Centralized access protocol which involve regulation of transmission by a
Control
centralized decision maker

• The end result is a MAC algorithm called DFWMAC (distributed foundation


wireless MAC) that provides a distributed access control mechanism with an
optional centralized control built on top of that
IEEE 802.11 PCF is a centralized MAC
algorithm
Protocol
Architecture DCF uses
CSMA
algorithm to
provide access
to all traffic

IEEE 802.11 Protocol Architecture


• DCF sublayer uses CSMA algorithm

Distributed • Does not include a collision detection


function because it is not practical on a
Coordination wireless network
Function
(DCF) • Includes a set of delays that amounts
as a priority scheme
IEEE 802.11
Medium
Access
Control
Logic

IEEE 802.11 Medium Access Control Logic


Priority IFS
Values
The preceding scheme is refined for DCF to provide priority-based access by the
simple expedient of using three values for IFS:

SIFS (short IFS): The shortest IFS, used for all immediate response actions, as
Priority IFS explained in the following discussion
Values
PIFS (point coordination function IFS): A midlength IFS, used by the centralized
(cont.)
controller in the PCF scheme when issuing polls

DIFS (distributed coordination function IFS): The longest IFS, used as a minimum
delay for asynchronous frames contending for access
Any station using SIFS to determine transmission opportunity has the
highest priority, because it will always gain access in preference to a station
waiting an amount of time equal to PIFS or DIFS

IEEE 802.11
MAC Timing

IEEE 802.11 MAC Timing


Any station using SIFS to determine transmission opportunity has the highest
priority
SIFS is used in the following circumstances:
Acknowledgment (ACK)
SIFS Station responds with an ACK frame after waiting only for a SIFS gap
Provides for efficient collision recovery
Clear to Send (CTS)
Station ensures data frame gets through by issuing RTS
Consider first the SIFS. Any station using SIFS to determine transmission opportunity has,
in effect, the
highest priority, because it will always gain access in preference to a station waiting
an amount of time equal to PIFS or DIFS. The SIFS is used in the following
circumstances:

• Acknowledgment (ACK): When a station receives a frame addressed only


SIFS to itself (not multicast or broadcast), it responds with an ACK frame after
waiting only for an SIFS gap. This has two desirable effects. First, because
(cont.) collision detection is not used, the likelihood of collisions is greater than with
CSMA/CD, and the MAC-level ACK provides for efficient collision recovery.
Second, the SIFS can be used to provide efficient delivery of an LLC protocol
data unit (PDU) that requires multiple MAC frames. In this case, the
following scenario occurs. A station with a multiframe LLC PDU to transmit
sends out the MAC frames one at a time. Each frame is acknowledged by the
recipient after SIFS. When the source receives an ACK, it immediately (after
SIFS) sends the next frame in the sequence. The result is that once a station
has contended for the channel, it will maintain control of the channel until it
• Clear to Send (CTS): A station can ensure that its data frame will get through
by first issuing a small RTS frame. The station to which this frame is addressed
should immediately respond with a CTS frame if it is ready to receive. All
other stations receive the RTS and defer using the medium.
SIFS
(cont.) • Poll response: This is explained in the following discussion of PCF.

The next longest IFS interval is the PIFS. This is used by the centralized
controller in issuing polls and takes precedence over normal contention traffic.
However, those frames transmitted using SIFS have precedence over a PCF poll.

Finally, the DIFS interval is used for all ordinary asynchronous traffic.
SIFS
(cont.)
• Point coordination function (PCF) resides in a point coordinator also known as
Point Access Point , to coordinate the communication within the network
Coordination • The AP waits for PIFS duration rather than DIFS duration to grasp the channel
• Channel access in PCF mode is centralized
Function ⚬ Access to the medium is restricted by the point coordinator
(PCF) ⚬ Associated stations can transmit data only when they are allowed to do so by the
point coordinator
• The polling list

⚬ Stations get on the polling list when they associate with the AP
⚬ Polls any associated stations on a polling list for data transmissions
PCF
⚬ Each CF-Poll is a license to transmit one frame
Operation ⚬ Multiple frames can be transmitted only if the access point sends
multiple poll requests
Figure 13.8 shows the format of IEEE 802.11
frame, also known as the MAC protocol
data unit (MPDU). This general format is used for
all data and control frames,
but not all fields are used in all contexts. The field
are as follows:

IEEE 802.11 • Frame Control: Indicates the type of frame


(control, management, or data)
MAC Frame and provides control information. Control
Format information includes whether the
frame is to or from a DS, fragmentation
information, and privacy information.

• Duration/Connection ID: If used as a duration


field, indicates the time (in
microseconds) the channel will be allocated for
successful transmission of a
MAC frame. In some control frames, this field
contains an association, or connection,
Figure 13.8 : IEEE 802.11 MAC Frame Format identifier.
Addresses: The number and meaning of the 48-bit
address fields depend on
context. The transmitter address and receiver
address are the MAC addresses
of stations joined to the BSS that are transmitting
and receiving frames over
the WLAN. The service set ID (SSID) identifies
the WLAN over which a
IEEE 802.11 frame is transmitted. For an IBSS, the SSID is a
MAC Frame random number generated at
the time the network is formed. For a WLAN that
Format is part of a larger configuration,
(cont.) the SSID identifies the BSS over which the frame
is transmitted; specifically,
the SSID is the MAC-level address of the AP for
this BSS (Figure 13.4).
Finally the source address and destination address
are the MAC addresses of
stations, wireless or otherwise, that are the
ultimate source and destination of
this frame. The source address may be identical to
Figure 13.8 : IEEE 802.11 MAC Frame Format the transmitter address and
• Sequence Control: Contains a 4-bit fragment
number subfield, used for fragmentation
and reassembly, and a 12-bit sequence number
IEEE 802.11 used to number
frames sent between a given transmitter and
MAC Frame receiver.
Format
• QoS Control: Contains information relating to
(cont.) the IEEE 802.11 quality of
service (QoS) facility. A discussion of this facility
is beyond our scope.

• High Throughput Control: This field contains


control bits related to the operation

Figure 13.8 : IEEE 802.11 MAC Frame Format


Frame
Control Field
Frame
Control Field
(cont.)
Frame
Control Field
(cont.)
Control
frames

Control frames assist in the reliable delivery of data frames


Control
frames
(cont.)

All control frames use the same Frame Control field


Control
frames
(cont.)

Duration field in RTS frame


Control
frames
(cont.)

CTS duration
The receiver of a CTS frame is the transmitter of the previous RTS frame, so the MAC copies the
transmitter address of the RTS frame into the receiver address of the CTS frame
• Data frames carry higher-level protocol data in the frame body

⚬ Data
■ Simplest data frame
⚬ Data + CF-Ack
Data ■ Carries data and acknowledges previously received data
frames ⚬ Data + CF-Poll
■ It is used by point coordinator to deliver data and also to request that the
mobile station send a data frame that it may have buffered
⚬ Data + CF-Ack + CF-Poll
■ Combines Data + CF-Ack and Data + CF-Poll
Data
Frame

There are eight data frame subtypes, organized into two groups. The first four subtypes define frames that
carry upper-level data from the source station to the destination station. The four data-carrying frames are
as follows:
• Data: This is the simplest data frame. It may be used in both a contention period and a contention-free
period.
• Data + CF-Ack: May only be sent during a contention-free period. In addition to carrying data, this
• Management frames are used to manage communications between stations
and Aps
• Functions covered include management of associations
⚬ Request, response, reassociation, dissociation, and authentication

Beacon
• announce the existence of a network
Management • transmitted at regular intervals to allow mobile stations to find and identify a
network, as well as match parameters for joining the network
frames Probe Request
• Mobile stations use Probe Request frames to scan an area for existing 802.11
networks
• Include SSID and the rates supported by the mobile station
• Stations that receive Probe Requests use the information to determine whether the
mobile station can join the network
Probe Response
Management • Disassociation and Deauthentication
• Association Request
frames(cont.) • Authentication
It contains the value indicating
the time period for which the
medium is occupied
The number and function of
the address fields depends on
context
In the case of an IBSS, no access points are used, and no distribution system is present

Use of the address fields in data frames


Figure shows a simple network in which a wireless client is connected to a server through an
802.11 network
Figure shows a simple network in which a wireless client is connected to a server through an
802.11 network
Two wired networks are joined by access points acting as wireless bridges
IEEE 802.11 Physical Layer Standards

IEEE 802.11
Physical
Layer
Standards
• Extension of 802.11 DSSS scheme
⚬ Data rates of 5.5 and 11 Mbps
IEEE 802.11b ⚬ Complementary Code Keying (CCK) modulation
gives higher data rate with same bandwidth and
chipping rate
• Makes use of the frequency band called Universal
Networking Information Infrastructure (UNNI)
⚬ UNNI-1 band (5.15 to 5.25 GHz) for indoor use
⚬ UNNI-2 band (5.25 to 5.35GHz) for indoor or
outdoor
⚬ UNNI-3 band (5.725 to 5.825 GHz) for outdoor

IEEE 802.11a

• Advantages over IEEE 802.11b and g


⚬ IEEE 802.11a
⚬ Utilizes more available bandwidth
⚬ Provides much higher data rates
⚬ Uses a relatively uncluttered frequency spectrum (5
GHz)
• Higher-speed extension to 802.11b
• Operates in 2.4GHz band
• Compatible with 802.11b devices
• Combines physical layer encoding techniques used in
IEEE 802.11g 802.11 and 802.11b to provide service at a variety of
data rates
• ERP-OFDM for 6, 9, 12, 18, 24, 36, 48, 54Mbps
rates
• ERP-PBCC for 22 and 33Mbps rates
• Enhancements in three general areas:
⚬ Multiple-input-multiple-output (MIMO) antenna architecture
■ with MIMO – multiple antennas on sending and receiving
devices to reduce error and boost speed – this standard
supports higher data rates
⚬ Radio transmission scheme to increase capacity
IEEE 802.11n
■ combines two 20-MHz channels to create a 40-MHz channel
⚬ MAC enhancements
■ Most significant change is to aggregate multiple MAC
frames into a single block for transmission
Forms of
Aggregation
• This standard aims to provide a throughput close to 1 Gbps
• Supports larger channel widths up to 160MHz
• Introduced a new modulation scheme
• 256-QAM modulation

IEEE 802.11ac
• Support of MU-MIMO transmissions in the downlink
⚬ Multiple simultaneous transmissions from the AP to different stations
⚬ Each antenna of a MU-MIMO AP can simultaneously communicate
with a different single-antenna device, such as a smart phone or
tablet
⚬ AP can be equipped with a maximum of eight antennas
IEEE 802.11ac • Allows the transmission of several MPDUs aggregated in a single
(cont.) A-MPDU
⚬ To acknowledge each MPDU individually a Block ACK packet is
used, which contains a bitmap to indicate the correct reception of all
included MPDUs.
• IEEE 802.11ax aims to provide at least a four-fold capacity increase compared to
IEEE 802.11ac
• Support multi-user transmission strategies by further developing MU-MIMO and
Orthogonal Frequency Division Multiple Access (OFDMA) capabilities in both
downlink and uplink
• A fast handoff between APs in the same administration domain
• Device-to-device communication

IEEE 802.11ax
• Open challenges are related to EDCA extensions
⚬ To support a large number of STAs
⚬ Improve traffic differentiation capabilities
⚬ Improve the energy consumption
⚬ Provide mechanisms to fairly co-exist with neighboring wireless
networks
• Developed to include new features and additional mechanisms to improve the
performance of real-time multimedia content delivery
• Groupcast communication mechanisms
IEEE 802.11aa ⚬ In most audio-video streaming applications a group of clients must receive
the same stream simultaneously
⚬ A multicast protocol is necessary to avoid that the same content is replicated
throughout the network
■ Traditional approach is to use Direct Multicast Service that converts
multicast streams into unicast streams
• The IEEE 802.11e amendment only allows traffic differentiation between four
different access categories: voice, video, best-effort, and background.
• Variety of streaming services, ranging from simple videoconferencing to HD
streaming over IPTV systems, have different QoS requirements

IEEE 802.11aa
(cont.)
• IEEE 802.11ah aims to provide WLANs with the ability to both manage a large
number of heterogeneous STAs within a single BSS, and minimize the energy
consumption of the sensor-type battery-powered STAs
⚬ support of up to 8192 STAs associated with a single AP
⚬ minimum data rate of 100 kbps
⚬ a coverage up to 1 km in outdoor areas
⚬ Channel widths of 1 MHz and 2 MHz

IIEEE 802.11ah
• A version of 802.11 operating in the 60-GHz frequency band
• Offers the potential for much wider channel bandwidth than the 5-GHz band
• Few devices operate in the 60-GHz which means communications would
IEEE 802.11ad experience less interference than in the other bands used by 802.11
• Designed for single-antenna operation
• Huge channel bandwidth of 2160 MHz
• 802.11ad is operating in the millimeter range, which has some undesirable
propagation characteristics:
⚬ Losses are much higher in this range than in the ranges used for traditional
IEEE 802.11ad microwave systems
(cont.) ⚬ Multipath losses can be quite high
⚬ Millimeter-wave signals generally don’t penetrate solid objects
IEEE 802.11
Physical Layer
Standards
Low Power Wide Area
THANK YOU Networks

19
• LoRaWAN, https://www.lora-alliance.org
Low Power Wide • SIGFOX, http://www.sigfox.com/
Area Networks

Prof. Md. Sazzadur Rahman, Ph.D


LoRa
⚬ Long Range radio
⚬ Developed by a company called Semtech
⚬ Uses ISM band
⚬ Covers physical layer
⚬ Enables long range transmissions with low power
consumption
⚬ Low bandwidth up to 27 kbs
Low Power Wide
Area Networks

https://lora-developers.semtech.com/library/tech-papers-and-guides/lora-and-lorawan/
Low Power Wide
Area Networks

https://lora-developers.semtech.com/library/tech-papers-and-guides/lora-and-lorawan/
• LoRaWAN
⚬ LoRa only defines the lower-level layers of the network
stack, and LoRaWAN defines the upper layers of the stack
⚬ The LoRaWAN protocols are defined by the LoRa
Low Power Wide Alliance
⚬ LoRaWAN operates in unlicensed radio spectrum
Area Networks
Network
Architecture
• End device is a sensor or an actuator which is wirelessly connected to a
LoRaWAN network through radio gateways
⚬ LoRa-based devices are assigned several unique identifiers
• Gateway receives messages from any end device in range and forwards these
messages to network server, which is connected through an IP backbone
⚬ There is no fixed association between an end device and a specific gateway.
Low Power Wide Same sensor can be served by multiple gateways in the area
Area Networks ⚬ IP traffic from a gateway to the network server can be backhauled via Wi-Fi
or Cellular connection
⚬ Gateways operate entirely at physical layer
■ They are just LoRa radio message forwarders
■ They only check the data integrity of each incoming LoRa RF message.
If error, message will be dropped otherwise will be forwarded to
network server
Network server manages entire network
• Route messages from end devices to right applications and back
• Device address checking
Low Power Wide • Frame authentication
• Acknowledgements of received messages
Area Networks
• Adapting data rates
• Queuing of downlink payloads coming from any Application Server to any de

Application servers are responsible for securely handling, managing and interpreting
sensor application data and generate all the application-layer downlink payloads to
connected end devices
• Device Classes
⚬ The device classes trade off network downlink communication latency
versus battery lifetime

Low Power Wide


Area Networks
• Class A
• Class A devices support bi-directional communication between a device and
a gateway
• Uplink messages can be sent at any time.
• When there is a change in the environment related to whatever the
device is programmed to monitor, it wakes up and initiates an uplink,
transmitting the data about the changed state back to the network.
Low Power Wide • The device then opens two receive windows at specified times after an
Area Networks uplink transmission.
• If the server does not respond in either of these receive windows, the
next opportunity will be after the next uplink transmission from the
device.
• The server can respond either in the first receive window, or in the
second receive window, but should not use both windows.
• Class B
⚬ Class B devices extend Class A by adding scheduled receive windows for
downlink messages from the server.
⚬ Using time-synchronized beacons transmitted by the gateway, the devices
periodically open receive windows.
Low Power Wide • Class C
Area Networks ⚬ Class C devices extend Class A by keeping the receive windows open unless
they are transmitting
■ This allows for low-latency communication but is many times more
energy consuming than Class A devices
Low Power Wide
Area Networks

https://www.mdpi.com/1424-8220/17/10/2364
ANY QUESTION
THANK YOU

Prof. Md. Sazzadur Rahman, Ph.D

You might also like