Introduction To WLAN: Srirama Krishna MV
Introduction To WLAN: Srirama Krishna MV
Srirama Krishna MV
Course Content
History
Why WLAN?
Challenges
A Brief History of Spread Spectrum Networking
Wireless LANs offer the following productivity, service, convenience, and cost advantages over traditional wired
networks:
•Mobility-Wireless LAN systems can provide LAN users with access to real-time information anywhere in their
organization. This mobility supports productivity and service opportunities not possible with wired networks.
•Installation Speed and Simplicity-Installing a wireless LAN system can be fast and easy and can
eliminate the need to pull cable through walls and ceilings.
•Installation Flexibility-Wireless technology allows the network to go where wire cannot go.
•Reduced Cost-of-Ownership-While the initial investment required for wireless LAN hardware can be higher
than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower.
Long-term cost benefits are greatest in dynamic environments requiring frequent moves, adds, and changes.
•Scalability-Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific
applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for
a small number of users to full infrastructure networks of thousands of users that allows roaming over a broad
area.
Challenges
Billing
– Business model
– Single bill from the home service provider
Roaming
– Between IP networks
– Between 3G and Wi-Fi
Indoor coverage for ISP
– Public transport (metro, airport, buses, train…)
– Access rights
Security issues
– Interference from competition
Unregulated frequencies
Security concerns
Chapter 2 – WLAN Organizations and Standards
IEEE
– 802.11 Family
FCC & IC
Major Organisations
IEEE Roles and Responsibility
The world's largest technical professional society
– Promoting the development and application of electro-technology
and allied sciences
Fosters the development of standards that often become
national and international standards
Publishes a number of journals
Has many local chapters to promote research and development
EM Spectrum and Frequency Allocation
Spread Spectrum
Most wireless LAN systems use spread-spectrum technology, a wideband
radio frequency technique developed by the military for use in reliable,
secure, mission-critical communications systems. Spread-spectrum is
designed to trade off bandwidth efficiency for reliability, integrity, and
security. In other words, more bandwidth is consumed than in the case of
narrowband transmission, but the tradeoff produces a signal that is, in
effect, louder and thus easier to detect, provided that the receiver knows
the parameters of the spread-spectrum signal being broadcast. If a receiver
is not tuned to the right frequency, a spread-spectrum signal looks like
background noise. There are two types of spread spectrum radio:
frequency hopping and direct sequence.
Frequency-Hopping Spread Spectrum Technology
Wireless Technologies
Organization Name Mission
Promoted
Trade Association
Technology Alliance
Locating a WLAN
Authentication and Association
Service Sets
Roaming
Power Management Features
Locating a WLAN
AP
Listen (scanning)
– Passive
The station will scan all channels AP
It will listen to each channel for a period of
time Be
a co
Saves bandwidth n
STA
PASSIVE
AP
Probe (requesting)
– Active
AP Pr
ob
The station will scan all channels
e It will send a Probe request to get
re
ACTIVE
Beacons
Approximately 50 bytes
50% is header and cyclic redundancy checking (CRC)
Header includes
– Source MAC address
– Destination MAC address (Broadcast)
Between the header and the CRC, the frame contains
– Service Set Identifier (SSID)
– Timestamp
– FH or DS parameter sets
– Traffic Indication Map (TIM)
– Supported rates
Header CRC
Beacons (cont’d)
SSID
– Unique
– Case sensitive
– Alphanumeric value from 2 to
32 characters long
– Used for
Segmenting networks
Primitive security
Process of joining a network
Beacons (cont’d)
Timestamp
– Synchronization
– Beacon interval AP
STA
Beacons (cont’d)
FH or DS parameter sets
– Provide the signalling method (FHSS, DSSS, etc.)
Traffic Indication Map (TIM)
– Is used for power saving mode
– Identifies a station by the association ID
Supported rates
– Informs the station of what speeds are supported by the AP
Authentication and Association
Authentication
– Open system > 2 step process
– Shared key (WEP) > 4 step process
Association STATE 1
– Required to synchronize the station Unauthenticated &
with the AP Unassociated
Successful Deassociation
Association Notification
STATE 3
Authenticated &
Associated
WEP Authentication
Service Set
DS (usually Ethernet)
BSS STA
AP
ESS AP
IBSS (ad hoc)
STA STA
STA
STA
STA STA
BSS BSS
ESS
STA
STA
STA
STA
IBSS
Roaming
Seamlessly changing from one BSS to another
Load balancing in congested area
Not in the standard (vendor specific)
BSS
BSS
Power Management Features (cont’d)
Beacons
ATIM window
zzzz….
Here is the data
Chapter 4 – WLAN Infrastructure Devices
Client Adapter
Access-Point
– AP Modes
Root
Repeater
Bridge
Workgroup Bridge
– Additional Topologies
WLAN Residential & Enterprise Gateways
Client Adapter
PCMCIA
4 common types of cards:
– PCMCIA
– PCI PCI
– USB
– LM
Typical tools on client adapter:
– Site survey tools
– Spectrum analyser USB
– Power & speed monitoring tools
– Profile configuration tool
– Link status monitoring
– & much more
LM
Access Point (AP)
Different vendors
– Cisco
– D-Link
– Linksys
– Nortel
– Symbol
– and much more
Additional topologies
– System redundancy
– Added bandwidth
Before we Proceed…
CHANNEL 1 CHANNEL 6
LAN Backbone
AP AP
Root Root
Mode Mode
AP Modes (cont’d)
Wireless Repeater Mode
The repeater’s Ethernet port does not forward packets
The repeater must be within reach of the root (overlap by 50%)
The repeater is a client to the root like any other STAs
Reduction of throughput !!!
CHANNEL 1 CHANNEL 1
LAN Backbone
Root Repeater
Mode Mode
AP Modes (cont’d)
Wireless Bridge Mode
4 modes supported
– Root
– Non-Root
– Repeater
– Access-Point
In bridge mode no STAs are allowed tA
en
– Except in Access-Point mode gm
se
N
LA
tB
en
gm
N se
LA
Bridge
Bridge
Mode
Mode
(Access-Point) tC
(Root) en
gm
se
N
Bridge LA
Mode
(Repeater)
Bridge
Mode
(Non-root)
AP Modes (cont’d)
tA tB
en en
gm gm
e se
Ns N
LA LA
Workgroup
Root Bridge
Mode Mode
AP Modes (cont’d)
AP to any client
40km @ 2Mbps
18km @11Mbps
LAN Backbone
Active AP Standby AP
Additional Topologies (cont’d)
LAN Backbone
CHANNEL 1 CHANNEL 6
WLAN Residential & Enterprise Gateways
Enterprise
Gateway
Chapter 5 – 802.11 MAC Layer
Topology
1st Generation
SEGMENT
Today
In Ethernet, CSMA/CD is the Access Method
Similarity
– Same LLC (Logical Link Control). There are no differences for upper
layer protocol
Differences
– WLAN is not private (not protected)
– WLAN is exposed to more interferences
Reflectors (metal objects, windows)
Changes in Rx signal strength when position change
Obstruction can affect the wave signal
Other device signals overlap the Tx path
– Mobility
Big advantage but need Roaming between AP and between
different IP networks (Mobile IP or DHCP)
Servers and services need to be modified
– IEEE 802.11 uses collision avoidance algorithm
IEEE 802.3 uses collision detection algorithm
802.11 Frames vs. 802.3 Frames
802.11 and 802.3 do NOT use the same frame
ALL 802.11 frames have the same overall format:
– Data Frame (between STA’s)
– Management Frames
– Control Frames (CTS, RTS, ACK)
802.11 frames have a maximum of 2346
802.3 frames have a maximum of 1500 bytes
Frag Seq
Numb Numb
Protocol Type Subtype To From More Retry Pwr More WEP Order
Version DS DS Frag Mgt Data
Bit 2 2 4 1 1 1 1 1 1 1 1
DS: Distribution System
This format is used to transmit information between stations.
Portions of this frame in the form of several fields are used in
other types of frames. The frame body field can be up to a
maximum of 2312 bytes that is enough to support
transportation of an Ethernet frame with maximum length (1500
bytes).
Control field - The control field consists of 11 fields that we will
briefly describe:
Protocol Version Subfield - This field provides a mechanism that
identifies the version of the 802.11 standard.
Type Subfield – This field identifies four types of frames
Subtype Subfield – This field identifies a specific type of frame
within the Type category
ToDS Subfield – This field is set to the value 1 when the frame
is addressed to an AP for forwarding to the distribution
system, else it is set to 0
FromDS Subfield – The value of this field is set to 1 if the frame is received from
the distribution system otherwise it is 0
More Fragments Subfield - This bit is set to 1 when there are more fragments
belonging to the same frame following the current fragment.
Power Management Subfield – This bit is used to indicate the power management
mode the station will be in after the transmission of the frame, which may set the
station in “power save” mode or “active” mode.
More Data Subfield – This field indicates that more frames are buffered to this
station.
WEP Subfield – This bit is indicating that the frame body is encrypted according
to the WEP algorithm.
Order Subfield – This means that this frame is sent using the Strictly-Ordered
Service class. The Strictly-Ordered Service Class is defined for users that
cannot accept change of the ordering between Unicast frames and Multicast
frames.
802.11 Data Link Layer
802.11 and 802.3 use the same LLC format
– Same 48 bit addressing as other 802 LANs
– MAC address is 6 bytes or 48 bits
– Allows for simple bridging to wired networks
Consequences:
– throughput decreases
– delay increases
STA coverage
Solving the Hidden Terminal Problem
Request to Send/Clear to Send (RTS/CTS)
RTS
A B STA A sends a RTS
(STA B doesn’t hear it)
CTS
AP sends CTS
A B STA A & STA B receive
the CTS addressed to
STA A
DATA
A B
STA A sends data to the AP
STA/AP coverage
Solving the Hidden Terminal Problem
Request to Send/Clear to Send (RTS/CTS) (cont’d)
Optional
Not available on inexpensive home or SOHO products
Provides control over the use of the shared medium
The process is initiated by a RTS frame from a STA
The receiving AP responds with a CTS frame
– Contains a time value that alerts other STA’s not to transmit
Exposed Terminal Problem
Adhoc configuration
DATA
A B C D
STA B sends data to STA A
DATA
A B C D STA C wants to send data
to STA D
Consequences:
– throughput decreases
– delay increases
What is CSMA/CA?
Carrier sense done at two levels
– Physical carrier sense done at the physical layer
– Virtual carrier sense done at the MAC layer using Network
Allocation Vector (NAV) while RTS/CTS/Data/ACK are overheard:
solves problem of hidden and exposed terminal
Reduces collision by deferring transmission if any of the carrier
sense mechanisms senses the channel busy
Reduces probability of collision by random back-off when
senses the channel busy
WLAN Fragmentation
Each fragment consist of a
– MAC Layer header
– Frame Check Sequence (FCS)
– Fragmentation number
Each fragment has the same frame sequence number but
have different ascending fragment number
Each fragment is acknowledged
Applies only to unicast address
Beacons (broadcast) and Ethernet multicast frames are not
fragmented
Fragmentation Implementation Tips
Greater reliability
– Less collision
Can be set between 256 and 2,048 bytes
– Fragmentation is activated by putting a
threshold
If <5% collision, increase fragmentation
threshold
If >5% collision, start a 1000 bytes
– Then lower the value until you get good
result
Dynamic Rate Shifting (DRS)
Supported by DSSS and FHSS
Speed adjustment in relation to the distance
Discrete jump between 1, 2, 5.5 and 11 Mbps
11 Mbps
5.5 Mbps
2 Mbps
1 Mbps
Chapter 6 – 802.11 Physical Layer
Spreading function
– DSSS
– FHSS
OFDM
Modulation overview
What Will be Covered in this Chapter
interference
data result
SS Result
f f f
Signal : One frequency Signal spread over Reconstructed signal at AP
at high power multiple frequencies
Direct Sequence Spread Spectrum (DSSS)
Used for 802.11 and 802.11b
Disperse signal over approximately 22Mhz
11 channel set
– 3 non overlapping: 1, 6 and 11
Ch Freq Range
(GHz) (GHz)
1 2.412 2.401 – 2.423
2.40Ghz 2.48Ghz
FREQUENCY
DSSS vs. FHSS
DSSS Advantages
– Cost
– More popular
– Bandwidth is greater
– No “interframe spacing” like in FHSS
FHSS Advantages
– Greater resistance to narrow band
interference
– Co location (DSSS has a limit of 3 AP co
location)
OFDM
Is NOT a form of spread spectrum
In use for 802.11a and 802.11g
Divides data signal into 48 sub carriers
Provides data transmission at 6, 9, 12, 18, 24, 26, 48,
54 Mbps
6 Mbps, 12 Mbps and 24 Mbps are mandatory for all
802.11 compliant products
Minimize multipath propagation problems
frequency
samples frequency
C26 m carrier
o
d
time samples C1 u
l
D1, D2, … a +
C-1 t
symbols
i
o
C-26 n
OFDM symbol
Transmit time: 4 µs
Modulation
Differential Binary Phase Shift Differential Quadrature Phase
Keying (DBPSK) Shift Keying (DQPSK)
– 2 possible phase shifts – 4 possible phase shifts
90o “01”
Digits Digits
180o 0o 180o 0o
Phase Phase
Shift Shift
270o “11”
+ +
time time
- -
“0” “1” “0” “00” “10” “01” “11” “10”
Modulation (cont’d)
Quadrature Amplitude Modulation (16 & 64 QAM)
– 8 possible phase shifts
16 QAM
“010”
“011” 90o “000”
135o 45o
+
Tribits
“111” “001”
180o 0o
time
Phase
Shift -
“1001” “0001” “1010” “0100” “1111”
225o 315o
Amplitude bit
“0 001”
Tribits 64 QAM …
Modulation (cont’d)
Freq 2.4 GHz 5.2GHz
Standard 802.11 & 802.11b 802.11g 802.11a
Data PHY Modul PHY Modul PHY Modul PHY Modul
Rate ation ation ation ation
(Mbps)
1 DSSS DBPSK FHSS 2GFSK DS/FH DB/2G - -
2 DSSS DQPSK FHSS 4GFSK DS/FH DQ/4G - -
5.5 DSSS CCK - - DSSS CCK - -
6 - - - - OFDM DBPSK OFDM DBPSK
9 - - - - OFDM DBPSK OFDM DBPSK
11 DSSS CCK - - DSSS CCK - -
12 - - - - OFDM DQPSK OFDM DQPSK
18 - - - - OFDM DQPSK OFDM DQPSK
22 - - - - OFDM DQPSK OFDM DQPSK
24 - - - - OFDM DQPSK OFDM DQPSK
33 - - - - OFDM 16QAM OFDM 16QAM
36 - - - - OFDM 16QAM OFDM 16QAM
48 - - - - OFDM 64QAM OFDM 64QAM
54 - - - - OFDM 64QAM OFDM 64QAM
802.11a
High rate PHY, 6 to 54 Mb/s
5 GHz UNII band
OFDM (Orthogonal Frequency Division Multiplexing)
802.11b
High rate PHY, 5.5 and 11 Mb/s
2.4 GHz ISM band (83 MHz, 22 MHz channel)
CCK (Complementary Code Keying)
802.11 Alphabet Soup (cont’d)
802.11c & d
802.11c
– Bridging operation procedures between APs
– Used by AP manufacturers to insure interoperability
– Approved in 1998
802.11d
– Extending operations to new regulatory domains
– Specifically 5 GHz
802.11 Alphabet Soup (cont’d)
802.11e - QoS
802.11h
– Use of 802.11a in 5 GHz band in Europe
– Include dynamic frequency selection (DFS) and transmit
power control (TPC)
802.11i
– Enhanced security and authentication in 802.11
– WEP not enough
– Solution leveraging existing 802.1x standard
802.11j
– Use of 802.11a in the Japanese 4.9 GHz band
802.11 Alphabet Soup (cont’d)
802.11n