Wireless Technology Unit 3: Wireless Metropolitan and Local Area Networks
Wireless Technology Unit 3: Wireless Metropolitan and Local Area Networks
Lecture No: 19
IEEE 802.16 (WiMax)
Wireless networks
3 3
Wireless Metropolitan Area Networks (WMAN)
Introduction
A WMAN is a wireless network intended to provide a signal over an area approximately
the size of a metropolitan area (approximately 50 kilometers or 31 miles).
A WMAN is typically owned by a single entity such as an Internet Service Provider (ISP ),
government entity, or large corporation.
Access to a WMAN is usually restricted to authorized user or subscriber devices.
WiMAX is the most widely used form of WMAN.
Goal: Provide high-speed Internet access to home and business subscribers, without wires.
Base stations (BS) can handle thousands of subscriber stations (SS)
BS can control all data traffic that goes between BS and SS through the allocation of
bandwidth on the radio channel.
6
WiMAX
7
WIMAX System: General Features
• Subsystems:
– A WiMAX tower
• similar in concept to a cell-phone tower - A single WiMAX tower can
provide coverage to a very large area as big as ~8,000 square km.
– A WiMAX client terminal
• The terminal receiver and antenna could be a small box or Personal
Computer Memory card, or they could be built into a laptop the
way WiFi access is today
• Range: 50km from base station
• Speed: 70 Megabits per second
• Frequency bands: 2 to 11 and 10 to 66 (licensed and unlicensed bands)
• IEEE 802.16 standards define both MAC and PHY layers and allow multiple
PHY layer specifications
8
IEEE 802.16
• The IEEE 802.16 standard delivers performance comparable to traditional cable, DSL, or
T1 offerings.
• The principal advantages of systems based on 802.16 are multifold:
faster provisioning of service, even in areas that are hard for wired infrastructure
to reach;
lower installation cost; and
ability to overcome the physical limitations of the traditional wired infrastructure.
• 802.16 technology provides a flexible, cost-effective, standard-based means of filling
gaps in broadband services not envisioned in a wired world.
• For operators and service providers, systems built upon the 802.16 standard represent
an easily deployable “third pipe” capable of delivering flexible and affordable last-mile
broadband access for millions of subscribers in homes and businesses throughout the
world.
9
Wireless Metropolitan Area Networks (WMAN)
Key Features of IEEE 802.16
Broadband Wireless Access
Coverage area up to 50 km.
Data rate up to 70 Mbps.
Modulation technique used is BPSK, 64-QAM.
Offers non-line of site (NLOS) operation.
1.5 to 28 MHz channel support.
Hundreds of simultaneous sessions can be carried per channel.
Delivers >1Mbps data throughput per user.
Supports both licensed and unlicensed spectrum.
QoS for voice, video, and T1/E1, continuous and bursty traffic.
Support Point-to-Multipoint (PMP) and Mesh network models.
11
IEEE 802.16 Specifications
• 802.16a
– Uses the licensed frequencies • 802.16d (d = a+b+c)
from 2 to 11 GHz; supports Mesh – Improvement and fixes for 802.16a
network • 802.16e-2005
• 802.16b – Addresses on Mobile
– Increase spectrum to 5 and 6 GHz – Enable high-speed signal handoffs
– Provides QoS( for real time voice necessary for communication with users
and video service) moving at vehicular speeds
• 802.16c
– Spectrum from 10 to 66GHz
12
IEEE 802.16
.
• IEEE 802.16a: It covers frequency bands between 2 and 11 GHz and enables non
line-of-sight (NLOS) operation, making it an appropriate technology for last-mile
applications where obstacles such as trees and buildings often present and where
base stations may need to be unobtrusively mounted on the roofs of homes or
buildings rather than towers on mountains.
• The 802.16a has a range of up to 30 miles with a typical cell radius of 4 to 6 miles.
• Within the typical cell radius NLOS performance and throughputs are optimal. In
addition, the 802.16a provides an ideal wireless backhaul technology to connect
802.11 WLAN and commercial 802.11 hotspots with the Internet.
• The 802.16 delivers high throughput at long ranges with a high spectral efficiency.
13
WIMAX System: General Features
• Subsystems:
– A WiMAX tower
• similar in concept to a cell-phone tower - A single WiMAX tower can
provide coverage to a very large area as big as ~8,000 square km.
– A WiMAX client terminal
• The terminal receiver and antenna could be a small box or Personal
Computer Memory card, or they could be built into a laptop the
way WiFi access is today
• Range: 50km from base station
• Speed: 70 Megabits per second
• Frequency bands: 2 to 11 and 10 to 66 (licensed and unlicensed bands)
• IEEE 802.16 standards define both MAC and PHY layers and allow multiple
PHY layer specifications
14
WiMAX Forum
15
Players in WiMAX Forum
WiMAX Forum has >500 members
(530 as at 26/11/08)
WiMAX members represent over
75% of current 2-11 GHz BWA
equipment sales!
16
WiMAX and IEEE 802.16
17
MODES OF OPERATION
18
Broadband Usage
Scenarios Non Line of Sight
Point to Multi-
Multi-point
Line of Sight
BACKHAUL
802.16
• Fixed wireless access (FWA)
802.16
– Wireless access application in which the
location of the end-user termination and
the network access point to be
connected to the end-user are fixed.
• Backhaul for business 802.11
Telco Core
Network or
Private (Fiber)
19
Types of access supported by WiMax
21
Why (earlier) BWA solutions have not taken off?
Economies of Ethernet
System scale as
Volume
Integration
Network Software
WiMax is an
open
System Design & standard
Architecture solution
Custom MAC
Custom, 802.11 or
DOCSIS PHY
Custom Radio 1980s 1990s 2000 2010
Source: WiMAx Forum
22
802.16 Standard History 2008 530
2006
Membership
Time
Source: Intel & WiMax Forum
23
WiMax Spectrum
24
Global spectrum bands
25
Licensed vs. License-Exempt
Solutions
Licensed Solution License-Exempt
Solution
FDD TDD
Better QoS Fast Rollout
Better NLOS Lower Costs
reception at lower
frequencies
Higher barriers for More worldwide
entrance options
26
Wimax Network CSN: Connectivity Service Network
ASN: Access Service Network
NSP: Network Service Provider
HA AAA HA NSP
ASN
ASN GW ASN GW
BS
BS (FA) (FA)
NAP
Mesh
BS
BS BS BS
P2MP or P2P
MS
27
Wimax Network System Architecture
28
Wimax Network System Architecture
29
Wimax Network System Architecture
30
Wimax Network System Architecture
31
802.16 Network Architectures
P2P
Point-to-Point (P2P) P2MP
Architecture
BS to BS
P2MP Architecture Telco Core
BS serves several Network
32
Wireless Metropolitan Area Networks (WMAN)
IEEE 802.16 lays down the standards for physical layer and data link layer.
Physical Layer − The two popular services of the physical layer are fixed WiMAX and
mobile WiMAX.
They operate in the licensed spectrum below 11 GHz.
Fixed WiMAX was released in 2003 and uses OFDM; while mobile WiMAX was released
in 2005 and uses scalable OFDM.
MAC Layer
The MAC layer refers to an interface that reads data between the physical layer and
the data link layer.
The main goal of the MAC layer is to provide support to PMP architecture using a
central base station that controls the subscriber stations connected to it.
The 802.16 MAC protocol is connection based, which when connected to a network,
every subscriber station creates one or multiple connections with the help of which
data can be transmitted.
A 16-bit unique Connection Identification (CID) is assigned to the transport
connection by the base station.
All uplink connections are unicast and all the downlink connections can be either
unicast or multicast.
PHY Layer
802.16 uses scalable OFDMA to carry data, supporting channel bandwidths of between 1.25 MHz
and 20 MHz, with up to 2048 subcarriers.
It supports adaptive modulation and coding, so that in conditions of good signal, a highly efficient
64 QAM coding scheme is used, whereas when the signal is poorer, a more robust BPKS coding
mechanism is used.
In intermediate conditions, 16 QAM and QPSK can also be employed.
Other PHY features include support for multiple-input multiple-output (MIMO) antennas in order
to provide good non-line-of-sight propagation (NLOS) characteristics (or higher bandwidth)
and hybrid automatic repeat request (HARQ) for good error correction performance.
Although the standards allow operation in any band from 2 to 66 GHz, mobile operation is best in
the lower bands which are also the most crowded, and therefore most expensive.
Lecture No:34
WLAN-802.11
Wi-Fi
• Wi-Fi is trademarked name for popular wireless technology that uses radio
waves to provide high-speed Internet and network connections.
• The governing body that owns the term Wi-Fi, the Wi-Fi Alliance, defines it
as any WLAN (wireless area network) products that are based on the
Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.
• The way Wi-Fi works is through the use of radio signals like in phones.
• Specifications
• 802.11a
• 802.11b
• 802.11g
• 802.11n
Background
1999 : 802.11a and 802.11b amendments were released Data rates improved to
5.5Mb/s and 11Mb/s at 2.4GHz (802.11) Wired Equivalent Privace (WEP) introduced
5GHz operation with OFDM modulation at 54Mb/s (802.11a)
42
Background
43
Benefits of Wi-Fi
Mobility
Compatibility with IP networks
High speed data
Unlicenced frequencies
Security
Easy and fast installation
Scalability
Installed infrastucture Low cost
44
WLAN-802.11
46
• ESS is made up of 2 or more BSSs with APs. BSSs are connected to the
distribution system via their APs. The distribution system can be any IEEE LAN
such as Ethernet.
• Distribution System (DS): A system to interconnect two or more BSS Typically
wired Ethernet Could be also wireless like 802.11, WiMax, 3G/4G etc.
• ESS has 2 kinds of stations:
• 1. Mobile – stations inside the BSS
2. Stationary – AP stations that are part of wired LAN.
47
802.11 - infrastructure network
(PCF)•Station (STA)
802.11 LAN – terminal with access mechanisms
802.x LAN
to the wireless medium and radio
contact to the access point
STA1 •Basic Service Set (BSS)
BSS1
– group of stations using the same
Access Portal radio frequency
Point •Access Point
Distribution System – station integrated into the
wireless LAN and the distribution
Access
ESS system
Point
•Portal
BSS2 – bridge to other (wired) networks
•Distribution System
– interconnection network to form
one logical network (EES:
STA2 802.11 LAN STA3 Extended Service Set) based
on several BSS
48
• AP – client services:
• Authentication : open, shared key or WPS
• De-authentication
• Privacy : WEP, WPA or WPA2
• Distribution System services:
• Association : maps the client into the distribution system via access point
Disassociation : release of association
• Distribution : used to deliver MAC frames across the distribution system
• Integration : enables delivery of MAC frames between DS and non 802.11
• Re-association : transition of association from one access point to an other
49
802.11 Architecture
Application
Host
TCP UDP
IP
50
802.11- in the TCP/IP stack
fixed terminal
mobile terminal
server
infrastructure network
access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
51
52
Physical layer
53
Physical layer
54
Physical layer
57
58
To maintain a common simple interface with MAC, both PHY share a single packet
structure.
Each PPDU contains a synchronization header (preamble plus start of packet
delimiter), a PHY header to indicate the packet length, and the payload, or PHY service
data unit (PSDU).
The 32-bit preamble is designed for the acquisition of symbol and chip timing, and in
some cases may be used for coarse frequency adjustment.
Within the PHY header, 7 bits are used to specify the length of the payload (in bytes).
This supports packets of length 0–127 bytes
59
Difference between wired and wireless
61
Collision detection (CSMA/CD)
62
Binary Exponential Backoff
A B C
64
Effect of interference range
RTS RTS
D A B C
CTS CTS
DATA
Sridhar Iyer IIT Bombay 66
Logical Link Control (LLC)
LLC services:
Connection-oriented service
Error and flow control
Peer-to-peer communication
Function Explanation
Scanning Scanning of access points. Both active (probe) and passive (beacon) scanning are provided by
the standard.
Authentication is the process of proving identity between the client and the access
Authentication point.
Association Once authenticated, the client must associate with the access point before sending data
frames.
The optional request-to send and clear-to-send (RTS/CTS) function allows the acces point to
RTS/CTS control use of the medium for stations activating RTS/CTS.
Power Save
Mode The power save mode enables the user to turn on or off enables the radio.
Fragmentation The fragmentation function enables an 802.11 station to divide data packets into smaller
frames.
802.11 Media Access Control (MAC)
70
802.11 Media Access Control (MAC)
71
802.11 Media Access Control (MAC)
72
802.11 - MAC layer
• Traffic services
– Asynchronous Data Service (mandatory) – DCF
– Time-Bounded Service (optional) – PCF
• Access methods
– DCF CSMA/CA (mandatory)
• collision avoidance via randomized back-off
mechanism
• ACK packet for acknowledgements (not for
broadcasts)
– DCF w/ RTS/CTS (optional)
• avoids hidden terminal problem
– PCF (optional)
• access point polls terminals according to a list
73
802.11 - CSMA/CA
contention window
DIFS DIFS (randomized back-off
mechanism)
direct access if t
medium is free DIFS slot time
– station ready to send starts sensing the medium (Carrier Sense based
on CCA, Clear Channel Assessment)
– if the medium is free for the duration of an Inter-Frame Space (IFS),
the station can start sending (IFS depends on service type)
– if the medium is busy, the station has to wait for a free IFS, then the
station must additionally wait a random back-off time (collision
avoidance, multiple of slot-time)
– if another station occupies the medium during the back-off time of the
station, the back-off timer stops (fairness)
74
802.11 –CSMA/CA example
DIFS DIFS DIFS DIFS
boe bor boe bor boe busy
station1
boe busy
station2
busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
• station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the medium)
• acknowledgement via CTS after SIFS by receiver (if ready to receive)
• sender can now send data at once, acknowledgement via ACK
• other stations store medium reservations distributed via RTS and CTS
DIFS
RTS data
sender
SIFS SIFS
CTS SIFS ACK
receiver
76
802.11 - PCF
t0 t1
SuperFrame
All stations should be able to properly construct frames for transmission and decode frames
upon reception, as specified here.
802.11 MAC frame is composed of header, body and FCS part.
• MAC header: It consists of frame control field, duration, address fields 1-4, sequence
control field.
• Frame body: This field vary in size and consists of information based on frame type to be
carried.
• FCS: stands for Frame Check Sequence, this is 32 bit CRC (i.e. cyclic redundancy code).
78
MAC Frame
Frame Control(FC) –
It is 2 bytes long field which defines type of frame and some control information.
Version:It is a 2 bit long field which indicates the current protocol version which is fixed to be 0 for
now.
Type:It is a 2 bit long field which determines the function of frame i.e management(00), control(01) or
data(10). The value 11 is reserved.
Subtype: It is a 4 bit long field which indicates sub-type of the frame like 0000 for association request,
1000 for beacon.
To DS: It is a 1 bit long field which when set indicates that destination frame is for DS(distribution
system).
From DS: It is a 1 bit long field which when set indicates frame coming from DS.
More frag (More fragments): It is 1 bit long field which when set to 1 means frame is followed by
other fragments.
Retry: It is 1-bit long field, if the current frame is a retransmission of an earlier frame, this bit is set to
1.
79
MAC Frame
Power Mgmt (Power management): It is 1-bit long field that indicates the mode of a
station after successful transmission of a frame. Set to 1 the field indicates that the
station goes into power-save mode. If the field is set to 0, the station stays active.
More data: It is 1-bit long field that is used to indicate receiver that a sender has more
data to send than the current frame.
This can be used by an access point to indicate to a station in power-save mode that
more packets are buffered or it can be used by a station to indicate to an access point
after being polled that more polling is necessary as the station has more data ready to
transmit.
WEP: It is 1 bit long field which indicates that the standard security mechanism of
802.11 is applied.
Order:It is 1 bit long field, if this bit is set to 1 the received frames must be processed in
strict order.
80
MAC Frame
81
MAC Frame
Duration/ID –
It is 4 bytes long field which contains the value indicating the period of time in which the
medium is occupied(in µs).
Address 1 to 4 –
These are 6 bytes long fields which contain standard IEEE 802 MAC addresses (48 bit
each). The meaning of each address depends on the DS bits in the frame control field.
SC (Sequence control) –
It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence number (12 bits) and
Fragment number (4 bits). Since acknowledgement mechanism frames may be
duplicated hence, a sequence number is used to filter duplicate frames.
Data –
It is a variable length field which contain information specific to individual frames which
is transferred transparently from a sender to the receiver(s).
CRC (Cyclic redundancy check) –
It is 4 bytes long field which contains a 32 bit CRC error detection sequence to ensure
error free frame.
82
Enhancements and Applications
83
New Naming Standards :
84
Application of Wi-Fi
• Many electronic devices use Wi-Fi
due to its simple functions.
87
Wireless Personal Area Networks IEEE 802.15
• IEEE 802.15.1 and 802.15.4 focus on the devices with the following characteristics:
• Power management: low current consumption Range:
• 0–10 m Rate: 19.2–100 kbps
• Size: 0.5 in3 without antenna
• Low cost relative to target device
• Should allow overlap of multiple networks in the same area
• Network supports a minimum of 16 devices
88
WPAN Vision Statement
High performance,
RFID WPAN WLANscost
higher
Low performance,
low cost
• variety of needs for wireless products
• No one product which can fill all needs
• Family of complementary devices
Wireless Personal Area Networks IEEE 802.15
90
Wireless Personal Area Networks IEEE 802.15
91
Wireless Personal Area Networks IEEE 802.15
92
Wireless Personal Area Networks IEEE 802.15
93
Bluetooth (IEEE 802.15.1)
•In 1994, the Swedish telecommunication company Ericsson decided to honor old,
weird Herald I. Bluetooth, king of Denmark between 940 and 985 AD, by naming its
new wireless networking standard after him.
94
Bluetooth (IEEE 802.15.1)
• Bluetooth supports
– Synchronous & asynchronous data channels.
• Three simultaneous synchronous voice channels, or
• One channel, with asynchronous data and synchronous voice
– Each voice channel supports 64 kb/s in each direction.
– The channel can support maximal 723.2 kb/s asymmetric
(and still up to 57.6 kb/s in the return direction), or 433.9
kb/s symmetric.
• Bluetooth provides
– point-to-point connection (only two BlueTooth units
involved), or
– point-to-multipoint connection.
Bluetooth (IEEE 802.15.1)
97
Usage scenarios: Synchronization
User benefits
• Proximity synchronization
• Easily maintained database
• Common
User benefits
• Multiple device access
• Cordless phone benefits
• Hand’s free operation
Wireless Freedom…
Usage scenarios: Data access points
PSTN, ISDN,
LAN, WAN, xDSL
User benefits
• No more connectors
• Easy internet access Remote Connections...
• Common connection experience
Bluetooth (IEEE 802.15.1)
101
The Piconet
IDa
ID d ID d
ID a D ID a P
A M
ID e
ID e
sb
E
ID a
ID b B ID b S IDa
ID c C ID c S
LAN
Mobile Phone
Headset
Printer
Laptop
master Laptop
Mouse
slave
master/slave
Source: Kris Fleming 20Mar01 [Bluetooth-BOF-at-50th-IETF-PAN-Talk.ppt]
106
Bluetooth Protocol Stack
• The Bluetooth protocol stack allows devices to locate, connect, and exchange data
with each other and to execute interoperable, interactive applications against each
other.
• The Bluetooth protocol stack can be placed into three groups: transport protocol
group, middleware protocol group, and application group
107
Bluetooth Protocol Stack
The transport protocols
baseband
a: audio
d: data radio
c: control
108
Bluetooth Protocol Stack
The transport protocols :
These protocols allow Bluetooth devices to locate and connect to each other.
Carry audio and data traffic between devices and support both synchronous
and asynchronous transmission for telephony-grade voice communication.
Audio traffic is treated with high priority in Bluetooth.
Audio traffic bypasses all protocol layers and goes directly to the baseband
layer which then transmits it in small packets directly over Bluetooth’s air
interface.
responsible for managing the physical and logical links between the devices so
that the layers above and applications can pass data through the connections.
The protocols in this group are radio, baseband, link manager, logical link, and
host controller interface (HCI)
Bluetooth Protocol Stack
Logical link control and adaptation protocol (L2CAP) layer:
All data traffic is routed through the logical link control and adaptation protocol layer.
This layer shields the higher layers from the details of the lower layers.
The higher layers need not be aware of the frequency hops occurring at the radio and
baseband level.
It is also responsible for segmenting larger packets from higher layers into smaller
packets
application
group (b) TCP UDP IrMC (b)
middleware (a)
protocol IP telephony
group control
(a) OBEX based on
transport
audio control SDP TCS-BIN
AT
protocol
PPP commands
group
(b)
RFCOMM
transport protocols
a: adopted protocol
b: Bluetooth specific protocol
112
Bluetooth Protocol Stack
Middleware Protocol Group
This group comprises the protocols needed for existing applications to operate
over Bluetooth links.
The protocols in this group can be third party and industry standard protocols and
protocols developed specifically by the Special Interest Group (SIG).
RFCOMM layer: provides a virtual serial port to applications.
The advantage provided by this layer is that it is easy for applications designed for
cabled serial ports to migrate to Bluetooth.
Service discovery protocol (SDP) layer: Once a connection is established there is
a need for the devices to find and understand the services the other devices have
to offer.
The SDP is a standard method for Bluetooth devices to discover and learn about
the services offered by the other device.
Infrared data association (IrDA) interoperability protocols.
The SIG has adopted some IrDA protocols to ensure interoperability between
applications.
Bluetooth Protocol Stack
Object exchange (OBEX) protocol: IrOBEX (in short, OBEX) is a session protocol
developed by the Infrared Data Association to exchange objects in a simple and
spontaneous manner.
OBEX provides the same basic functionality as HTTP but in a much lighter
fashion.
The OBEX protocol defines a folder-listing object, which is used to browse the
contents of folders on a remote device.
Networking layers. Bluetooth wireless communication uses a peer-to-peer
network topology rather than an LAN type topology.
Dial-up networking uses the attention (AT) command layer.
In most cases the network that is being accessed is an IP network.
Once a dial-up connection is established to an IP network, then standard
protocols like TCP, UDP, and HTTP can be used.
A device can also connect to an IP network using a network access point.
The Internet PPP is used to connect to the access point.
Bluetooth Protocol Stack
Telephone control specifi cation (TCS) layer and audio.
This layer is designed to support telephony functions, which include call control
and group management.
These are associated with setting up voice calls.
Once a call is established a Bluetooth audio channel can carry the call’s voice
content.
TCS can also be used to set up data calls. The TCS protocols are compatible with
ITU specifications.
The SIG is also considered a second protocol called TCS-AT, which is a modem
control protocol. AT commands over RFCOMM are used for some applications.
Application Group
This group consists of actual applications that make use of Bluetooth links and
refers to the software that exists above the protocol stack.
The software uses the protocol stack to provide some function to the user of the
Bluetooth devices.
The application group
middleware protocols
transport protocols
a: legacy application
b: Bluetooth specific application
11
116
6
IEEE 802.15.4 (ZigBee)
• The low rate (LR) wireless personal access network (WPAN) (IEEE802.15.4/LRWPAN) is
intended to serve a set of industrial, residential, and medical applications with very low
power consumption, low cost requirement, and relaxed needs for data rate and QoS.
• The low data rate enables the LR-WPAN to consume little power
• ZigBee technology is a low data rate, low power consumption, low cost, wireless
networking protocol targeted toward automation and remote control applications.
• The IEEE 802.15.4 committee and ZigBee Alliance worked together and developed the
technology commercially known as ZigBee.
• The IEEE 802.15.4 committee is focusing on the specifications of the lower two layers of
the protocol (the physical and data link layers)
• ZigBee Alliance aims to provide the upper layers of the protocol stack (from the network
to the application layer) for interoperable data interworking, security services, and a
range of wireless home and building control solutions.
117
IEEE 802.15.4 (ZigBee)
118
Wireless networking Basics
Network Scan
Device scans the 16 channels to determine the best channel to
occupy.
Creating/Joining a PAN
Device can create a network (coordinator) on a free channel or
join an existing network
Device Discovery
Device queries the network to discover the identity of devices on
active channels
Service Discovery
Device scans for supported services on devices within the network
Binding
Devices communicate via command/control messaging
IEEE 802.15.4 (ZigBee)
120
Network Pieces –PAN Coordinator
• PAN Coordinator
– “owns” the network
• Starts it
• Allows other devices to join it
• Provides binding and address-table
services
• Saves messages until they can be
delivered olds list of neighbors and
routers
• Select channel to be used by network
• Routers
– Routes messages
– Does not own or start network
• Scans to find a network to join
– Given a block of addresses to
assign
– A “full-function device” – FFD
– Mains powered depending on
topology
– Could also have i/o capability
Network Pieces – End Device
• End Device
– Communicates with a
single device
124
IEEE 802.15.4 (ZigBee)
125
Network Topology Models
Mesh
Star
128
ZigBee protocol Stack
The lower two layers (PHY and MAC) are defined by the IEEE 802.15.4 standard.
The NWK and APL layers are defined by the ZigBee standard.
The security features are defined in both standards.
A network that implements all of the layers in Figure 3.1 is considered a ZigBee wireless
network.
Physical Layer functionalities:
The PHY (IEEE 802.15.4) provides two services: the PHY data service and PHY
management service interfacing to the physical layer management entity (PLME).
The PHY data service enables the transmission and reception of PHY protocol data
units (PPDUs) across the physical radio channel.
Activation and deactivation of the radio transceiver
Energy detection within the current channel
Link quality indication for received packets
Clear channel assessment for CSMA-CA
Channel frequency selection
Data transmission and reception
Physical Layer functionalities:
2.4 GHz
PHY Channels 11-26 5 MHz
The MAC provides two services to higher layers that can be accessed through two
service access points (SAPs).
The MAC data service is accessed through the MAC common part sublayer (MCPS-
SAP), and the MAC management services are accessed through the MAC layer
management entity (MLME-SAP).
These two services provide an interface between the SCCS or another LLC and the
physical layer.
The MAC protocol data unit (MPDU) consists of the MAC header (MHR), MAC service
data unit (MSDU), and MAC footer (MFR).
IEEE 802.15.4 MAC Overview
General Frame Structure
The MAC protocol data unit (MPDU) consists of the MAC header (MHR), MAC service
data unit (MSDU), and MAC footer (MFR).
The fi rst fi eld of the MAC header is the frame control field, which indicates the type of
MAC frame being transmitted, specifies the format of the address field, and controls the
acknowledgment
The sequence number in the MAC header matches the acknowledgment frame with the
previous transmission.
The FCS helps to verify the integrity of the MAC frame.
ZigBee protocol Stack
Only the data and beacon frames actually contain information sent by higher
layers;
the acknowledgment and MAC command frames originate in the MAC and
are used for MAC peer-to-peer communication
Data Transfer Model
Data transferred from device to coordinator
• In a beacon-enable network, device finds the beacon to synchronize to
the super-frame structure. Then using slotted CSMA/CA to transmit its
data.
• In a non beacon-enable network, device simply transmits its data using
un-slotted CSMA/CA
140
Superframe Structure
• The channel access in time slots is contention based; however, the PAN coordinator may
assign time slots to a single device that requires a dedicated bandwidth or low latency
transmissions.
• These assigned time slots are called guaranteed time slots (GTSs) and together form a
contention-free period (CFP) located immediately before the next beacon
141
802.15.4 Architecture
Applications
• Network Routing
• Address translation
ZigBee • Packet Segmentation
• Profiles
The Network Layer The network layer of Zigbee (IEEE 802.15.4) is responsible for
topology construction and maintenance as well as naming and binding services,
which include the tasks of addressing, routing, and security.
The network layer should be selforganizing and self-maintaining to minimize
energy consumption and total cost.
IEEE 802.15.4 supports multiple network topologies, including star, peer-to-peer,
and cluster tree.
The topology is an application design choice
144
ZigBee Stack Architecture- Application Support Sublayer (APS)
The application support sublayer (APS) provides the services necessary for application
objects (endpoints) and the ZigBee device object (ZDO) to interface with the network layer
for data and management services.
Some of the services provided by the APS to the application objects for data transfer are
request, confirm, and response.
Application object (endpoint): An application object defines input and output to the APS.
For example, a switch that controls a light is the input from the application object, and the
output is the light bulb condition.
An application object may also be referred to as an endpoint (EP).
145
ZigBee Stack Architecture- Application Support Sublayer (APS)
146
ZigBee Stack Architecture- Application Support Sublayer (APS)
End node:
Each end node or end device can have multiple EPs.
Each EP contains an application profile, such as home automation, and can be used to
control multiple devices or a single device.
Each EP defines the communication functions within a device.
Eg: the bedroom switch controls the bedroom light, and the remote control is used to
control three lights: bedroom, hallway1, and hallway2.
147
Wireless Sensor Network
148
149
Applications of wireless sensor network
150
Applications of wireless sensor network
153
Wireless Sensor Network – Design Considerations
154
Wireless Sensor Network – Design Considerations
155
Wireless Sensor Network – Design Considerations
156
Wireless Sensor Network – Design Considerations
• Wireless sensor nodes are the essential building blocks in a wireless sensor
network
• A wireless sensor node is equipped with sensing and computing devices, radio
transceivers and power components.
• sensing, processing, and communication
• stores and executes the communication protocols as well as data processing
algorithms
• After the sensor nodes are deployed, they are responsible for self-organizing an
appropriate network infrastructure often with multi-hop communication with
them.
• Then the onboard sensors start collecting information of interest.
• Wireless sensor devices also respond to queries sent from a “control site” to
perform specific instructions or provide sensing samples.
158
The components of a sensor node
159
Types of Wireless Networks: infrastructure vs. ad- hoc
networks
infrastructure
network •Infrastructure
Networks
AP: Access Point
AP
• Fixed, wired
AP wired network backbone
AP
•Mobile communicates
directly with access
points
ad-hoc network •Suitable for locations
where access points can
be placed
• Cellular networks
1-
160
What is an Ad hoc Network?
A network without any base
stations “infrastructure-less” or
multi-hop infrastructure
A collection of two or more network
devices equipped with wireless
Speed of deployment
1-
162
Introduction
• Autonomous => does not require support from any existing network
infrastructure
– But might be able to use such support if available
» Such support might be available from time to time
– Support could be: an Internet gateway or some fixed stations
• Notice how different from cellular network
– Requires infrastructure (BS, MSC, backbone network, etc.) => not ad hoc
Introduction
• Characteristics of MANETs:
– Dynamically changing topology
• Changing in an unpredictable manner
– Since nodes are free to move
– Limited power available to nodes (e.g., a battery)
– Usually communicates only with neighboring nodes
• Among other reasons, to save power
– Peer-to-peer
• No more or less “important” nodes
– Information transmission via store-and-forward (fig)
Asymmetric =
• Using multi-hop routing unidirectional - when
• MSs also serve as routers
Moving to a new location xmission power of
MS2 MS2 nodes on its ends is
different (e.g., MS4
stronger than MS7)
MS4
MS3 Asymmetric link
MS5
Symmetric link MS7
MS1 MS6
Characteristics of Ad Hoc Networks
• As nodes move:
– Connectivity changes
– Topology information must be updated
• E.g., MS2 changes attachment: from MS3 to MS4
• Energy-constrained operation
– Nodes in ad hoc network may rely on batteries or other
limited energy sources
• Energy conservation may be a dominant design factor
Characteristics of Ad Hoc Networks
• Scalability problems
– As networks get large
Applications (Examples)
• “Wearable” computing
• Defense applications
• Crisis-management applications
– Natural disasters, where the entire communication infrastructure is in disarray
• Telemedicine
– E.g., assistance by a surgeon for an emergency
• Tele-geoprocessing applications
– Queries dependent on location of the users
– Integrating geographical info systems (GIS) & GPS
• Virtual navigation
– Data from a remote database transmitted to navigation device in car or in hand
– May contain graphical representation of streets, buildings, and the latest traffic
information
• May assist driver in selecting a route
• Education and Internet access
– K-12, continued education, etc., for people in remote areas
– E.g., email-by-bus in remote villages
Vehicular Ad Hoc Networks (VANET) :
169
Vehicular Ad Hoc Networks (VANET) :
170
Vehicular Ad Hoc Networks (VANET) :
171
Vehicular Ad Hoc Networks (VANET) :
172
Security mechanisms in GSM
• Most security protections provided by the GSM are located at the BSS and limited to access
control and radio encryption.
• GSM security is composed of three classes of protection:
– subscriber identity protection.
For privacy issues, transmitting a subscriber identity in plain on a radio link must be
avoided;
International Mobile Subscriber Number (IMSI) contained in the SIM card and in the HLR
shall never be transmitted in plain text.
Instead, the system uses a temporary subscriber number (TMSI) on the radio link. The TMSI
only holds temporary and local validity, meaning that only the fusion between the TMSI
and the Local Area Identifier (LAI) may reveal the IMSI.
The association between the IMSI and the TMSI is kept safe by the VLR that is accordingly
in charge of creating a new TMSI when roaming outside a local area.
The identity of the subscriber is therefore protected by two methods. The first one is by
only transmitting an old TMSI on an unencrypted radio link and the second is by encrypting
the new TMSI.
173
Security mechanisms in GSM
174
Security mechanisms in GSM
175
Security mechanisms in GSM
176
Security mechanisms in GSM
177
Security mechanisms in GSM
178