SlideShare a Scribd company logo
1 of 55
WIRELESS LAN (WLAN)


Selected topics
»
»
»
»
»
»
»
»
»

Introduction – WLAN Standards
WLAN definition
WLAN characteristics
WLAN design goals
Infrared vs radio transmission
Infrastructure-based vs ad-hoc networks
IEEE 802.11
WLAN Roaming
WLAN Security

» Other technologies
1
Introduction


Several WLAN standards:
– IEEE 802.11b offering 11 Mbit/s at 2.4 GHz
– The same radio spectrum is used by Bluetooth
» A short-range technology to set-up wireless personal area
networks with gross data rates less than 1 Mbit/s

– IEEE released a new WLAN standard, 802.11a,
operating at 5 GHz and offering gross data rates of 54
Mbit/s
» uses the same physical layer as HiperLAN2 does


tries to give QoS guarantees

– IEEE 802.11g offering up to 54 Mbit/s at 2.4 GHz.2
WLAN Standards
Wireless
LAN

2.4 GHz

5 GHz

802.11

802.11b

802.11g

HiSWANa

802.11a

HiperLAN2

(2 Mbps)

(11 Mbps)

(22-54 Mbps)

(54 Mbps)

(54 Mbps)

(54 Mbps)

HomeRF 2.0

Bluetooth

HomeRF 1.0

(10 Mbps)

(1 Mbps)

(2 Mbps)

802.11e

802.11f

802.11h

802.11i

(QoS)

(IAPP)

(TPC-DFS)

(Security)

3
WLAN definition
A fast-growing market introducing the flexibility
of wireless access into office, home, or production
environments.
 Typically restricted in their diameter to buildings,
a campus, single rooms etc.
 The global goal of WLANs is to
replace office cabling and, additionally,
to introduce a higher flexibility for ad
hoc communication in, e.g., group
meetings .
4

WLAN characteristics


Advantages:
–
–
–
–



very flexible within radio coverage
ad-hoc networks without previous planning possible
wireless networks allow for the design of small, independent devices
more robust against disasters (e.g., earthquakes, fire)

Disadvantages:

– typically very low bandwidth compared to wired networks (~11 – 54 Mbit/s) due to
limitations in radio transmission, higher error rates due to interference, and higher
delay/delay variation due to extensive error correction and error detection mechanisms
» offer lower QoS

–

many proprietary solutions offered by companies, especially for higher bit-rates,
standards take their time (e.g., IEEE 802.11) – slow standardization procedures

» standardized functionality plus many enhanced features
» these additional features only work in a homogeneous environment (i.e., when adapters from
the same vendors are used for all wireless nodes)

– products have to follow many national restrictions if working wireless, it takes a very
long time to establish global solutions
5
WLAN design goals








global, seamless operation of WLAN products
low power for battery use (special power saving modes and power
management functions)
no special permissions or licenses needed (license-free band)
robust transmission technology
easy to use for everyone, simple management
protection of investment in wired networks (support the same data
types and services)
security – no one should be able to read other’s data, privacy – no
one should be able to collect user profiles, safety – low radiation
6
Infrared vs radio transmission
Radio

Infrared light





Advantages



(microwave links) and mobile phones
can be used
– coverage of larger areas possible (radio
can penetrate (thinner) walls, furniture
etc.)
– higher transmission rates (~11 – 54
Mbit/s)

simple, cheap, available in many
mobile devices (PDAs, laptops, mobile
phones)
no licenses needed

Disadvantages







typically using the license free frequency
band at 2.4 GHz

uses IR diodes, diffuse light reflected
at walls, furniture etc, or directed light if  Advantages
a LOS exists btn sender and receiver
– experience from wireless WAN






interference by sunlight, heat sources
etc.
many things shield or absorb IR light
cannot penetrate obstacles (e.g., walls)
low bandwidth (~115kbit/s, 4Mbit/s)

Example


IrDA (Infrared Data Association)
interface available everywhere



Disadvantages
– very limited license free frequency
bands
– shielding more difficult, interference with
other senders, or electrical devices



Example
7
– IEEE 802.11, HIPERLAN, Bluetooth
Infrastructure-based vs ad-hoc
wireless networks (I)
Infrastructurebased wireless
networks





AP
AP

wired network

AP: Access Point
AP

Infrastructure networks provide access to other networks.
Communication typically takes place only between the
wireless nodes and the access point, but not directly
between the wireless nodes.
The access point does not just control medium access, but
also acts as a bridge to other wireless or wired networks.
8
Infrastructure-based vs ad-hoc
wireless networks (II)


Several wireless networks may form one logical wireless network:
– The access points together with the fixed network in between can connect
several wireless networks to form a larger network beyond actual radio
coverage.




Network functionality lies within the access point (controls network
flow), whereas the wireless clients can remain quite simple.
Use different access schemes with or without collision.
– Collisions may occur if medium access of the wireless nodes and the access
point is not coordinated.
» If only the access point controls medium access, no collisions are possible.



Useful for quality of service guarantees (e.g., minimum bandwidth for certain nodes)
The access point may poll the single wireless nodes to ensure the data rate.

9
Infrastructure-based vs ad-hoc
wireless networks (III)


Infrastructure-based wireless networks lose some of the
flexibility wireless networks can offer in general:
– They cannot be used for disaster relief in cases where no
infrastructure is left.

10
Infrastructure-based vs ad-hoc
wireless networks (III)
Ad-hoc
wireless
networks


No need of any infrastructure to work
– greatest possible flexibility



Each node communicate with other nodes, so no access
point controlling medium access is necessary.
– The complexity of each node is higher
» implement medium access mechanisms, forwarding data

11
Infrastructure-based vs ad-hoc
wireless networks (IV)


Nodes within an ad-hoc network can only communicate if
they can reach each other physically
– if they are within each other’s radio range
– if other nodes can forward the message





IEEE 802.11 and HiperLAN2 are typically infrastructurebased networks, which additionally support ad-hoc
networking
Bluetooth is a typical wireless ad-hoc network
12
IEEE 802.11 (I)






As the standards number indicates, this standard belongs
to the group of 802.x LAN standards.
This means that the standard specifies the physical and
medium access layer adapted to the special requirements
of wireless LANs, but offers the same interface as the
others to higher layers to maintain interoperability.
The primary goal of the standard was the specification of a
simple and robust WLAN which offers time-bounded and
asynchronous services.
13
WLAN components

Figure 2.11 Photographs of popular 802.11b WLAN equipment.
Access points and a client card are shown on left, and PCMCIA
Client card is shown on right. (Courtesy of Cisco Systems, Inc.)

14
IEEE 802.11 (II)
System Architecture of an infrastructure network
Station (STA)

802.11 LAN

STA1

802.x LAN

– terminal with access mechanisms
to the wireless medium and radio
contact to the access point
Basic Service Set (BSS)

BSS1
Portal

Access
Point

Distribution System

Access Point

– station integrated into the wireless
LAN and the distribution system

Access
Point

ESS

– group of stations using the same
radio frequency

Portal

BSS2

– bridge to other (wired) networks
Distribution System

STA2

802.11 LAN

STA3

– interconnection network to form
one logical network (EES:
Extended Service Set) based 15
on several BSS
IEEE 802.11 (III)
Stations can select an AP and associate with it.
 The APs support roaming (i.e., changing access
points), the distribution system then handles data
transfer between the different APs.
 Furthermore, APs provide synchronization within
a BSS, support power management, and can
control medium access to support time-bounded
service.


16
IEEE 802.11 (IV)


IEEE 802.11 allows the building of ad hoc
networks between stations, thus forming one or
more BSSs.
– In this case, a BSS comprises a group of stations using
the same radio frequency.
– Several BSSs can either be formed via the distance
between the BSSs or by using different carrier
frequencies.
17
IEEE 802.11 (V)
IEEE standard 802.11
fixed
terminal

mobile terminal

infrastructure
network
access point
application

application

TCP

TCP

IP

IP

LLC

LLC

LLC

802.11 MAC

802.11 MAC

802.3 MAC

802.3 MAC

802.11 PHY

802.11 PHY

802.3 PHY

802.3 PHY

18
IEEE 802.11 (VI)


Protocol architecture
– Applications should not notice any difference apart
from the lower bandwidth and perhaps higher access
time from the wireless LAN.
» WLAN behaves like a slow wired LAN.

– Consequently, the higher layers (application, TCP, IP)
look the same for the wireless node as for the wired
node.
– The differences are in physical and link layer
» different media and access control
19
IEEE 802.11 (VII)
– The physical layer provides a carrier sense signal, handles
modulation and encoding/decoding of signals.
– The basic tasks of the MAC-medium access control protocol
comprise medium access, fragmentation of user data, and
encryption.


The standard also specifies management layers.
– The MAC management supports the association and reassociation of a station to an access point and roaming between
different APs.
– Furthermore, it controls authentication mechanisms, encryption,
synchronization of a station with regard to an AP, and power
management to save battery power.
20
IEEE 802.11 (VIII)


Physical layer
– Includes the provision of the Clear Channel
Assessment-CCA signal (energy detection).
– This signal is needed for the MAC mechanisms
controlling medium access and indicates if the medium
is currently idle.

21
IEEE 802.11 (IX)


Medium Access Control
– The basic services provided by the MAC layer are the mandatory
asynchronous data service and an optional time-bounded
service.
– IEEE 802.11 offers only the asynchronous data service in ad-hoc
network mode
– Both service types can be offered using an infrastructure-based
network together with the access point coordinating medium
access.
– The asynchronous service supports broadcast and multicast
packets, and packet exchange is based on a “best-effort” model
» no delay bounds can be given for transmission
» cannot guarantee a maximum access delay or minimum transmission
bandwidth
22


Need for a time-bounded service provision
IEEE 802.11 (X)


Medium Access Control (cnt’d)

– Three basic access mechanisms have been defined for IEEE
802.11
» CSMA/CA (mandatory)
» Optional method avoiding the hidden terminal problem
» A contention-free polling method for time-bounded service


access point polls terminals according to a list

– The first two methods are also summarized as distributed
coordination function (DCF)
– The third method is called point coordination function (PCF)
– DCF only offers asynchronous service, while PCF offers both
asynchronous and time-bounded service, but needs an access
point to control medium access and to avoid contention.
23
IEEE 802.11 (XI)


Medium Access Control (cnt’d)
–
–
–

The medium can be busy or idle (detected by the CCA)
If the medium is busy this can be due to data frames or other control frames
During a contention phase several nodes try to access the medium
» Short inter-frame spacing (SIFS)



the shortest waiting time for medium access
defined for short control messages (e.g., ACK of data packets)

» DCF inter-frame spacing (DIFS)



the longest waiting time used for asynchronous data service within a contention period
SIFS + two slot times

» PCF inter-frame spacing (PIFS)



an access point polling other nodes only has to wait PIFS for medium access (for a
time-bounded service)
SIFS + one slot time
24
IEEE 802.11 (XII)
– Medium Access Control (cnt’d)
» The mandatory access mechanism of IEEE 802.11 is based on
carrier sense multiple access with collision avoidance
(CSMA/CA).


a random access scheme with carrier sense (with the help of the Clear
Channel Assessment-CCA signal of the physical layer) and collision
avoidance through random back-off.

» The standard defines also two control frames:



RTS: Request To Send
CTS: Clear To Send

25
IEEE 802.11 (XIII)

» Broadcast data transfer (DCF)
DIFS

DIFS
medium busy
direct access if
medium is free ≥ DIFS

contention window
(randomized back-off
mechanism)
next frame
t
slot time

– station ready to send starts sensing the medium (Carrier Sense based
on CCA-Clear Channel Assessment)
– if the medium is free for the duration of a Distributed Inter-Frame
Space (DIFS), the station can start sending
– if the medium is busy, the station has to wait for a free DIFS, then the
station must additionally wait a random back-off time (collision
avoidance)
– if another station occupies the medium during the back-off time of the
station, the back-off timer stops (fairness – during the next phase this
node will continue its timer from where it stopped)
26
IEEE 802.11 (XIV)
» Unicast data transfer
DIFS
sender

data
SIFS

receiver

ACK
DIFS

other
stations

waiting time

data
t

contention

– station has to wait for DIFS before sending data
– receivers acknowledge after waiting for a duration of a Short
Inter-Frame Space (SIFS), if the packet was received correctly
27
IEEE 802.11 (XV)
» Sending unicast packets with RTS/CTS control frames
DIFS
sender
receiver

other
stations

RTS

data
SIFS

CTS SIFS

SIFS

NAV (RTS)
NAV (CTS)
defer access

ACK

DIFS
contention

data
t

– station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the medium and
the ACK related to it). Every node receiving this RTS now has to set its net
allocation vector – it specifies the earliest point at which the node can try to access
the medium again
– acknowledgement via CTS after SIFS by receiver (if ready to receive)
28
– sender can now send data at once, acknowledgement via ACK
– Other stations store medium reservations distributed via RTS and CTS
Masters thesis
http://eeweb.poly.edu/dgoodman/fainberg.pdf

29
30
Coverage

Figure 2.13 A predicted coverage plot for three access points in a
modern large lecture hall. (Courtesy of Wireless Valley
Communications, Inc., ©2000, all rights reserved.)

31
IEEE 802.11 – enhancements (I)


IEEE 802.11b
– 11Mbit/s
– in 2.4GHz frequency band
– widely used



IEEE 802.11a
– offers up to 54 Mbit/s
– 5 GHz band
» Shading is much more severe compared to 2.4 GHz
» Depending on the SNR, propagation conditions and the distance between
sender and receiver, data rates may drop fast
32
IEEE 802.11 – enhancements (II)


IEEE 802.11e

– MAC enhancements for providing some QoS

» No QoS in the DCF operation mode
» Some QoS guarantees can be given only via polling using PCF
» For applications such as audio, video, or media stream, distribution
service classes have to be provided




For this reason, MAC layer must be enhanced

IEEE 802.11g
–
–
–

offers up to 54 Mbit/s
2.4 GHz band
Benefits from the better propagation characteristics at 2.4 GHz
compared to 5 GHz
» Backward compatible to 802.11b

33
WLAN Roaming (I)

Reassociation
Response
Reassociation Request

34
WLAN Roaming (II)



No or bad connection? Then perform:
Scanning

– scan the environment, i.e., listen into the medium for beacon
signals or send probes into the medium and wait for an answer



Reassociation Request

– station sends a request to one or several AP(s)



Reassociation Response

– success: AP has answered, station can now participate
– failure: continue scanning



AP accepts Reassociation Request

– signal the new station to the distribution system
– the distribution system updates its data base (i.e., location
information)
– typically, the distribution system now informs the old AP so it can
release resources
35
WLAN Roaming (III)


L2 handover
– If handover from one AP to another belonging
to the same subnet, then handover is completed
at L2



L3 handover
– If new AP is in another domain, then the
handover must be completed at L3, due to the
assignment of an IP belonging to the new
domain – hence routing to the new IP.
» Mobile IP deals with these issues – more later
36
WLAN Security (I)


Not so efficient compared with Ethernet security due to the nature of the medium
& the requirements of the users



Security mechanisms
– Service Set Identifiers (SSID)
» Used to name the network and provide initial authentication for each client

– Wired Equivalent Privacy (WEP)
» Data encryption technique using shared keys and a pseudorandom number as an initialization
vector
» 64-bit key level encryption BUT several vendors now support 128-bit key level encryption

– Also a VPN could operate on top of the WLAN providing increased security


IEEE developing new standards
– 802.11e (Enhanced Security, QoS)
– 802.11i (Advanced Encryption Standard – AES)
– Requires physical replacement of Access Points and WLAN Cards
37
WLAN Security (II)
Late-2001

Mid-2002

• Rapid re-keying
•802.1X
authentication
•WEP
•IEEE 802.1X
Encryption
ratified
•WEP key
•Mutual
tumbling via
Authentication 802.1X key
•Key
management
Management
•WEP
Encryption
•WEP Attacks go
public

Q1 2003

•Wi-Fi Protected
Access
•802.1X
Authentication
•802.1X key
Management
•TKIP data
protection

Q3 2003

•IEEE 802.11i
•802.1X
authentication
•Enhanced
802.1X key
management
•AES-based
Encryption
•Enhanced
support
infrastructure

38
OTHER WIRELESS
TECHNOLOGIES
EPL657

39
HIPERLAN –
High Performance LAN (I)






The European Telecommunications Standards Institute
(ETSI) standardized HIPERLAN as a WLAN allowing
for node mobility and supporting ad hoc and
infrastructure-based topologies.
It is a wireless LAN supporting priorities and packet life
time for data transfer at 23.5 Mbit/s, including forwarding
mechanisms, topology discovery, user data encryption,
network identification and power conservation
mechanisms.
HIPERLANs operate at 5.1 – 5.3 GHz with a range of
50m in buildings at 1 W transmit power.
40
HIPERLAN –
High Performance LAN (II)
The service offered by a HIPERLAN is compatible
with the standard MAC services known from IEEE
802.x LANs.
 The HIPERLAN Channel Access Control
mechanism was specifically designed to provide
channel access with priorities.
 The CAC contains the access scheme EY-NPMA,
which is unique for HIPERLAN.


41
HIPERLAN –
High Performance LAN (III)


Elimination-yield non-preemptive priority multiple
access (EY-NPMA)
– not only a complex acronym, but also the heart of the channel
access providing priorities and different access schemes.
– divides the medium access of different competing nodes into
three phases:
» Prioritization: Determine the highest priority of a data packet ready to be
sent on competing nodes
» Contention: Eliminate all but one of the contenders, if more than one
sender has the highest current priority.
» Transmission: Finally, transmit the packet of the remaining node.
42
HIPERLAN –
High Performance LAN (IV)
– The contention phase is further subdivided into an
elimination phase and a yield phase.
– The purpose of the elimination phase is to eliminate as
many contending nodes as possible. The result is a
more or less constant number of remaining nodes,
almost independent of the initial number of competing
nodes.
– The yield phase completes the work of the elimination
phase with the goal of only one remaining node.
43
HIPERLAN –
High Performance LAN (IV)
– The contention phase is further subdivided into an
elimination phase and a yield phase.
– The purpose of the elimination phase is to eliminate as
many contending nodes as possible. The result is a
more or less constant number of remaining nodes,
almost independent of the initial number of competing
nodes.
– The yield phase completes the work of the elimination
phase with the goal of only one remaining node.
44
BLUETOOTH (I)
Bluetooth technology aims at so-called ad hoc
piconets, which are local area networks with a
very limited coverage and without the need for an
infrastructure.
 Needed to connect different small devices in close
proximity without expensive wiring or the need for
a wireless infrastructure.
 Represents a single-chip, low-cost, radio-based
wireless network technology.


45
BLUETOOTH (II)
Up to now Bluetooth is not a standard like IEEE
802.11 or HIPERLAN, but it soon become a defacto standard – established by the industry and
promoted by the Bluetooth consortium.
 Bluetooth uses the license-free frequency band at
2.4GHz allowing for worldwide operation.


46
BLUETOOTH (III)


Physical layer:
– A frequency-hoppingtime-division duplex scheme is used for
transmission with a fast hopping rate of 1,600 hops per second.
The time between two hops is called a slot, which is an interval
of 625μs, thus each slot uses a different frequency.
– On average, the frequency-hopping sequence ´visits´ each hop
carrier with an equal probability.
– All devices using the same hopping sequence with the same
phase form a Bluetooth piconet.

47
BLUETOOTH (IV)
– With transmitting power of up to 100 mW, Bluetooth
devices have a range of up to 10m (or even up to 100m
with special transceivers).
– Having this power and relying on battery power, a
Bluetooth device cannot be in an active transmit mode
all the time.
– Bluetooth defines several low-power states for the
device.
48
BLUETOOTH (V)
– States of a possible Bluetooth device and possible
transitions:
» Standby mode: Every device which is currently not
participating in a piconet (and not switched off)


In this mode, a device listens for paging messages.

» Connections can be initiated by any device which becomes
the master.


This is done by sending page messages if the device already knows
the address of the receiver, or inquiry messages followed by a page
message if the receiver’s address is unknown.
49
BLUETOOTH (VI)
» To save battery power, a Bluetoth device can go into one of
three low power states if no data is ready to be sent:






PARK state: The device has the lowest duty cycle, and thus the
lowest power consumption. The device releases its MAC address, but
remains synchronized with the piconet. The device occasionally
listens to the traffic of the master device to resynchronize and check
for broadcast messages.
HOLD state: The power consumption of this state is a little higher.
The device does not release its MAC address and can resume sending
at once after transition out of the HOLD state.
SNIFF state: It has the highest power consumption of the low-power
states. The device listens to the piconet at a reduced rate.

50
BLUETOOTH (VII)
STANDBY

unconnected

inquiry

transmit

PARK

page

connected

HOLD

SNIFF

connecting

active

low power

51
BLUETOOTH (VIII)


MAC layer:
– Several mechanisms control medium access in a Bluetooth
system.
– First of all, one device within a piconet acts as a master, all other
devices (up to seven) act as slaves.
– The master determines the hopping sequence as well as the phase
of the sequence.
– All Bluetooth devices have the same networking capabilities,
i.e., they can be master or slave. The unit establishing the piconet
automatically becomes the master and controls medium access;
all other devices will be slaves.
52
WLAN technologies – summary (I)
The basic goals of all three LAN types (WLAN,
HIPERLAN, BUETOOTH) are the provision of a
much higher flexibility for nodes within a network.
 All WLANs suffer from limitations of the air
interface and higher complexity compared to their
wired counterparts but allow for a new degree of
freedom for their users within rooms, buildings etc.


53
WLAN technologies – summary
(II)





The three technologies differ in some respects.
HIPERLAN comprises many interesting features, is much
more powerful than IEEE 802.11, has a higher data rate
(23.5 Mbit/s) but it is questionable if it will ever be a
commercial success.
The 5 GHz band required for HIPERLAN is not available
worldwide compared to the 2.4 GHz used for IEEE
802.11.
54
WLAN technologies – summary
(III)
No standardization body has set up any
specification regarding Bluetooth.
 The primary goal of Bluetooth is not a complex
standard covering many aspects of wireless
networking, but a quick and very cheap solution
enabling ad hoc personal communication within a
short range in the license-free 2.4 GHz band.


55

More Related Content

What's hot

Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architectureJAIGANESH SEKAR
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone NetworkHaither Mithath
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologiesbalasubramani p
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANsAram
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationasadkhan1327
 

What's hot (20)

Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architecture
 
Gsm
GsmGsm
Gsm
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
Cellular network
Cellular networkCellular network
Cellular network
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 

Viewers also liked

IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-nsRio Nguyen
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmissionAnuj Rajput
 
How I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop MeHow I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop Medigitallibrary
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security systemIJAEMSJORNAL
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Energy efficient wireless technology
Energy efficient wireless technologyEnergy efficient wireless technology
Energy efficient wireless technologyEisha Madhwal
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanIAEME Publication
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 

Viewers also liked (20)

Hiperlan
HiperlanHiperlan
Hiperlan
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
 
Wsh96 Wilkinson
Wsh96 WilkinsonWsh96 Wilkinson
Wsh96 Wilkinson
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
How I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop MeHow I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop Me
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Presentation
PresentationPresentation
Presentation
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Energy efficient wireless technology
Energy efficient wireless technologyEnergy efficient wireless technology
Energy efficient wireless technology
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlan
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 

Similar to Wireless LAN Standards and Technologies Guide

Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...AssocaKazama
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptabenimelos
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi MaxSiyad Ca
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 

Similar to Wireless LAN Standards and Technologies Guide (20)

Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
J010216776
J010216776J010216776
J010216776
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Darsh
DarshDarsh
Darsh
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 

More from David Livingston J

Performing Addition and Subtraction on Integers
Performing Addition and Subtraction on IntegersPerforming Addition and Subtraction on Integers
Performing Addition and Subtraction on IntegersDavid Livingston J
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingDavid Livingston J
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Frequently asked questions in c
Frequently asked questions in cFrequently asked questions in c
Frequently asked questions in cDavid Livingston J
 
Frequently asked questions in c
Frequently asked questions in cFrequently asked questions in c
Frequently asked questions in cDavid Livingston J
 
Problem solving using Computer
Problem solving using ComputerProblem solving using Computer
Problem solving using ComputerDavid Livingston J
 

More from David Livingston J (9)

Performing Addition and Subtraction on Integers
Performing Addition and Subtraction on IntegersPerforming Addition and Subtraction on Integers
Performing Addition and Subtraction on Integers
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Frequently asked questions in c
Frequently asked questions in cFrequently asked questions in c
Frequently asked questions in c
 
Frequently asked questions in c
Frequently asked questions in cFrequently asked questions in c
Frequently asked questions in c
 
File handling in c
File handling in cFile handling in c
File handling in c
 
Structure of a C program
Structure of a C programStructure of a C program
Structure of a C program
 
Problem solving using Computer
Problem solving using ComputerProblem solving using Computer
Problem solving using Computer
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Wireless LAN Standards and Technologies Guide

  • 1. WIRELESS LAN (WLAN)  Selected topics » » » » » » » » » Introduction – WLAN Standards WLAN definition WLAN characteristics WLAN design goals Infrared vs radio transmission Infrastructure-based vs ad-hoc networks IEEE 802.11 WLAN Roaming WLAN Security » Other technologies 1
  • 2. Introduction  Several WLAN standards: – IEEE 802.11b offering 11 Mbit/s at 2.4 GHz – The same radio spectrum is used by Bluetooth » A short-range technology to set-up wireless personal area networks with gross data rates less than 1 Mbit/s – IEEE released a new WLAN standard, 802.11a, operating at 5 GHz and offering gross data rates of 54 Mbit/s » uses the same physical layer as HiperLAN2 does  tries to give QoS guarantees – IEEE 802.11g offering up to 54 Mbit/s at 2.4 GHz.2
  • 3. WLAN Standards Wireless LAN 2.4 GHz 5 GHz 802.11 802.11b 802.11g HiSWANa 802.11a HiperLAN2 (2 Mbps) (11 Mbps) (22-54 Mbps) (54 Mbps) (54 Mbps) (54 Mbps) HomeRF 2.0 Bluetooth HomeRF 1.0 (10 Mbps) (1 Mbps) (2 Mbps) 802.11e 802.11f 802.11h 802.11i (QoS) (IAPP) (TPC-DFS) (Security) 3
  • 4. WLAN definition A fast-growing market introducing the flexibility of wireless access into office, home, or production environments.  Typically restricted in their diameter to buildings, a campus, single rooms etc.  The global goal of WLANs is to replace office cabling and, additionally, to introduce a higher flexibility for ad hoc communication in, e.g., group meetings . 4 
  • 5. WLAN characteristics  Advantages: – – – –  very flexible within radio coverage ad-hoc networks without previous planning possible wireless networks allow for the design of small, independent devices more robust against disasters (e.g., earthquakes, fire) Disadvantages: – typically very low bandwidth compared to wired networks (~11 – 54 Mbit/s) due to limitations in radio transmission, higher error rates due to interference, and higher delay/delay variation due to extensive error correction and error detection mechanisms » offer lower QoS – many proprietary solutions offered by companies, especially for higher bit-rates, standards take their time (e.g., IEEE 802.11) – slow standardization procedures » standardized functionality plus many enhanced features » these additional features only work in a homogeneous environment (i.e., when adapters from the same vendors are used for all wireless nodes) – products have to follow many national restrictions if working wireless, it takes a very long time to establish global solutions 5
  • 6. WLAN design goals        global, seamless operation of WLAN products low power for battery use (special power saving modes and power management functions) no special permissions or licenses needed (license-free band) robust transmission technology easy to use for everyone, simple management protection of investment in wired networks (support the same data types and services) security – no one should be able to read other’s data, privacy – no one should be able to collect user profiles, safety – low radiation 6
  • 7. Infrared vs radio transmission Radio Infrared light   Advantages  (microwave links) and mobile phones can be used – coverage of larger areas possible (radio can penetrate (thinner) walls, furniture etc.) – higher transmission rates (~11 – 54 Mbit/s) simple, cheap, available in many mobile devices (PDAs, laptops, mobile phones) no licenses needed Disadvantages      typically using the license free frequency band at 2.4 GHz uses IR diodes, diffuse light reflected at walls, furniture etc, or directed light if  Advantages a LOS exists btn sender and receiver – experience from wireless WAN    interference by sunlight, heat sources etc. many things shield or absorb IR light cannot penetrate obstacles (e.g., walls) low bandwidth (~115kbit/s, 4Mbit/s) Example  IrDA (Infrared Data Association) interface available everywhere  Disadvantages – very limited license free frequency bands – shielding more difficult, interference with other senders, or electrical devices  Example 7 – IEEE 802.11, HIPERLAN, Bluetooth
  • 8. Infrastructure-based vs ad-hoc wireless networks (I) Infrastructurebased wireless networks    AP AP wired network AP: Access Point AP Infrastructure networks provide access to other networks. Communication typically takes place only between the wireless nodes and the access point, but not directly between the wireless nodes. The access point does not just control medium access, but also acts as a bridge to other wireless or wired networks. 8
  • 9. Infrastructure-based vs ad-hoc wireless networks (II)  Several wireless networks may form one logical wireless network: – The access points together with the fixed network in between can connect several wireless networks to form a larger network beyond actual radio coverage.   Network functionality lies within the access point (controls network flow), whereas the wireless clients can remain quite simple. Use different access schemes with or without collision. – Collisions may occur if medium access of the wireless nodes and the access point is not coordinated. » If only the access point controls medium access, no collisions are possible.   Useful for quality of service guarantees (e.g., minimum bandwidth for certain nodes) The access point may poll the single wireless nodes to ensure the data rate. 9
  • 10. Infrastructure-based vs ad-hoc wireless networks (III)  Infrastructure-based wireless networks lose some of the flexibility wireless networks can offer in general: – They cannot be used for disaster relief in cases where no infrastructure is left. 10
  • 11. Infrastructure-based vs ad-hoc wireless networks (III) Ad-hoc wireless networks  No need of any infrastructure to work – greatest possible flexibility  Each node communicate with other nodes, so no access point controlling medium access is necessary. – The complexity of each node is higher » implement medium access mechanisms, forwarding data 11
  • 12. Infrastructure-based vs ad-hoc wireless networks (IV)  Nodes within an ad-hoc network can only communicate if they can reach each other physically – if they are within each other’s radio range – if other nodes can forward the message   IEEE 802.11 and HiperLAN2 are typically infrastructurebased networks, which additionally support ad-hoc networking Bluetooth is a typical wireless ad-hoc network 12
  • 13. IEEE 802.11 (I)    As the standards number indicates, this standard belongs to the group of 802.x LAN standards. This means that the standard specifies the physical and medium access layer adapted to the special requirements of wireless LANs, but offers the same interface as the others to higher layers to maintain interoperability. The primary goal of the standard was the specification of a simple and robust WLAN which offers time-bounded and asynchronous services. 13
  • 14. WLAN components Figure 2.11 Photographs of popular 802.11b WLAN equipment. Access points and a client card are shown on left, and PCMCIA Client card is shown on right. (Courtesy of Cisco Systems, Inc.) 14
  • 15. IEEE 802.11 (II) System Architecture of an infrastructure network Station (STA) 802.11 LAN STA1 802.x LAN – terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS) BSS1 Portal Access Point Distribution System Access Point – station integrated into the wireless LAN and the distribution system Access Point ESS – group of stations using the same radio frequency Portal BSS2 – bridge to other (wired) networks Distribution System STA2 802.11 LAN STA3 – interconnection network to form one logical network (EES: Extended Service Set) based 15 on several BSS
  • 16. IEEE 802.11 (III) Stations can select an AP and associate with it.  The APs support roaming (i.e., changing access points), the distribution system then handles data transfer between the different APs.  Furthermore, APs provide synchronization within a BSS, support power management, and can control medium access to support time-bounded service.  16
  • 17. IEEE 802.11 (IV)  IEEE 802.11 allows the building of ad hoc networks between stations, thus forming one or more BSSs. – In this case, a BSS comprises a group of stations using the same radio frequency. – Several BSSs can either be formed via the distance between the BSSs or by using different carrier frequencies. 17
  • 18. IEEE 802.11 (V) IEEE standard 802.11 fixed terminal mobile terminal infrastructure network access point application application TCP TCP IP IP LLC LLC LLC 802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC 802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY 18
  • 19. IEEE 802.11 (VI)  Protocol architecture – Applications should not notice any difference apart from the lower bandwidth and perhaps higher access time from the wireless LAN. » WLAN behaves like a slow wired LAN. – Consequently, the higher layers (application, TCP, IP) look the same for the wireless node as for the wired node. – The differences are in physical and link layer » different media and access control 19
  • 20. IEEE 802.11 (VII) – The physical layer provides a carrier sense signal, handles modulation and encoding/decoding of signals. – The basic tasks of the MAC-medium access control protocol comprise medium access, fragmentation of user data, and encryption.  The standard also specifies management layers. – The MAC management supports the association and reassociation of a station to an access point and roaming between different APs. – Furthermore, it controls authentication mechanisms, encryption, synchronization of a station with regard to an AP, and power management to save battery power. 20
  • 21. IEEE 802.11 (VIII)  Physical layer – Includes the provision of the Clear Channel Assessment-CCA signal (energy detection). – This signal is needed for the MAC mechanisms controlling medium access and indicates if the medium is currently idle. 21
  • 22. IEEE 802.11 (IX)  Medium Access Control – The basic services provided by the MAC layer are the mandatory asynchronous data service and an optional time-bounded service. – IEEE 802.11 offers only the asynchronous data service in ad-hoc network mode – Both service types can be offered using an infrastructure-based network together with the access point coordinating medium access. – The asynchronous service supports broadcast and multicast packets, and packet exchange is based on a “best-effort” model » no delay bounds can be given for transmission » cannot guarantee a maximum access delay or minimum transmission bandwidth 22  Need for a time-bounded service provision
  • 23. IEEE 802.11 (X)  Medium Access Control (cnt’d) – Three basic access mechanisms have been defined for IEEE 802.11 » CSMA/CA (mandatory) » Optional method avoiding the hidden terminal problem » A contention-free polling method for time-bounded service  access point polls terminals according to a list – The first two methods are also summarized as distributed coordination function (DCF) – The third method is called point coordination function (PCF) – DCF only offers asynchronous service, while PCF offers both asynchronous and time-bounded service, but needs an access point to control medium access and to avoid contention. 23
  • 24. IEEE 802.11 (XI)  Medium Access Control (cnt’d) – – – The medium can be busy or idle (detected by the CCA) If the medium is busy this can be due to data frames or other control frames During a contention phase several nodes try to access the medium » Short inter-frame spacing (SIFS)   the shortest waiting time for medium access defined for short control messages (e.g., ACK of data packets) » DCF inter-frame spacing (DIFS)   the longest waiting time used for asynchronous data service within a contention period SIFS + two slot times » PCF inter-frame spacing (PIFS)   an access point polling other nodes only has to wait PIFS for medium access (for a time-bounded service) SIFS + one slot time 24
  • 25. IEEE 802.11 (XII) – Medium Access Control (cnt’d) » The mandatory access mechanism of IEEE 802.11 is based on carrier sense multiple access with collision avoidance (CSMA/CA).  a random access scheme with carrier sense (with the help of the Clear Channel Assessment-CCA signal of the physical layer) and collision avoidance through random back-off. » The standard defines also two control frames:   RTS: Request To Send CTS: Clear To Send 25
  • 26. IEEE 802.11 (XIII) » Broadcast data transfer (DCF) DIFS DIFS medium busy direct access if medium is free ≥ DIFS contention window (randomized back-off mechanism) next frame t slot time – station ready to send starts sensing the medium (Carrier Sense based on CCA-Clear Channel Assessment) – if the medium is free for the duration of a Distributed Inter-Frame Space (DIFS), the station can start sending – if the medium is busy, the station has to wait for a free DIFS, then the station must additionally wait a random back-off time (collision avoidance) – if another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness – during the next phase this node will continue its timer from where it stopped) 26
  • 27. IEEE 802.11 (XIV) » Unicast data transfer DIFS sender data SIFS receiver ACK DIFS other stations waiting time data t contention – station has to wait for DIFS before sending data – receivers acknowledge after waiting for a duration of a Short Inter-Frame Space (SIFS), if the packet was received correctly 27
  • 28. IEEE 802.11 (XV) » Sending unicast packets with RTS/CTS control frames DIFS sender receiver other stations RTS data SIFS CTS SIFS SIFS NAV (RTS) NAV (CTS) defer access ACK DIFS contention data t – station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium and the ACK related to it). Every node receiving this RTS now has to set its net allocation vector – it specifies the earliest point at which the node can try to access the medium again – acknowledgement via CTS after SIFS by receiver (if ready to receive) 28 – sender can now send data at once, acknowledgement via ACK – Other stations store medium reservations distributed via RTS and CTS
  • 30. 30
  • 31. Coverage Figure 2.13 A predicted coverage plot for three access points in a modern large lecture hall. (Courtesy of Wireless Valley Communications, Inc., ©2000, all rights reserved.) 31
  • 32. IEEE 802.11 – enhancements (I)  IEEE 802.11b – 11Mbit/s – in 2.4GHz frequency band – widely used  IEEE 802.11a – offers up to 54 Mbit/s – 5 GHz band » Shading is much more severe compared to 2.4 GHz » Depending on the SNR, propagation conditions and the distance between sender and receiver, data rates may drop fast 32
  • 33. IEEE 802.11 – enhancements (II)  IEEE 802.11e – MAC enhancements for providing some QoS » No QoS in the DCF operation mode » Some QoS guarantees can be given only via polling using PCF » For applications such as audio, video, or media stream, distribution service classes have to be provided   For this reason, MAC layer must be enhanced IEEE 802.11g – – – offers up to 54 Mbit/s 2.4 GHz band Benefits from the better propagation characteristics at 2.4 GHz compared to 5 GHz » Backward compatible to 802.11b 33
  • 35. WLAN Roaming (II)   No or bad connection? Then perform: Scanning – scan the environment, i.e., listen into the medium for beacon signals or send probes into the medium and wait for an answer  Reassociation Request – station sends a request to one or several AP(s)  Reassociation Response – success: AP has answered, station can now participate – failure: continue scanning  AP accepts Reassociation Request – signal the new station to the distribution system – the distribution system updates its data base (i.e., location information) – typically, the distribution system now informs the old AP so it can release resources 35
  • 36. WLAN Roaming (III)  L2 handover – If handover from one AP to another belonging to the same subnet, then handover is completed at L2  L3 handover – If new AP is in another domain, then the handover must be completed at L3, due to the assignment of an IP belonging to the new domain – hence routing to the new IP. » Mobile IP deals with these issues – more later 36
  • 37. WLAN Security (I)  Not so efficient compared with Ethernet security due to the nature of the medium & the requirements of the users  Security mechanisms – Service Set Identifiers (SSID) » Used to name the network and provide initial authentication for each client – Wired Equivalent Privacy (WEP) » Data encryption technique using shared keys and a pseudorandom number as an initialization vector » 64-bit key level encryption BUT several vendors now support 128-bit key level encryption – Also a VPN could operate on top of the WLAN providing increased security  IEEE developing new standards – 802.11e (Enhanced Security, QoS) – 802.11i (Advanced Encryption Standard – AES) – Requires physical replacement of Access Points and WLAN Cards 37
  • 38. WLAN Security (II) Late-2001 Mid-2002 • Rapid re-keying •802.1X authentication •WEP •IEEE 802.1X Encryption ratified •WEP key •Mutual tumbling via Authentication 802.1X key •Key management Management •WEP Encryption •WEP Attacks go public Q1 2003 •Wi-Fi Protected Access •802.1X Authentication •802.1X key Management •TKIP data protection Q3 2003 •IEEE 802.11i •802.1X authentication •Enhanced 802.1X key management •AES-based Encryption •Enhanced support infrastructure 38
  • 40. HIPERLAN – High Performance LAN (I)    The European Telecommunications Standards Institute (ETSI) standardized HIPERLAN as a WLAN allowing for node mobility and supporting ad hoc and infrastructure-based topologies. It is a wireless LAN supporting priorities and packet life time for data transfer at 23.5 Mbit/s, including forwarding mechanisms, topology discovery, user data encryption, network identification and power conservation mechanisms. HIPERLANs operate at 5.1 – 5.3 GHz with a range of 50m in buildings at 1 W transmit power. 40
  • 41. HIPERLAN – High Performance LAN (II) The service offered by a HIPERLAN is compatible with the standard MAC services known from IEEE 802.x LANs.  The HIPERLAN Channel Access Control mechanism was specifically designed to provide channel access with priorities.  The CAC contains the access scheme EY-NPMA, which is unique for HIPERLAN.  41
  • 42. HIPERLAN – High Performance LAN (III)  Elimination-yield non-preemptive priority multiple access (EY-NPMA) – not only a complex acronym, but also the heart of the channel access providing priorities and different access schemes. – divides the medium access of different competing nodes into three phases: » Prioritization: Determine the highest priority of a data packet ready to be sent on competing nodes » Contention: Eliminate all but one of the contenders, if more than one sender has the highest current priority. » Transmission: Finally, transmit the packet of the remaining node. 42
  • 43. HIPERLAN – High Performance LAN (IV) – The contention phase is further subdivided into an elimination phase and a yield phase. – The purpose of the elimination phase is to eliminate as many contending nodes as possible. The result is a more or less constant number of remaining nodes, almost independent of the initial number of competing nodes. – The yield phase completes the work of the elimination phase with the goal of only one remaining node. 43
  • 44. HIPERLAN – High Performance LAN (IV) – The contention phase is further subdivided into an elimination phase and a yield phase. – The purpose of the elimination phase is to eliminate as many contending nodes as possible. The result is a more or less constant number of remaining nodes, almost independent of the initial number of competing nodes. – The yield phase completes the work of the elimination phase with the goal of only one remaining node. 44
  • 45. BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for an infrastructure.  Needed to connect different small devices in close proximity without expensive wiring or the need for a wireless infrastructure.  Represents a single-chip, low-cost, radio-based wireless network technology.  45
  • 46. BLUETOOTH (II) Up to now Bluetooth is not a standard like IEEE 802.11 or HIPERLAN, but it soon become a defacto standard – established by the industry and promoted by the Bluetooth consortium.  Bluetooth uses the license-free frequency band at 2.4GHz allowing for worldwide operation.  46
  • 47. BLUETOOTH (III)  Physical layer: – A frequency-hoppingtime-division duplex scheme is used for transmission with a fast hopping rate of 1,600 hops per second. The time between two hops is called a slot, which is an interval of 625μs, thus each slot uses a different frequency. – On average, the frequency-hopping sequence ´visits´ each hop carrier with an equal probability. – All devices using the same hopping sequence with the same phase form a Bluetooth piconet. 47
  • 48. BLUETOOTH (IV) – With transmitting power of up to 100 mW, Bluetooth devices have a range of up to 10m (or even up to 100m with special transceivers). – Having this power and relying on battery power, a Bluetooth device cannot be in an active transmit mode all the time. – Bluetooth defines several low-power states for the device. 48
  • 49. BLUETOOTH (V) – States of a possible Bluetooth device and possible transitions: » Standby mode: Every device which is currently not participating in a piconet (and not switched off)  In this mode, a device listens for paging messages. » Connections can be initiated by any device which becomes the master.  This is done by sending page messages if the device already knows the address of the receiver, or inquiry messages followed by a page message if the receiver’s address is unknown. 49
  • 50. BLUETOOTH (VI) » To save battery power, a Bluetoth device can go into one of three low power states if no data is ready to be sent:    PARK state: The device has the lowest duty cycle, and thus the lowest power consumption. The device releases its MAC address, but remains synchronized with the piconet. The device occasionally listens to the traffic of the master device to resynchronize and check for broadcast messages. HOLD state: The power consumption of this state is a little higher. The device does not release its MAC address and can resume sending at once after transition out of the HOLD state. SNIFF state: It has the highest power consumption of the low-power states. The device listens to the piconet at a reduced rate. 50
  • 52. BLUETOOTH (VIII)  MAC layer: – Several mechanisms control medium access in a Bluetooth system. – First of all, one device within a piconet acts as a master, all other devices (up to seven) act as slaves. – The master determines the hopping sequence as well as the phase of the sequence. – All Bluetooth devices have the same networking capabilities, i.e., they can be master or slave. The unit establishing the piconet automatically becomes the master and controls medium access; all other devices will be slaves. 52
  • 53. WLAN technologies – summary (I) The basic goals of all three LAN types (WLAN, HIPERLAN, BUETOOTH) are the provision of a much higher flexibility for nodes within a network.  All WLANs suffer from limitations of the air interface and higher complexity compared to their wired counterparts but allow for a new degree of freedom for their users within rooms, buildings etc.  53
  • 54. WLAN technologies – summary (II)    The three technologies differ in some respects. HIPERLAN comprises many interesting features, is much more powerful than IEEE 802.11, has a higher data rate (23.5 Mbit/s) but it is questionable if it will ever be a commercial success. The 5 GHz band required for HIPERLAN is not available worldwide compared to the 2.4 GHz used for IEEE 802.11. 54
  • 55. WLAN technologies – summary (III) No standardization body has set up any specification regarding Bluetooth.  The primary goal of Bluetooth is not a complex standard covering many aspects of wireless networking, but a quick and very cheap solution enabling ad hoc personal communication within a short range in the license-free 2.4 GHz band.  55

Editor's Notes

  1. Fig. 2.11
  2. Fig. 2.13