Вы находитесь на странице: 1из 32

Wireless LANs

The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services
2/6/2006 CSCI 363 Computer Networks 1

The 802.11 Protocol Stack


Part of the 802.11 protocol stack.

2/6/2006

CSCI 363 Computer Networks

The 802.11 MAC Sublayer Protocol


(a) The hidden station problem. (b) The exposed station problem.

2/6/2006

CSCI 363 Computer Networks

The 802.11 MAC Sublayer Protocol (2)


The use of virtual channel sensing using CSMA/CA.

2/6/2006

CSCI 363 Computer Networks

The 802.11 MAC Sublayer Protocol (3)


A fragment burst.

2/6/2006

CSCI 363 Computer Networks

The 802.11 MAC Sublayer Protocol (4)


Interframe spacing in 802.11.

2/6/2006

CSCI 363 Computer Networks

The 802.11 Frame Structure


The 802.11 data frame.

2/6/2006

CSCI 363 Computer Networks

802.11 Services
Distribution Services
2/6/2006

Association Disassociation Reassociation Distribution Integration


CSCI 363 Computer Networks 8

802.11 Services
Intracell Services

Authentication Deauthentication Privacy Data Delivery

2/6/2006

CSCI 363 Computer Networks

Broadband Wireless
Comparison of 802.11 and 802.16 The 802.16 Protocol Stack The 802.16 Physical Layer The 802.16 MAC Sublayer Protocol The 802.16 Frame Structure

2/6/2006

CSCI 363 Computer Networks

10

The 802.16 Protocol Stack


The 802.16 Protocol Stack.

2/6/2006

CSCI 363 Computer Networks

11

The 802.16 Physical Layer


QPSK: 2 bits/baud (longer distance) QAM-16: 4 bits/baud (medium distance) QAM-64: 6 bits/baud (short distance) Example: a 25 MHz bandwidth, QPSK can deliver 50 Mbps, QAM-16 100 Mbps, QAM-64 150 Mbps

2/6/2006

CSCI 363 Computer Networks

12

The 802.16 Physical Layer (2)


The 802.16 transmission environment.

2/6/2006

CSCI 363 Computer Networks

13

The 802.16 Physical Layer (3)


Both frequency division duplexing and time division duplixing are used Frames and time slots for time division duplexing.

2/6/2006

CSCI 363 Computer Networks

14

The 802.16 Physical Layer (4)


For voice traffic, the duplexing is symmetric (up stream and down stream have the same bandwidth) For Internet traffic, typically down stream uses more bandwidth than up stream, thus asymmetric allocation of bandwidth

2/6/2006

CSCI 363 Computer Networks

15

The 802.16 MAC Sublayer Protocol


Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service
2/6/2006 CSCI 363 Computer Networks 16

The 802.16 Frame Structure


(a) A generic frame. (b) A bandwidth request frame.

2/6/2006

CSCI 363 Computer Networks

17

The 802.16 Frame Structure (2)


First bit: 0, generic frame; 1, bandwidth request frame EC bit: whether the payload is encrypted Type (6 bits): packing, fragmentation CI bit: presence or absence of the final check-sum EK (2 bits): which encryption key is used, if any (DES block, DES two keys, AES) Length: complete length of the frame including header Connection ID: which connection this frame belongs to Header CRC: header check-sum using 100000111

2/6/2006

CSCI 363 Computer Networks

18

Bluetooth
Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband Layer The Bluetooth L2CAP Layer The Bluetooth Frame Structure
CSCI 363 Computer Networks 19

2/6/2006

Bluetooth Architecture
Two piconets can be connected to form a scatternet.

2/6/2006

CSCI 363 Computer Networks

20

Bluetooth Architecture (2)


Base unit: piconet, up to 8 nodes (one master, seven slave nodes) in one piconet Distance up to 10 meters Communications take place only between slave nodes and the master node TDM is used in a piconet with the master node controlling the clock and allocation of time slots Two piconets can be connected to form a scatternet via a common slave node
2/6/2006 CSCI 363 Computer Networks 21

Bluetooth Applications
The Bluetooth profiles.

2/6/2006

CSCI 363 Computer Networks

22

The Bluetooth Protocol Stack


The 802.15 version of the Bluetooth protocol architecture.

2/6/2006

CSCI 363 Computer Networks

23

Physical Layer
Low power radio system with a range of 10 meters operating in the 2.4-GHz ISM band 79 channels of 1 MHz each (1 bit/baud, so 1 Mbps data rate) Conflicting with IEEE 802.11 band except 802.11a using the 5 GHz ISM band Difficult to resolve the problem
2/6/2006 CSCI 363 Computer Networks 24

Baseband Layer
The master node in each piconet defines a series of 625 micro-second time slots The master node communicates with the seven slave nodes in a round-robin fashion (TDM) Frames can be 1, 3, or 5 slots long Two types of links exist
ACL (asynchronous connection-less) SCO (synchronous connection oriented) for real-time data, no frame retransmissions
2/6/2006 CSCI 363 Computer Networks 25

The Bluetooth Frame Structure


A typical Bluetooth data frame.

2/6/2006

CSCI 363 Computer Networks

26

The Bluetooth Frame Structure (2)


72 bit access code identifies the master node 54 bit header includes thee repeats of an 18-bit header
3 bit address identifies one of the eight nodes 4 bit type indicates
Frame type (ACL, SCO, poll, or null) Type of error correction How many slots long the frame is
2/6/2006 CSCI 363 Computer Networks 27

The Bluetooth Frame Structure (3)


Flow bit is set when the slave buffer is full Acknowledge bit piggybacks the ack of a receiving frame Sequence bit is used for retransmission (stopand-wait protocol) 8-bit check-sum

The header repeats three times. If all headers are the same, the frame is accepted; if differ, majority wins
2/6/2006 CSCI 363 Computer Networks 28

Data Link Layer Switching


Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs
2/6/2006 CSCI 363 Computer Networks 29

Data Link Layer Switching


Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.

2/6/2006

CSCI 363 Computer Networks

30

Bridges from 802.x to 802.y


Operation of a LAN bridge from 802.11 to 802.3.

2/6/2006

CSCI 363 Computer Networks

31

Bridges from 802.x to 802.y (2)


The IEEE 802 frame formats. The drawing is not to scale.

2/6/2006

CSCI 363 Computer Networks

32

Вам также может понравиться