ImageVerifierCode 换一换
格式:PPT , 页数:222 ,大小:2.43MB ,
资源ID:379724      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-379724.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Chapter 3 Wireless LANs.ppt)为本站会员(medalangle361)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

Chapter 3 Wireless LANs.ppt

1、Chapter 3 Wireless LANs,Reading materials: 1.第8章、第9章1,Part 4 in 2 2.M. Ergen (UC Berkeley), 802.11 tutorial,Outline,3.1 Wireless LAN Technology3.2 Wireless MAC3.3 IEEE 802.11 Wireless LAN Standard3.4 Bluetooth,3.1 Wireless LAN Technology,3.1.1 Overview 3.1.2 Infrared LANs 3.1.3 Spread Spectrum LANs

2、3.1.4 Narrowband Microwave LANs,3.1.1 Overview,WLAN ApplicationsWLAN RequirementsWLAN Technology,3.1.1.1 Wireless LAN Applications,LAN ExtensionCross-building interconnectNomadic Access Ad hoc networking,LAN Extension,Wireless LAN linked into a wired LAN on same premises Wired LAN Backbone Support s

3、ervers and stationary workstationsWireless LAN Stations in large open areas Manufacturing plants, stock exchange trading floors, and warehouses,Cross-Building Interconnect,Connect LANs in nearby buildings Wired or wireless LANs Point-to-point wireless link is used Devices connected are typically bri

4、dges or routers,Nomadic Access,Wireless link between LAN hub and mobile data terminal equipped with antenna Laptop computer or notepad computer Uses: Transfer data from portable computer to office server Extended environment such as campus,Ad Hoc Networking,Temporary peer-to-peer network set up to m

5、eet immediate need Example: Group of employees with laptops convene for a meeting; employees link computers in a temporary network for duration of meeting,3.1.1.2 Wireless LAN Requirements,Throughput Number of nodes Connection to backbone LAN Service area Battery power consumption Transmission robus

6、tness and security Collocated network operation License-free operation Handoff/roaming Dynamic configuration,3.1.1.3 Wireless LAN Technology,Infrared (IR) LANs Spread spectrum LANs Narrowband microwave,3.1.2 Infrared LANs,Strengths and WeaknessTransmission Techniques,Strengths of Infrared Over Micro

7、wave Radio,Spectrum for infrared virtually unlimited Possibility of high data rates Infrared spectrum unregulated Equipment inexpensive and simple Reflected by light-colored objects Ceiling reflection for entire room coverage Doesnt penetrate walls More easily secured against eavesdropping Less inte

8、rference between different rooms,Drawbacks of Infrared Medium,Indoor environments experience infrared background radiation Sunlight and indoor lighting Ambient radiation appears as noise in an infrared receiver Transmitters of higher power required Limited by concerns of eye safety and excessive pow

9、er consumption Limits range,IR Data Transmission Techniques,Directed Beam Infrared Ominidirectional Diffused,Directed Beam Infrared,Used to create point-to-point links (e.g.Fig.13.5) Range depends on emitted power and degree of focusing Focused IR data link can have range of kilometers Such ranges a

10、re not needed for constructing indoor WLANs Cross-building interconnect between bridges or routers,Ominidirectional,Single base station within line of sight of all other stations on LAN Base station typically mounted on ceiling (Fig.13.6a) Base station acts as a multiport repeater Ceiling transmitte

11、r broadcasts signal received by IR transceivers Other IR transceivers transmit with directional beam aimed at ceiling base unit,Diffused,All IR transmitters focused and aimed at a point on diffusely reflecting ceiling (Fig.13.6b) IR radiation strikes ceiling Reradiated omnidirectionally Picked up by

12、 all receivers,Typical Configuration for IR WLANs,Fig.13.7 shows a typical configuration for a wireless IR LAN installation A number of ceiling-mounted base stations, one to a room Using ceiling wiring, the base stations are all connected to a server Each base station provides connectivity for a num

13、ber of stationary and mobile workstations in its area,3.1.3 Spread Spectrum LANs,ConfigurationTransmission Issues,3.1.3.1 Configuration,Multiple-cell arrangement Within a cell, either peer-to-peer or hub Peer-to-peer topology No hub Access controlled with MAC algorithm CSMA Appropriate for ad hoc LA

14、Ns,Spread Spectrum LAN Configuration,Hub topology Mounted on the ceiling and connected to backbone May control access May act as multiport repeater Automatic handoff of mobile stations Stations in cell either: Transmit to / receive from hub only Broadcast using omnidirectional antenna,3.1.3.2 Transm

15、ission Issues,Within ISM band, operating at up to 1 watt. Unlicensed spread spectrum: 902-928 MHz (915 MHZ band), 2.4-2.4835 GHz (2.4 GHz band), and 5.725-5.825 GHz (5.8 GHz band). The higher the frequency, the higher the potential bandwidth,3.1.4 Narrowband Microwave LANs,Use of a microwave radio f

16、requency band for signal transmission Relatively narrow bandwidth Licensed Unlicensed,Licensed Narrowband RF,Licensed within specific geographic areas to avoid potential interference Motorola - 600 licenses (1200 frequencies) in 18-GHz range Covers all metropolitan areas Can assure that independent

17、LANs in nearby locations dont interfere Encrypted transmissions prevent eavesdropping,Unlicensed Narrowband RF,RadioLAN introduced narrowband wireless LAN in 1995 Uses unlicensed ISM spectrum Used at low power (0.5 watts or less) Operates at 10 Mbps in the 5.8-GHz band Range = 50 m to 100 m,3.2 Wire

18、less MAC,Wireless Data Networks,Experiencing a tremendous growth over the last decade or soIncreasing mobile work force, luxury of tetherless computing, information on demand anywhere/anyplace, etc, have contributed to the growth of wireless data,Wireless Network Types ,Satellite networks e.g. Iridi

19、um (66 satellites), Qualcomms Globalstar (48 satellites)Wireless WANs/MANs e.g. CDPD, GPRS, RicochetWireless LANs e.g. Georgia Techs LAWNWireless PANs e.g. BluetoothAd-hoc networks e.g. Emergency relief, militarySensor networks,Wireless Local Area Networks,Probably the most widely used of the differ

20、ent classes of wireless data networksCharacterized by small coverage areas (200m), but relatively high bandwidths (upto 50Mbps currently)Examples include IEEE 802.11 networks, Bluetooth networks, and Infrared networks,WLAN Topology,Distribution Network,Mobile Stations,Access Point,Static host/Router

21、,Wireless WANs,Large coverage areas of upto a few miles radiusSupport significantly lower bandwidths than their LAN counterparts (upto a few hundred kilobits per second)Examples: CDPD, Mobitex/RAM, Ricochet,WAN Topology,Wireless MAC,Channel partitioning techniques FDMA, TDMA, CDMARandom access,Wirel

22、ine MAC Revisited,ALOHAslotted-ALOHACSMACSMA/CDCollision free protocolsHybrid contention-based/collision-free protocols,Wireless MAC,CSMA as wireless MAC?Hidden and exposed terminal problems make the use of CSMA an inefficient techniqueSeveral protocols proposed in related literature MACA, MACAW, FA

23、MAIEEE 802.11 standard for wireless MAC,Hidden Terminal Problem,A talks to BC senses the channelC does not hear As transmission (out of range)C talks to BSignals from A and B collide,A,B,C,Collision,Exposed Terminal Problem,B talks to AC wants to talk to DC senses channel and finds it to be busyC st

24、ays quiet (when it could have ideally transmitted),A,B,C,D,Not possible,Hidden and Exposed Terminal Problems,Hidden Terminal More collisions Wastage of resourcesExposed Terminal Underutilization of channel Lower effective throughput,MACA,Medium Access with Collision AvoidanceInspired by the CSMA/CA

25、method used by Apple Localtalk network (for somewhat different reasons)CSMA/CA (Localtalk) uses a “dialogue” between sender and receiver to allow receiver to prepare for receptions in terms of allocating buffer space or entering “spin loop” on a programmed I/O interface,Basis for MACA,In the context

26、 of hidden terminal problem, “absence of carrier does not always mean an idle medium”In the context of exposed terminal problem, “presence of carrier does not always mean a busy medium”Data carrier detect (DCD) useless!Get rid of CS (carrier sense) from CSMA/CA MA/CA MACA!,MACA,Dialogue between send

27、er and receiver: Sender sends RTS (request to send) Receiver (if free) sends CTS (clear to send) Sender sends DATACollision avoidance achieved through intelligent consideration of the RTS/CTS exchange,MACA (contd.),When station overhears an RTS addressed to another station, it inhibits its own trans

28、mitter long enough for the addressed station to respond with a CTSWhen a station overheads a CTS addressed to another station, it inhibits its own transmitter long enough for the other station to send its data,Hidden Terminal Revisited ,A sends RTSB sends CTSC overheads CTSC inhibits its own transmi

29、tterA successfully sends DATA to B,A,B,C,RTS,CTS,DATA,CTS,Hidden Terminal Revisited,How does C know how long to wait before it can attempt a transmission?A includes length of DATA that it wants to send in the RTS packetB includes this information in the CTS packetC, when it overhears the CTS packet,

30、 retrieves the length information and uses it to set the inhibition time,Exposed Terminal Revisited,B sends RTS to A (overheard by C)A sends CTS to BC cannot hear As CTSC assumes A is either down or out of rangeC does not inhibit its transmissions to D,A,B,C,D,RTS,RTS,CTS,Cannot hear CTS,Tx not inhi

31、bited,Collisions,Still possible RTS packets can collide!Binary exponential backoff performed by stations that experience RTS collisionsRTS collisions not as bad as data collisions in CSMA (since RTS packets are typically much smaller than DATA packets),Drawbacks,Collisions still possible if CTS pack

32、ets cannot be heard but carry (transmit) enough to cause significant interferenceIf DATA packets are of the same size as RTS/CTS packets, significant overheads,MACA Recap,No carrier sensingRequest-to-send (RTS), Clear-to-send (CTS) exchange to solve hidden terminal problemRTS-CTS-DATA exchange for e

33、very transmission,MACAW,Based on MACADesign based on 4 key observations: Contention is at receiver, not the sender Congestion is location dependent To allocate media fairly, learning about congestion levels should be a collective enterprise Media access protocol should propagate synchronization info

34、rmation about contention periods, so that all devices can contend effectively,Back-off Algorithm,MACA uses binary exponential back-off (BEB)BEB: back-off counter doubles after every collision and reset to minimum value after successful transmissionUnfair channel allocation!Example simulation result:

35、 2 stations A & B communicating with base-station Both have enough packets to occupy entire channel capacity A gets 48.5 packets/second, B gets 0 packets/second,BEB Unfairness,Since successful transmitters reset back-off counter to minimum value Hence, it is more likely that successful transmitters

36、continue to be successfulTheoretically, if there is no maximum back-off, one station can get the entire channel bandwidthIdeally, the back-off counter should reflect the ambient congestion level which is the same for all stations involved!,BEB with Copy,MACAW uses BEB with CopyPacket header includes

37、 the BEB value used by transmitterWhen a station overhears a packet, it copies the BEB value in the packet to its BEB counterThus, after each successful transmission, all stations will have the same backoff counter Example simulation result (same setting as before: A gets 23.82 packets/second, B get

38、s 23.32 packets/second,MILD adaptation,Original back-off scheme uses BEB upon collision, and resetting back-off to minimum value upon successLarge fluctuations in back-off valueWhy is this bad?MACAW uses a multiplicative increase and linear decrease (MILD) scheme for back-off adaptation (with factor

39、s of 1.5 and 1 respectively),Accommodating Multiple Streams,If A has only one queue for all streams (default case), bandwidth will be split as AB:1/4, AC:1/4, DA:1/2Is this fair?Maintain multiple queues at A, and contend as if there are two co-located nodes at A,A,B C D,Other modifications (ACK),ACK

40、 packet exchange included in addition to RTS-CTS-DATA Handle wireless (or collision) errors at the MAC layer instead of waiting for coarse grained transport (TCP) layer retransmission timeouts For a loss rate of 1%, 100% improvement in throughput demonstrated over MACA,Other modifications (DS),In th

41、e exposed terminal scenario (ABCD with B talking to A), C cannot talk to D (because of the ACK packet introduced)What if the RTS/CTS exchange was a failure? How does C know this information?A new packet DS (data send) included in the dialogue: RTS-CTS-DS-DATA-ACKDS informs other stations that RTS-CT

42、S exchange was successful,Other modifications (RRTS),Request to Request to SendConsider a scenario: A B C DD is talking to CA sends RTS to B. However, B does not respond as it is deferring to the D-C transmissionA backs-off (no reply to RTS) and tries laterIn the meantime if another D-C transmission

43、 begins, A will have to backoff again,RRTS (contd.),The only way A will get access to channel is if it comes back from a back-off and exactly at that time C-D is inactive (synchronization constraint!)Note that B can hear the RTS from A!When B detects the end of current D-C transmission (ACK packet f

44、rom C to D), it sends an RRTS to A, and A sends RTS,MACAW Recap,Backoff scheme BEB with Copy MILD Multiple streamsNew control packets ACK DS RRTS Other changes (see paper),IEEE 802.11,The 802.11 standard provides MAC and PHY functionality for wireless connectivity of fixed, portable and moving stati

45、ons moving at pedestrian and vehicular speeds within a local area. Specific features of the 802.11 standard include the following: Support of asynchronous and time-bounded delivery service Continuity of service within extended areas via a Distribution System, such as Ethernet. Accommodation of trans

46、mission rates of 1, 2,10, and 50 Mbps Support of most market applications Multicast (including broadcast) services Network management services Registration and authentication services,IEEE 802.11,The 802.11 standard takes into account the following significant differences between wireless and wired

47、LANs: Power Management Security Bandwidth Addressing,IEEE 802.11 Topology,Independent Basic Service Set (IBSS) Networks Stand-alone BSS that has no backbone infrastructure and consists of at-least two wireless stations Often referred to as an ad-hoc network Applications include single room, sale flo

48、or, hospital wing,IEEE 802.11 Topology (contd.),Extended Service Set (ESS) Networks Large coverage networks of arbitrary size and complexity Consists of multiple cells interconnected by access points and a distribution system, such as Ethernet,IEEE 802.11 Logical Architecture,The logical architectur

49、e of the 802.11 standard that applies to each station consists of a single MAC and one of multiple PHYs Frequency hopping PHY Direct sequence PHY Infrared light PHY802.11 MAC uses CSMA/CA (carrier sense multiple access with collision avoidance),IEEE 802.11 MAC Layer,Primary operations Accessing the

50、wireless medium (!) Joining the network Providing authentication and privacyWireless medium access Distributed Coordination Function (DCF) mode Point Coordination Function (PCF) mode,IEEE 802.11 MAC (contd.),DCF CSMA/CA A contention based protocolPCF Contention-free access protocol usable on infrastructure network configurations containing a controller called a point coordinator within the access pointsBoth the DCF and PCF can operate concurrently within the same BSS to provide alternative contention and contention-free periods,

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1