86
WIRELESS LOCAL AREA NETWORKS WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Ian F. Akyildiz Broadband & Wireless Networking Laboratory Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering School of Electrical and Computer Engineering Georgia Institute of Technology Georgia Institute of Technology Tel: 404-894-5141; Fax: 404-894-7883 Tel: 404-894-5141; Fax: 404-894-7883 Email: [email protected] Email: [email protected] Web: http://www.ece.gatech.edu/research/labs/bwn Web: http://www.ece.gatech.edu/research/labs/bwn

WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

Embed Size (px)

Citation preview

Page 1: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

WIRELESS LOCAL AREA WIRELESS LOCAL AREA NETWORKSNETWORKS

Ian F. AkyildizIan F. AkyildizBroadband & Wireless Networking LaboratoryBroadband & Wireless Networking Laboratory

School of Electrical and Computer EngineeringSchool of Electrical and Computer Engineering

Georgia Institute of TechnologyGeorgia Institute of Technology

Tel: 404-894-5141; Fax: 404-894-7883 Tel: 404-894-5141; Fax: 404-894-7883

Email: [email protected]: [email protected]

Web: http://www.ece.gatech.edu/research/labs/bwnWeb: http://www.ece.gatech.edu/research/labs/bwn

Page 2: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

2IFA’2004

WIRELESS LANsWIRELESS LANs

Infrastructure Network

Ad-hoc Network

APAP

AP

wired network

AP: Access Point

Page 3: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

3IFA’2004

Wireless LAN - IEEE 802.11 Wireless LAN - IEEE 802.11 Reference ArchitectureReference Architecture

The terminology and some of the specific The terminology and some of the specific features are unique to this standard and features are unique to this standard and are not reflected in all commercial are not reflected in all commercial products.products.

However, it is However, it is useful to be useful to be familiar with the familiar with the standard since its standard since its features are features are representative of representative of the Wireless LAN the Wireless LAN capabilities capabilities required. required.

Page 4: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

4IFA’2004

Reference Architecture of Reference Architecture of Wireless LANsWireless LANs

Station (STA)Station (STA)– terminal with access terminal with access

mechanisms to the wireless mechanisms to the wireless medium and radio contact to medium and radio contact to the access pointthe access point

Basic Service Set (BSS)Basic Service Set (BSS)– group of stations using the group of stations using the

same radio frequencysame radio frequencyAccess PointAccess Point

– station integrated into the station integrated into the wireless LAN and the wireless LAN and the distribution systemdistribution system

PortalPortal– bridge to other (wired) bridge to other (wired)

networksnetworksDistribution SystemDistribution System

– interconnection network to interconnection network to form one logical network (ESS: form one logical network (ESS: Extended Service Set) based Extended Service Set) based on several BSSon several BSS

Distribution System

Portal

Access Point

BSS2

BSS1

Access Point

STA1

STA2

STA3

ESS

Page 5: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

5IFA’2004

Reference ArchitectureReference Architecture

The smallest building block of a wireless LAN is a The smallest building block of a wireless LAN is a basic service set (BSS), which consists of some basic service set (BSS), which consists of some number of stations executing the same MAC number of stations executing the same MAC protocol and competing for access to the same protocol and competing for access to the same shared medium.shared medium.

A basic service set may be isolated or it may A basic service set may be isolated or it may

connect to a backbone distribution system through connect to a backbone distribution system through an access point. an access point.

The access point functions as a bridge. The access point functions as a bridge. The MAC protocol may be fully distributed or The MAC protocol may be fully distributed or

controlled by a central coordination function controlled by a central coordination function housed in the access point. housed in the access point.

Page 6: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

6IFA’2004

Reference ArchitectureReference Architecture

The basic service set generally corresponds The basic service set generally corresponds to what is referred to as a cell in the to what is referred to as a cell in the literature.literature.

An extended service set (ESS) consists of An extended service set (ESS) consists of two or more basic service sets two or more basic service sets interconnected by a distribution system. interconnected by a distribution system.

Typically, the distribution system is a wired Typically, the distribution system is a wired backbone LAN. backbone LAN.

The extended service set appears as a single The extended service set appears as a single logical LAN to the logical link control (LLC) logical LAN to the logical link control (LLC) level.level.

Page 7: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

7IFA’2004

Reference ArchitectureReference Architecture

The standard defines three types of stations The standard defines three types of stations based on mobility:based on mobility:

No transition:No transition: A station of this type is either stationary A station of this type is either stationary or moves only within the direct communication range or moves only within the direct communication range of the communicating stations of a single BSS.of the communicating stations of a single BSS.

BSS transition:BSS transition: This is defined as a station movement This is defined as a station movement from one BSS to another BSS within the same ESS. In from one BSS to another BSS within the same ESS. In this case, delivery of data to the station requires that this case, delivery of data to the station requires that the addressing capability be able to recognize the new the addressing capability be able to recognize the new location of the station.location of the station.

ESS transition:ESS transition: This is defined as a station movement This is defined as a station movement from a BSS in one ESS to a BSS within another ESS. from a BSS in one ESS to a BSS within another ESS. This case is supported only in the sense that the This case is supported only in the sense that the station can move. station can move.

Page 8: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

8IFA’2004

Protocol ArchitectureProtocol Architecture

mobile terminal

access point

fixedterminal

application

TCP

PHY

MAC

IP

802.3 MAC

802.3 PHY

application

TCP

802.3 PHY

802.3 MAC

IP

MAC

PHY

LLC

infrastructurenetwork

LLC LLC

Page 9: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

9IFA’2004

Protocol Layers and Protocol Layers and FunctionsFunctions

PLCP PLCP Physical Layer Convergence ProtocolPhysical Layer Convergence Protocol

clear channel assessment signal clear channel assessment signal (carrier sense)(carrier sense)

PMD PMD Physical Medium DependentPhysical Medium Dependent

modulation, codingmodulation, coding

PHY ManagementPHY Managementchannel selection, MIBchannel selection, MIB

Station ManagementStation Managementcoordination of all management coordination of all management

functionsfunctions

PMD

PLCP

MAC

LLC

MAC Management

PHY Management

MACMAC– access mechanisms, access mechanisms,

fragmentation, encryption fragmentation, encryption MAC ManagementMAC Management

– synchronization, roaming, synchronization, roaming, MIB, power managementMIB, power management

PH

YD

LC

Sta

tion

Man

agem

ent

Page 10: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

10IFA’2004

Basics of Wireless Basics of Wireless LANsLANs

Coverage area, data rate, and battery Coverage area, data rate, and battery consumption.consumption.

Characterized by small coverage areas Characterized by small coverage areas (~200m), but relatively high (~200m), but relatively high bandwidthsbandwidths

(data rates) (upto 50Mbps currently)(data rates) (upto 50Mbps currently) Major standardsMajor standards

– WLAN: IEEE 802.11 and HIPERLAN.WLAN: IEEE 802.11 and HIPERLAN.– WPAN: IEEE 802.16 (Bluetooth) and WPAN: IEEE 802.16 (Bluetooth) and

HomeRFHomeRF

Page 11: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

11IFA’2004

Advantages of WLANs

– Very flexible within the reception area Very flexible within the reception area

– Users can access high speed multimedia applications Users can access high speed multimedia applications anywhere at anytime, with easy implementation, low cost, anywhere at anytime, with easy implementation, low cost, and wide user acceptanceand wide user acceptance

- Generally works in industrial, scientific, and- Generally works in industrial, scientific, and medical (ISM) band, which is un-licensed andmedical (ISM) band, which is un-licensed and available for public. available for public.

– (Almost) no wiring difficulties (e.g. historic buildings, (Almost) no wiring difficulties (e.g. historic buildings, firewalls)firewalls)

Page 12: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

12IFA’2004

WLANs – Advantages WLANs – Advantages

Buildings with large open areas, such Buildings with large open areas, such as manufacturing plants, stock as manufacturing plants, stock exchange trading floors, and exchange trading floors, and warehouseswarehouses

Historical buildings with insufficient Historical buildings with insufficient twisted pair and where drilling holes twisted pair and where drilling holes for new wiring is prohibitedfor new wiring is prohibited

Small offices where installation and Small offices where installation and maintenance of wired LANs is not maintenance of wired LANs is not economicaleconomical

Page 13: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

13IFA’2004

Disadvantages of WLANsDisadvantages of WLANs

– Typically very low bandwidth compared to Typically very low bandwidth compared to wired networks (1-10 Mbit/s)wired networks (1-10 Mbit/s)

– Many proprietary solutions, especially for Many proprietary solutions, especially for higher bit-rates, standards take their time.higher bit-rates, standards take their time.

– Products have to follow many national Products have to follow many national restrictions if working wireless, it takes a very restrictions if working wireless, it takes a very long time to establish global solutions.long time to establish global solutions.

– Interference ProblemsInterference Problems

Page 14: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

14IFA’2004

Family of Wireless LAN Family of Wireless LAN (WLAN) Standards (WLAN) Standards 802.11802.11

– 802.11a - 5GHz- Ratified in 1999802.11a - 5GHz- Ratified in 1999– 802.11b - 11Mb 2.4GHz- ratified in 1999802.11b - 11Mb 2.4GHz- ratified in 1999– 802.11d - Additional regulatory domains802.11d - Additional regulatory domains– 802.11e - Quality of Service802.11e - Quality of Service– 802.11f - Inter-Access Point Protocol (IAPP)802.11f - Inter-Access Point Protocol (IAPP)– 802.11g - Higher Data rate (>20mBps) 802.11g - Higher Data rate (>20mBps)

2.4GHz2.4GHz– 802.11h - Dynamic Frequency Selection and 802.11h - Dynamic Frequency Selection and

Transmit Power Control mechanismsTransmit Power Control mechanisms– 802.11i - Authentication and security802.11i - Authentication and security

Page 15: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

15IFA’2004

WLANs – WLANs – Current Current UseUse

Home wireless networks.Home wireless networks. Enterprise wireless networks. Enterprise wireless networks. Public access. Public access. Hospitals. Hospitals. Warehouses. Warehouses. Consulting and audit teamsConsulting and audit teams Dynamic environments, ad agencies, etc.Dynamic environments, ad agencies, etc. UniversitiesUniversities Historic buildings, older buildings. Historic buildings, older buildings. Meeting rooms. Meeting rooms. Retail storesRetail stores Restaurants and car rental agenciesRestaurants and car rental agencies Data backup. Data backup.

Page 16: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

16IFA’2004

In-Building Deployment – In-Building Deployment – Service ObjectivesService Objectives

Greater coverageGreater coverage High-speed ratesHigh-speed rates Scalable and manageable bandwidthScalable and manageable bandwidth Enable new (high-end) services (and keep running Enable new (high-end) services (and keep running

the good old ones)the good old ones) Service differentiationService differentiation Smooth deployment and low maintenanceSmooth deployment and low maintenance Interoperable systemsInteroperable systems Plug & PlayPlug & Play Extends the local area networkExtends the local area network Freedom to access the corporate networkFreedom to access the corporate network Comparable to those of wired networksComparable to those of wired networks Secure access to important information (e-mail, Secure access to important information (e-mail,

corporate data, Internet)corporate data, Internet)

Page 17: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

17IFA’2004

Some FactsSome Facts

By 2005, more than 1/3By 2005, more than 1/3rdrd of Internet users will of Internet users will have Internet connectivity through a wireless have Internet connectivity through a wireless enabled device (750 million users)!!! (Source: enabled device (750 million users)!!! (Source: Intermarket group)Intermarket group)

By the end of 2001, more than half of the By the end of 2001, more than half of the workforce in the US uses a wireless net device – workforce in the US uses a wireless net device – primarily cellular phones! (Source: Cahners Intat primarily cellular phones! (Source: Cahners Intat Group)Group)

By the year 2004 revenue from wireless data will By the year 2004 revenue from wireless data will reach $34B, and by the year 2010 the number of reach $34B, and by the year 2010 the number of wireless data subscribers will hit 1B!!wireless data subscribers will hit 1B!!

Page 18: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

18IFA’2004

Design Goals for Wireless Design Goals for Wireless LANsLANs

– Global, seamless operation (must sell in all countries)Global, seamless operation (must sell in all countries)– Low power for battery use (power saving modes and Low power for battery use (power saving modes and

power management functions)power management functions)– No special permissions or licenses needed to use the No special permissions or licenses needed to use the

LAN LAN – Robust transmission technology (avoid interference)Robust transmission technology (avoid interference)– Simplified spontaneous cooperation at meetings Simplified spontaneous cooperation at meetings – Easy to use for everyone, simple management Easy to use for everyone, simple management – Protection of investment in wired networks Protection of investment in wired networks

(interoperable with wired LANs)(interoperable with wired LANs)– Security (no one should be able to read my data), Security (no one should be able to read my data),

privacy (no one should be able to collect user privacy (no one should be able to collect user profiles), safety (low radiation)profiles), safety (low radiation)

Page 19: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

19IFA’2004

TopologiesTopologies- - Single-Cell Wireless LANSingle-Cell Wireless LAN

Page 20: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

20IFA’2004

TopologiesTopologies- - Single-Cell Wireless LANSingle-Cell Wireless LAN

In Figure there is a backbone wired LAN, such as Ethernet, that In Figure there is a backbone wired LAN, such as Ethernet, that supports servers, workstations, and one or more bridges or supports servers, workstations, and one or more bridges or routers to link with other networks. routers to link with other networks.

In addition, there is a control module (CM) (Access Point (AP) In addition, there is a control module (CM) (Access Point (AP) before) that acts as an interface to a wireless LAN. (CM = AP)before) that acts as an interface to a wireless LAN. (CM = AP)

The control module includes either bridge or router functionality The control module includes either bridge or router functionality to link the wireless LAN to the backbone. to link the wireless LAN to the backbone.

In addition, it includes some sort of access control logic, such as a In addition, it includes some sort of access control logic, such as a polling or token-passing scheme, to regulate the access from the polling or token-passing scheme, to regulate the access from the end systems. end systems.

Note that some of the end systems are stand-alone devices such Note that some of the end systems are stand-alone devices such as a workstation or a server. as a workstation or a server.

In addition, hubs or other user modules (UM) (PORTAL before) that In addition, hubs or other user modules (UM) (PORTAL before) that control a number of stations off a wired LAN may also be part of control a number of stations off a wired LAN may also be part of the wireless LAN configuration.the wireless LAN configuration.

Page 21: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

21IFA’2004

TopologiesTopologies- - Multiple Cell Wireless Multiple Cell Wireless LANLAN

Figure 2

Page 22: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

22IFA’2004

TopologiesTopologies- - Multiple Cell Wireless Multiple Cell Wireless LANLAN

In this case there are multiple control In this case there are multiple control modules interconnected by a wired LAN.modules interconnected by a wired LAN.

Each control module supports a number Each control module supports a number of wireless end systems within its of wireless end systems within its transmission range. transmission range.

For example, with an infrared LAN, For example, with an infrared LAN, transmission is limited to a single room; transmission is limited to a single room; therefore, one cell is needed for each therefore, one cell is needed for each room in an office building that requires room in an office building that requires wireless support.wireless support.

Page 23: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

23IFA’2004

WLANs – 802.11 WLANs – 802.11 Protocol Protocol ArchitectureArchitecture

Physical Layer (PHY)

Distributed Coordination Function (DCF)

Point Coordination Function (PCF)

Normal Data Traffic(Asynchronous)

Real Time Traffic

MAC

Page 24: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

24IFA’2004

IEEE 802.11IEEE 802.11- - Physical Medium Physical Medium SpecificationSpecification

Three Physical Media:Three Physical Media: INFRAREDINFRARED

Narrowband MicrowaveNarrowband Microwave

Spread SpectrumSpread Spectrum

Page 25: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

25IFA’2004

InfraredInfrared

Infrared signals used to transmit data (similar to TV Infrared signals used to transmit data (similar to TV remotes!)remotes!)

Higher data rates possible (than spread spectrum)Higher data rates possible (than spread spectrum)

Line of sight point-to-point configuration required (or Line of sight point-to-point configuration required (or reflection surface that reflects signals)reflection surface that reflects signals)

Too sensitive to obstacles, line-of-sight requirement, etc. Too sensitive to obstacles, line-of-sight requirement, etc.

850-950 nm, diffuse light (to allow point-to-multipoint 850-950 nm, diffuse light (to allow point-to-multipoint communication)communication)

10 m maximum range with no sunlight or heat interfere10 m maximum range with no sunlight or heat interfere

Page 26: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

26IFA’2004

Narrowband Narrowband MicrowaveMicrowave

Typically used to link two WLANs together (for Typically used to link two WLANs together (for example, to link WLANs in two buildings)example, to link WLANs in two buildings)

Microwave dishes required at both ends of linkMicrowave dishes required at both ends of link

Unlike spread spectrum which operates in the Unlike spread spectrum which operates in the unlicensed ISM band, narrowband microwave unlicensed ISM band, narrowband microwave requires FCC licensingrequires FCC licensing

Exclusive license typically effective within a Exclusive license typically effective within a 17.5 mile radius17.5 mile radius

Page 27: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

27IFA’2004

Spread SpectrumSpread Spectrum

Distributed signals over multiple frequencies (to Distributed signals over multiple frequencies (to avoid eavesdropping or jamming)avoid eavesdropping or jamming)

Frequency Hopping Spread Spectrum (FHSS)Frequency Hopping Spread Spectrum (FHSS)– Sender transmits over a seemingly random series of frequenciesSender transmits over a seemingly random series of frequencies– Intended receiver aware of sequence of frequencies and hops Intended receiver aware of sequence of frequencies and hops

accordingly accordingly – Allows the coexistence of multiple networks in the same area by Allows the coexistence of multiple networks in the same area by

using different hopping sequencesusing different hopping sequences

Direct Sequence Spread Spectrum (DSSS)Direct Sequence Spread Spectrum (DSSS)– Sender transmits redundant information called “chips” between Sender transmits redundant information called “chips” between

actual data bitsactual data bits– Intended receiver aware of spread removes redundant Intended receiver aware of spread removes redundant

information accordinglyinformation accordingly– Preamble and header of a frame is always transmitted with 1 Preamble and header of a frame is always transmitted with 1

Mbit/s, rest of transmission 1 or 2 Mbit/sMbit/s, rest of transmission 1 or 2 Mbit/s

Page 28: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

28IFA’2004

Wireless LAN Wireless LAN ClassificationClassification

Infrared (IR) LANsInfrared (IR) LANs– An individual cell of an IR LAN is limited to a single An individual cell of an IR LAN is limited to a single

room, since infrared light does not penetrate opaque room, since infrared light does not penetrate opaque walls.walls.

Spread Spectrum LANsSpread Spectrum LANs– In most cases these LANs operate in the ISM In most cases these LANs operate in the ISM

(industrial, scientific, and medical) bands, so no FCC (industrial, scientific, and medical) bands, so no FCC licensing is required for their use in the United licensing is required for their use in the United States.States.

Narrowband Microwave LANsNarrowband Microwave LANs– These LANs operate at microwave frequencies but do These LANs operate at microwave frequencies but do

no use spread spectrum. Some of these products no use spread spectrum. Some of these products operate at frequencies that require FCC licensing; operate at frequencies that require FCC licensing; others use one of the unlicensed ISM bands. others use one of the unlicensed ISM bands.

– Table 1 summarizes some of the key characteristics Table 1 summarizes some of the key characteristics of these three technologies; the details are explored of these three technologies; the details are explored in the next three subsections.in the next three subsections.

Page 29: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

29IFA’2004

Comparison: Comparison: Infrared vs. Radio Infrared vs. Radio TransmissionTransmission

InfraredInfrared– uses IR diodes, diffuse light, uses IR diodes, diffuse light,

multiple reflections (walls, multiple reflections (walls, furniture etc.)furniture etc.)

AdvantagesAdvantages– simple, cheap, available in simple, cheap, available in

many mobile devicesmany mobile devices– no licenses neededno licenses needed

DisadvantagesDisadvantages– interference by sunlight, heat interference by sunlight, heat

sources etc.sources etc.– many things shield or absorb many things shield or absorb

IR light IR light – low bandwidthlow bandwidth– Line of Sight ProblemLine of Sight Problem

ExampleExample– IrDA (Infrared Data IrDA (Infrared Data

Association) interface available Association) interface available everywhere: PDAs, calculators, everywhere: PDAs, calculators, laptops, mobile phones...laptops, mobile phones...

RadioRadio– typically using the license typically using the license

free ISM band at 2.4 GHz free ISM band at 2.4 GHz AdvantagesAdvantages

– experience from wireless experience from wireless WAN and mobile phones can WAN and mobile phones can be used be used

– coverage of larger areas coverage of larger areas possible (radio can possible (radio can penetrate walls, furniture penetrate walls, furniture etc.) etc.)

DisadvantagesDisadvantages– very limited license free very limited license free

frequency bands frequency bands – shielding more difficult, shielding more difficult,

interference with other interference with other electrical deviceselectrical devices

ExampleExample– WaveLAN, HIPERLAN, WaveLAN, HIPERLAN,

BluetoothBluetooth

Page 30: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

30IFA’2004

Overview of WLAN ClassificationOverview of WLAN Classification

Page 31: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

31IFA’2004

Wireless LAN MACWireless LAN MAC

CSMA as Wireless MAC?CSMA as Wireless MAC?

Hidden and Exposed TerminalHidden and Exposed Terminal Problems Problems make the use of CSMA make the use of CSMA an inefficient techniquean inefficient technique

Page 32: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

32IFA’2004

Hidden Terminal Hidden Terminal ProblemProblem

A talks to BA talks to B C senses the channelC senses the channel C does not hear A’s transmission C does not hear A’s transmission (out of range)(out of range) C talks to BC talks to B Signals from A and B collide Signals from A and B collide

A B C

Collision

Page 33: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

33IFA’2004

Exposed Terminal Exposed Terminal ProblemProblem

B talks to AB talks to A C wants to talk to DC wants to talk to D C senses channel and finds it to be C senses channel and finds it to be

busybusy C stays quiet (when it could have C stays quiet (when it could have

ideally transmitted)ideally transmitted)

A B C D

Notpossible

Page 34: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

34IFA’2004

Hidden and Hidden and Exposed Terminal Exposed Terminal ProblemsProblems

Hidden TerminalHidden Terminal– More collisionsMore collisions– Wastage of resourcesWastage of resources

Exposed TerminalExposed Terminal– Underutilization of channelUnderutilization of channel– Lower effective throughputLower effective throughput

Page 35: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

35IFA’2004

MACA - Collision AvoidanceMACA - Collision Avoidance

MACA (Multiple Access with Collision Avoidance) uses MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidanceshort signaling packets for collision avoidance– RTS (request to send): a sender request the right to RTS (request to send): a sender request the right to

send from a receiver with a short RTS packet before send from a receiver with a short RTS packet before it sends a data packetit sends a data packet

– CTS (clear to send): the receiver grants the right to CTS (clear to send): the receiver grants the right to send as soon as it is ready to receivesend as soon as it is ready to receive

Signaling packets containSignaling packets contain– sender addresssender address– receiver addressreceiver address– packet sizepacket size

Variants of this method can be found in IEEE802.11 as Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC)DFWMAC (Distributed Foundation Wireless MAC)

Page 36: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

36IFA’2004

Hidden Terminal Hidden Terminal Revisited …Revisited …

A sends RTSA sends RTS B sends CTSB sends CTS C overheads CTSC overheads CTS C inhibits its own transmitterC inhibits its own transmitter A successfully sends DATA to BA successfully sends DATA to B

A B CRTS CTS

DATACTS

Page 37: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

37IFA’2004

Hidden Terminal Hidden Terminal RevisitedRevisited

How does C know how long to wait How does C know how long to wait before it can attempt a transmission?before it can attempt a transmission?

A includes length of DATA that it A includes length of DATA that it wants to send in the RTS packetwants to send in the RTS packet

B includes this information in the CTS B includes this information in the CTS packetpacket

C, when it overhears the CTS packet, C, when it overhears the CTS packet, retrieves the length information and retrieves the length information and uses it to set the inhibition timeuses it to set the inhibition time

Page 38: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

38IFA’2004

Exposed Terminal Exposed Terminal RevisitedRevisited

B sends RTS to A (overheard by C)B sends RTS to A (overheard by C) A sends CTS to BA sends CTS to B C cannot hear A’s CTSC cannot hear A’s CTS C assumes A is either down or out of rangeC assumes A is either down or out of range C does not inhibit its transmissions to DC does not inhibit its transmissions to D

A B C DRTS RTS

CTS Cannot hear CTSTx notinhibited

Page 39: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

39IFA’2004

CollisionsCollisions

Still possible – RTS packets can collide!Still possible – RTS packets can collide!

Binary exponential backoff performed by Binary exponential backoff performed by stations that experience RTS collisionsstations that experience RTS collisions

RTS collisions not as bad as data RTS collisions not as bad as data collisions in CSMA (since RTS packets are collisions in CSMA (since RTS packets are typically much smaller than DATA typically much smaller than DATA packets)packets)

Page 40: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

40IFA’2004

DrawbacksDrawbacks

Collisions still possible if CTS Collisions still possible if CTS packets cannot be heard but packets cannot be heard but carry enough to cause significant carry enough to cause significant interferenceinterference

If DATA packets are of the same If DATA packets are of the same size as RTS/CTS packets, size as RTS/CTS packets, significant overheadssignificant overheads

Page 41: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

41IFA’2004

WLANs – 802.11 WLANs – 802.11 Protocol Protocol ArchitectureArchitecture

Physical Layer (PHY)

Distributed Coordination Function (DCF)

Point Coordination Function (PCF)

Normal Data Traffic(Asynchronous)Contention Service

Real Time Traffic Contention Free Service

MAC

Page 42: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

42IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

– Distributed Mode: Distributed Coordination Function (DCF) Distributed Mode: Distributed Coordination Function (DCF) * Based on CSMA/CA protocol * Based on CSMA/CA protocol * Uses a contention algorithm to provide access to all traffic.* Uses a contention algorithm to provide access to all traffic. * Ordinary asynchronous traffic uses DCF directly.* Ordinary asynchronous traffic uses DCF directly.

– Coordinated Mode: Point Coordination Function (PCF) Coordinated Mode: Point Coordination Function (PCF) * Supports real time traffic * Supports real time traffic * Based on polling which is controlled by a centralized point * Based on polling which is controlled by a centralized point

coordinator.coordinator. * Uses a c* Uses a centralized MAC algorithm and provides contention-free entralized MAC algorithm and provides contention-free

service.service. * PCF is built on top of DCF and exploits features of DCF to assure * PCF is built on top of DCF and exploits features of DCF to assure

access for its users. access for its users.

NOTE: NOTE: Both the DCF and PCF can operate concurrently Both the DCF and PCF can operate concurrently within the same BSS to provide alternative contention within the same BSS to provide alternative contention and contention-free periodsand contention-free periods

Page 43: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

43IFA’2004

802.11 - MAC Layer 802.11 - MAC Layer OverviewOverview

– DFWMAC-DCF CSMA/CA (Mandatory)DFWMAC-DCF CSMA/CA (Mandatory)(Distributed Foundation Wireless Medium Access (Distributed Foundation Wireless Medium Access Control - Distributed Coordinated Function Control - Distributed Coordinated Function CSMA/CA)CSMA/CA)

– DFWMAC-DCF w/ RTS/CTS (Optional)DFWMAC-DCF w/ RTS/CTS (Optional)Distributed Foundation Wireless MACDistributed Foundation Wireless MACAvoids Hidden Terminal problemAvoids Hidden Terminal problem

– DFWMAC- PCF (Optional)DFWMAC- PCF (Optional)Access point polls terminals according to a listAccess point polls terminals according to a list

Page 44: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

44IFA’2004

802.11 - CSMA/CA 802.11 - CSMA/CA Access Method DFWMAC-DCF Access Method DFWMAC-DCF CSMA/CACSMA/CA

– A station with a frame to transmit senses the A station with a frame to transmit senses the medium. medium.

– If the medium is idle, it waits to see if the medium If the medium is idle, it waits to see if the medium remains idle for a time equal to IFS. If so, the remains idle for a time equal to IFS. If so, the station may transmit immediately.station may transmit immediately.

– If the medium is busy (either because the station If the medium is busy (either because the station initially finds the medium busy or because the initially finds the medium busy or because the medium becomes busy during the IFS idle time), medium becomes busy during the IFS idle time), the station defers transmission and continues to the station defers transmission and continues to monitor the medium until the current transmission monitor the medium until the current transmission is over.is over.

– Once the current transmission is over, the station Once the current transmission is over, the station delays another IFS.delays another IFS.

– If the medium remains idle for this period, the If the medium remains idle for this period, the station backs off using a binary exponential station backs off using a binary exponential backoff scheme and again senses the medium. backoff scheme and again senses the medium.

– If the medium is still idle, the station may transmit.If the medium is still idle, the station may transmit.

Page 45: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

45IFA’2004

802.11 - CSMA/CA 802.11 - CSMA/CA Access Method IAccess Method I

slot time

direct access if medium is free DIFS

t

medium busy

DIFSDIFS

next frame

contention window(randomized back-offmechanism)

Page 46: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

46IFA’2004

802.11 - CSMA/CA Access Method 802.11 - CSMA/CA Access Method IIII Interframe Spaces (IFS)Interframe Spaces (IFS)

Priorities– Defined through different inter frame spaces

– SIFS (Short Inter Frame Spacing)highest priority, for ACK, CTS, polling response

– PIFS (PCF IFS) - Point Coordination Function Inter-Frame spacingmedium priority, for real time service using PCFSIFS + one slot time

– DIFS (DCF, Distributed Coordination Function IFS)lowest priority, for asynchronous data serviceSFIS + two slot times

Page 47: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

47IFA’2004

Interframe Spaces (IFS)Interframe Spaces (IFS)

t

medium busySIFS

PIFS

DIFSDIFS

next framecontention

direct access if medium is free DIFS

Page 48: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

48IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

In Figure we illustrate the use of these time

values.

Page 49: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

49IFA’2004

802.11 - CSMA/CA 802.11 - CSMA/CA Access Method IIAccess Method II

– Station has to wait for DIFS before sending dataStation has to wait for DIFS before sending data– Receivers acknowledge at once (after waiting for SIFS) if the packet Receivers acknowledge at once (after waiting for SIFS) if the packet

was received correctly (CRC))was received correctly (CRC))– Automatic retransmission of data packets in case of transmission Automatic retransmission of data packets in case of transmission

errorserrors

t

SIFS

DIFS

data

ACK

waiting time

otherstations

receiver

senderdata

DIFS

contention

Page 50: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

50IFA’2004

802.11 – DFWMAC 802.11 – DFWMAC w/ RTS/CTSw/ RTS/CTS

– Station can send RTS (request to send) with reservation Station can send RTS (request to send) with reservation parameter after waiting for DIFS (reservation determines parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) amount of time the data packet needs the medium)

– Every node receiving the RTS has to set its Net Allocation Every node receiving the RTS has to set its Net Allocation Vector (NAV) in accordance with the duration of the field Vector (NAV) in accordance with the duration of the field (NAV specifies the earliest point at which the station can (NAV specifies the earliest point at which the station can try to access the mediumtry to access the medium

– If receiver receives RTS, it sends CTS (Clear to Send) after If receiver receives RTS, it sends CTS (Clear to Send) after SIFS. CTS again contains duration field and all stations SIFS. CTS again contains duration field and all stations receiving this packet need to adjust their NAVreceiving this packet need to adjust their NAV

– Sender can now send data after SIFS, acknowledgement Sender can now send data after SIFS, acknowledgement via ACK by receiver after SIFSvia ACK by receiver after SIFS

Page 51: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

51IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

Clear to Send (CTS)Clear to Send (CTS)– A station can ensure that its data frame will get A station can ensure that its data frame will get

through by first issuing a small request to send through by first issuing a small request to send (RTS) frame. (RTS) frame.

– The station to which this frame is addressed should The station to which this frame is addressed should respond immediately with a CTS frame if it is ready respond immediately with a CTS frame if it is ready to receive. to receive.

– All other stations receive the RTS and defer using All other stations receive the RTS and defer using the medium until they see a corresponding CTS or the medium until they see a corresponding CTS or until a timeout occurs.until a timeout occurs.

– PIFS is used by the centralized controller in issuing PIFS is used by the centralized controller in issuing polls and takes precedence over normal contention polls and takes precedence over normal contention traffic. traffic.

– However, those frames transmitted using SIFS have However, those frames transmitted using SIFS have precedence over a PCF poll. precedence over a PCF poll.

– Finally, the DIFS interval is used for all ordinary Finally, the DIFS interval is used for all ordinary asynchronous traffic.asynchronous traffic.

Page 52: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

52IFA’2004

802.11 – DFWMAC 802.11 – DFWMAC w/ RTS/CTSw/ RTS/CTS

t

SIFS

DIFS

data

ACK

defer access

otherstations

receiver

senderdata

DIFS

contention

RTS

CTSSIFS SIFS

NAV (RTS)NAV (CTS)

Page 53: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

53IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

Point Coordination FunctionPoint Coordination Function– PCF is an alternative access method PCF is an alternative access method

implemented on top of the DCF. implemented on top of the DCF. – The operation consists of polling with the The operation consists of polling with the

centralized polling master (point centralized polling master (point coordinator). coordinator).

– The point coordinator makes use of PIFS The point coordinator makes use of PIFS when issuing polls. when issuing polls.

– Because PIFS is smaller than DIFS, the Because PIFS is smaller than DIFS, the point coordinator can seize the medium point coordinator can seize the medium and lock out all asynchronous traffic while and lock out all asynchronous traffic while it issues polls and receives responses.it issues polls and receives responses.

Page 54: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

54IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

Point Coordination Function (Cont.)Point Coordination Function (Cont.)– A wireless network is configured so that a number A wireless network is configured so that a number

of stations with time-sensitive traffic are controlled of stations with time-sensitive traffic are controlled by the point coordinator while remaining traffic by the point coordinator while remaining traffic contends for access using CSMA. contends for access using CSMA.

– The point coordinator could issue polls in a round-The point coordinator could issue polls in a round-robin fashion to all stations configured for polling. robin fashion to all stations configured for polling.

– When a poll issued, the polled station may respond When a poll issued, the polled station may respond using SIFS. using SIFS.

– If the point coordinator receives a response, it If the point coordinator receives a response, it issues another poll using PIFS. issues another poll using PIFS.

– If no response is received during the expected If no response is received during the expected turnaround time, the coordinator issues a poll.turnaround time, the coordinator issues a poll.

Page 55: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

55IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

Point Coordination Function (Cont.)Point Coordination Function (Cont.)

Figure 18 illustrates the use of the superframe.Figure 18 illustrates the use of the superframe.

Figure 18

Page 56: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

56IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

Point Coordination Function (Cont.)Point Coordination Function (Cont.)– At the beginning of a superframe, the At the beginning of a superframe, the

point coordinator may optionally seize point coordinator may optionally seize control and issues polls for a given control and issues polls for a given period of time. period of time.

– This interval varies because of the This interval varies because of the variable frame size issued by variable frame size issued by responding stations. responding stations.

– The remainder of the superframe is The remainder of the superframe is available for contention-based access. available for contention-based access.

Page 57: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

57IFA’2004

IEEE 802.11IEEE 802.11- - Medium Access ControlMedium Access Control

Point Coordination Function (Cont.)Point Coordination Function (Cont.)– At the end of the superframe interval, At the end of the superframe interval,

the point coordinator contends for the point coordinator contends for access to the medium using PIFS. access to the medium using PIFS.

– If the medium is idle, the point If the medium is idle, the point coordinator gains immediate access coordinator gains immediate access and a full superframe period follows. and a full superframe period follows.

– However, the medium may be busy at However, the medium may be busy at the end of a superframe. the end of a superframe.

– In this case, the point coordinator In this case, the point coordinator must wait until the medium is idle to must wait until the medium is idle to gain access; this results in a gain access; this results in a foreshortened superframe period for foreshortened superframe period for the next cycle.the next cycle.

Page 58: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

58IFA’2004

DFWMAC-PCF IDFWMAC-PCF I

The access mechanisms presented so far The access mechanisms presented so far cannot guarantee a maximum access delay or cannot guarantee a maximum access delay or minimum transmission bandwidth.minimum transmission bandwidth.

To provide a time bounded service, the To provide a time bounded service, the standards specify a Point Coordination standards specify a Point Coordination Function (PCF) on top of the DCF mechanisms.Function (PCF) on top of the DCF mechanisms.

Using PCF requires an access point that can Using PCF requires an access point that can controls medium access and polls the single controls medium access and polls the single nodes. Ad Hoc networks cannot use this nodes. Ad Hoc networks cannot use this functionfunction..

Page 59: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

59IFA’2004

DFWMAC-PCF IDFWMAC-PCF I

At time tAt time t00 the contention-free period should the contention-free period should start, but another station is transmitting datastart, but another station is transmitting data

After the medium has been idle, the PCF has to After the medium has been idle, the PCF has to wait for PIFS before accessing the medium.wait for PIFS before accessing the medium.

The point coordinator now sends data DThe point coordinator now sends data D11 to the to the first station. The station can answer after SIFS. first station. The station can answer after SIFS. After waiting for SIFS, the point coordinator can After waiting for SIFS, the point coordinator can poll the second station by sending Dpoll the second station by sending D22. .

The second station replies with UThe second station replies with U22

Page 60: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

60IFA’2004

DFWMAC-PCF IDFWMAC-PCF I

PIFS

stations‘NAV

wirelessstations

point coordinator

D1

U1

SIFS

NAV

SIFSD2

U2

SIFS

SIFS

SuperFramet0

medium busy

t1

Page 61: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

61IFA’2004

DFWMAC-PCF IIDFWMAC-PCF II

tstations‘NAV

wirelessstations

point coordinator

D3

NAV

PIFSD4

U4

SIFS

SIFSCFend

contentionperiod

contention free period

t2 t3 t4

Polling continues with the third node which has nothing Polling continues with the third node which has nothing to answer.to answer.

After waiting for PIFS, the point coordinator can issue an After waiting for PIFS, the point coordinator can issue an end marker (CFend marker (CFendend), indicating that the contention period ), indicating that the contention period may start again.may start again.

The cycle starts again with the next superframeThe cycle starts again with the next superframe

Page 62: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

62IFA’2004

WLAN: IEEE WLAN: IEEE 802.11b802.11b

Data rateData rate– 1, 2, 5.5, 11 Mbit/s, 1, 2, 5.5, 11 Mbit/s,

depending on SNR depending on SNR – User data rate max. approx. User data rate max. approx.

6 Mbit/s6 Mbit/s Transmission rangeTransmission range

– 300m outdoor, 30m indoor300m outdoor, 30m indoor– Max. data rate ~10m indoorMax. data rate ~10m indoor

FrequencyFrequency– Free 2.4 GHz ISM-bandFree 2.4 GHz ISM-band

SecuritySecurity– Limited, WEP (Wired Limited, WEP (Wired

Equivalent Privacy) insecure, Equivalent Privacy) insecure, SSIDSSID

AvailabilityAvailability– Many products, many Many products, many

vendorsvendors

Connection set-up timeConnection set-up time– Connectionless/always onConnectionless/always on

Quality of ServiceQuality of Service– Typ. Best effort, no guarantees Typ. Best effort, no guarantees

(unless polling is used, limited (unless polling is used, limited support in products)support in products)

ManageabilityManageability– Limited (no automated key Limited (no automated key

distribution, sym. Encryption)distribution, sym. Encryption) Special Special

Advantages/DisadvantagesAdvantages/Disadvantages– Advantage: many installed Advantage: many installed

systems, lot of experience, systems, lot of experience, available worldwide, free ISM-available worldwide, free ISM-band, many vendors, integrated band, many vendors, integrated in laptops, simple systemin laptops, simple system

– Disadvantage: heavy Disadvantage: heavy interference on ISM-band interference on ISM-band (Industrial, Scientific, Medical (Industrial, Scientific, Medical band), no service guarantees, band), no service guarantees, slow relative speed onlyslow relative speed only

Page 63: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

63IFA’2004

WLAN: IEEE WLAN: IEEE 802.11a802.11a

Data rateData rate– 6, 9, 12, 18, 24, 36, 48, 54 6, 9, 12, 18, 24, 36, 48, 54

Mbit/s, depending on SNRMbit/s, depending on SNR– User throughput (1500 byte User throughput (1500 byte

packets): 5.3 (6), 18 (24), 24 packets): 5.3 (6), 18 (24), 24 (36), 32 (54) (36), 32 (54)

– 6, 12, 24 Mbit/s mandatory6, 12, 24 Mbit/s mandatory Transmission rangeTransmission range

– 100m outdoor, 10m indoor100m outdoor, 10m indoor E.g., 54 Mbit/s up to 5 m, 48 up to E.g., 54 Mbit/s up to 5 m, 48 up to

12 m, 36 up to 25 m, 24 up to 30m, 12 m, 36 up to 25 m, 24 up to 30m, 18 up to 40 m, 12 up to 60 m 18 up to 40 m, 12 up to 60 m

FrequencyFrequency– Free 5.15-5.25, 5.25-5.35, Free 5.15-5.25, 5.25-5.35,

5.725-5.825 GHz ISM-band5.725-5.825 GHz ISM-band SecuritySecurity

– Limited, WEP insecure, SSIDLimited, WEP insecure, SSID AvailabilityAvailability

– Some products, some vendorsSome products, some vendors

Connection set-up timeConnection set-up time– Connectionless/always onConnectionless/always on

Quality of ServiceQuality of Service– Typ. best effort, no Typ. best effort, no

guarantees (same as all guarantees (same as all 802.11 products)802.11 products)

ManageabilityManageability– Limited (no automated key Limited (no automated key

distribution, sym. Encryption)distribution, sym. Encryption) Special Special

Advantages/DisadvantagesAdvantages/Disadvantages– Advantage: fits into 802.x Advantage: fits into 802.x

standards, free ISM-band, standards, free ISM-band, available, simple system, uses available, simple system, uses less crowded 5 GHz bandless crowded 5 GHz band

– Disadvantage: stronger Disadvantage: stronger shading due to higher shading due to higher frequency, no QoSfrequency, no QoS

Page 64: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

64IFA’2004

WLAN: IEEE 802.11 – WLAN: IEEE 802.11 – Future Developments Future Developments ((08/200208/2002))

802.11d: Regulatory Domain Update – 802.11d: Regulatory Domain Update – completedcompleted 802.11e: MAC Enhancements – QoS – 802.11e: MAC Enhancements – QoS – ongoingongoing

– Enhance the current 802.11 MAC to expand support for Enhance the current 802.11 MAC to expand support for applications with Quality of Service requirements, and in the applications with Quality of Service requirements, and in the capabilities and efficiency of the protocol. capabilities and efficiency of the protocol.

802.11f: Inter-Access Point Protocol – 802.11f: Inter-Access Point Protocol – ongoingongoing – Establish an Inter-Access Point Protocol for data exchange via the Establish an Inter-Access Point Protocol for data exchange via the

distribution system.distribution system. 802.11g: Data Rates > 20 Mbit/s at 2.4 GHz802.11g: Data Rates > 20 Mbit/s at 2.4 GHz; 54 Mbit/s, OFDM; 54 Mbit/s, OFDM – –

ongoing ongoing 802.11h: Spectrum Managed 802.11a (D802.11h: Spectrum Managed 802.11a (DCCS, TPC) – S, TPC) – ongoing ongoing 802.11i: Enhanced Security Mechanisms – 802.11i: Enhanced Security Mechanisms – ongoingongoing

– Enhance the current 802.11 MAC to provide improvements in Enhance the current 802.11 MAC to provide improvements in security. security.

Study GroupsStudy Groups– 5 GHz (harmonization ETSI/IEEE) – 5 GHz (harmonization ETSI/IEEE) – closed closed – Radio Resource Measurements – Radio Resource Measurements – startedstarted– High Throughput – High Throughput – startedstarted

Page 65: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

65IFA’2004

WLANs – 802.11 WLANs – 802.11 CompatibilityCompatibility

802.11a and 802.11b share the same MAC layer802.11a and 802.11b share the same MAC layer Significant differences at the physical layer.Significant differences at the physical layer.

– 802.11b: 2.4 GHz, ISM band, 802.11b: 2.4 GHz, ISM band, – 802.11a: 5 GHz, U-NII band802.11a: 5 GHz, U-NII band– possible to operate both on the same possible to operate both on the same

network concurrently (using the same access network concurrently (using the same access points)points)

InteroperabilityInteroperability– WECA (Wireless Ethernet Compatibility WECA (Wireless Ethernet Compatibility

Alliance): organization behind Wi-Fi that Alliance): organization behind Wi-Fi that certifies products meeting the 802.11b certifies products meeting the 802.11b specificationspecification

Page 66: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

66IFA’2004

WLANs – WLANs – Comparison of Comparison of TechnologiesTechnologies

Characteristic 802.11 802.11b 802.11a HiperLAN/2

Spectrum 2.4GHz 2.4GHz 5GHz 5GHz

Max Physical Rate 2Mb/s 11Mb/s 54Mb/s 32Mb/s

Max data rate layer 3 1.2Mb/s 5Mb/s 32Mb/s 32Mb/s

Medium access CSMA/MA TDMA/TDD

Connectivity Conn.-less Conn.-less Conn.-less Conn.-oriented

Multicast Yes Yes Yes Yes

QoS support No No No Yes

Frequency selection FH/DSSS DSSS Single carrier Single carrier with Dynamic Frequency

Selection

Authentication No No No NAI/IEEE address/X.509

Encryption 40bit RC4 40bit RC4 40bit RC4 DES, 3DES

Handover support No No No No

Fixed network support Ethernet Ethernet Ethernet Ethernet, IP, ATM UMTS, FireWire, PPP

Management 802.11MIB 802.11MIB 802.11MIB HiperLAN/2MIB

Radio link quality control No No No Link adaptation

         

Page 67: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

67IFA’2004

WLANs – WLANs – InterferenceInterference

An important issue in all wireless systems An important issue in all wireless systems because nearby users occupy same because nearby users occupy same bandwidth and cause co-channel interference. bandwidth and cause co-channel interference.

For WLANs, in addition to co-channel For WLANs, in addition to co-channel interference, other types of interference exist interference, other types of interference exist mainly due to the use of unlicensed ISM band. mainly due to the use of unlicensed ISM band. Interference to WLANs comes from the Interference to WLANs comes from the following major sources:following major sources:– Co-channel interference. Co-channel interference. – Interference from non-wLAN devices in the Interference from non-wLAN devices in the

same frequency band same frequency band – Interference between different wLANs in Interference between different wLANs in

the same frequency band. the same frequency band.

Page 68: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

68IFA’2004

WLANs – WLANs – Interference Interference ReductionReduction

Regulatory and standards Regulatory and standards – Change frequency segment of a channel (proposed Change frequency segment of a channel (proposed

by FCC for Bluetooth) by FCC for Bluetooth) Usage and practicesUsage and practices

– When one wLAN is working, others are banned. Not When one wLAN is working, others are banned. Not practical. Modal operation of wLANs can be a good practical. Modal operation of wLANs can be a good alternativealternative

Technical approaches. Technical approaches. – Driver layer: software above the MAC layer can be Driver layer: software above the MAC layer can be

installed for different types of wLANs. Thus, installed for different types of wLANs. Thus, software switch from one wLAN to another wLAN is software switch from one wLAN to another wLAN is required. required.

– MAC layer: more attractive but it is an on-going MAC layer: more attractive but it is an on-going research topic. research topic.

– Physical layer: signal processing techniques and Physical layer: signal processing techniques and anti-jamming schemes usedanti-jamming schemes used

Page 69: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

69IFA’2004

WLANs – WLANs – Environmental Environmental IssuesIssues

Has been proved that WLAN is safe for healthHas been proved that WLAN is safe for health– Radiation used by this technology, fall well within the limits Radiation used by this technology, fall well within the limits

of safety guidelines (both in terms of frequency content of safety guidelines (both in terms of frequency content and power level) specified by Radio Frequency Safety and power level) specified by Radio Frequency Safety Standards and Recommendations. Standards and Recommendations.

– Radiation in this frequency range is non-ionizing (as they Radiation in this frequency range is non-ionizing (as they do not have enough energy to break the chemical bonds of do not have enough energy to break the chemical bonds of genetic material of body cells). genetic material of body cells).

– Vendors designing their products to operate within the Vendors designing their products to operate within the power limit set by the Safety Standards. power limit set by the Safety Standards.

OthersOthers– No wires to hide and maintainNo wires to hide and maintain– Looks much better and cleaner compared to the wired one. Looks much better and cleaner compared to the wired one. – Positive impact on user psychology due to user mobility, Positive impact on user psychology due to user mobility,

reduced-cost of ownership, real-time-access to information,reduced-cost of ownership, real-time-access to information,

Page 70: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

70IFA’2004

WLANs – WLANs – Major SuppliersMajor Suppliers

Three types of products in WLANs:

– Access Point– LAN Adapters and – LAN Bridges.

Page 71: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

71IFA’2004

WLANs –WLANs –Access Point Access Point ProductsProducts

Major Suppliers

Products Operating Frequency

Standard Throughput WEP Encryption

Agere AP-1000 2.4GHz 802.11b 11Mbps -

Avaya I/700022270 2.4GHz 802.11b 11Mbps -

Nokia A032 2.4GHz 802.11b 11Mbps 64- and 128-bit

Nortel e-mobility DSSS AP DR4000E02

2.4GHz 802.11b 11Mbps -

Intel PRO/Wireless 2011B

2.4GHz 802.11b 11Mbps 64- and 128-bit

Intel PRO/Wireless 5000

5.2 GHz 802. 11b 54 Mbs 64- and 128-bit

Siemens I-GATE 11M 2.4GHz 802.11b 11Mbps 11Mbps

3Com Access Point 6000

2.4GHz 802.11b 11Mbps 64-bit

Fujitsu MBH8MB01 2.4GHz Bluetooth 732.2kbps -

Compaq WL510 2.4GHz 802.11b 11Mbps 128bit

Agere AP-1000 2.4GHz 802.11b 11Mbps 128bit

Apple AirPort 2.4GHz 802.11b 11Mbps -

IBM AP500 2.4GHz 802.11b 11Mbps -

Cisco Aironet® 350 Series

2.4GHz 802.11b 11Mbps -

Page 72: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

72IFA’2004

WLANs – WLANs – LAN Adapter LAN Adapter ProductsProducts

Major suppliers

Products Operating Frequency

Standard Throughput Range

Intel PRO/Wireless 2011B LAN

PC Card

2.4GHz 802.11b 11Mbps -

Intel PRO/Wireless 5000 LAN

PCI Adapter

5.2GHz 802.11a 54Mbps 100 feet

Compaq WL110 2.4GHz 802.11b 11Mbps -

Agere ORiNOCO PC Card

2.4GHz 802.11b 11Mbps -

Apple Airport Client Card

2.4GHz 802.11b 11Mbps -

Cisco Aironet® 350 Series

2.4GHz 802.11b 11Mbps -

Page 73: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

73IFA’2004

WLANs –WLANs –Bridge Bridge ProductsProducts

Major suppliers

Products Operating Frequency

Standard Throughput Range

Intel Wireless Gateway

2.4GHz 802.11b 11Mbps -

Compaq WL310 2.4GHz 802.11b 11Mbps 160m(525feet)

Agere RG-1100 Broadband

Gateway

2.4GHz 802.11b 11Mbps 550m(1750ft)

Agere ORiNOCO PC Card

2.4GHz 802.11b 11Mbps -

Cisco Aironet® 350 Series Wireless Bridge

2.4GHz 802.11b 11Mbps 25 miles (40.2 km)

Page 74: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

74IFA’2004

WLANs – WLANs – Market Market SegmentSegment

by Wireless LAN Association (wLANA )

Page 75: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

75IFA’2004

WLANs – WLANs – Market Market ForecastForecast

Seen as "The Technology" of the future. Seen as "The Technology" of the future. – Trend support: Decrease of product price and Trend support: Decrease of product price and

increase of network speed, increase of network speed, – Apart from current sectors, more and more new Apart from current sectors, more and more new

markets are opening up for this technology. Some markets are opening up for this technology. Some of these are shipping and receiving area, of these are shipping and receiving area, distribution center, cafeteria, home, train, bus, distribution center, cafeteria, home, train, bus, airport, sport complexes, trade shows, coffee airport, sport complexes, trade shows, coffee shops, etc. shops, etc.

Huge market potentialHuge market potential– Make WLAN as a viable option to connect the Make WLAN as a viable option to connect the

developing nations to the developed part of the developing nations to the developed part of the world, making the concept "Global Village" a world, making the concept "Global Village" a reality.reality.

Estimated a five-fold increase in its market by 2005Estimated a five-fold increase in its market by 2005

Page 76: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

76IFA’2004

WLANs – WLANs – Technology Technology ForecastForecast

WLAN will have higher speeds WLAN will have higher speeds – Wi-Fi5 for IEEE 802.11a up to 54Mbps Wi-Fi5 for IEEE 802.11a up to 54Mbps – 5.7-GHz band promises to allow for the next 5.7-GHz band promises to allow for the next

breakthrough data rate of 100 Mbps. breakthrough data rate of 100 Mbps. Provide multimedia and access to 3G-4G SystemsProvide multimedia and access to 3G-4G Systems

– HIPERLAN/2 to provide high speed access (up HIPERLAN/2 to provide high speed access (up to 54 Mbit/s at PHY layer) to 3G mobile core to 54 Mbit/s at PHY layer) to 3G mobile core networks, and Internet.networks, and Internet.

More security guarantees. More security guarantees. – Enhancements to Wired Equivalent Privacy Enhancements to Wired Equivalent Privacy

(WEP)(WEP)

Page 77: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

77IFA’2004

WLANs – WLANs – Technology Technology ForecastForecast

Even more decreased size, cost, Even more decreased size, cost, power consumptionpower consumption

New approaches in handling New approaches in handling network parameters dynamically to network parameters dynamically to improve throughput. improve throughput.

Improved reliabilityImproved reliability Efficient and concurrent uses of Efficient and concurrent uses of

bandwidth via Wideband bandwidth via Wideband Orthogonal Frequency Division Orthogonal Frequency Division Multiplexing (W-OFDM)Multiplexing (W-OFDM)

Page 78: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

78IFA’2004

WLANs – WLANs – Service Service

AnalysisAnalysis

Convergence for voice and data networksConvergence for voice and data networks– As voice, audio and video are shared As voice, audio and video are shared

among WLAN-enabled phones, MP3 among WLAN-enabled phones, MP3 players, web cameras, interactive TVs, players, web cameras, interactive TVs, etc, wireless applications will move etc, wireless applications will move beyond traditional computer networking.beyond traditional computer networking.

Replacement of proprietary cables. Replacement of proprietary cables. Portable access to wireless LAN. Portable access to wireless LAN. Multimedia over wireless networks. Multimedia over wireless networks. Wireless remote data access. Wireless remote data access. Data Backup. Data Backup.

Page 79: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

79IFA’2004

WLANs – WLANs – Network Network Design Plan Design Plan AnalysisAnalysis

Key parameters:Key parameters:– number of expected usersnumber of expected users– area of coveragearea of coverage– quality of servicequality of service– service typesservice types

Network topology for WLAN can Network topology for WLAN can broadly be classified into:broadly be classified into:– Ad-Hoc WLAN Ad-Hoc WLAN – Client-Server based WLAN Client-Server based WLAN

Page 80: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

80IFA’2004

WLANs – WLANs – Performance Performance

MetricsMetrics

Overall coverage area Overall coverage area – Can be evaluated in terms of received Can be evaluated in terms of received

signal strength intensity (RSSI)signal strength intensity (RSSI) Throughput Throughput

– Can be evaluated by measuring TCP Can be evaluated by measuring TCP connection throughputs since wLANs connection throughputs since wLANs establish a client-server communication establish a client-server communication link via TCP connection,link via TCP connection,

Implementations of handoff and dropping Implementations of handoff and dropping are the responsibility of manufacturers, are the responsibility of manufacturers, since they vary according to different since they vary according to different equipmentsequipments

Page 81: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

81IFA’2004

WLANs – WLANs – Network Network Security AspectsSecurity Aspects

Service set identifier (SSID) (can be configured into 802.11 Service set identifier (SSID) (can be configured into 802.11 APs)APs)

Use VPN technologies built into or on top of WLAN productsUse VPN technologies built into or on top of WLAN products Wired equivalent privacy (WEP) of 802.11 or the common Wired equivalent privacy (WEP) of 802.11 or the common

128-bit extension128-bit extension– Uses shared keys and a pseudo random number (PRN) as Uses shared keys and a pseudo random number (PRN) as

an initial vector (IV) to encrypt the data portion of an initial vector (IV) to encrypt the data portion of network packets, but does not encrypt 802.11b header network packets, but does not encrypt 802.11b header

– Each station (clients and APs) has a number of keys to Each station (clients and APs) has a number of keys to encrypt data before it is transmitted encrypt data before it is transmitted

– Each station can only receive a packet being encrypted Each station can only receive a packet being encrypted with its appropriate key. Without proper key, the packet with its appropriate key. Without proper key, the packet will be discarded will be discarded

– Some vendors also provide key servers to implement Some vendors also provide key servers to implement centralized key management, such as Cisco.centralized key management, such as Cisco.

Page 82: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

82IFA’2004

WLANs – WLANs – Price ComparisonPrice Comparison

Vendor Name Access Points PC card PCI Adapter Wireless Bridge

3Com $545.00 $169.00 $199.00 $1095.00

Apple $301.00 $99.00 -- --

Avaya $685.00 $144.00 $59.00 --

Cisco $717.00 $193.00 $269.00 $458.00

Compaq $729.00 $166.00 $208.00 --

Ericsson $929.00 $186.00 -- --

IBM $1015.00 $182.00 -- --

Nokia $751.00 $212.00 $199.00 --

Nortel $1065.00 $289.00 -- $638.00

Symbol $1025.00 $181.00 $271.00 $655.00

Zoom $410.00 $136.00 $136.00 $1888.00

Page 83: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

83IFA’2004

WLANs – Total CostWLANs – Total Cost

Much smaller (around one year) payback periodMuch smaller (around one year) payback period– Even though initial capital cost for the WLAN may Even though initial capital cost for the WLAN may

be more, but the running cost for the WLAN is be more, but the running cost for the WLAN is much lessmuch less

Cost-effective large scale network deploymentCost-effective large scale network deployment– Example: organizations for around 300 users Example: organizations for around 300 users

benefited annual savings of up to $4.9 million, benefited annual savings of up to $4.9 million, which corresponds to per user saving of which corresponds to per user saving of $15,989.00.$15,989.00.

Low initial installation cost (wiring)Low initial installation cost (wiring)– University of Akron, covered their four-story University of Akron, covered their four-story

library with WLAN with a total cost of $80,000, library with WLAN with a total cost of $80,000, using Cisco Airnet 350 series and the estimated using Cisco Airnet 350 series and the estimated cost for wired network for that was $800,000 cost for wired network for that was $800,000

Page 84: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

84IFA’2004

ConclusionsConclusions Users demand ubiquity: mergence of the Users demand ubiquity: mergence of the

wireless communication services; indoor and wireless communication services; indoor and outdooroutdoor

Greater demand for integration with Greater demand for integration with Bluetooth, wLAN and cellular system Bluetooth, wLAN and cellular system

Technology to meet these demand available Technology to meet these demand available todaytoday

Some key issues:Some key issues:– interoperability between different wireless interoperability between different wireless

network systems (MORE WORK NEEDED)network systems (MORE WORK NEEDED)– Security: More work needed. An ideal Security: More work needed. An ideal

solution: combination of VPN and IPSec solution: combination of VPN and IPSec

Page 85: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

85IFA’2004

ConclusionsConclusions Since the needs from various enterprises and Since the needs from various enterprises and

end users are quite different, the service end users are quite different, the service providers should prepare various network providers should prepare various network deploymentsdeployments– Many issues to be considered: network Many issues to be considered: network

capacity, the connectivity to wired network, capacity, the connectivity to wired network, QoS, security, price and performance.QoS, security, price and performance.

A competitive solution provides seamless end-A competitive solution provides seamless end-to-end connectivity from mobile users to wired to-end connectivity from mobile users to wired ones.ones.

A web-based, centralized network A web-based, centralized network management is another consideration most management is another consideration most customers wantcustomers want

Page 86: WIRELESS LOCAL AREA NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute

86IFA’2004

WLANs - WLANs - Challenging IssuesChallenging Issues

Relatively low data rate. Relatively low data rate. – Some can achieve very high data rate, e.g., the Some can achieve very high data rate, e.g., the

rate of IEEE 802.11 WLANs can be as high as rate of IEEE 802.11 WLANs can be as high as 11Mbps, while some products such as Bluetooth 11Mbps, while some products such as Bluetooth can only achieve medium speed data rate. can only achieve medium speed data rate.

Lack of support for real time services. Lack of support for real time services. – IEEE 802.11 products, which are based on the IEEE 802.11 products, which are based on the

CSMA/CA protocol, are unable to provide QoS CSMA/CA protocol, are unable to provide QoS guarantees for voice, video, and other real time guarantees for voice, video, and other real time services. (IEEE 802.11 working group E is still services. (IEEE 802.11 working group E is still working QoS enhancement)working QoS enhancement)

Interference between different types of WLANs Interference between different types of WLANs Lack of Interoperability between WLANs Lack of Interoperability between WLANs