WLANs schiller

  • Upload
    uflilla

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

  • 7/29/2019 WLANs schiller

    1/11

    IEE 802.11

    System ArchitectureProtocol Architecture As indicated by the standard number, IEEE 802.11 fits seamlessly into the other

    802.x standards for wired LANs

    Applications should not notice any difference apart from the lower bandwidth andperhaps higher access time from the wireless LAN. The WLAN behaves like a

    slow wired LAN. Consequently, the higher layers (application, TCP, IP) look the

    same for wireless nodes as for wired nodes.

    The upper part of the data link control layer, the logical link control (LLC), coversthe differences of the medium access control layers needed for the different media.

    The IEEE 802.11 standard only covers the physical layerPHY and medium accesslayerMAC like the other 802.x LANs do

    The physical layer is subdivided into the physical layer convergence protocol(PLCP) and the physical medium dependent sublayerPMD.

    The basic tasks of the MAC layer comprise medium access, fragmentation of userdata, and encryption.

  • 7/29/2019 WLANs schiller

    2/11

    a

    i

    he PLCP s

    ssessment

    dependent

    odulation

    blayer pro

    CCA), and

    of the tran

    and encodi

    vides a car

    provides a

    smission te

    g/decodin

    rier sense s

    common

    chnology.

    of signal

    ignal, calle

    HY servic

    inally, the

    .

    d clear cha

    e access po

    PMD subl

    nnel

    int (SAP)

    ayer handl

    s

  • 7/29/2019 WLANs schiller

    3/11

    Apart from the protocol sublayers, the standard specifies management layers andthe station management. The MAC management supports the association and re-

    association of a station to an access point and roaming between different access

    points. It also controls authentication mechanisms, encryption, synchronization of

    a station with regard to an access point, and power management to save battery

    power. MAC management also maintains the MAC management information base(MIB).

    The main tasks of the PHY management include channel tuning and PHY MIBmaintenance. Finally, station management interacts with both management layers

    and is responsible for additional higher layer functions (e.g., control of bridging

    and interaction with the distribution system in the case of an access point).

    Physical Layer:

    IEEE 802.11 supports three different physical layers: one layer based on infra red andtwo layers based on radio transmission (primarily in the ISM band at 2.4 GHz, which is

    available worldwide). All PHY variants include the provision of

    the clear channel assessment signal (CCA). This is needed for the MAC mechanisms

    controlling medium access and indicates if the medium is currently idle.

    The PHY layer offers a service access point (SAP) with 1 or 2 Mbit/s transfer rate to the

    MAC layer (basic version of the standard).

    Frequency hopping spread spectrumFHSS which allows for the coexistence of multiple networks in the same area by

    separating different networks using different hopping sequences . The original standarddefines 79 hopping channels for North America and Europe, and 23 hopping channels for

    Japan (each with a bandwidth of 1 MHz in the 2.4 GHz ISM band). The selection of a

    particular channel is achieved by using a pseudo-random hopping pattern. National

    restrictions also determine further parameters, e.g., maximum transmit power is 1 W in

    the US, 100 mW EIRP (equivalent isotropic radiated power) in Europe and 10 mW/MHz

    in Japan.

    The standard specifies Gaussian shaped FSK (frequency shift keying), GFSK, as

    modulation for the FHSS PHY. For 1 Mbit/s a 2 level GFSK is used (i.e., 1 bit is mapped

    to one frequency), a 4 level GFSK for 2 Mbit/s (i.e., 2 bits are mapped to one frequency).While sending and receiving at 1 Mbit/s is mandatory for all devices, operation at 2

    Mbit/s is optional. This facilitated the production of low-cost devices for the lower rate

    only and more powerful devices for both transmission rates in the early days of 802.11.

  • 7/29/2019 WLANs schiller

    4/11

    Figure

    two basi

    MAC d

    The fiel

    Sync

    010101.

    signal d

    Start

    provide

    PLC

    length o

    can ran

    PLC

    followi

    Mbit/s

    obvious

    Head

    checksu

    Direct

    Direct

    separati

    achieve

    The ke

    insensiti

    is more

    ISM ba

    elow show

    c parts, th

    ta is scram

    s of the fr

    ronizatio

    .. bit patte

    tection by

    rame deli

    frame sync

    _PDU len

    f the paylo

    e between

    signallin

    g. All bits

    s indicate

    y does not

    r error

    with the

    sequen

    equence s

    g by code

    using the

    character

    vity to mu

    complex

    d and offe

    s a frame

    PLCP par

    bled using

    me fulfill

    : The PL

    n. This pa

    the CCA.

    iter (SF

    hronizatio

    gth word

    ad in byte

    0 and 4,09

    field (PS

    set to zer

    d by 0010

    accommo

    heck (HE

    standard I

    e spread

    read spec

    and not by

    11-chip B

    stics of t

    tipath pro

    ompared t

    s both 1 a

    f the physi

    (preambl

    the polyno

    he followi

    P preambl

    tern is use

    ): The foll

    . The SFD

    (PLW): T

    including

    .

    F): This 4

    (0000) in

    and the

    ate todays

    C): Finall

    U-T gener

    spectru

    trum (DS

    frequency

    rker seque

    is method

    agation ti

    FHSS. I

    d 2 Mbit/s

    cal layer u

    and head

    ial s(z) =

    g function

    e starts wi

    d for sync

    owing 16

    pattern is

    is first fie

    the 32 bit

    bit field i

    dicates the

    maximum

    higher dat

    , the PL

    ator polyn

    S) is the

    . In the cas

    nce (+1,

    are its ro

    e delay s

    EE 802.1

    data rates.

    ed with F

    r) and the

    z7 + z4 + 1

    s:

    h 80 bit s

    ronization

    its indicat

    00011001

    ld of the

    CRC at th

    dicates th

    lowest da

    is 8.5 M

    a rates.

    P header

    mial G(x)

    alternative

    e of IEEE

    , +1, +1,

    ustness a

    pread). Ho

    DSSS P

    SS. The f

    ayload pa

    .

    nchroniza

    of potenti

    the start

    111101.

    LCP head

    end of th

    e data rate

    ta rate of

    it/s (1111

    is protect

    = x16 + x12

    spread sp

    802.11 DS

    1, +1, +1,

    ainst inter

    wever, the

    Y also us

    ame consi

    t. Additio

    ion, whic

    l receiver

    f the fram

    er indicate

    payload.

    of the pa

    Mbit/s.

    ). This sy

    d by a 1

    + x5 + 1.

    ectrum m

    S, spreadi

    +1, 1, 1,

    ference an

    implement

    es the 2.4

    ts of

    ally,

    is a

    and

    and

    s the

    LW

    load

    he 2

    stem

    bit

    thod

    ng is

    1).

    d its

    ation

    GHz

  • 7/29/2019 WLANs schiller

    5/11

    The sy

    transmi

    modulat

    EIRP in

    chippin

    polynotodays

    to these

    Figure s

    parts, th

    always t

    of the fr

    Synch

    setting,

    Start

    beginni

    Signa

    rate of t

    2 Mbit/

    bit rates

    Servi

    complia

    Leng

    microse

    Head

    checksu

    tem uses

    sion and

    ion schem

    Europe a

    rate of 11

    ial s(z) =products o

    lower data

    hows a fra

    e PLCP pa

    ransmitted

    ame have t

    ronization

    nergy det

    frame de

    g of a fra

    : Originall

    e payload.

    (and thus

    .

    e: This fie

    t frame.

    h: 16 bit

    onds.

    r error c

    using th

    differenti

    ifferential

    s. Again,

    d 10 mW

    MHz. All

    7 + z4 + 1fering 11

    rates.

    e of the

    t (preambl

    at 1 Mbit/

    e followin

    : The first

    ction (for t

    imiter (S

    e and cons

    , only tw

    The value

    DQPSK).

    d is reserv

    s are use

    eck (HE

    ITU-T C

    l binary

    quadrature

    he maxim

    MHz in J

    bits trans

    for DC blbit/s acc

    hysical lay

    e and head

    , payload,

    g function

    28 bits ar

    he CCA), a

    D): This

    ists of the

    values ha

    0x0A indi

    ther valu

    ed for futu

    in this

    ): Signal,

    C-16 stan

    phase shi

    phase shi

    m transm

    pan. The

    itted by th

    ocking andrding to 8

    er using D

    er) and the

    .e., MAC

    :

    not only u

    nd frequen

    16 bit fiel

    attern 111

    e been de

    ates 1 Mbi

    s have be

    e use; ho

    ase for l

    service, a

    ard polyn

    ft keying

    ft keying

    t power is

    ymbol rat

    e DSSS P

    whitening02.11b are

    SSS. The

    payload p

    ata, can u

    sed for sy

    cy offset c

    is used

    100111010

    ined for th

    t/s (and th

    n reserved

    ever, 0x0

    ngth indi

    d length f

    mial.

    (DBPSK)

    (DQPSK)

    1 W in th

    is 1 MH

    Y are scr

    of the spestill back

    rame consi

    rt. While t

    e 1 or 2 M

    chronizati

    mpensatio

    or synchr

    0000.

    is field to i

    s DBPSK)

    for future

    indicates

    cation of

    elds are p

    for 1

    or 2 Mbit

    e US, 100

    , resulting

    mbled wit

    ctrum. Maard comp

    sts of two

    e PLCP p

    bit/s. The

    n, but also

    n.

    nization a

    ndicate the

    , 0x14 indi

    use, i.e., h

    n IEEE 8

    the payloa

    otected b

    bit/s

    /s as

    mW

    in a

    the

    y oftible

    asic

    art is

    ields

    gain

    t the

    data

    cates

    gher

    2.11

    d in

    this

  • 7/29/2019 WLANs schiller

    6/11

    The IEEE 802.11 Medium Access Control Layer

    MSs in an IEEE802.11network have to share the transmission medium, which isair.

    If two MSs transmit at the same time and the transmissions are both in range of thedestination, then they may collide, resulting in the frames being lost.

    The MAC layer is responsible for controlling access to the medium and ensuringthat MSs can access the medium in a fair manner with minimal collisions.

    The medium access mechanism is based on CSMA, but there is no collisiondetection, unlike the wired equivalent LAN standard (IEEE 802.3).

    In IEEE 802.3, sensing the channel is very simple. The receiver reads the peakvoltage on the wire or cable and compares that against a threshold.

    Collisions are extremely hard to detect in RF because of the dynamic nature of thechannel.

    Detecting collisions also results difficulties in hardware implementation becausean MS has to be transmitting and receiving at the same time.

    Instead, the strategy adopted is to avoid collisions to the greatest extent possible. In IEEE 802.11, there are two types of carrier sensing: physical sensing of energy

    in the medium and virtual sensing.

    Physical sensing is through a clear channel assessment (CCA) signal produced bythe physical layer convergence protocol (PLCP) in the physical layer of the

    IEEE802.11.

    The CCA is generated based on real sensing of the air interface, either bysensing the detected bits in the air or by checking the RSS of the carrier against athreshold.

    Decisions based on the detected bits are made slightly slower, but they are morereliable.

    Decisions based on the RSS may create false alarms caused by high interferencelevels.

    The best designs take advantage of both carrier sensing and detected data sensing. In addition to physical sensing, IEEE 802.11 also provides for virtual carrier

    sensing.

    Virtual sensing is implemented by decoding a duration field in the 802.11 framethat allows an MS to know the time for which a frame will last.

    A length field in the MAC layer is used to specify the amount of time that mustelapse before the medium can be freed.

    This time is stored in a network allocation vector (NAV) that counts down to zeroto indicate when the medium is free again.

  • 7/29/2019 WLANs schiller

    7/11

    e

    I

    t

    ti

    a

    I

    t

    a

    o illustrate

    ample. H

    ell.

    he Dist

    he basic m

    onsider th

    EE 802.1

    n MS will

    en the MS

    CF IFS (D

    CF inter-

    me and ha

    synchrono

    the medi

    ithout wai

    he rational

    ill also wa

    owever,

    ansmissio

    he wireles

    cknowledg

    the IEEE

    wever, th

    ibuted

    edium acce

    figure w

    .

    initially se

    will conti

    IFS).

    frame spa

    the lowes

    s data serv

    m is still

    ing. Other

    e is that if

    t for the D

    efore a ti

    . Upon hea

    s medium

    ed.

    802.11 M

    procedur

    oordina

    ss process

    ich shows

    nse the ch

    uously m

    cing (DIF

    t priority f

    ice within

    idle after

    ise, the M

    another M

    FS.

    e DIFS

    ring the tra

    is harsh a

    C layer,

    s are iden

    tion Fun

    in IEEE 80

    the basic

    nnel befor

    nitor the

    ): This p

    r medium

    contentio

    the DIFS,

    S will ente

    S senses t

    expires, t

    nsmission,

    nd unrelia

    e will use

    tical in an

    ction

    2.11, calle

    method fo

    e transmis

    edium for

    rameter d

    access. Th

    period.

    then the

    r a back-of

    e medium

    e first M

    the secon

    ble and h

    the ad hoc

    infrastruct

    the DCF.

    accessing

    ion. If the

    a Period o

    notes the

    is waiting

    S can tra

    process.

    after the

    S would

    MS will h

    nce all tr

    topology

    re topolo

    the mediu

    medium is

    time calle

    longest wa

    time is use

    nsmit its f

    irst MS, t

    ave starte

    ave to bac

    nsmission

    s an

    y as

    m in

    free,

    d the

    iting

    d for

    rame

    en it

    d its

    off.

    are

  • 7/29/2019 WLANs schiller

    8/11

    s

    IS

    tt

    Ia

    p

    c

    t

    i

    n

    ti

    I

    s

    I

    2

    t

    he destina

    urce if the

    will wait

    IFS value i

    hus, any o

    ansmittedansmissio

    order to

    s free for

    rocess if it

    he excepti

    ase, the

    ansmitted

    he back-o

    nce an Mterval (BI

    umber call

    he MS wi

    me DIFS,

    edium is f

    the mediu

    S will fre

    s soon the

    own in Fi

    he IEEE 8

    itially, th

    1 3

    he slot ti

    e IEEE 80

    ion of the

    frame is s

    for a time

    s smaller t

    ther MS t

    will stills.

    aintain fa

    a time DI

    wants to tr

    n is when

    S can in

    nd occupy

    f process

    S enters tthat is a

    d the Cont

    l then mo

    the MS w

    ee. The co

    m is sense

    ze the cou

    counter be

    ure below.

    2.11 MA

    CW is

    slots. So t

    e varies d

    2.11b stan

    frame will

    ccessfully

    called the

    an the DI

    at senses t

    be waitin

    rness and

    S and tra

    nsmit anot

    it is trans

    icate the

    the chann

    orks as f

    e back-ofrandom v

    ention Wi

    itor the m

    ill start co

    nter is de

    as occupi

    ter and co

    comes zer

    supports

    aintained

    he BI will

    pending o

    ard and 9u

    send an a

    received.

    short IFS

    S value.

    he channel

    and AC

    void colli

    smits a fr

    her frame i

    itting one

    umber of

    l until the

    llows.

    process,lue unifor

    dow (CW)

    edium. W

    nting do

    remented

    d before t

    tinue to m

    , the MS

    inary expo

    at a valu

    e uniform

    the physi

    s in the 80

    cknowled

    (SIFS) an

    as idle a

    K frames

    ions, the

    ame will

    mmediatel

    frame in

    fragments

    rame is co

    it picks amly distri

    .

    en the me

    n from th

    very so of

    e counter

    onitor the

    an transmi

    nential bac

    called C

    ly distribut

    cal layer.

    .11a stand

    ement (A

    transmits

    ter the ori

    have prio

    S that sen

    ave to en

    .

    any frag

    in the fir

    mpletely tr

    value calluted betw

    dium is fr

    e BI value

    en (called

    oes down

    edium.

    t its frame.

    k-off like I

    min, wh

    ed betwee

    or exampl

    ard.

    K) back t

    the ACK.

    inal frame

    rity over

    ses the me

    er the bac

    ents. In s

    st frame t

    nsmitted.

    d the baceen zero a

    e for at le

    as long a

    slot).

    o zero, the

    This proc

    EE802.3.

    ich is typi

    0 and 31

    e, it is 20

    the

    The

    was

    their

    dium

    k-off

    ch a

    o be

    k-offnd a

    ast a

    s the

    n the

    ss is

    cally

    lots.

    us in

  • 7/29/2019 WLANs schiller

    9/11

    Ic

    2

    c

    s

    Fd

    I

    a

    u

    Ih

    a

    a

    a packet

    annel erro

    he MS wi

    1 6

    Wmax (us

    he rationa

    ontending

    me BI val

    W, it is lik

    rames ma

    estination i

    EE 802.1

    e receive

    ndeliverabl

    he Hiddwireless

    idden term

    d receptio

    he transmi

    S-A is tra

    d MS-A i

    is not suc

    r), then the

    l now pic

    slots. Thi

    ally 1023

    le behind

    or the me

    ue. Their t

    ely that thi

    be lost du

    s necessar

    , each MS

    . After a r

    e.

    n Termietworks t

    inal proble

    n range of

    ssion from

    nsmitting a

    hidden fr

    essfully tr

    value of C

    a BI val

    process c

    slots).

    this appr

    ium, then

    ransmissio

    probabilit

    e to chann

    to ensure

    maintains

    etry thresh

    al Probat use carr

    m. Suppos

    , as show

    MS-A can

    frame to

    m MS-B.

    ansmitted

    W is essen

    e that is

    n be conti

    ach is a

    it is likely

    s will the

    will go d

    l errors or

    that the fra

    retry coun

    old is reac

    em andier sensing

    e all MSs

    in Figure

    be heard

    S-C, MS

    f both MS

    (this could

    ially doub

    niformly

    nued until

    follows.

    that one

    n collide.

    own, there

    collisions.

    me has bee

    ters that ar

    hed, the fr

    ptional, there is a

    re identic

    below.

    y MS-C b

    B will not

    -A and M

    be due to

    ed.

    distributed

    CW reache

    If there

    r more M

    y increasi

    y reducing

    A positiv

    n successf

    e incremen

    ame is dis

    echaniunique pr

    l and hav

    ut not by

    sense the

    -B transmi

    collisions

    between 0

    s a value t

    re many

    s may pic

    ng the val

    collisions.

    ACK fro

    lly receiv

    ted if no

    arded as

    mblem calle

    a transmi

    S-B. So,

    hannel as

    t frames to

    or a

    and

    at is

    MSs

    the

    e of

    the

    d. In

    CKs

    eing

    d the

    ssion

    hen

    busy

    MS-

  • 7/29/2019 WLANs schiller

    10/11

    C at the same time, the frames will collide. This problem is called the hidden

    terminal problem.

    There is a dual problem called the exposed terminal problem. In this case, MS-Ais transmitting a frame to MS-D. This transmission is heard by MS-C, which then

    backs off. However, MS-C could have transmitted a frame to MS-B and the two

    transmissions would not interfere or collide. In this case, MS-A is called anexposed terminal.

    Both hidden and exposed terminals cause a loss of throughput.To reduce the possibility of collisions due to the hidden terminal problem, the

    IEEE 802.11 MAC has an optional mechanism at the MAC layer, as given

    below.

    Suppose MS-A wants to transmit a frame to MS-C. It will first transmit a shortframe called the RTS frame. The RTS frame is heard in the transmission range of

    MS-A and includes MS-C and MS-D, but not MS-B. Both MS-C and MS-D are alerted to the fact that MS-A intends to transmit a

    frame and they will not attempt to simultaneously use the medium.

    This is achieved by the virtual carrier sensing process that sets the NAV to a valueequal to the time it will take to complete the exchange of frames successfully.

    In response to the RTS frame, MS-C will send a clear-to-send (CTS) frame thatwill be heard by all MSs in its transmission range. This includes MS-B and MS-A

    but not MS-D.

    The CTS frame lets MS-A know that MS-C is ready to receive the data frame. Italso alerts MS-B to the fact that there will be a transmission from some MS to

    MS-C. Consequently, MS-B will defer any frames that it wishes to transmit inanticipation of the completion of the communication to MS-C.

    This way, even though MS-B is outside the transmission range of MS-A, the CTSmessage can be used to extend the carrier sensing range, thereby reducing the

    hidden terminal problem.

    Of course, it is quite possible that the RTS frame itself collided with atransmission from MS-B. In such a case, both MS-A and MS-B will have to enter

    the back-off process and retransmit their frames.

  • 7/29/2019 WLANs schiller

    11/11

    t

    t

    2

    p

    ti

    e

    he RTS-C

    reshold.ll unicast

    ansmitted

    y setting t

    347 bytes,

    hen RTS-

    S after w

    riority co

    me DIFS a

    sing the

    ssential to

    S mecha

    and mana

    sing RTS-

    is value to

    which disa

    CTS signal

    iting simp

    pared wit

    nd perhaps

    TS-CTS s

    se this in

    ism can b

    ement fra

    -CTS.

    0bytes, all

    les RTS-

    s are used,

    y for a ti

    all other

    an additio

    gnals redu

    ense envir

    e controlle

    mes larger

    frames wi

    TS for all

    the CTS f

    e equal to

    ransmissio

    al waiting

    ces the thr

    nments.

    d in IEEE

    than this

    ll use RTS

    ackets.

    ame is tra

    SIFS. Thi

    ns, which

    time in ba

    oughput o

    802.11 b

    threshold

    -CTS. The

    smitted b

    s way, the

    have to w

    k-off.

    a WLAN

    using an

    will alwa

    default val

    the destin

    CTS fram

    it for at le

    , but it ma

    RTS

    s be

    ue is

    ation

    has

    ast a

    y be