Lecture 1 Wireless Local Area Network for print.pdf
bilqesahmed60
26 views
48 slides
Oct 15, 2024
Slide 1 of 48
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
About This Presentation
This is for master computer engineering
Size: 1.95 MB
Language: en
Added: Oct 15, 2024
Slides: 48 pages
Slide Content
Wireless Networking Architecture
Lecture 1
Wireless Local Area Network (WLAN)
IEEE 802.11
Professor Dr. Salah Abdulghani
Computer Engineering Department
University of Mosul
IEEE 802.11
IEEE has defined the specifications for a wireless
LAN, called IEEE 802.11, which covers the physical
and data link layers.
Wireless LANs can be found on college campuses,
in office buildings, and in many public areas.
Two wireless technologies for LANs: IEEE 802.11
wireless LANs, sometimes called wireless Ethernet,
and Bluetooth, a technology for small wireless
LANs.
Wireless networks are becoming of more interest in recent
days. They are easy to use and configure. The most famous
and widely-used standard is IEEE802.11 for WLAN.
As in wired networks, collisions can occur in wireless LANs
when more than on station transmits at the same time while
using a shared transmission medium.
Of course, the air is the shared medium in wireless LANs.
IEEE802.11 standard defines the medium access methods in
the MAC layer. It has two main functions namely: distributed
coordination function (DCF), and point coordination function
(PCF). DCF is mandatory while PCF is optional in the
standard.
IEEE 802.11 Group Standards
IEEE 802.11 The original 1 Mbit/s and 2 Mbit/s , 2.4 GHz RF and IR standard (1999)
IEEE 802.11a 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001)
IEEE 802.11b Enhancements to 802.11 to support 5.5 and 11 Mbit/s (1999)
IEEE 802.11c Bridge operation procedures; included in the IEEE 802.1D standard (2001)
IEEE 802.11d International (country-to-country) roaming extensions (2001)
IEEE 802.11e Enhancements: QoS, including packet bursting (2005)
IEEE 802.11f Inter-Access Point Protocol (2003) Withdrawn February 2006
IEEE 802.119 54 Mbit/s, 2.4 GHz standard (backwards compatible with b) (2003)
IEEE 802.11h Spectrum Managed 802.11a (5 GHz) for European compatibility (2004)
IEEE 802.11i Enhanced security (2004)
IEEE 802.11j Extensions for Japan (2004)
IEEE 802.11 Group Standards Cont.
IEEE 802.11k | Radio resource measurement enhancements
IEEE 802.111 (reserved and will not be used)
IEEE 802.11m | Maintenance of the standard; odds and ends.
Higher throughput improvements using MIMO (multiple input, multiple output
IEEE 802.11n antennas)
IEEE 802.110 | (reserved and will not be used)
WAVE - Wireless Access for the Vehicular Environment (such as ambulances and
IEEE 802.11p passenger cars)
IEEE 802.11q | (reserved and will not be used, can be confused with 802.1Q VLAN trunking)
IEEE 802.11r Fast roaming Working "Task Group r"
IEEE 802.11s | ESS Mesh Networking
IEEE 802.11T | Wireless Performance Prediction (WPP) - test methods and metrics Recommendation
IEEE 802.11u Interworking with non-802 networks (for example, cellular)
IEEE 802.11v | Wireless network management
IEEE 802.11w | Protected Management Frames 802.11ax (Wi-Fi 6) and
IEEE 802.11x
IEEE 802.11y
(reserved and will not be used) 802.1 1 ac (Wi-Fi 5)
3650-3700 Operation in the U.S.
IEEE 802.11: basics
= Basic standard first ratified in 1997
= Primary (original) function:
= Wireless replacement for Ethernet
= Frequency band: Unlicensed band
= 2.4 GHz: 11 channels, 3 of which are non-overlapping
= 5 GHz: 12 non-overlapping channels
= Basic data rate
= 1,2,5.5, 11, ..., 54,100 Mbps .... Now up to 1200Mbps, with 2x2 MIMO
technology
= Range
= Indoor: 20 ~ 25 meters
= Outdoor: 50~100 meters
= Specify protocols for MAC and PHY layers only
= 802.11 has defined many new amendments
» PHY: 802.11b, 802.11a, 802.11g, ...
= MAC: 802.11e, 802.11i, ...
= Application
= Enterprise and campus networking
= Ad hoc networking
= Public access in “hot spots”
= Home networking
Medium
In a wireless LAN, the medium is air, the signal is generally broadcast.
When hosts in a wireless LAN communicate with each other, they are
sharing the same medium (multiple access).
We may be able to create a point-to-point communication between
two wireless hosts by using a very limited bandwidth and two-
directional antennas.
igure 15.1 Isolated LANs: wired versus wireless
Isolated LAN @ Ad hoc network @
N > 4 \ A
Host Host
\ go 2
> a
Host Host
Wired Wireless.
Connection to Other Networks
Figure 15.2 Connection of a wired LAN and a wireless LAN to other networks
Wired
internet
Access
point
Wired LAN Infrastructure network
Note that the role of the access point is completely different from the role
of a link-layer switch in the wired environment. An access point is gluing
two different environments together: one wired and one wireless.
Communication between the AP and the wireless host occurs in a
wireless environment; communication between the AP and the
infrastructure occurs in a wired environment.
Protocol Stacks
IEEE 802.11
mobile terminal
infrastr
fixed terminal
ucture network
application application
TCP access point
IP
LLC LLC LLC
802.11 MAC 802.11 MAC | 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY | 802.3 PHY 802.3 PHY
o] o y
MAC Sublayer
Figure : MAC layers in IEEE 802.11 standard
LLC
sublayer
Contention-free
Data link SERS Contention
layer service
Point coordination function (PCF)
MAC
sublayer
Distributed coordination function (DCF)
Y
À
Physical 802.11 802.11 802.11 | 802.11a | 802.11a | 802.119
layer FHSS DSSS Infrared DSSS OFDM DSSS
Y
Architecture
The standard defines two kinds of services: the basic service set (BSS)
and the extended service set (ESS).
BSS: Basic service set
AP: Access point
! LI 1
I E | LE F i
I = | 2 =
D u OM ——
| Station Station | | Station Station |
I | I |
I tos = |
j AI 0 AP fa :
| E == | h == [== |
| Station Station al | Station Station |
Ad hoc network (BSS without an AP) Infrastructure (BSS with an AP)
A basic service set is made of static or mobile wireless stations and an
optional central base station, known as the access point (AP).
The BSS without an AP is a stand-alone network and cannot send data to
other BSSs. It is called an ad hoc architecture. In this architecture, stations
can form a network without the need of an AP; they can locate one another
and agree to be part of a BSS. ABSS with an AP is sometimes referred to as
an infrastructure network.
Extended service sets (ESSs)
An extended service set (ESS) =a ne set
is made up of two or more Ap: access point
BSSs with APs. In this case, the
BSSs are connected through a
distribution system, which is
Serveror
usually a wired LAN. The un
distribution system connects _-7 >
the APs in the BSSs. IEEE // PON oe N
802.11 does not constrain the ¡a =. ¡a ) IN
distribution system; it can be \ a A \ / 0 ue
any IEEE LAN such as an mi x m x m 7
Ethernet. Note that the BSS BSS BSS
extended service set uses two
types of stations: mobile and Set ID)
stationary. The mobile stations | ssjp can be different
are normal stations inside @ +BSS= MAC-level address of the AP
BSS. The stationary stations
are AP stations that are part of
a wired LAN,
« Each BSS has an address (SSID = Service
Characteristics
Attenuation
The strength of electromagnetic signals decreases rapidly because the signal
disperses in all directions; only a small portion of it reaches the receiver. The
situation becomes worse with mobile senders that operate on batteries and
normally have small power supplies.
Interference
Another issue is that a receiver may receive signals not only from the intended
sender, but also from other senders if they are using the same frequency band.
Multipath Propagation
A receiver may receive more than one signal from the same sender because
electromagnetic waves can be reflected back from obstacles such as walls, the
ground, or objects. The result is that the receiver receives some signals at different
phases (because they travel different paths). This makes the signal less
recognizable.
Error
With the above characteristics of a wireless network, we can expect that errors
and error detection are more serious issues in a wireless network than in a wired
network. If we think about the error level as the measurement of signal-to-noise
ratio (SNR)
The CSMA/CD algorithm does not work in wireless LANs
for three reasons:
1. To detect a collision, a host needs to send and receive at
the same time (sending the frame and receiving the collision
signal), which means the host needs to work in aduplex mode.
Wireless hosts do not have enough power to do so (the power
is supplied by batteries). They can only send or receive at one
time.
2. Because of the hidden station problem, in which a station
may not be aware of another station’s transmission due to
some obstacles or range problems, collision may occur but not
be detected.
3. The distance between stations can be great. Signal fading
could prevent a station at one end from hearing a collision at
the other end.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
Distributed Coordination
Function (DCF)
One of the two protocols
defined by IEEE at the
MAC sublayer is called the
distributed coordination
function (DCF). DCF uses
Carrier Sense Multiple
Access /Collision
Avoidance (CSMA/CA)
as the access method.
Set back-off
to zero
Increment
back-off
Persistence
strategy
Seta timer
Send the frame
Set a timer
Figure 12.9 Behavior of three persistence methods
Transmit
Continuously sense Sense Sense
HATTA ne gs
St Time A dx Time
Busy Busy
a. 1-Persistent b. Nonpersistent
Send if Send if Send if
R<p. R<p. R<p.
Continuously sense | Wait a time slot | Wait a backoff | Wait a time slot
| | | | | | | | | | otherwise = |. otherwise
Busy Busy
> Time
c. p-Persistent
CSMA/CA Action
1. Before sending a frame, the source station senses the medium by
checking the energy level at the carrier frequency.
a. The channel uses a persistence strategy with back-off until the
channel is idle.
b. After the station is found to be idle, the station waits for a period of
time called the distributed interframe space (DIFS); then the station
sends a control frame called the request to send (RTS).
2. After receiving the RTS and waiting a period of time called the short
interframe space (SIFS), the destination station sends a control frame,
called the clear to send (CTS), to the source station. This control frame
indicates that the destination station is ready to receive data.
3. The source station sends data after waiting an amount of time equal
to SIFS.
4. The destination station, after waiting an amount of time equal to SIFS,
sends an acknowledgment to show that the frame has been received.
Acknowledgment is needed in this protocol because the station does not
have any means to check for the successful arrival of its data at the
destination. On the other hand, the lack of collision in CSMAICD is a
kind of indication to the source that data have arrived.
Network Allocation Vector How do other stations defer sending their
data if one station gets access? In other words, how is the collision
avoidance? The key is a feature called NAV. When a station sends an
RTS frame, it includes the duration of time that it needs to take the
channel. The stations that are affected by this transmission create a
timer called a network allocation vector (NAV) that shows how much
time must pass before these stations are allowed to check the
channel for idleness. Each time a station accesses the system and
sends an RTS frame, other stations start their NAV. In other words,
each station, before sensing the physical medium to see if it is idle,
first checks its NAV to see if it has expired.
Collision During Handshaking What happens if there is collision
during the time when RTS or CTS control frames are in transition,
often called the handshaking period? Two or more stations may try to
send RTS frames at the same time. These control frames may collide.
However, because there is no mechanism for collision detection, the
sender assumes there has been a collision if it has not received a
CTS frame from the receiver. The back-off strategy is employed, and
the sender tries again.
Use of handshaking to prevent hidden station problem
B A c
3 _ 4
|
Time Time Time
Figure 12.17 CSMA/CA and NAV
Source Destination All other stations
Time Time Time Time
In CSMA/CA, the IFS can also be used to
define the priority of a station or a frame.
In CSMA/CA, if the station finds the channel
busy, it does not restart the timer of the
contention window; it stops the timer and
restarts it when the channel becomes idle.
Example of RTS/CTS Access Scheme
CSMA/CA based
=™CSMA: listen at least DIFS before talk
"CA: defer transmission for random back-off time after DIFS
SIFS
ler er
H BO=5 (set) + BO=15 (set)
A DIFS | DIFS R Lois
0 collision
B
BO=8 (set)
nl BO=5 (suspend) BO=5(resyy á BO=10 (set)
C BUSY | DIFS DIFS DIFS
H NAV(CTS,
Minimum payload length: 46 bytes
Maximum payload length: 1500 bytes
Preamble: 56 bits of alternating Is and Os
SED: Start frame delimiter, flag (10101011) y
«EN a pone Type Data and padding CRC
Tbytes 1 byte 6 bytes 6bytes 2 bytes 4 bytes
Physi ee Minimum frame length: 512 bits or 64 bytes
pure Maximum frame length: 12,144 bits or 1518 bytes
Frame format for IEEE 802.3
Frame format for IEEE 802.11
2 bytes 2bytes 6 bytes 6 bytes 6bytes 2bytes 6 bytes 0t0 2312 bytes 4 bytes
Frame body
Frame control (FC). The FC field is 2 bytes long and defines the type of
frame and some control information.
D. This field defines the duration of the transmission that is used to set the
value of NAV.
Table 14.1 Subfields in FC field Frame control (FC).
Protocol} +... To |From|More Pwr |More
LE sion a | aie as
2bits 2bits 4 bits 1bit Lbit Ibit Ibit Ibit 1 bit 1 bit 1 bit
Field Explanation
Version Current version is 0
Type Type of information: management (00), control (01), or data (10)
Subtype Subtype of each type (see Table 14.2)
To DS Defined later
From DS Defined later
More flag When set to 1, means more fragments
Retry When set to |, means retransmitted frame
Pwr mgt When set to 1, means station is in power management mode
More data When set to 1, means station has more data to send
WEP Wired equivalent privacy (encryption implemented)
Rsvd Reserved
Type and Subtype
This 6 bits define the Type and SubType of the frame as indicated in the
following table:
Type Value Type Description | Subtype Value | Subtype Description
b3 b2 b7 b6 bS b4
00 Management 0000 Association Request
00 Management 0001 Association Response
00 Management 0010 Association Request
10 Data 0011 Data + CF-ACK + CF-Poll
10 Data 0100 Null Function (no data)
10 Data 0101 CF-Ack (no data)
10 Data 0110 CF-Poll (no data)
10 Data 0111 CF-Ack + CF-Poll (no data)
10 Data 1000-1111 Reserved
10 Data 0000-1111 Reserved
Addresses. There are four address fields, each 6 bytes long.
The meaning of each address field depends on the value of
the To DS and From DS subfields and will be discussed later.
Sequence control. This field, often called the SC field,
defines a 16-bit value. The first four bits define the fragment
number; the last 12 bits define the sequence number, which
is the same in all fragments.
Frame body. This field, which can be between 0 and 2312
bytes, contains information based on the type and the
subtype defined in the FC field.
FCS. The FCS field is 4 bytes long and contains a CRC-32
error-detection sequence.
Frame Types
A wireless LAN defined by IEEE 802.11 has three
categories of frames: management frames, control
frames, and data frames.
Management Frames are used for the initial
communication between stations and access points.
Control Frames are used for accessing the channel and
acknowledging frames.
Subtype: Example subtypes for management
frames are: 0000 for association request, 1000 for
beacon. RTS is a control frame with subtype
1011, CTS is coded as 1100 and ACK is 1101
15.2.3 Addressing Mechanism
The IEEE 802.11 addressing mechanism specifies four cases, defined by the value of the
two flags in the FC field, To DS and From DS. Each flag can be either 0 or 1, resulting in
four different situations. The interpretation of the four addresses (address 1 to address 4)
in the MAC frame depends on the value of these flags, as shown in Table 15.3.
Table 15.3 Addresses
EE loue fau ue ut |
0 [0 me fo — ES D
Destination Sending AP
Receiving AP Source a
Receiving AP Sending AP Destination
Note that address 1 is always the address of the next device that the frame will visit.
Address 2 is always the address of the previous device that the frame has left. Address 3
is the address of the final destination station if it is not defined by address 1 or the orig-
inal source station if it is not defined by address 2. Address 4 is the original source
when the distribution system is also wireless.
Case 1: 00 In this case, To DS = 0 and From DS = 0. This means that the
frame is not going to a distribution system (To DS = 0) and is not coming
from a distribution system (From DS = 0). The frame is going from one
station in a BSS to another without passing through the distribution
system.
BSS-ID
[BIATYT
1 2 3 4
a. Case |
To From Address Address Address Address
DS DS il 2 3 4
[0 [0 | Destination [Sauce | BSSID
Address 1: MAC address Address 2: MAC address
of wireless host or AP of wireless host or AP
to receive this frame transmitting this frame
Case 2: 01 In this case, To DS = 0 and From DS = 1. This means that the
frame is coming from a distribution system (Access Point) (From DS = 1).
The frame is coming from an AP and going to a station. Note that address 3
contains the original sender of the frame (in another BSS).
FromDS, | Distribution system |
This bit is set to 1 m fAP}=y7====2
when the frame is BSS
received from the
Distribution System. & >
B
To From Address Address Address Address
DS DS 1 2 3) 4
| 0 | 1 | Destination | Sending AP Source N/A
Address 1: MAC address Address 2: MAC address
of wireless host or AP
of wireless host or AP
transmitting this frame
to receive this frame
Case 3: 10 In this case, To DS = 1 and From DS = 0. This means that the
frame is going to a distribution system (or to AP) (To DS = 1). The frame is
going from a station to an AP. The ACK is sent to the original station. Note
that address 3 contains the final destination of the frame in the distribution
system.
ToDS, This bit is set to 1 when
the frame is addressed to the 2>=2========777777777777777
AP for forwarding to the
Distribution System (including
the case where the destination
station is in the same BSS, and
Address 1: MAC address Address 2: MAC address
of wireless host or AP of wireless host or AP
to receive this frame transmitting this frame
Case 4: 11 In this case, To DS = 1 and From DS = 1. This is the case in
which the distribution system is also wireless. The frame is going from one
AP to another AP in a wireless distribution system. Here, we need four
addresses to define the original sender, the final destination, and two
intermediate APs.
| Wireless distribution Se
== Tapa. —TAP2Japı AF TAPIE=
A RER hss
ei
À
ee A
d. Case 4
To From Address Address Address Address
DS DS 1 2 3) 4
1 1 Receiving AP Sending AP Destination Source
Address 1: MAC address Address 2: MAC address
of wireless host or AP
to receive this frame
of wireless host or AP
transmitting this frame
Point Coordination Function (PCF)
The point coordination function (PCF) is an optional access method that can be implemented in
an infrastructure network (not in an ad hoc network). It is implemented on top of the DCF and
is used mostly for time-sensitive transmission.
PCF has a centralized, contention-free polling access method. The AP performs polling for
stations that are capable of being polled. The stations are polled one after another, sending any
data they have to the AP.
To give priority to PCF over DCF, another set of interframe spaces has been defined: PIFS and
SIFS. The SIFS is the same as that in DCF, but the PIFS (PCF IFS) is shorter than the DIFS.
This means that if, at the same time, a station wants to use only DCF and an AP wants to use
PCF, the AP has priority.
Due to the priority of PCF over DCF, stations that only use DCF may not gain access to the
medium. To prevent this, a repetition interval has been designed to cover both contention-free
(PCF) and contention-based (DCF) traffic. The repetition interval, which is repeated
continuously, starts with a special control frame, called a beacon frame.
When the stations hear the beacon frame, they start their NAV for the duration of the
contention-free period of the repetition interval. Figure 14.6 shows an example of a repetition
interval.
During the repetition interval, the PC (point controller) can send a poll frame, receive data, send
an ACK, receive an ACK, or do any combination of these (802.11 uses piggybacking). At the
end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow
the contention-based stations to use the medium.
Point coordination function (PCF) is an optional technique used to prevent
collisions in IEEE 802.11-based WLAN standard including Wi-Fi. It is a
medium access control (MAC) sublayer technique used in areas where
carrier-sense multiple access with collision avoidance (CSMA/CA) is used.
PCF is used additionally along with the mandatory distributed coordination
function (DCF). It is used in centralised control system, and is present in the
access point (AP) of the wireless network. An AP is generally a wireless
router that coordinates network communication.
Features of PCF
It is an optional function that resides on the top of the mandatory DCF. Both
PCF and DCF operate simultaneously.
It provides channel access to the stations using poll and response method
thus eliminating the need of contention.
The polling is done by the point co-ordinator (PC) that resides in central
access point (AP).
The station waits for Point Inter-Frame Space (PISF) before transmission.
PISF is typically smaller than DIFS (Distributed Inter-Frame Space) as used
in DCF.
PC polls in a round — robin method to provide access to the stations in the
wireless network.
AP issues a special control frame called beacon frame to initiate and repeat
polling.
Technique
Step 1 - PC sends a beacon frame after waiting for PIFS. The beacon frame
reaches every station in the wireless network.
Step 2 — If AP has data for a particular station, say station X, it sends the
data and a grant to station X.
Step 3 - When station X gets the grant from the AP, if it has a data frame
for AP, it transmits data and acknowledgement (ACK) to the AP.
Step 4- On receiving data from station X, the AP sends an ACK to it.
Step 5 - The AP then sends goes to the next station, say station Y. If AP
has data for Y, it sends data and grant to Y, otherwise it sends only grant to
Y.
Step 6 - On receiving grant from AP, station Y transmits its data (if any) to
AP.
Step 7 - This process continues for all the stations in the poll.
Step 8 — At the end of granting access to all the stations, the AP sends an
ACK to the last station. It then notifies all stations that this is the end of
polling.
Select and poll functions in polling access method
» Physical layer conforms to OSI (five options)
— 1997: 802.11 infrared, FHSS, DHSS
— 1999: 802.11a OFDM and 802.11b HR-DSSS
— 2001: 802.11g OFDM
« 802.11 Infrared
— Two capacities 1 Mbps or 2 Mbps.
— Cannot penetrate walls.
+ 802.11 FHSS (Frequence Hopping Spread Spectrum)
— 79 channels, each 1 Mhz wide at low end of 2.4 GHz ISM band.
— Same pseudo-random number generator used by all stations.
— Dwell time: min. time on channel before hopping (400msec).
Wireless Physical Layer
802.11 DSSS (Direct Sequence Spread Spectrum)
— Spreads signal over entire spectrum using pseudo-random sequence
(similar to CDMA see Tanenbaum sec. 2.6.2).
— Each bit transmitted as 11 chips (Barker seq.), PSK at 1Mbaud.
— 1 or2 Mbps.
802.11a OFDM (Orthogonal Frequency Divisional
Multiplexing)
— Compatible with European HiperLan2.
— 54Mbps in wider 5.5 GHz band > transmission range is limited.
— Uses 52 FDM channels (48 for data; 4 for synchronization).
— Encoding is complex ( PSM up to 18 Mbps and QAM above this
capacity).
— E.g., at 54Mbps 216 data bits encoded into into 288-bit symbols.
— More difficulty penetrating walls.
Wireless Physical Layer
« 802.11b HR-DSSS (High Rate Direct Sequence
Spread Spectrum)
—1la and 11b shows a split in the standards
committee.
— 11b approved and hit the market before 11a.
— Up to 11 Mbps in 2.4 GHz band using 11 million
chips/sec.
— Note in this bandwidth all these protocols have to
deal with interference from microwave ovens,
cordless phones and garage door openers.
— Range is 7 times greater than 11a.
— 11b and 11a are incompatible!!
Wireless Physical Layer
+ 802.11g OFDM(Orthogonal Frequency Division
Multiplexing)
— Supports 54 Mbps.
— Uses 2.4 GHz frequency for greater range.
Physical Layer
Table 15.4 Specifications
IEEE Technique Band aun Rate (Mbps)
802.11 FHSS 2.400-4.835 GHz land 2
DSSS 2.400.835 GHz PK fra |
None Infrared 1 and 2
802.11a OFDM 5.725-5.850 GHz ee or QAM 6 to 54
80211b | DSSS 2400-4835 GHz |PSK |SSandil
802118 | OFDM 2400-4835 GHz | Different 22 and 54
802.1In | OFDM 3.725-5.850 GHz | Different 600
IEEE 802.11 FHSS uses the frequency-hopping spread spectrum (FHSS) method. FHSS uses the 2.4-GHz ISM band. The
band is divided into 79 subbands of 1 MHz (and some guard bands). A pseudorandom number generator selects the hopping
sequence. The modulation technique in this specification is either two-level FSK or four-level FSK with I or 2 bits/baud,
which results in a data rate of 1 or 2 Mbps.
IEEE 802.11 DSSS
IEEE 802.11 DSSS uses the direct sequence spread spectrum (DSSS) method. DSSS uses the 2.4-GHz ISM band. The
modulation technique in this specification is PSK at 1 Mbaud/s. The system allows 1 or 2 bits/baud (BPSK or QPSK), which
results in a data rate of 1 or 2 Mbps.
IEEE 802.11 Infrared
TEEE 802.11 infrared uses infrared light in the range of 800 to 950 nm. The modulation technique is called pulse position
modulation (PPM). For a I-Mbps data rate, a 4-bit sequence is first mapped into a 16-bit sequence in which only one bit is set
to 1 and the rest are set to O. For a 2-Mbps data rate, a 2-bit sequence is first mapped into a 4-bit sequence in which only one
bit is set to 1 and the rest are set to O. The mapped sequences are then converted to optical signals; the presence of light
specifies 1, the absence of light specifies O.
IEEE 802.lla OFDM
IEEE 802.Ila OFDM describes the orthogonal frequency-division multiplexing (OFDM) method for signal generation in a 5-
GHz ISM band. OFDM is similar to FDM as discussed in Chapter 6, with one major difference: All the subbands are used by
one source at a given time. Sources contend with one another at the data link layer for access. The band is divided into 52
ubbands, with 48 subbands for sending 48 groups of bits at a time and 4 subbands for control information. The scheme is
imilar to ADSL, as discussed in Chapter 9. Dividing the band into subbands diminishes the effects of interference. If the
ubbands are used randomly, security can also be increased. OFDM uses PSK and QAM for modulation. The common data
rates are 18 Mbps (PSK) and 54 Mbps (QAM).
IEEE 802.llb DSSS
IEEE 802.11 b DSSS describes the high-rate direct sequence spread spectrum (HRDSSS) method for signal generation in the
2.4-GHz ISM band. HR-DSSS is similar to DSSS except for the encoding method, which is called complementary code
keying (CCK). CCK encodes 4 or 8 bits to one CCK symbol. To be backward compatible with DSSS, HR-DSSS defines four
data rates: 1,2, 5.5, and 11 Mbps. The first two use the same modulation techniques as DSSS. The 5.5-Mbps version uses
BPSK and transmits at 1.375 Mbaud/s with 4-bit CCK encoding. The II-Mbps version uses QPSK and transmits at 1.375
Mbps with 8-bit CCK encoding.
Physical-Layer Architecture
The physical layer is divided into two sub-layers:
+ the Physical Layer Convergence Procedure (PLCP) sub-
layer.
+ the Physical Medium Dependent (PMD) sub-layer.
Frequency-hopping (FH) spread-spectrum
radio PHY Frame format
% PLCP Preamble
the preamble synchronizes the transmitter and receive, In the
802.11 FH PHY, the Preamble is composed of the Sync field and
the Start Frame Delimiter field.
Synch:
a sequence of 80 bits altering 0 and 1, used by the physical circuits to
select the correct antenna (if more than one are in use), and correct
offsets of frequency and synchronization.
Start Frame Delimiter (SFD)
start frame delimiter consists of a pattern of 16 bits: 0000 1100 1011
1101, used to define the beginning of the frame.
+ PLCP Header
The Physical Layer Convergence Protocol (PLCP) header is always
transmitted at 1 Mbps and carries some logical information used by
the physical layer to decode the frame
PLCP Length Word (PLW)
The first field in the PLCP header is the PLW. The payload of the PLCP frame is a MAC frame
that may be up to 4,095 bytes long. The 12-bit length field informs the receiver of the length of
the MAC frame that follows the PLCP header.
PLCP Signaling (PSF)
4-bit ,Bit 0 the first bit transmitted, is reserved and set to 0. Bits 1-3 encode the speed at which
the payload MAC frame is transmitted. Several speeds are available, so this field allows the
receiver to adjust to the appropriate demodulation scheme. Although the standard allows for
data rates in increments of 500 kbps from 1.0 Mbps to 4.5 Mbps, the modulation scheme has
been defined only for 1.0 Mbps and 2.0 Mbps.
Header Error Check (HEC)
To protect against errors in the PLCP header, a 16-bit CRC is calculated over the contents of
the header and placed in this field. The header does not protect against errors in other parts