Beruflich Dokumente
Kultur Dokumente
ECE 477
Spring 2016
Lecture 3, Page 2 of 20
Lecture 3, Page 3 of 20
Lecture 3, Page 4 of 20
Ad Hoc Networking
A peer-to-peer network.
- No centralized controller.
In "ad hoc networks" devices talk to whatever other devices they
can talk to.
- From a dictionary: Ad hoc = Formed for or concerned with
one specific purpose (usually also considered temporary).
- Networks of devices that are all peers and talk to whoever is near
enough.
- Examples:
- A set of computers that talk to each other during a meeting.
- Devices that share files, e-mails, calendars, etc. when in range.
- As devices move, they change their connections with other
devices.
- May send data through a sequence of neighbors to reach an end
destination.
Wireless LAN Requirements
Throughput
Make as efficient use as possible of the wireless medium.
Provide data rates fast enough to not hinder users.
- Make the network invisible.
Lecture 3, Page 5 of 20
Number of nodes
May need to support hundreds of nodes across multiple cells.
Difficult scenarios:
Many users in a lecture halls, several
smartphones watching videos.
Connection to a backbone LAN to the Internet
Service area
Diameter of 100 to 300 meters
Battery power consumption
Do not require battery-powered workstations to constantly transmit.
- No constant monitoring of CMs.
- No frequent handshakes or keepalives.
Allow workstations to not use transmission power when not using
the network.
Transmission robustness and security
Prevent problems with interference.
Prevent eavesdropping and many other possible security problems.
Since operated by end-users, make configuration easy.
- So that users do not inadvertently leave security features turned
off.
Collocated network operation
Allow two or more WLANs to operate in the same area.
License-free operation
Do not need to buy licenses to operate.
Handoff/roaming
Enable mobile stations to move from one cell to another.
Dynamic configuration
Permit addition, deletion, and relocation of end systems.
In a dynamic or automatic way.
Without disruption to end users.
Lecture 3, Page 6 of 20
Lecture 3, Page 7 of 20
http://www.ieee802.org/dots.shtml
Lecture 3, Page 8 of 20
Architecture
Defines layering of protocols that organize basic functions.
Open Standards Interconnection Model (OSI)
Developed by the International Organization for Standardization
(ISO)
Lecture 3, Page 10 of 20
Another view
The IEEE standards focus on the lower layers and subdivide them.
Lecture 3, Page 11 of 20
Layers
Physical Layer
General functions
- Encoding/decoding of data into signals to be sent over a wireless
medium through an antenna.
- Preemble generation/removal
- Beginning and ending bits added for synchronization
purposes.
- Bit transmission/reception
Physical medium dependent functionality
- Specifics of infrared, spread spectrum, etc.
Medium Access Control
Assembles groups of data bits into frames
Also includes addresses, error correction fields, etc.
Upon reception, disassembles the frame, and checks for errors.
Governs how stations get access to the medium.
- Two options
- Random access anyone can transmit at any time, but if
collisions occur they must try again in prescribed ways.
- Controlled access Give stations particular frequencies, time
slots, etc.
Logical Link Control
Provides interfaces to the network layer.
Performs flow control
- Makes sure a transmitting entity does not overwhelm a receiving
entity with data.
- Typically allocates data buffers.
- So data is not lost while a station is processing other packets.
- And makes sources adjust sending rates.
Performs error control
- Corrects errors
- Or has frames retransmitted
Lecture 3, Page 12 of 20
Encapsulation
As data is passed down the protocol stack, each layer may add its
own information.
- To the header and maybe the trailer of the packet.
________
Layer.
- TCP is used for data, others are used for audio/video.
Lecture 3, Page 13 of 20
Lecture 3, Page 14 of 20
Date
Scope
Medium access control (MAC): One common MAC for WLAN
applications
IEEE 802.11
1997
IEEE 802.11a
1999
IEEE 802.11b
1999
IEEE 802.11c
2003
IEEE 802.11d
2001
IEEE 802.11e
2007
IEEE 802.11f
2003
IEEE 802.11g
2003
2003
IEEE 802.11h
Lecture 3, Page 15 of 20
IEEE 802.11i
2007
IEEE 802.11j
2007
IEEE 802.11k
2008
IEEE 802.11m
Ongoing
IEEE 802.11n
2009
IEEE 802.11p
2010
IEEE 802.11r
2008
IEEE 802.11s
2011
Mesh Networking
IEEE 802.11T
Abandoned
IEEE 802.11u
2011
IEEE 802.11v
2011
IEEE 802.11w
2009
IEEE 802.11y
2008
IEEE 802.11z
2010
IEEE 802.11aa
2012
IEEE 802.11ac
Ongoing
IEEE 802.11ad
2012
IEEE 802.11ae
2012
IEEE 802.11af
Ongoing
IEEE 802.11ah
Ongoing
IEEE 802.11ai
Ongoing
IEEE 802.11aj
Ongoing
IEEE 802.11ak
Ongoing
IEEE 802.11aq
Ongoing
IEEE 802.11ax
Ongoing
IEEE 802.11ay
Ongoing
IEEE 802.11az
Ongoing
Lecture 3, Page 16 of 20
The latest list of active groups is available from the 802.11 web site
http://www.ieee802.org/11/QuickGuide_IEEE_802_WG_and_Activities.htm
Lecture 3, Page 17 of 20
________
__________
__________
_______________
Any entity that has station functionality and provides access to the
distribution system via the wireless medium for associated stations
Coordination function
The unit of data exchanged between two peer MAC entities using
the services of the physical layer
Station
Provider
Used to support
Association
Distribution system
MSDU delivery
Authentication
Station
Deauthentication
Station
Disassociation
Distribution system
MSDU delivery
Distribution
Distribution system
MSDU delivery
Integration
Distribution system
MSDU delivery
MSDU delivery
Station
MSDU delivery
Privacy
Station
Reassocation
Distribution system
MSDU delivery
____________
Lecture 3, Page 19 of 20