Advantages and Disadvantages of IR LAN and Radio Transmissions IEEE802.11 Architecture and Services, Bluetooth Architecture , Bluetooth Security, Bluetooth Protocols. Infrared Infrared systems (IR systems) are simple in design and therefore inexpensive. They use the same signal frequencies used on fiber optic links. IR systems detect only the amplitude of the signal and so interference is greatly reduced. These systems are not bandwidth limited and thus can achieve transmission speeds greater than the other systems. Infrared transmission operates in the light spectrum and does not require a license from the FCC to operate. Wireless LAN technology is based on IEEE 802.11 standard. Its predecessor the IEEE 802.3, commonly referred to as the Ethernet, is the most widely deployed member of the family. IEEE 802.11 is commonly referred to as wireless Ethernet because of its close similarity with the IEEE 802.3. Like IEEE 802.3, it also defines only two bottom levels of ISO’s open system Interconnection (OSI) model As it shares the upper layers with other LAN standards, it is relatively easy to bridge the IEEE 802.11 wireless LANs to other IEEE 802.11 wired LANs to form an extended interconnected wired and wireless LAN network. IEEE 802.11 networks consist of four major components : Stations: Stations are computing devices with wireless network interfaces. Typically, stations are battery- operated laptop or handheld pocket PCs. Access points: Frames on an 802.11 network must be converted to another type of frame for delivery to a wired network. Devices called access points (AP) perform the wireless to-wired bridging function. Wireless medium: To move frames from station to station, the standard uses a wireless medium. Typical WLANs utilize an RF physical layer. Distribution system : When several APs are connected to form a large coverage area, they must communicate with each other to handle the movements of mobile stations. The distribution system (DS) is the logical component of 802.11 used to forward frames to their destination. Usually, the DS is implemented as a combination of a bridging engine and a distribution system medium, which is the backbone network used to relay frames between APs. In most cases, Ethernet is used as the backbone network technology. Most APs operate as bridges. They have at least one wireless network interface and at least one Ethernet network interface. The Ethernet side can be connected to an existing network, and the wireless side becomes an extension of that network. IEEE 802.11 standard defines two kinds of services: The Basic Service Set (BSS) Extended Service Set (ESS) [ The BSS is the basic building block of a wireless LAN. A BSS consists of stationary or mobile wireless stations and possibly a central base station (e.g., an AP). When a station is in the BSS, it can communicate with the other members of the BSS. The BSS without an AP is a stand-alone network and cannot send data to other BSSs. Such BSSs are called Independent BSSs (IBSS). Typically, IBSSs involve a small number of stations set up for a specific purpose and for a short period of time (e.g.,creating a short-lived network to support a single meeting in a conference room). IBSSs are also referred to as ad hoc networks. Infrastructure BSSs are distinguished from ad hoc networks by the use of an AP. APs are used for all communications in an infrastructure BSS, including communication between mobile nodes in the same service set. An infrastructure BSS is bounded by the coverage distance from the AP. The coverage area of a single AP is called acell. All mobile stations are required to be within reach of the AP. 802.11 allows wireless networks of arbitrarily large size to be created by linking BSSs into an ESS. An ESS is created by chaining BSSs together with a backbone network. All the Aps in an ESS are given the same Service Set Identier (SSID), which serves as a network name for its users. APs in an ESS operate in a manner such that the outside world can use the station's MAC address to talk to a station without worrying about its location in the ESS. Figure 4 shows three BSSs corresponding to three APs. There is an equal level of overlap between BSS 1 and BSS 2, and between BSS 2 and BSS 3. Such overlap is necessary to provide stations with seamless connectivity if they move from one BSS to another. In the figure, the router uses the station's MAC address as the destination to deliver frames to a station; only the AP with which that station is associated delivers the frame. Usually, mobility support is the primary motivation for deploying an 802.11 network. IEEE 802.11 allows mobility between BSSs at the link layer. However, it is not aware of anything that happens above the link layer. When stations move between BSSs, they will find and attempt to associate with an AP with the strongest signal and the least network traffic. This way, a mobile station can transition seamlessly from one AP in the network to another, without losing connectivity. This event is often referred to as roaming. IEEE 802.11 Framing Frame control: The frame control is 2 bytes long and defines the type of the frame and control information. The subfields in the frame control field are as follows: Protocol version: Indicates which version of 802.11 MAC is contained in the rest of the frame. Only one version of the 802.11 MAC has been developed: it has been assigned a protocol number of 0. Type: Defines the type of information carried in the frame body: management (00), control (01), or data (10). Subtype: Defines the subtype of each management, control, or data frame. ToDS: This bit is set to 1 if the frame was sent to the DS. FromDS: This bit is set to 1 if the frame was sent from the DS. More fragments: When a higher-level packet has been fragmented by the MAC, the initial fragment and any following non-final fragments set this bit to 1. Retry: The retry bit is set to 1 if the current packet is a retransmission of a previous attempt. This aids the receiving station in eliminating duplicate packets. Power management: To conserve battery life, many small devices have the ability to power down parts of the network interface. A 1 indicates that the station will be in powersave mode, and 0 indicates that the station will be active. WEP: The Wired Equivalent Privacy (WEP) bit is set to 1 if the payload of the packet has been encrypted using the WEP algorithm. Order: Frames and fragments can be transmitted in any order by both the receiv-ing and sending stations. The bit is set to 1 when the packets must be strictly ordered. Duration ID: The duration field is used to set the Network Allocation Vector (NAV). NAV is used for carrier sensing. The value represents the number of microseconds that the medium is expected to remain busy for the transmission currently in progress. Address fields :There are four address elds, each 6 bytes long. The meaning of each address field depends on the value of the ToDS and the FromDS subfields as shown in Table 2. Address 1 is the address of the receiver of the frame. Address 2 is the transmitter address. Address 3 is the final destination station if it is not defined by Address 1. Address 4 is the address of the original source station if it is not the same as Address 2. Sequence control: The sequence control field is composed of a 4-bit fragment number and a 12-bit sequence number. This field is used for defragmentation and discarding duplicate frames. Higher-level frames are each given a sequence number as they are passed to the MAC layer for transmission. Frame body : The frame body moves the higher-layer payload from station to station. 802.11 can transmit frames with a maximum payload of 2304 bytes of data. Frame check sequence Similar to Ethernet, the 802.11 frame ends with a Frame Check Sequence (FCS), also known as Cyclic Redundancy Check (CRC). The FCS allows stations to check the integrity of received frames. IEEE 802.11 Services IEEE 802.11 defines nine services that need to be provided by the wireless LAN to provide functionality 1. The service provider can be either the station or the distribution system (DS). Station services are implemented in every 802.11 station, including access point (AP) stations. Distribition services are provided between basic service sets (BSSs); these services may be implemented in an AP. 2. Three of the services are used to control IEEE 802.11 LAN access and confidentiality. Six of the services are used to support delivery of MAC service data units (MSDUs) between stations. The MSDU is a the block of data passeddown from the MAC user to the MAC layer; If the MSDU is too large to be transmitted in a single MAC frame, it may befragmented and transmitted in a series of MAC frames. Distribution : It is the primary service used by stations to exchange MAC frames when the frame must traverse the DS to get from a station in one BSS to a station in another BSS. For example, suppose a frame is to be sent from station 2 (STA 2) to STA 7 . The frame is sent from STA 2 to STA 1, which is the AP for this BSS. The AP gives the frame to the DS, which has the job of directing the frame to the AP associated with STA 5 in the target BSS.STA 5 receives the frame and forwards it to STA 7. If the two stations that are communicating are within the same BSS, then the distribution service logically goes through the single AP of that BSS. The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN. The term integrated refers to a wired LAN that is physically connected to the DS and whose stations may be logically connected to an IEEE 802.11 LAN via the integration service. To deliver a message within a DS, the distribution service needs to know where the destination station is located. To meet this requirement, a station must maintain an association with the AP within its current BSS. Three services relate to this requirement: • Association: Establishes an initial association between a station and an AP. Before a station can transmit or receive frames on a wireless LAN, its identity and address must be known. For this purpose, a station must establish an association with an AP within a particular BSS. The AP can then communicate this information to other APs within the ESS to facilitate routing and delivery of addressed frames. • Reassociation: Enables an established association to be transferred from oneAP to another, allowing a mobile station to move from one BSS to another. Disassociation: A notification from either a station or an AP that an existing association is terminated. A station should give this notification before leaving an ESS or shutting down. Access and Privacy Services • Authentication: Used to establish the identity of stations to each other. IEEE 802.11 supports several authentication schemes and allows for expansion of the functionality of these schemes. The standard does not mandate any particular authentication scheme, which could range from relatively unsecure handshaking to public-key encryption schemes. • Deathentication: This service is invoked whenever an existing authentication is to be terminated. • Privacy: Used to prevent the contents of messages from being read by other than the intended recipient. The standard provides for the optional use of encryption to assure privacy. The algorithm specified in the standard is WEP, The lower sublayer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. Distributed Coordination Function The DCF sublayer makes use of a simple CSMA (carrier sense multiple access) algorithm. If a station has a MAC frame to transmit, it listens to the medium.If the medium is idle, the station may transmit; otherwise the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision detection function (i.e., CSMA/CD) because collision detection is not practical on a wireless network. • SIFS (short IFS): The shortest IFS, used for all immediate response actions. • PIFS (point coordination function IFS): A midlength IFS, used by the centralized controller in the PCF scheme when issuing polls • DIFS (distributed coordination function IFS): The longest IFS, used as a minimum delay for asynchronous frames contending for access Point Coordination Function PCF is an alternative access method implemented on top of the DCF. The operation consists of polling by the centralized polling master (point coordinator). A wireless network is configured so that a number of stations with time-sensitive traffic are controlled by the point coordinator while remaining traffic contends for access using CSMA. The point coordinator could issue polls in a round-robin fashion to all stations configured for polling. When a poll is issued, the polled station may respond using SIFS. If the point coordinator receives a response, it issues another poll using PIFS.If no response is received during the expected turnaround time, the coordinator issues a poll. Bluetooth What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPAN), commonly referred to as ad hoc or peer-to-peer (P2P) networks. Bluetooth is a low-cost, low-power technology that provides a mechanism for creating small wireless networks on an ad hoc basis Where we can find it? Bluetooth technology has been integrated into many types of business and consumer devices,including: Cellular phones Personal digital assistants (PDA) Laptops Automobiles Printers Headsets This allows users to form ad hoc networks between a wide variety of devices to transfer voice and data. Why do we need Bluetooth (keybenefits of Bluetooth technology are): Cable replacement. Ease of file sharing. Wireless synchronization. Internet connectivity. There are two types of topology for Bluetooth – Piconet Scatternet. The Piconet is a small ad hoc network of devices (normally 8 stations) It has the following features:
One is called Master and the others are called Slaves
All slave stations synchronizes their clocks with the master
Possible communication - One-to-one or one-to-many
There may be one station in parked state
Each piconet has a unique hopping pattern/ID
Each master can connect to 7 simultaneous or 200+ inactive
(parked) slaves per piconet Scatternet is formed by combining several Piconets. Multiple piconets with overlapping coverage areas form a scatternet. Each piconet may have only one master, but slaves may participate in different piconets Key features of the scatternet topology are mentioned below: A Scatternet is the linking of multiple co-located piconets through the sharing of common master or slave devices.
A device can be both a master and a slave.
Radios are symmetric (same radio can be master or slave).
High capacity system, each piconet has maximum capacity
(720 Kbps) Bluetooth Architecture Layer 1: Radio Layer This is the lowest layer in the Bluetooth protocol stack. Bluetooth uses a technique called frequency hopping in establishing radio links with other Bluetooth devices. Suppose we have a data packet then the whole packet is never transmitted at the same frequency. It is always split into different parts and transmitted at different frequencies. This is the frequency hopping technique This partly gives the necessary protection to the transmitted data and avoids tampering. Standard hop values are 79 hops, which are spaced at an interval of 1 MHz. Layer 2: Baseband Layer The baseband is the digital engine of a Bluetooth system. It is responsible for constructing and decoding packets encoding and managing error correction encrypting and decrypting for secure communications calculating radio transmission frequency patterns maintaining synchronization, controlling the radio all of the other low level details necessary to realize Bluetooth communications. Bluetooth operates in the 2.4 GHz ISM band. In the US and Europe, a band of 83.5 MHz width is available; in this band, 79 RF channels spaced 1 MHz apart are defined. Layer 3: Link Manager Protocol The Link Manager is responsible for managing the physical details for Bluetooth connections. The Link Manager carries out link setup, authentication, link configuration and other protocols. It discovers other remote LM’s and communicates with them via the Link Manager Protocol (LMP). To perform its service provider role, the LM uses the services of the underlying Link Controller (LC). Layer 4: Host Controller Interface This is the layer of the stack that contains the firmware i.e. the software that actually controls all the activities happening in the Baseband and Radio layers. It provides a common interface between the Bluetooth host and a Bluetooth module. It manages the hardware links with the scatternets. Logical Link Control and Adaptation Protocol The Logical Link Control and Adaptation Layer Protocol (L2CAP) is layered over the Baseband Protocol and resides in the data link layer. It manages the high level aspects of each connection (who is connected to who, whether to use encryption or not, what level of performance is required, etc.). In addition it is responsible for converting the format of data as necessary between the APIs and the lower level Bluetooth protocols. The L2CAP is implemented in software and can execute either on the host system processor or on a local processor in the Bluetooth system. L2CAP provides connection oriented and connectionless data services to upper layer protocols. L2CAP permits higher-level protocols and applications to transmit and receive L2CAP data packets up to 64 kilobytes in length. Two link types are supported for the Baseband layer: Synchronous Connection-Oriented (SCO) links and Asynchronous Connection-Less (ACL) links. SCO links support real-time voice traffic using reserved bandwidth. ACL links support best effort traffic.