bjpraveena.files.wordpress.com  · web view->bluetooth is a wireless lan technology designed to...

54
UNIT - V Bluetooth: ->Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers (desktop and laptop), cameras, printers, coffee makers, and so on. ->Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously; the devices, sometimes called gadgets, find each other and make a network called a piconet. ->Bluetooth LAN network cannot be large. If there are many gadgets that try to connect, there is chaos. Applications: i) Peripheral devices such as a wireless mouse or keyboard can communicate with the computer through this technology. ii) Monitoring devices can communicate with sensor devices in a small health care center. iii) Home security devices can use this technology to connect different sensors to the main security controller. iv) Conference attendees can synchronize their laptop computers at a conference. ->Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard which defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall. Architecture: -> Bluetooth defines two types of networks: i) piconet ii)scatternet i) Piconet: -> A piconet can have up to eight stations, one of which is called the primary and the rest are called secondaries.

Upload: others

Post on 18-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

UNIT - V

Bluetooth:->Bluetooth is a wireless LAN technology designed to connect devices of different functionssuch as telephones, notebooks, computers (desktop and laptop), cameras, printers,coffee makers, and so on.->Bluetooth LAN is an ad hoc network, which means that thenetwork is formed spontaneously; the devices, sometimes called gadgets, find eachother and make a network called a piconet.->Bluetooth LAN network cannot be large. If there are many gadgets that try to connect, there is chaos.

Applications:i) Peripheral devices such as a wirelessmouse or keyboard can communicate with the computer through this technology.ii) Monitoring devices can communicate with sensor devices in a small health care center.iii) Home security devices can use this technology to connect different sensors to the main security controller.iv) Conference attendees can synchronize their laptop computers at a conference.

->Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard which defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall.

Architecture:-> Bluetooth defines two types of networks: i) piconet ii)scatternet

i) Piconet:-> A piconet can have up to eight stations, one of which is called the primary and the rest are called secondaries.-> All the secondary stations synchronize their clocks with primary.-> piconet can have only one primary station.-> communication between the primary and the secondary can be one-to-one or one-to-many.

Page 2: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> Maximum number of secondaries=7 + 1 primary i.e total =8-> Additional 8 secondaries can be added in parked state.-> A secondary in a parked state is synchronized with the primary, but cannot take part in communication until it is moved from the parked state.(only eight stations can be active in a piconet)

ii) Scatternet:-> Piconets can be combined to form a scatternet.-> Secondary station in one piconet can be the primary in another piconet.-> This station can receive messages from the primary in the first piconet (as a secondary) and, acting as a primary, deliver them to secondaries in the second piconet.

Bluetooth Devices:-> Bluetooth device has a built-in short-range radio transmitter.-> current data rate is 1 Mbps with a 2.4-GHz bandwidth. -> There is a possibility of interference between the IEEE 802.11b wireless LANs and Bluetooth LANs.

Bluetooth Layers:

Page 3: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> Bluetooth uses several layers that do not exactly match those of the Internet model.

i) Radio Layer:-> It is equivalent to the physical layer of the Internet model.-> Bluetooth devices are low-power and have a range of 10 m.-> Bluetooth uses a 2.4-GHz ISM band divided into 79 channels of 1 MHz each.-> Bluetooth uses the frequency-hopping spread spectrum (FHSS) method in the physicallayer to avoid interference from other devices or other networks.-> To transform bits to a signal, Bluetooth uses a sophisticated version of FSK, calledGFSK (FSK with Gaussian bandwidth filtering.

ii) Baseband layer : -> It is equivalent to the MAC sublayer in LANs.-> access method is TDMA, The primary and secondary communicate witheach other using time slots.-> communication is only between the primary and a secondary; secondaries cannot communicate directly with one another.-> TDMA: Bluetooth uses a form of TDMA that is called TDD-TDMA (timedivision duplex TDMA). -> TDD-TDMA is a kind of half-duplex communication in which the secondary and receiver send and receive data, but not at the same time (halfduplex).-> communication for each direction uses different hops:(a) Single secondary communication - primary uses even slots - secondary uses odd slots(b) Multiple secondary communication

Dwell time - 625 microseconds

-> Bluetooth hops 1600 times/second , therefore each device changes its modulation frequency 1600 times/second.-> Device uses frequency for only 625 microseconds(1/1600 sec) before it hops to another frequency.

Physical links:->Two types of links can be created between a primary and a secondary:(a) SCO links (synchronous connection-oriented)(b) ACL links (asynchronous connectionless link)

Page 4: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> SCO used when avoiding delay in data delivery is more important than error free delivery(integrity).-> ACL used when integrity is more important.

Frame format:-> A frame in baseband layer can be one of three types:(i) One-slot(ii) Three-slot(iii) Five-slot-A slot is 625 microseconds

iii) L2CAP:-> Logical Link Control and Adaptation Protocol, or L2CAP (L2 here means LL).-> equivalent to the LLC sublayer in LANs.-> It is used for data exchange on an ACL link.-> L2CAP data packet format :

-> L2CAP has specific duties:(a) Multiplexing(b) Segmentation(c) Reassembly(d) QOS(quality of service)(e) Group management

WIRELESS LANs:

Page 5: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> Wireless LANs makes use of wireless transmission medium.-> Wireless LANs were less used until relatively because of high prices,low data rates,occupational safety concerns and licensing requirement.-> As these problems have been addressed popularity of wireless LANs has grown rapidly.

Applications:(a) LAN extension(b) Cross-Building Interconnect(c) Nomadic Access(d) Ad Hoc Networking

(a) LAN extension: -> Wireless LANs saves cost of cabling and eases task of relocation and other modifications to network structures.-> However, this motivation for wireless LANs was overtaken by events.(i)as awareness of the need for LANs became greater,architects designed new buildings to include extensive prewiring for data applications.(ii)with advances in data transmission technology, there is an increasing reliance on twisted pair cabling for LANs and, in particular, Category 3 and Category 5 unshielded twisted pair.(iii)Thus, the use of a wireless LAN to replace wired LANs has not happened to anygreat extent.

Page 6: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

(b) Cross-Building Interconnect : -> connect LANs in nearby buildings, be they wired or wireless LANs.-> point-to-point wireless link is used between two buildings.

(c) Nomadic Access:-> Nomadic access provides a wireless link between a LAN hub and a mobile data terminal equipped with an antenna, such as a laptop computer or notepad computer.

(d) Ad Hoc Networking:-> An ad hoc network is a peer-to-peer network (no centralized server) set up temporarily to meet some immediate need.-> For example, a group of employees, each with a laptop or palmtop computer, may convene in a conference room for a business or classroom meeting.-> The employees link their computers in a temporary network just for the duration of the meeting.

-> In number of environments,there is a role for wireless LAN as alternative to wired LAN.Example:(i) Building with large open areas such as manufacturing plants,stock exchange trading floors and warehouses.(ii) Historical buildings with insufficient twisted pair of wire and where drilling for new wiring is prohibited.(iii) Small offices where installation and maintenance of wired LANs is not economical.

Page 7: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Requirement of wireless LAN:1) Throughpu t: medium access control (MAC) protocol should make as efficient use as possible of the wireless medium to maximize capacity.2) Number Of Nodes: support hundreds of nodes across multiple cells.3) Connection to backbone LAN : For infrastructure wireless LANs, this is easily accomplished through the use of control modules that connect to both types of LANs.4) Service Area: A typical coverage area for a wireless LAN has a diameter of 100 to 300 m.5) Battery Power Consumption: Mobile workers use battery-powered workstations that need to have a long battery life when used with wireless adapters.Typical wireless LAN implementations have features to reduce power consumption while not using the network, such as a sleep mode.6) Transmission robustness and security : design of a wireless LAN must permit reliable transmission even in a noisy environment and should provide some level of security from eavesdropping.7) Collocated network operation: when two or more wireless LANs to operate in the same area or in some area where interference between the LANs is possible. Such interference may disturb the normal operation of a MAC algorithm and may allow unauthorized access to a particular LAN.8) License-free operation : Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN.9) Handoff/roaming : The MAC protocol used in the wireless LAN should enable mobile stations to move from one cell to another.10) Dynamic configuration : The MAC addressing and network management aspects of the LAN should permit dynamic and automated addition, deletion, and relocation of end systems without disruption to other users.

Wireless LAN technology:-> Wireless LANs are generally categorized according to the transmission technique that is used.(i) Infrared LANs (IR LANs): -> An individual cell of an IR LAN is limited to a single room, because infrared light does not penetrate opaque walls.-> Optical wireless communication in the infrared portion of the spectrum is commonplace in most homes, where it is used for a variety of remote control devices.Strengths and weakness:-> The two competing transmission media for wireless LANs are microwave radio using either spread spectrum or narrow band transmission,infrared.(a) spectrum for infrared is virtually unlimited, which presents the possibility of achieving extremely high data rates. The infrared spectrum is unregulated worldwide.(b) infrared shares some properties of visible light that make it attractive for certain types of LAN configurations.-> Infrared light is diffusely reflected by light-colored objects; thus it is possible to use ceiling reflection to achieve coverage of an entire room. -> Infrared light does not penetrate walls or other opaque objects.This has two advantages:1) infrared communications can be more easily secured against eavesdropping than microwave.2) separate infrared installation can be operated in every room in a building without interference, enabling the construction of very large infrared LANs.

-> infrared equipment is relatively inexpensive and simple.

Page 8: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> Infrared data transmission typically uses intensity modulation, so that IR receivers need to detect only the amplitude of optical signals, whereas most microwave receivers must detect frequency or phase.

Transmission Techniques:1) Directed-beam IR: ->used to create point-to-point links.->range depends on the emitted power and on the degree of focusing.( remote TV control)2) Omnidirectional configuration: -> involves a single base station that is within ine of sight of all other stations on the LAN.-> this station is mounted on the ceiling.3) Diffused configuration: -> all of the IR transmitters are focused and aimed at a point on a diffusely reflecting ceiling. IR radiation striking the ceiling is reradiated omnidirectionally and picked up by all of the receivers in the area.

(ii) Spread Spectrum LANs:-> This type of LAN makes use of spread spectrum transmission technology.-> Except for quite small offices, a spread spectrum wireless LAN makes use of a multiple-cell arrangement.-> Adjacent cells make use of different center frequencies within the same band to avoid interference.-> Within a given cell, the topology can be either hub or peer to peer.-> Regardless of access control mechanism,each station may broadcast using an omnidirectional antenna so that all other stations in cell may receive.-> A peer-to-peer topology is one in which there is no hub. CSMA is used to control access.-> appropriate for ad hoc LANs.-> Wireless LAN can be usable without having to go through a licensing procedure.

(iii) Narrowband Microwave LANs:-> Narrowband microwave refers to the use of microwave radio frequency band for signal transmission,with relatively narrow bandwidth -> just wide to accomodate signal.-> Licensed Narrowband RF Unlicensed Narrowband RF

IEEE 802.11

-> IEEE has defined specifications for wireless LAN,called IEEE 802.11,which covers physical and data link layers.

Architecture:-> Std. Define 2 services:(i) Basic service set (BSS)(ii) Extended service set (ESS)

(i) BSS:

Page 9: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> It is made of stationary or mobile wireless stations and optional central base station called Access point (AP).

-> BSS without AP,is stored-alone network and cannot send data to other BSSs.-> It is called an ad hoc architecture.-> BSS with an AP is an infrastructure network.

(ii) ESS:-> It is made up of two or more BSSs with APs.-> In this case, the BSSs are connected through a distribution system, which is usually a wiredLAN.-> distribution system connects the APs in the BSSs.

-> distribution system can be any IEEE LAN such as an Ethernet.-> ESS uses 2 types of stations: - mobile (normal station inside BSS) - stationary (AP stations that are part of wired LAN)-> Communication between 2 stations in 2 different BSSs usually occurs via 2 APs.

Station Types:

Page 10: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

-> three types of stations according to IEEE 802.11 based on their mobility in a wireless LAN:(a) No Transition: -> Station with no transition mobility is either stationary or moving inside BSS.(b) BSS Transition:-> Move from 1 BSS to another BSS inside 1 BSS.(c) ESS transition mobility:-> Move from 1 BSS to another.

IEEE 802.11 Services:

Service Provider Category

Association Distribution system

MSDU delivery

Authentication Station LAN access and security

Deauthentication Station LAN access and security

Dissassociation Distribution system

MSDU delivery

Distribution Distribution system

MSDU delivery

Page 11: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Integration Distribution system

MSDU delivery

MSDU delivery Station MSDU delivery

Privacy Station LAN access and security

Reassocation Distribution system

MSDU delivery

Categorizing Services:

• Station services implemented in every 802.11 station — Including AP stations • Distribution services provided between BSSs — May be implemented in AP or special-purpose device • Three services used to control access and confidentiality • Six services used to support delivery of MAC service data units (MSDUs) between stations — Block of data passed down from MAC user to MAC layer — Typically LLC PDU — If MSDU too large for MAC frame, fragment and transmit in series of frames (see later)

Distribution of Messages Within a DS:

Page 12: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

• Distribution is primary service used by stations to exchange MAC frames when frame must traverse DS

— From station in one BSS to station in another BSS — Transport of message through DS is beyond scope of 802.11— If stations within same BSS, distribution service logically goes through single AP of that

BSS• Integration service enables transfer of data between station on 802.11 LAN and one on an

integrated 802.x LAN — Integrated refers to wired LAN physically connected to DS • Stations may be logically connected to 802.11 LAN via integration service — Integration service takes care of address translation and media conversion

Association Related Services:

• Purpose of MAC layer transfer MSDUs between MAC entities • Fulfilled by distribution service (DS)• DS requires information about stations within ESS — Provided by association-related services — Station must be associated before communicating• Three transition types of based on mobility— No transition: Stationary or moves within range of single BSS— BSS transition: From one BSS to another within same ESS • Requires addressing capability be able to recognize new location• ESS transition: From BSS in one ESS to BSS in another ESS — Only supported in sense that the station can move — Maintenance of upper-layer connections not guaranteed — Disruption of service likely

Station Location:

• DS needs to know where destination station is — Identity of AP to which message should be delivered — Station must maintain association with AP within current BSS • Three services relate to this requirement: — Association: Establishes initial association between station and AP

Page 13: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

• To make identity and address known • Station must establish association with AP within particular BSS • AP then communicates information to other APs within ESS — Reassociation: Transfer established association to another AP • Allows station to move from one BSS to another— Disassociation: From either station or AP that association is terminated — Given before station leaves ESS or shuts• MAC management facility protects itself against stations that disappear without

notification

Access and Privacy Services – Authentication:

• On wireless LAN, any station within radio range other devices can transmit • Any station within radio range can receive • Authentication: Used to establish identity of stations to each other — Wired LANs assume access to physical connection conveys authority to connect to LAN — Not valid assumption for wireless LANs• Connectivity achieved by having properly tuned antenna — Authentication service used to establish station identity — 802.11 supports several authentication schemes • Allows expansion of these schemes — Does not mandate any particular scheme — Range from relatively insecure handshaking to public-key encryption schemes — 802.11 requires mutually acceptable, successful authentication before association• Deauthentication: Invoked whenever an existing authentication is to be terminated• Privacy: Used to prevent messages being read by others

802.11 provides for optional use of encryptionMedium Access Control:

• MAC layer covers three functional areas • Reliable data delivery • Access control • Security— Beyond our scope

Page 14: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Reliable Data Delivery:

• 802.11 physical and MAC layers subject to unreliability • Noise, interference, and other propagation effects result in loss of frames • Even with error-correction codes, frames may not successfully be received • Can be dealt with at a higher layer, such as TCP — However, retransmission timers at higher layers typically order of seconds — More efficient to deal with errors at the MAC level • 802.11 includes frame exchange protocol — Station receiving frame returns acknowledgment (ACK) frame — Exchange treated as atomic unit • Not interrupted by any other station — If noACK within short period of time, retransmit

Four Frame Exchange:

• Basic data transfer involves exchange of two frames • To further enhance reliability, four-frame exchange may be used — Source issues a Request to Send (RTS) frame to destination — Destination responds with Clear to Send (CTS) — After receiving CTS, source transmits data — Destination responds with ACK • RTS alerts all stations within range of source that exchange is under way • CTS alerts all stations within range of destination • Stations refrain from transmission to avoid collision • RTS/CTS exchange is required function of MAC but may be disabled• Distributed wireless foundation MAC (DWFMAC) — Distributed access control mechanism— Optional centralized control on top• Lower sublayer is distributed coordination function (DCF)— Contention algorithm to provide access to all traffic— Asynchronous traffic • Point coordination function (PCF)— Centralized MAC algorithm— Contention free— Built on top of DCF

Page 15: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

(a) DCF: -> DCF uses CSMAICA as the access method. Wireless LANs cannot implement CSMAfCD for three reasons:(i) For collision detection a station must be able to send data and receive collision signals at the same time.This can mean costly stations and increased bandwidth requirements.(ii) Collision may not be detected because of the hidden station problem.(iii) distance between stations can be great. Signal fading could prevent a station at one end from hearing a collision at the other end.

Distributed Coordination Function:

• DCF sublayer uses CSMA • If station has frame to transmit, it listens to medium • If medium idle, station may transmit • Otherwise must wait until current transmission complete • No collision detection — Not practical on wireless network — Dynamic range of signals very large — Transmitting station cannot distinguish incoming weak signals from noise and effects of

own transmission• DCF includes delays — Amounts to priority scheme • Interframe space

Page 16: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Interframe Space

• Single delay known as interframe space (IFS) • Using IFS, rules for CSMA:1. Station with frame senses medium • If idle, wait to see if remains idle for one IFS. If so, may transmit immediately2. If busy (either initially or becomes busy during IFS) station defers transmission • Continue to monitor until current transmission is over3. Once current transmission over, delay another IFS • If remains idle, back off random time and again sense • If medium still idle, station may transmit • During backoff time, if becomes busy, backoff timer is halted and resumes when medium

becomes idle• To ensure stability, binary exponential backoff used

IEEE 802.11 Medium Access Control Logic:

Page 17: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Priority:

• Use three values for IFS• SIFS (short IFS): — Shortest IFS — For all immediate response actions (see later) • PIFS (point coordination function IFS): — Midlength IFS — Used by the centralized controller in PCF scheme when issuing polls• DIFS (distributed coordination function IFS):

Page 18: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

— Longest IFS — Used as minimum delay for asynchronous frames contending for access

SIFS Use – ACK:

• Station using SIFS to determine transmission opportunity has highest priority — In preference to station waiting PIFS or DIFS time • SIFS used in following circumstances:• Acknowledgment (ACK): Station responds with ACK after waiting SIFS gap — No collision detection so likelihood of collisions greater than CSMA/CD • MAC-level ACK gives efficient collision recovery — SIFS provide efficient delivery of multiple frame LLC PDU • Station with multiframe LLC PDU to transmit sends out MAC frames one at a

time • Each frame acknowledged after SIFS by recipient • When source receives ACK, immediately (after SIFS) sends next frame in

sequence • Once station has contended for channel, it maintains control of all fragments sent

SIFS Use – CTS:

• Clear to Send (CTS): Station can ensure data frame will get through by issuing RTS — Destination station should immediately respond with CTS if ready to receive — All other stations hear RTS and defer • Poll response: See Point coordination Function (PCF)

PIFS and DIFS:

Page 19: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

• PIFS used by centralized controller — Issuing polls — Takes precedence over normal contention traffic — Frames using SIFS have precedence over PCF poll• DIFS used for all ordinary asynchronous traffic

IEEE 802.11 MAC Timing Basic Access Method:

Point Coordination Function (PCF):

• Alternative access method implemented on top of DCF • Polling by centralized polling master (point coordinator) • Uses PIFS when issuing polls — PIFS smaller than DIFS — Can seize medium and lock out all asynchronous traffic while it issues polls and receives

responses• E.g. wireless network configured so number of stations with time-sensitive traffic controlled by

point coordinator — Remaining traffic contends for access using CSMA • Point coordinator polls in round-robin to stations configured for polling • When poll issued, polled station may respond using SIFS • If point coordinator receives response, it issues another poll using PIFS • If no response during expected turnaround time, coordinator issues poll

Page 20: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Superframe:

• Point coordinator would lock out asynchronous traffic by issuing polls • Superframe interval defined — During first part of superframe interval, point coordinator polls round-robin to all stations

configured for polling — Point coordinator then idles for remainder of superframe — Allowing contention period for asynchronous access• At beginning of superframe, point coordinator may seize control and issue polls for given period — Time varies because of variable frame size issued by responding stations • Rest of superframe available for contention-based access • At end of superframe interval, point coordinator contends for access using PIFS • If idle, point coordinator gains immediate access — Full superframe period follows — If busy, point coordinator must wait for idle to gain access — Results in foreshortened superframe period for next cycle

IEEE 802.11 MAC Timing PCF Superframe Construction:

IEEE 802.11 MAC Frame Format:

MAC Frame Fields :

Page 21: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

• Frame Control: — Type of frame — Control, management, or data — Provides control information • Includes whether frame is to or from DS, fragmentation information, and privacy

information• Duration/Connection ID: — If used as duration field, indicates time (in ms) channel will be allocated for successful

transmission of MAC frame — In some control frames, contains association or connection identifier• Addresses: — Number and meaning of address fields depend on context — Types include source, destination, transmitting station, and receiving station• Sequence Control: — 4-bit fragment number subfield • For fragmentation and reassembly — 12-bit sequence number — Number frames between given transmitter and receiver• Frame Body: — MSDU (or a fragment of)• LLC PDU or MAC control information• Frame Check Sequence: — 32-bit cyclic redundancy check

Control Frames:

• Assist in reliable data delivery • Power Save-Poll (PS-Poll) — Sent by any station to station that includes AP — Request AP transmit frame buffered for this station while station in power-saving mode• Request to Send (RTS) — First frame in four-way frame exchange • Clear to Send (CTS) — Second frame in four-way exchange • Acknowledgment (ACK)• Contention-Free (CF)-end — Announces end of contention-free period part of PCF• CF-End + CF-Ack: — Acknowledges CF-end — Ends contention-free period and releases stations from associated restrictions

Page 22: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Data Frames – Data Carrying:

• Eight data frame subtypes, in two groups • First four carry upper-level data from source station to destination station • Data — Simplest data frame — May be used in contention or contention-free period• Data + CF-Ack — Only sent during contention-free period — Carries data and acknowledges previously received data• Data + CF-Poll — Used by point coordinator to deliver data — Also to request station send data frame it may have buffered• Data + CF-Ack + CF-Poll — Combines Data + CF-Ack and Data + CF-Poll• Remaining four data frames do not carry user data • Null Function — Carries no data, polls, or acknowledgments — Carries power management bit in frame control field to AP — Indicates station is changing to low-power state • Other three frames (CF-Ack, CF-Poll, CF-Ack + CF-Poll) same as corresponding frame in

preceding list (Data + CF-Ack, Data + CF-Poll, Data + CF-Ack + CF-Poll) but without data

Management Frames:

• Used to manage communications between stations and Aps • E.g. management of associations — Requests, response, reassociation, dissociation, and authentication

802.11 Physical Layer:

Page 23: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

• Issued in four stages • First part in 1997 — IEEE 802.11 — Includes MAC layer and three physical layer specifications — Two in 2.4-GHz band and one infrared — All operating at 1 and 2 Mbps • Two additional parts in 1999 — IEEE 802.11a • 5-GHz band up to 54 Mbps — IEEE 802.11b • 2.4-GHz band at 5.5 and 11 Mbps • Most recent in 2002 — IEEE 802.g extends IEEE 802.11b to higher data rates

Original 802.11 Physical Layer - DSSS Process Flowchart:

• Three physical media • Direct-sequence spread spectrum — 2.4 GHz ISM band at 1 Mbps and 2 Mbps — Up to seven channels, each 1 Mbps or 2 Mbps, can be used — Depends on bandwidth allocated by various national regulations• 13 in most European countries • One in Japan

Page 24: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

— Each channel bandwidth 5 MHz — Encoding scheme DBPSK for 1-Mbps and DQPSK for 2-Mbps

Original 802.11 Physical Layer – FHSS:

• Frequency-hopping spread spectrum

— 2.4 GHz ISM band at 1 Mbps and 2 Mbps— Uses multiple channels — Signal hopping from one channel to another based on a pseudonoise sequence — 1-MHz channels are used — 23 channels in Japan — 70 in USA • Hopping scheme adjustable — E.g. Minimum hop rate forUSA is 2.5 hops per second — Minimum hop distance 6 MHz in North America and most of Europe and 5 MHz in

Japan• Two-level Gaussian FSK modulation for 1-Mbps — Bits encoded as deviations from current carrier frequency • For 2 Mbps, four-level GFSK used — Four different deviations from center frequency define four 2-bit combinations

Original 802.11 Physical Layer – Infrared:

• Omnidirectional • Range up to 20 m • 1 Mbps used 16-PPM (pulse position modulation) — Each group of 4 data bits mapped into one of 16-PPM symbols — Each symbol a string of 16 bits — Each 16-bit string consists of fifteen 0s and one binary 1

Page 25: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

• For 2-Mbps, each group of 2 data bits is mapped into one of four 4-bit sequences — Each sequence consists of three 0s and one binary 1 — Intensity modulation • Presence of signal corresponds to 1 

802.11a:

• 5-GHz band • Uses orthogonal frequency division multiplexing (OFDM) — Not spread spectrum• Also called multicarrier modulation • Multiple carrier signals at different frequencies • Some bits on each channel — Similar to FDM but all subchannels dedicated to single source• Data rates 6, 9, 12, 18, 24, 36, 48, and 54 Mbps • Up to 52 subcarriers modulated using BPSK, QPSK, 16-QAM, or 64-QAM — Depending on rate — Subcarrier frequency spacing 0.3125 MHz — Convolutional code at rate of 1/2, 2/3, or 3/4 provides forward error correction

802.11b:

• Extension of 802.11 DS-SS scheme • 5.5 and 11 Mbps • Chipping rate 11 MHz — Same as original DS-SS scheme — Same occupied bandwidth — Complementary code keying (CCK) modulation to achieve higher data rate in same

bandwidth at same chipping rate — CCK modulation complex • Overview on next slide— Input data treated in blocks of 8 bits at 1.375 MHz • 8 bits/symbol ´ 1.375 MHz = 11 Mbps • Six of these bits mapped into one of 64 code sequences • Output of mapping, plus two additional bits, forms input to QPSK modulator

Page 26: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

802.11g:

• Higher-speed extension to 802.11b • Combines physical layer encoding techniques used in 802.11a and 802.11b to provide service at

a variety of data rates

BRIDGES:

The five categories contain devices which can be defined as

1. Those which operate below the physical layer such as a passive hub.

2. Those which operate at the physical layer (a repeater or an active hub).

3. Those which operate at the physical and data link layers (a bridge or a two-layer switch).

4. Those which operate at the physical, data link, and network layers (a router or a three-layer switch).

5. Those which can operate at all five layers (a gateway).

Page 27: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

A bridge operates in both the physical and the data link layer. As a physical layer device, it regenerates the signal it receives. As a data link layer device, the bridge can check the physical (MAC) addresses (source and destination) contained in the frame.

Page 28: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Filtering

One may ask, What is the difference in functionality between a bridge and a repeater? A bridge has filtering capability. It can check the destination address of a frame and decide if the frame should be forwarded or dropped. If the frame is to be forwarded, the decision must specify the port. A bridge has a table that maps addresses to ports.

A bridge has a table nsed in filtering decisions.

Let us give an example. In Figure 15.5, two LANs are connected by a bridge. If a frame destined for station 712B13456142 arrives at port 1, the bridge consults its table to find the departing port. According to its table, frames for 7l2B 13456142 leave through port 1; therefore, there is no need for forwarding, and the frame is dropped. On the other hand, if a frame for 712B13456141 arrives at port 2, the departing port is port 1 and the frame is forwarded. In the first case, LAN 2 remains free of traffic; in the sec-ond case, both LANs have traffic. In our example, we show a two-port bridge; in reality a bridge usually has more ports.

Note also that a bridge does not change the physical addresses contained in the frame.

A bridge does not change the physical (MAC) addresses in a frame.

Page 29: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Transparent Bridges

A transparent bridge is a bridge in which the stations are completely unaware of the bridge's existence. If a bridge is added or deleted from the system, reconfiguration of the stations is unnecessary. According to the IEEE 802.1 d specification, a system equipped with transparent bridges must meet three criteria:

1. Frames must be forwarded from one station to another.

2. The forwarding table is automatically made by learning frame movements in the network.

3. Loops in the system must be prevented.

Forwarding A transparent bridge must correctly forward the frames, as discussed in the previous section.

Learning The earliest bridges had forwarding tables that were static. The systems administrator would manually enter each table entry during bridge setup. Although the process was simple, it was not practical. If a station was added or deleted, the table had to be modified manually. The same was true if a station's MAC address changed, which is not a rare event. For example, putting in a new network card means a new MAC address.

Page 30: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

A better solution to the static table is a dynamic table that maps addresses to ports automatically. To make a table dynamic, we need a bridge that gradually learns from the frame movements. To do this, the bridge inspects both the destination and the source addresses. The destination address is used for the forwarding decision (table lookup); the source address is used for adding entries to the table and for updating pur-poses. Let us elaborate on this process by using Figure 15.6.

When station A sends a frame to station D, the bridge does not have an entry for either D or A. The frame goes out from all three ports; the frame floods the net-work. However, by looking at the source address, the bridge learns that station A must be located on the LAN connected to port 1. This means that frames destined for A, in the future, must be sent out through port 1. The bridge adds this entry to its table. The table has its first entry now.

When station E sends a frame to station A, the bridge has an entry for A, so it for-wards the frame only to port 1. There is no flooding. In addition, it uses the source address of the frame, E, to add a second entry to the table.When station B sends a frame to C, the bridge has no entry for C, so once again it floods the network and adds one more entry to the table.The process of learning continues as the bridge forwards frames.

Page 31: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Loop Problem Transparent bridges work fine as long as there are no redundant bridges in the system. Systems administrators, however, like to have redundant bridges (more than one bridge between a pair of LANs) to make the system more reliable. If a bridge fails, another bridge takes over until the failed one is repaired or replaced. Redundancy can create loops in the system, which is very undesirable. Figure 15.7 shows a very simple example of a loop created in a system with two LANs connected by two bridges.

1. Station A sends a frame to station D. The tables of both bridges are empty. Both forward the frame and update their tables based on the source address A.

2. Now there are two copies of the frame on LAN 2. The copy sent out by bridge 1 is received by bridge 2, which does not have any information about the destination address D; it floods the bridge. The copy sent out by bridge 2 is received by bridge 1 and is sent out for lack of information about D. Note

Page 32: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

that each frame is handled separately because bridges, as two nodes on a network sharing the medium, use an access method such as CSMA/CD. The tables of both bridges are updated, but still there is no information for destination D.

3. Now there are two copies of the frame on LAN 1. Step 2 is repeated, and both copies flood the network.

4. The process continues on and on. Note that bridges are also repeaters and regen-erate frames. So in each iteration, there are newly generated fresh copies of the frames.

To solve the looping problem, the IEEE specification requires that bridges use the spanning tree algorithm to create a loopless topology.

Page 33: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Spanning TreeIn graph theory, a spanning tree is a graph in which there is no loop. In a bridged LAN, this means creating a topology in which each LAN can be reached from any other LAN through one path only (no loop). We cannot change the physical topology of the system because of physical connections between cables and bridges, but we can create a logical topology that overlays the physical one. Figure 15.8 shows a system with four LANs and five bridges. We have shown the physical system and its represen-tation in graph theory. Although some textbooks represent the LANs as nodes and the bridges as the connecting arcs, we have shown both LANs and bridges as nodes. The connecting arcs show the connection of a LAN to a bridge and vice versa. To find the spanning tree, we need to assign a cost (metric) to each arc. The interpretation of the cost is left up to the systems administrator. It may be the path with minimum hops (nodes), the path with minimum delay, or the path with maximum bandwidth. If two ports have the same shortest value, the systems administrator just chooses one. We have chosen the minimum hops. However, as we will see in Chapter 22, the hop count is nor-mally 1 from a bridge to the LAN and 0 in the reverse direction.The process to find the spanning tree involves three steps:

Every bridge has a built-in ID (normally the serial number, which is unique). Each bridge broadcasts this ID so that all bridges know which one has the smallest ID. The bridge with the smallest ID is selected as the root bridge (root of the tree). We assume that bridge B 1 has the smallest ID. It is, therefore, selected as the root bridge.

Page 34: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

1. The algorithm tries to find the shortest path (a path with the shortest cost) from the root bridge to every other bridge or LAN. The shortest path can be found by examining the total cost from the root bridge to the destination. Figure 15.9 shows the shortest paths.

2. The combination of the shortest paths creates the shortest tree, which is also shown in Figure 15.9.

3. Based on the spanning tree, we mark the ports that are part of the spanning tree, the forwarding ports, which forward a frame that the bridge receives. We also mark those ports that are not part of the spanning tree, the blocking ports, which block the frames received by the bridge. Figure 15.10 shows the physical systems of LANs with forwarding points (solid lines) and blocking ports (broken lines).

Source Routing BridgesAnother way to prevent loops in a system with redundant bridges is to use source routing bridges. A transparent bridge's duties include filtering frames, forwarding, and blocking. In a system that has source routing bridges, these duties are performed by the source station and, to some extent, the destination station.

Page 35: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

In source routing, a sending station defines the bridges that the frame must visit. The addresses of these bridges are included in the frame. In other words, the frame con-tains not only the source and destination addresses, but also the addresses of all bridges to be visited.

The source gets these bridge addresses through the exchange of special frames with the destination prior to sending the data frame.

Source routing bridges were designed by IEEE to be used with Token Ring LANs.These LANs are not very common today.

Two-Layer SwitchesWhen we use the term switch, we must be careful because a switch can mean two dif-ferent things. We must clarify the term by adding the level at which the device operates. We can have a two-layer switch or a three-layer switch. A three-layer switch is used at the network layer; it is a kind of router. The two-layer switch performs at the physical and data link layers.

A two-layer switch is a bridge, a bridge with many ports and a design that allows better (faster) performance. A bridge with a few ports can connect a few LANs together. A bridge with many ports may be able to allocate a unique port to each station, with each station on its own independent entity. This means no competing traffic (no collision, as we saw in Ethernet).

A two-layer switch, as a bridge does, makes a filtering decision based on the MAC address of the frame it received. However, a two-layer switch can be more sophisti-cated. It can have a buffer to hold the frames for processing. It can have a switching fac-tor that forwards the frames faster. Some new two-layer switches, called cut-through switches, have been designed to forward the frame as soon as they check the MAC addresses in the header of the frame.

Routers

Page 36: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

A router is a three-layer device that routes packets based on their logical addresses (host-to-host addressing). A router normally connects LANs and WANs in the Internet and has a routing table that is used for making decisions about the route. The routing tables are normally dynamic and are updated using routing protocols. Figure 15.11 shows a part of the Internet that uses routers to connect LANs and WANs.

Three-Layer SwitchesA three-layer switch is a router, but a faster and more sophisticated. The switching fabric in a three-layer switch allows faster table lookup and forwarding. In this book, we use the terms router and three-layer switch interchangeably.

Gateway

Although some textbooks use the terms gateway and router interchangeably, most of the literature distinguishes between the two. A gateway is normally a computer that operates in all five layers of the Internet or seven layers of OSI model. A gateway takes an application message, reads it, and interprets it. This means that it can be used as a connecting device between two internetworks that use different models. For example, a network designed to use the OSI model can be connected to another network using the Internet model. The gateway connecting the two systems can take a frame as it arrives from the first system, move it up to the OSI application layer, and remove the message. Gateways can provide security.

Page 37: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Passive Hubs

A passive hub is just a connector. It connects the wires coming from different branches. In a star-topology Ethernet LAN, a passive hub is just a point where the signals coming from different stations collide; the hub is the collision point. This type of a hub is part of the media; its location in the Internet model is below the physical layer.

Repeaters

A repeater is a device that operates only in the physical layer. Signals that carry infor-mation within a network can travel a fixed distance before attenuation endangers the integrity of the data. A repeater receives a signal and, before it becomes too weak or corrupted, regenerates the original bit pattern. The repeater then sends the refreshed signal. A repeater can extend the physical length of a LAN, as shown in Figure 15.2.

Page 38: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Active Hubs

An active hub is actually a multipart repeater. It is normally used to create connections between stations in a physical star topology. We have seen examples of hubs in some Ethernet implementations (lOBase-T, for example). However, hubs can also be used to create multiple levels of hierarchy. The hierarchical use of hubs removes the length limitation of 10Base-T (100 m).

Virtual LAN:

A station is considered part of a LAN if it physically belongs to that LAN. The criterion of membership is geographic. What happens if we need a virtual connection between two stations belonging to two different physical LANs? We can roughly define a virtual local area network (VLAN) as a local area network configured by software, not by physical wiring.

Let us use an example to elaborate on this definition. Figure 15.15 shows a switched LAN in an engineering firm in which 10 stations are grouped into three LANs that are connected by a switch. The first four engineers work together as the first group, the next three engineers work together as the second group, and the last three engineers work together as the third group. The LAN is configured to allow this arrangement.

But what would happen if the administrators needed to move two engineers from the first group to the third group, to speed up the project being done by the third group? The LAN configuration would need to be changed. The network technician must rewire. The problem is repeated if, in another week, the two engineers move back to their previous group. In a switched LAN, changes in the work group mean

Page 39: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

physical changes in the network configuration.

Figure 15.16 shows the same switched LAN divided into VLANs. The whole idea of VLAN technology is to divide a LAN into logical, instead of physical, segments. A LAN can be divided into several logical LANs called VLANs. Each VLAN is a work group in the organization. If a person moves from one group to another, there is no need to change the physical configuration. The group membership in VLANs is defined by software, not hardware. Any station can be logically moved to another VLAN. All mem-bers belonging to a VLAN can receive broadcast messages sent to that particular VLAN.

Page 40: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

This means if a station moves from VLAN 1 to VLAN 2, it receives broadcast messages sent to VLAN 2, but no longer receives broadcast messages sent to VLAN 1.

It is obvious that the problem in our previous example can easily be solved by using VLANs. Moving engineers from one group to another through software is easier than changing the configuration of the physical network.

VLAN technology even allows the grouping of stations connected to different switches in a VLAN.

Page 41: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Figure 15.17 shows a backbone local area network with two switches and three VLANs. Stations from switches A and B belong to each VLAN.

Membership

Page 42: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

What characteristic can be used to group stations in a VLAN? Vendors use different characteristics such as port numbers, MAC addresses, IP addresses, IP multicast addresses, or a combination of two or more of these.

Port Numbers

Some VLAN vendors use switch port numbers as a membership characteristic. For example, the administrator can define that stations connecting to ports 1, 2, 3, and 7 belong to VLAN 1; stations connecting to ports 4, 10, and 12 belong to VLAN 2; and so on.

MAC Addresses

Some VLAN vendors use the 48-bit MAC address as a membership characteristic. For example, the administrator can stipulate that stations having MAC addresses E21342A12334 and F2A123BCD341 belong to VLAN 1.

IP Addresses

Some VLAN vendors use the 32-bit IP address (see Chapter 19) as a membership char-acteristic. For example, the administrator can stipulate that stations having IP addresses 181.34.23.67, 181.34.23.72, 181.34.23.98, and 181.34.23.112 belong to VLAN 1.

Page 43: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Multicast IP Addresses

Some VLAN vendors use the multicast IP address (see Chapter 19) as a membership characteristic. Multicasting at the IP layer is now translated to multicasting at the data link layer.

Combination

Recently, the software available from some vendors allows all these characteristics to be combined. The administrator can choose one or more characteristics when installing the software. In addition, the software can be reconfigured to change the settings.

ConfigurationHow are the stations grouped into different VLANs? Stations are configured in one of three ways: manual, semiautomatic, and automatic.

Manual Configuration

In a manual configuration, the network administrator uses the VLAN software to man-ually assign the stations into different VLANs at setup. Later migration from one VLAN to another is also done manually. Note that this is not a physical configuration; it is a logical configuration. The term manually here means that the administrator types the port numbers, the IP addresses, or other characteristics, using the VLAN software.Automatic Configuration

In an automatic configuration, the stations are automatically connected or disconnected from a VLAN using criteria defined by the administrator. For example, the administra-tor can define the project number as the criterion for being a member of a group. When a user changes the project, he or she automatically migrates to a new VLAN.

Page 44: bjpraveena.files.wordpress.com  · Web view->Bluetooth is a wireless LAN technology designed to connect devices of different functions. such as telephones, notebooks, computers (desktop

Semiautomatic Configuration

A semiautomatic configuration is somewhere between a manual configuration and an automatic configuration. Usually, the initializing is done manually, with migrations done automatically.

Communication Between SwitchesIn a multiswitched backbone, each switch must know not only which station belongs to which VLAN, but also the membership of stations connected to other switches. For example, in Figure 15.17, switch A must know the membership status of stations con-nected to switch B, and switch B must know the same about switch A. Three methods have been devised for this purpose: table maintenance, frame tagging, and time-division multiplexing.

Table Maintenance

In this method, when a station sends a broadcast frame to its group members, the switch creates an entry in a table and records station membership. The switches send their tables to one another periodically for updating.

Frame Tagging

In this method, when a frame is traveling between switches, an extra header is added to the MAC frame to define the destination VLAN. The frame tag is used by the receiving switches to determine the VLANs to be receiving the broadcast message.

Time-Division Multiplexing (TDM)

In this method, the connection (trunk) between switches is divided into timeshared channels (see TDM in Chapter 6). For example, if the total number of VLANs in a backbone is five, each trunk is divided into five channels. The traffic destined for VLAN 1 travels in channell, the traffic destined for VLAN 2 travels in channel 2, and so on. The receiving switch determines the destination VLAN by checking the channel from which the frame arrived.