SlideShare a Scribd company logo
802.11 Wireless LAN
     Concepts
           By
      Chaitanya T K
To repeat what others have said,
requires education; to challenge it,
          requires brains.

 Mary Pettibone Poole, A Glass
    Eye at a Keyhole, 1938
Objectives:

     Evolution-Why Wireless ?
     Overview of 802.11 standards
     Basics of RF Medium and wireless
      concepts
     Different RF Access Technologies
      used in 802.11 PHY layer
     Wireless Standards(802.11
      b/a/g/n)
     802.11 MAC layer in Detail
     Roaming
     802.11e-QOS
Evolution of Networks:

    PC-PC wired, LAN (Ethernet-Fast
     Ethernet-Gigabit Ethernet), MAN
     and WAN
    PC-PC wireless, WLAN,WiMAX and
     LTE

 Why Wireless?
  Advantages

  Disadvantages
Evolution of wireless:
Wireless Standard Bodies

    FCC– Frequency,BW,Usage and EIRP (Only
     U.S and some others)
    ITU-T– RF spectrum management through 5
     standard bodies per continent (Global)
    IEEE– Developing standards for PHY and
     MAC layers (L2 and L1 only)
    Wi-fi Alliance – Maintaining
     interoperability b/w vendors
    ISO- For developing a general framework
     for data communication (OSI Model)
Overview of wireless
Standards:
    802.11 Legacy-IR/DSSS/FHSS - Up
     to 2 Mbps
    802.11b- CCK-HR_DSSS-Up to 11
     Mbps
    802.11a-OFDM-Up to 54 Mbps (5Ghz)
    802.11g-OFDM-up to 54 Mbps (2.4
     GHz)
    802.11n-MIMO-OFDMA-Up to 600
     Mbps(Both 2.4 and 5 GHz)
    802.11y-OFDM-up to 54 Mbps (3.7
     GHz)
Comparison Table:
RF medium Basics
Wireless Terminology:


   Key Parameters in understanding
    wireless channels
   Delay Spread
   Coherence bandwidth
   Doppler spread
   Coherence time
Welcome to PHY layer
Modulation techniques:

    PHY layer Modulation techniques
     used in WLAN
    Infra Red         OFDM
    DHSS              OFMDA
    FHSS              Scalable-OFDMA
    HR-DHSS           MIMO
    CCK               MIMO-OFDM(A)
    CCK-OFDM          and other
     common
    PBCC              QPSK/BPSK/QAM..
Spread Spectrum techniques:
    Highly resistant to narrowband
     interference.
    Spread-spectrum signals are
     difficult to intercept , it
     appears as a white noise
    BW utilization by sharing the BW
     with zero interference.
    Two Types:
    Direct Sequence spread spectrum
     (DSSS)
    Frequency Hopping spread spectrum
     (FHSS)
Direct Sequence spread
spectrum (DSSS)
    It phase-modulates a sine wave
     pseudo randomly with a continuous
     string of pseudo-noise (PN) code
     symbols called "chips“.
    Multiplies the data being
     transmitted by a "noise" signal.
     This noise signal is a
     pseudorandom sequence of 1 and −1
     values, at a frequency much
     higher than that of the original
     signal, thereby spreading the
     energy of the original signal
     into a much wider band.
Tx in DSSS:
Frequency Hopping spread
spectrum (FHSS)

    The initiating party sends a
     request via a predefined
     frequency or control channel.
    The receiving party sends a
     number, known as a seed.
    The initiating party uses the
     number as a variable in a
     predefined algorithm, which
     calculates the sequence of
     frequencies that must be used.
   Most often the period of the
    frequency change is predefined,
    as to allow a single base station
    to serve multiple connections.
   The initiating party sends a
    synchronization signal via the
    first frequency in the calculated
    sequence, thus acknowledging to
    the receiving party it has
    correctly calculated the
    sequence.
   The communication begins
Complementary Code Keying:
    Complementary codes, first
     introduced by Golay in 1961.
    They are sets of finite sequences
     of equal length, such that the
     number of pairs of identical
     elements with any given
     separation in one sequence is
     equal to the number of pairs of
     unlike elements having the same
     separation in the other
     sequences.
Binary Complementary Codes:
Mathematics Involved:
     complementary codes are
      characterized by the property
      that their periodic auto
      correlative vector sum is zero
      everywhere except at the zero
      shift.
Example:
Polyphase Complementary
Codes:

    Polyphase complementary code is a
     sequence having complementary
     properties, the elements of which
     have phase parameters.

    Eg: c = {1,– 1, j,j,–j,j ,– 1,-1}
Representation of CCK:


    Uses I/Q Modulator and M-Ary
     Signaling schemes
I/Q Modulators:
    Quadrature modulators are used to
     conserve bandwidth for a given
     data rate. This is accomplished
     by modulating two orthogonal data
     streams onto a common carrier. If
     the phases and amplitudes of both
     data stream (in-phase "I" and
     quadrature "Q"), then one of the
     sidebands is completely cancelled
     out. If there is no DC bias feed
     through, then the carrier itself
     is completely cancelled out.
   In practice, complete
    cancellation is never
    accomplished, but without too
    much work, achieving 40 dB of
    sideband cancellation is not hard
    to do. Even 60 dB is relatively
    easy; however, preventing drift
    due to thermal and mechanical
    effects is not so easy, and the
    result is that a "textbook"
    quadrature alignment during
    alignment can look pretty bad
    over time.
I/Q Modulation:
CCK modulator:

                                                                                                        I OUT
                             3       Pick One                                                       1
                                     of 8 Walsh
                                     Functions

  MBOK                           3   Pick One                                                      1
                                                                                                        Q OUT

                                     of 8 Walsh
                                     Functions
                          1
  Data Input   MUX
               1:8           1




                 1.375 MHz                         11 MHz


               Modulation is Bi-orthagonal keying on both I and Q channels
                      Data Rate = 8 bits/symbol * 1.375 MSps = 11 MBps



                                                                                                         I OUT
                                     Pick One of




                                                                              Differential Mod
                              6                                                                     1
                                     64 Complex
  CCK                                Codes
                                                                                                        Q OUT
                                                                                                   1

                             1
                MUX
  Data Input    1:8          1


                                                                  Code Set is defined by
                                                                  formula:
                 1.375 MHz                                       c = e j(ϕ + 2 + 3 + 4 ) , e j (ϕ + 3+ 4 ) , e j (ϕ + 2 + 4 ) ,
                                                                    {     1 ϕ ϕ ϕ                1 ϕ ϕ             1 ϕ ϕ

                                        11 MHz                   − j(ϕ + 4 ) , e j (ϕ + 2 + 3 ) , e j(ϕ + 3 ) , − j (ϕ + 2 ) , e jϕ }
                                                                  e 1 ϕ              1 ϕ ϕ             1 ϕ       e 1 ϕ             1




                      Data Rate = 8 bits/symbol * 1.375 MSps = 11 MBps
Comparison:

              Modulation Technique and Data rates
                                                  c = e j(ϕ+ 2+ 3+ 4) , e j(ϕ+ 3+ 4) , e j(ϕ+ 2+ 4) ,
                                                     { 1ϕ ϕ ϕ                1 ϕ ϕ          1 ϕ ϕ

                                                  − j(ϕ + 4) , e j(ϕ + 2+ 3) , e j(ϕ+ 3) , − j(ϕ+ 2) , e jϕ }
                                                   e 1ϕ             1 ϕ ϕ           1 ϕ     e 1ϕ           1
     11 Bit Barker Word             22 MHz                                Code set

 802.11 DSSS BPSK            802.11 DSSS QPSK               5.5 MBps                         11 MBps
                                                              CCK                              CCK
         1 MBps                       2MBps
         Barker                       Barker
         BPSK                         QPSK



   1 bit used to                                           2 bits encoded to                6 bits encoded to
                                 2 bits used to                                             64 complex code
   BPSK code word                                          4 complex code
                                 QPSK code word                                             words; 2-QPSK
                                                           words; 2-QPSK


  I, Q                                                                               I, Q
                          I, Q                      I, Q


         11 chips                   11 chips                   8 chips                         8 chips
         1 MSps                     1 MSps                     1.375 MSps                      1.375 MSps
Packet Binary Convolutional
Coding:
   In its simplest form, PBCC works by
    reducing overhead (bandwidth used to
    transmit non-data) through the removal of
    extraneous information and
   optimizing transmission by using smaller
    data packets,cutting the response time in
    processing those packets.
   Thus, allowing for a greater amount of
    data to be transmitted between networked
    devices.
   Specific examples of overhead include:
• Protocol headers – carry information
  for controlling the device
• Frame interval times – allow users to
  gain access to the frequency band
• Error and flow control – ensure the
  integrity of the wireless transmission
• Received message acknowledgements –
  verify that messages were received
  correctly or need to be resent due to
  errors and/or message collisions
OFDM:
    Modulation and Multiplexing
    Orthogonality
    Sub carriers
    Sub carrier spacing
    Multipath and ISI
    Cyclic Prefix
    Flat Fading and Performs well in
     frequency Selective fading

    High PAPR
    Local Oscillator Frequency Offset
OFDM Symbol Time and
Frequency Representation:
Transmission of OFDM
Symbols:
Cyclic Prefix:
MIMO:
Different MIMO techniques:
ST Coding
SF Coding
SF Coding:Rate-2
STF Coding
Different MCS indices:
Protocol Stack:
Protocol Stack for 802.11:

     PHYsical Layer:

     PLCP (Physical Layer Convergence
      Protocol)
     PMD (Physical Medium Dependent)
      sub layer.
     The PMD takes care of the
      wireless encoding.
   The PLCP presents a common
    interface for higher-level
    drivers to write to and provides
    carrier sense and CCA (Clear
    Channel Assessment), which is the
    signal that the MAC (Media Access
    Control) layer needs so it can
    determine whether the medium is
    currently in use.
PLCP frame format:
PHY concepts:
     The PLCP consists of a 144 bits
      preamble that is used for
      synchronization to determine radio gain
      and to establish CCA.
     The preamble comprises 128 bits of
      synchronization, followed by a 16 bits
      field consisting of the pattern
      1111001110100000.
     This sequence is used to mark the start
      of every frame and is called the SFD
      (Start Frame Delimiter).
   The next 48 bits are collectively known
    as the PLCP header. The header contains
    four fields: signal, service, length
    and HEC (header error check). The
    signal field indicates how fast the
    payload will be transmitted (1, 2, 5.5
    or 11 Mbps).
   The service field is reserved for
    future use. The length field indicates
    the length of the ensuing payload, and
    the HEC is a 16 bits CRC of the 48 bits
    header.
   In a wireless environment, the PLCP is
    always transmitted at 1 Mbps. Thus, 24
    bytes of each packet are sent at 1
    Mbps.
   The PLCP introduces 24 bytes of
    overhead into each wireless Ethernet
    packet before we even start talking
    about where the packet is going.
    Ethernet introduces only 8 bytes of
    data. Because the 192 bits header
    payload is transmitted at 1 Mbps,
    802.11b is at best only 85 percent
    efficient at the physical layer.
PLCP formats in 11n:
PHY Tx Procedure:
PHY Rx Procedure:
MAC Layer Concepts
Modes of WLAN:
Working of Different Modes
in WLAN:

    802.11 MAC functions much the
     same way in both ADHOC
     (or)independent and
     Infrastructure modes.
    Only difference is a centralized
     controller is to elected in the
     absence of an Access point.
BSS and ESS:
Modes of Access Point:


     Root Mode,
     Bridge Mode,
     Repeater Mode

     BSSID
     ESSID
     SSID
MAC coordination functions:
Frame Processing:
Carrier Sensing:
    Physical Sensing-Hardware-PHY
    Virtual sensing-Software-MAC-NAV
Carrier Sensing Algorithm:
Clear Channel Assessment
Modes (DSSS):
Clear Channel Assessment
Modes (CCK):
Scanning Procedures:
     Active Scanning
      -Use of Probe Request
      -Can be a
      unicast/multicast/broadcast
      - Optional
     Passive Scanning
      - Waits for beacon
      - It may miss a beacon
      - Mandatory
Inter frame Spacing:
Inter frame Spacing
(Contd..):
Fragmentation:
MAC Framing:
Addresses:
802.11 frame: addressing


                                                                 Internet
              H1                         R1 router
                               AP



                                          R1 MAC addr AP MAC addr
                                          dest. address   source address

                                                                 802.3 frame

  AP MAC addr H1 MAC addr R1 MAC addr
  address 1        address 2        address 3

                                      802.11 frame
Summary Of MAC rules:
PCF contention Free:
Problems and Solutions in
MAC:
Basic handshakes:
Channel Placement in 2.4 &
5 GHz bands:
5GHz band:
5GHz band(Contd..):
802.11n:
    Requirements:
    MAC layer throughput > 100Mbps
    Support 20MHz Channel
    Support 5GHz Band
    Backward compatible with 802.11g (if
     support 2.4GHz Band)    and 802.11a
    Support 802.11e (QoS)
    Spectral Efficiency >= 3 bps / Hz
    Control of support for legacy STA from
     802.11n AP
11n Enhancements:
Enhancements in detail-I:
Enhancements in detail-II:
MAC enhancements:
MSDU Aggregation:
MPDU aggregation:
BLOCK ACK bitmap:
BLOCK ACK Bitmap Analysis:
Timing Diagram For
Aggregation:
Backward Compatibility:
802.11y:
    Operates in 3650-3700 MHz band
    Novel Licensing
    High Power compared to normal 20
     Watts EIRP.
    Hence Higher coverage area (5 Km)
    3 Major changes compared to
     traditional 802.11:
    Contention based protocol
    Extended Channel switch
     announcement
    Dependent station enablement
Terminology in 802.11y:
    Dependent STA: A station that
     must receive and successfully
     decode an enabling signal before
     it is allowed to transmit.
    Registered STA: A station that
     is certified to operate at a
     given location after registering
     with the required authorities.
     Registered STAs do not need to
     receive an enabling signal before
     commencing operation.
Terminology in 802.11y
(Contd..):
    Fixed STA: a station that is
     authorized to operate only at a
     specific location.
    Enabling point(EP): A fixed
     station that transmits coded
     signals that contain the
     necessary information and
     authorization for a dependant
     STAs to transmit in a restricted
     band for the purpose of engaging
     in the DSE process.
Terminology in 802.11y
(Contd..):

    Dependent STA enablement
     (DSE):
     The process by which a
     dependant STA gains
     permission to transmit on a
     restricted channel.
Roaming in WLAN
Roaming in WLAN:
     Seamless Roaming
     Nomadic Roaming
     A roaming domain is defined as APs that
      are in the same broadcast domain and
      configured with the same SSID.
     Stated another way, a client can only
      roam between APs in the same VLAN and
      with the same SSID.
     As WLAN deployments expand within an
      organization, roaming domains might
      need to scale beyond a single Layer 2
      VLAN.
Roaming Types:
Layer 2 Roaming:
    The client must decide to roam—Roaming
     algorithms (signal strength, frame
     acknowledgment, missed beacons..)
    The client must decide where to roam—
         preemptive AP discovery,
         roam-time AP discovery.
    The client initiates a roam—The client
     uses 802.11 (re-)association frames to
     associate to a new AP.
    The client can resume existing
     application sessions.
Roam Types:

   Preemptive AP discovery:
   Effects application Throughput
   Reduces roaming time
   Better use for Power save clients
   Not suitable for fast roaming
    client
   Roam-time AP discovery:
   High roaming delay
Roaming Processes:
    The previous AP must determine that
     the client has roamed away from it.
    The previous AP should buffer data
     destined for the roaming client.*
    The new AP should indicate to the
     previous AP that the client has
     successfully roamed. This step usually
     happens via a unicast or multicast
     packet from the old AP to the new AP
     with the source MAC address set to the
     MAC of the roaming client.*
    The previous AP should send the
     buffered data to the new AP.
  The previous AP must determine
   that the client has roamed away
   from it.
  The AP must update MAC address
   tables on infrastructure
   switches to prevent the loss of
   data to the roaming client.
Note: * Tasks are not mandatory
   because they are not specified
   in the 802.11 standard.
Effects of roaming on Data
Flow:
Layer 3 Roaming:
Mobile IP to the rescue:
    Mobile node (MN)—The MN is the roaming
     station.
    Home agent (HA)—The HA exists on
     routers or Layer 3 switches and ensures
     that a roaming MN receives its IP
     packets.Foreign agent (FA)—The FA
     exists on router or Layer 3 switches
     and aids the MN notifying the HA of the
     new MN location by receiving packets
     from the HA destined for the MN.
    Care-of address (CoA)—The CoA is a
     locally attached router that receives
     packets sent by the HA, destined for
     the MN. Co-located care-of address
     (CCoA)—A CoA that exists on the mobile
     node itself.
Steps in Layer 3 Roaming:
   A station is on its home subnet
    if the station's IP address
    belongs to the subnet of the HA.
   As the MN roams to a foreign
    subnet, the MN detects the
    presence of the FA and registers
    with the FA or with the MN CCoA.
   The FA or MN CCoA communicates
    with the HA and establishes a
    tunnel between the HA and a CoA
    for the MN.
   Packets destined to the MN are
    sent to the HA (via normal IP
    routing.
   The HA forwards the packets via
    the tunnel to the MN.
   Any packets the MN transmits are
    sent via the FA as if the MN were
    local on the subnet. (A "reverse
    tunnel" mode is available when
    the edge routers use ingress
    packet filtering.)
Effect on data flow in L3
roaming:
Overview of Mobile IP in
WLAN:

    Agent discovery:
    Uses IRDP (ICMP+router discovery
     Protocol) Multicast/Broadcast
    The agent advertisement contains two
     fields that allow the MN to determine
     whether it has roamed to a new subnet:
    The lifetime field from the agent
     advertisement
    The prefix-length extension
   Upon determining it is on a
    foreign subnet, the MN gleans the
    CoA from the agent advertisement.
    The CoA can take two forms:
   The address of the FA.
   CCoA (Note that the CCoA is not
    advertised by the FA, but it is
    probably acquired by the MN as a
    Dynamic Host Configuration
    Protocol [DHCP] option.)
MN Registration Process:
     The MN sends a registration
      request to the FA. If the MN has
      a CCoA, this step is skipped.
     The FA processes the
      registration request and
      forwards the request to the HA.
     The HA accepts or declines the
      registration and sends a
      registration reply to the FA.
     The FA processes the
      registration reply and relays it
      to the MN.
Understanding 802.11e-
         QoS
802.11e:


     HCF: Hybrid of DCF & PCF
      NO ACK
     BLOCK ACK
      TX OP
EDCA:
     EDCA contention access is an
      extension of the legacy
      CSMA/CA DCF mechanism to
      include priorities
EDCA (Contd..):
    After resolving internal and
     external collisions an STA is
     given a TXOP.
    If the frame exchange sequence
     has been completed, and there is
     still time remaining in the TXOP,
     the QSTA can may extend the frame
     exchange sequence by transmitting
     another frame in the same access
     category. The QSTA must ensure
     that the transmitted frame and
     any necessary acknowledgement can
     fit into the time remaining in
     the TXOP.
EDCA Admission control:
    A station specifies its traffic
     flow requirements (data rate,
     delay bounds, packet size, and
     others) and requests the QAP to
     create a TSPEC by sending the
     ADDTS (add TSPEC) management
     action frame
    The QAP calculates the existing
     load based on the current set of
     issued TSPECs
   If the TSPEC is denied, the high
    priority access category inside
    the QSTA is not permitted to use
    the high priority access
    parameters, but it must use lower
    priority parameters instead.
    Admission control is not
    intended to be used for the "best
    effort" and "background" traffic
    classes
HCCA:

     The HCF controlled channel access
      (HCCA) mechanism uses a hybrid
      coordinator (HC) to centrally
      manage medium access. The intent
      of HCCA is to increase efficiency
      by reducing the contention on the
      medium.
     Delay for HC will be the least
     HC control Admission control
      using TSPEC and grants the TXOP
Optional 802.11e features:
     Contention-free bursts,
      -When time remains in a given    TXOP
      -To save 11g from 11b clients by
      TXOP(g)=1 frame length of 11b
     Block acknowledgements,
     Direct link protocol,
     Active power mode save delivery
      -Automatic Schedule in terms of beacon
      periods
       -APSD operation is invoked by a
      station by establishing a TSPEC with
      the APSD flag set.
Block acknowledgements:
      Immediate BLOCK ACK




        Delayed BLOCK ACK
Direct Link protocol:
My method is to take the utmost
trouble to find the right thing to say,
  and then to say it with the utmost
                 levity.
                    .
       George Bernard Shaw,
    "Answers to Nine Questions"
  Irish dramatist & socialist (1856 -
                1950)

More Related Content

What's hot

Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelCancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
IDES Editor
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
TELKOMNIKA JOURNAL
 
3512vlsics05
3512vlsics053512vlsics05
3512vlsics05
arathyg
 
An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)
An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)
An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)
CSCJournals
 
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...
ijngnjournal
 
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic DispersionPerformance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
IDES Editor
 
T04504121126
T04504121126T04504121126
T04504121126
IJERA Editor
 
Generation and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codesGeneration and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codes
IOSR Journals
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
IJCNCJournal
 
Integrated Active Filters using low gain modules
Integrated Active Filters using low gain modulesIntegrated Active Filters using low gain modules
Integrated Active Filters using low gain modules
IDES Editor
 
High Speed Low Power CMOS Domino or Gate Design in 16nm Technology
High Speed Low Power CMOS Domino or Gate Design in 16nm TechnologyHigh Speed Low Power CMOS Domino or Gate Design in 16nm Technology
High Speed Low Power CMOS Domino or Gate Design in 16nm Technology
csandit
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd Iaetsd
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
gopi1985
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices
Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices
Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices
IJECEIAES
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
Alexander Decker
 

What's hot (17)

Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelCancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
3512vlsics05
3512vlsics053512vlsics05
3512vlsics05
 
An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)
An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)
An OFDM System Based on Dual Tree Complex Wavelet Transform (DT-CWT)
 
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...
 
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic DispersionPerformance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
 
T04504121126
T04504121126T04504121126
T04504121126
 
Generation and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codesGeneration and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codes
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
Integrated Active Filters using low gain modules
Integrated Active Filters using low gain modulesIntegrated Active Filters using low gain modules
Integrated Active Filters using low gain modules
 
High Speed Low Power CMOS Domino or Gate Design in 16nm Technology
High Speed Low Power CMOS Domino or Gate Design in 16nm TechnologyHigh Speed Low Power CMOS Domino or Gate Design in 16nm Technology
High Speed Low Power CMOS Domino or Gate Design in 16nm Technology
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices
Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices
Theoretical Analysis of a two-stage Sagnac loop filter Using Jones Matrices
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
 

Similar to Wireless LAN (WLAN) concepts: Modulation to Aggregation

802.11 technology overview
802.11 technology overview802.11 technology overview
802.11 technology overview
sureshkumarmss
 
Ln3619761985
Ln3619761985Ln3619761985
Ln3619761985
IJERA Editor
 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer Simulation
Michail Grigoropoulos
 
Lecture intro to_wcdma
Lecture intro to_wcdmaLecture intro to_wcdma
Lecture intro to_wcdma
Gurpreet Singh
 
For spreading factor & channels
For spreading factor & channelsFor spreading factor & channels
For spreading factor & channels
Shivendra Verma
 
Wcdma channel
Wcdma channelWcdma channel
Wcdma channel
Yutthak
 
Demodulation of Wi-Fi 802.11g Packets
Demodulation of Wi-Fi 802.11g PacketsDemodulation of Wi-Fi 802.11g Packets
Demodulation of Wi-Fi 802.11g Packets
Shamman Noor Shoudha
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
IJERA Editor
 
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
Journal For Research
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
IJERA Editor
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
Ankur Kumar
 
OFDM Final
OFDM FinalOFDM Final
OFDM Final
Ashish Meshram
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
Chyon Ju
 
UNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdfUNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdf
Matrusri Engineering College
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd Iaetsd
 
3 g by pasha
3 g by pasha3 g by pasha
3 g by pasha
Meraj Ahmad
 
Bm044394397
Bm044394397Bm044394397
Bm044394397
IJERA Editor
 
Sistec ppt
Sistec pptSistec ppt
Sistec ppt
hemant choubey
 
Adc lab
Adc labAdc lab
Adc lab
xyxz
 
D Belver FEE for Trasgos
D Belver  FEE for TrasgosD Belver  FEE for Trasgos
D Belver FEE for Trasgos
Miguel Morales
 

Similar to Wireless LAN (WLAN) concepts: Modulation to Aggregation (20)

802.11 technology overview
802.11 technology overview802.11 technology overview
802.11 technology overview
 
Ln3619761985
Ln3619761985Ln3619761985
Ln3619761985
 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer Simulation
 
Lecture intro to_wcdma
Lecture intro to_wcdmaLecture intro to_wcdma
Lecture intro to_wcdma
 
For spreading factor & channels
For spreading factor & channelsFor spreading factor & channels
For spreading factor & channels
 
Wcdma channel
Wcdma channelWcdma channel
Wcdma channel
 
Demodulation of Wi-Fi 802.11g Packets
Demodulation of Wi-Fi 802.11g PacketsDemodulation of Wi-Fi 802.11g Packets
Demodulation of Wi-Fi 802.11g Packets
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
 
OFDM Final
OFDM FinalOFDM Final
OFDM Final
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
UNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdfUNIT-4 Baseband Digital Modulation.pdf
UNIT-4 Baseband Digital Modulation.pdf
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
3 g by pasha
3 g by pasha3 g by pasha
3 g by pasha
 
Bm044394397
Bm044394397Bm044394397
Bm044394397
 
Sistec ppt
Sistec pptSistec ppt
Sistec ppt
 
Adc lab
Adc labAdc lab
Adc lab
 
D Belver FEE for Trasgos
D Belver  FEE for TrasgosD Belver  FEE for Trasgos
D Belver FEE for Trasgos
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Wireless LAN (WLAN) concepts: Modulation to Aggregation

  • 1. 802.11 Wireless LAN Concepts By Chaitanya T K
  • 2. To repeat what others have said, requires education; to challenge it, requires brains. Mary Pettibone Poole, A Glass Eye at a Keyhole, 1938
  • 3. Objectives:  Evolution-Why Wireless ?  Overview of 802.11 standards  Basics of RF Medium and wireless concepts  Different RF Access Technologies used in 802.11 PHY layer  Wireless Standards(802.11 b/a/g/n)  802.11 MAC layer in Detail  Roaming  802.11e-QOS
  • 4. Evolution of Networks:  PC-PC wired, LAN (Ethernet-Fast Ethernet-Gigabit Ethernet), MAN and WAN  PC-PC wireless, WLAN,WiMAX and LTE Why Wireless?  Advantages  Disadvantages
  • 6. Wireless Standard Bodies  FCC– Frequency,BW,Usage and EIRP (Only U.S and some others)  ITU-T– RF spectrum management through 5 standard bodies per continent (Global)  IEEE– Developing standards for PHY and MAC layers (L2 and L1 only)  Wi-fi Alliance – Maintaining interoperability b/w vendors  ISO- For developing a general framework for data communication (OSI Model)
  • 7. Overview of wireless Standards:  802.11 Legacy-IR/DSSS/FHSS - Up to 2 Mbps  802.11b- CCK-HR_DSSS-Up to 11 Mbps  802.11a-OFDM-Up to 54 Mbps (5Ghz)  802.11g-OFDM-up to 54 Mbps (2.4 GHz)  802.11n-MIMO-OFDMA-Up to 600 Mbps(Both 2.4 and 5 GHz)  802.11y-OFDM-up to 54 Mbps (3.7 GHz)
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Wireless Terminology:  Key Parameters in understanding wireless channels  Delay Spread  Coherence bandwidth  Doppler spread  Coherence time
  • 19.
  • 20.
  • 21.
  • 22. Welcome to PHY layer
  • 23. Modulation techniques:  PHY layer Modulation techniques used in WLAN  Infra Red OFDM  DHSS OFMDA  FHSS Scalable-OFDMA  HR-DHSS MIMO  CCK MIMO-OFDM(A)  CCK-OFDM and other common  PBCC QPSK/BPSK/QAM..
  • 24. Spread Spectrum techniques:  Highly resistant to narrowband interference.  Spread-spectrum signals are difficult to intercept , it appears as a white noise  BW utilization by sharing the BW with zero interference.  Two Types:  Direct Sequence spread spectrum (DSSS)  Frequency Hopping spread spectrum (FHSS)
  • 25. Direct Sequence spread spectrum (DSSS)  It phase-modulates a sine wave pseudo randomly with a continuous string of pseudo-noise (PN) code symbols called "chips“.  Multiplies the data being transmitted by a "noise" signal. This noise signal is a pseudorandom sequence of 1 and −1 values, at a frequency much higher than that of the original signal, thereby spreading the energy of the original signal into a much wider band.
  • 27. Frequency Hopping spread spectrum (FHSS)  The initiating party sends a request via a predefined frequency or control channel.  The receiving party sends a number, known as a seed.  The initiating party uses the number as a variable in a predefined algorithm, which calculates the sequence of frequencies that must be used.
  • 28. Most often the period of the frequency change is predefined, as to allow a single base station to serve multiple connections.  The initiating party sends a synchronization signal via the first frequency in the calculated sequence, thus acknowledging to the receiving party it has correctly calculated the sequence.  The communication begins
  • 29. Complementary Code Keying:  Complementary codes, first introduced by Golay in 1961.  They are sets of finite sequences of equal length, such that the number of pairs of identical elements with any given separation in one sequence is equal to the number of pairs of unlike elements having the same separation in the other sequences.
  • 31. Mathematics Involved:  complementary codes are characterized by the property that their periodic auto correlative vector sum is zero everywhere except at the zero shift.
  • 33. Polyphase Complementary Codes:  Polyphase complementary code is a sequence having complementary properties, the elements of which have phase parameters.  Eg: c = {1,– 1, j,j,–j,j ,– 1,-1}
  • 34. Representation of CCK:  Uses I/Q Modulator and M-Ary Signaling schemes
  • 35. I/Q Modulators:  Quadrature modulators are used to conserve bandwidth for a given data rate. This is accomplished by modulating two orthogonal data streams onto a common carrier. If the phases and amplitudes of both data stream (in-phase "I" and quadrature "Q"), then one of the sidebands is completely cancelled out. If there is no DC bias feed through, then the carrier itself is completely cancelled out.
  • 36. In practice, complete cancellation is never accomplished, but without too much work, achieving 40 dB of sideband cancellation is not hard to do. Even 60 dB is relatively easy; however, preventing drift due to thermal and mechanical effects is not so easy, and the result is that a "textbook" quadrature alignment during alignment can look pretty bad over time.
  • 38. CCK modulator: I OUT 3 Pick One 1 of 8 Walsh Functions MBOK 3 Pick One 1 Q OUT of 8 Walsh Functions 1 Data Input MUX 1:8 1 1.375 MHz 11 MHz Modulation is Bi-orthagonal keying on both I and Q channels Data Rate = 8 bits/symbol * 1.375 MSps = 11 MBps I OUT Pick One of Differential Mod 6 1 64 Complex CCK Codes Q OUT 1 1 MUX Data Input 1:8 1 Code Set is defined by formula: 1.375 MHz c = e j(ϕ + 2 + 3 + 4 ) , e j (ϕ + 3+ 4 ) , e j (ϕ + 2 + 4 ) , { 1 ϕ ϕ ϕ 1 ϕ ϕ 1 ϕ ϕ 11 MHz − j(ϕ + 4 ) , e j (ϕ + 2 + 3 ) , e j(ϕ + 3 ) , − j (ϕ + 2 ) , e jϕ } e 1 ϕ 1 ϕ ϕ 1 ϕ e 1 ϕ 1 Data Rate = 8 bits/symbol * 1.375 MSps = 11 MBps
  • 39. Comparison: Modulation Technique and Data rates c = e j(ϕ+ 2+ 3+ 4) , e j(ϕ+ 3+ 4) , e j(ϕ+ 2+ 4) , { 1ϕ ϕ ϕ 1 ϕ ϕ 1 ϕ ϕ − j(ϕ + 4) , e j(ϕ + 2+ 3) , e j(ϕ+ 3) , − j(ϕ+ 2) , e jϕ } e 1ϕ 1 ϕ ϕ 1 ϕ e 1ϕ 1 11 Bit Barker Word 22 MHz Code set 802.11 DSSS BPSK 802.11 DSSS QPSK 5.5 MBps 11 MBps CCK CCK 1 MBps 2MBps Barker Barker BPSK QPSK 1 bit used to 2 bits encoded to 6 bits encoded to 2 bits used to 64 complex code BPSK code word 4 complex code QPSK code word words; 2-QPSK words; 2-QPSK I, Q I, Q I, Q I, Q 11 chips 11 chips 8 chips 8 chips 1 MSps 1 MSps 1.375 MSps 1.375 MSps
  • 40. Packet Binary Convolutional Coding:  In its simplest form, PBCC works by reducing overhead (bandwidth used to transmit non-data) through the removal of extraneous information and  optimizing transmission by using smaller data packets,cutting the response time in processing those packets.  Thus, allowing for a greater amount of data to be transmitted between networked devices.  Specific examples of overhead include:
  • 41. • Protocol headers – carry information for controlling the device • Frame interval times – allow users to gain access to the frequency band • Error and flow control – ensure the integrity of the wireless transmission • Received message acknowledgements – verify that messages were received correctly or need to be resent due to errors and/or message collisions
  • 42. OFDM:  Modulation and Multiplexing  Orthogonality  Sub carriers  Sub carrier spacing  Multipath and ISI  Cyclic Prefix  Flat Fading and Performs well in frequency Selective fading  High PAPR  Local Oscillator Frequency Offset
  • 43. OFDM Symbol Time and Frequency Representation:
  • 46. MIMO:
  • 54. Protocol Stack for 802.11:  PHYsical Layer:  PLCP (Physical Layer Convergence Protocol)  PMD (Physical Medium Dependent) sub layer.  The PMD takes care of the wireless encoding.
  • 55. The PLCP presents a common interface for higher-level drivers to write to and provides carrier sense and CCA (Clear Channel Assessment), which is the signal that the MAC (Media Access Control) layer needs so it can determine whether the medium is currently in use.
  • 57. PHY concepts:  The PLCP consists of a 144 bits preamble that is used for synchronization to determine radio gain and to establish CCA.  The preamble comprises 128 bits of synchronization, followed by a 16 bits field consisting of the pattern 1111001110100000.  This sequence is used to mark the start of every frame and is called the SFD (Start Frame Delimiter).
  • 58. The next 48 bits are collectively known as the PLCP header. The header contains four fields: signal, service, length and HEC (header error check). The signal field indicates how fast the payload will be transmitted (1, 2, 5.5 or 11 Mbps).  The service field is reserved for future use. The length field indicates the length of the ensuing payload, and the HEC is a 16 bits CRC of the 48 bits header.
  • 59. In a wireless environment, the PLCP is always transmitted at 1 Mbps. Thus, 24 bytes of each packet are sent at 1 Mbps.  The PLCP introduces 24 bytes of overhead into each wireless Ethernet packet before we even start talking about where the packet is going. Ethernet introduces only 8 bytes of data. Because the 192 bits header payload is transmitted at 1 Mbps, 802.11b is at best only 85 percent efficient at the physical layer.
  • 65. Working of Different Modes in WLAN:  802.11 MAC functions much the same way in both ADHOC (or)independent and Infrastructure modes.  Only difference is a centralized controller is to elected in the absence of an Access point.
  • 67. Modes of Access Point:  Root Mode,  Bridge Mode,  Repeater Mode  BSSID  ESSID  SSID
  • 70. Carrier Sensing:  Physical Sensing-Hardware-PHY  Virtual sensing-Software-MAC-NAV
  • 74. Scanning Procedures:  Active Scanning -Use of Probe Request -Can be a unicast/multicast/broadcast - Optional  Passive Scanning - Waits for beacon - It may miss a beacon - Mandatory
  • 80. 802.11 frame: addressing Internet H1 R1 router AP R1 MAC addr AP MAC addr dest. address source address 802.3 frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame
  • 81. Summary Of MAC rules:
  • 85. Channel Placement in 2.4 & 5 GHz bands:
  • 88. 802.11n:  Requirements:  MAC layer throughput > 100Mbps  Support 20MHz Channel  Support 5GHz Band  Backward compatible with 802.11g (if support 2.4GHz Band) and 802.11a  Support 802.11e (QoS)  Spectral Efficiency >= 3 bps / Hz  Control of support for legacy STA from 802.11n AP
  • 96. BLOCK ACK Bitmap Analysis:
  • 99. 802.11y:  Operates in 3650-3700 MHz band  Novel Licensing  High Power compared to normal 20 Watts EIRP.  Hence Higher coverage area (5 Km)  3 Major changes compared to traditional 802.11:  Contention based protocol  Extended Channel switch announcement  Dependent station enablement
  • 100. Terminology in 802.11y:  Dependent STA: A station that must receive and successfully decode an enabling signal before it is allowed to transmit.  Registered STA: A station that is certified to operate at a given location after registering with the required authorities. Registered STAs do not need to receive an enabling signal before commencing operation.
  • 101. Terminology in 802.11y (Contd..):  Fixed STA: a station that is authorized to operate only at a specific location.  Enabling point(EP): A fixed station that transmits coded signals that contain the necessary information and authorization for a dependant STAs to transmit in a restricted band for the purpose of engaging in the DSE process.
  • 102. Terminology in 802.11y (Contd..):  Dependent STA enablement (DSE): The process by which a dependant STA gains permission to transmit on a restricted channel.
  • 104. Roaming in WLAN:  Seamless Roaming  Nomadic Roaming  A roaming domain is defined as APs that are in the same broadcast domain and configured with the same SSID.  Stated another way, a client can only roam between APs in the same VLAN and with the same SSID.  As WLAN deployments expand within an organization, roaming domains might need to scale beyond a single Layer 2 VLAN.
  • 106. Layer 2 Roaming:  The client must decide to roam—Roaming algorithms (signal strength, frame acknowledgment, missed beacons..)  The client must decide where to roam—  preemptive AP discovery,  roam-time AP discovery.  The client initiates a roam—The client uses 802.11 (re-)association frames to associate to a new AP.  The client can resume existing application sessions.
  • 107. Roam Types:  Preemptive AP discovery:  Effects application Throughput  Reduces roaming time  Better use for Power save clients  Not suitable for fast roaming client  Roam-time AP discovery:  High roaming delay
  • 108. Roaming Processes:  The previous AP must determine that the client has roamed away from it.  The previous AP should buffer data destined for the roaming client.*  The new AP should indicate to the previous AP that the client has successfully roamed. This step usually happens via a unicast or multicast packet from the old AP to the new AP with the source MAC address set to the MAC of the roaming client.*  The previous AP should send the buffered data to the new AP.
  • 109.  The previous AP must determine that the client has roamed away from it.  The AP must update MAC address tables on infrastructure switches to prevent the loss of data to the roaming client. Note: * Tasks are not mandatory because they are not specified in the 802.11 standard.
  • 110. Effects of roaming on Data Flow:
  • 112. Mobile IP to the rescue:  Mobile node (MN)—The MN is the roaming station.  Home agent (HA)—The HA exists on routers or Layer 3 switches and ensures that a roaming MN receives its IP packets.Foreign agent (FA)—The FA exists on router or Layer 3 switches and aids the MN notifying the HA of the new MN location by receiving packets from the HA destined for the MN.  Care-of address (CoA)—The CoA is a locally attached router that receives packets sent by the HA, destined for the MN. Co-located care-of address (CCoA)—A CoA that exists on the mobile node itself.
  • 113. Steps in Layer 3 Roaming:  A station is on its home subnet if the station's IP address belongs to the subnet of the HA.  As the MN roams to a foreign subnet, the MN detects the presence of the FA and registers with the FA or with the MN CCoA.  The FA or MN CCoA communicates with the HA and establishes a tunnel between the HA and a CoA for the MN.
  • 114. Packets destined to the MN are sent to the HA (via normal IP routing.  The HA forwards the packets via the tunnel to the MN.  Any packets the MN transmits are sent via the FA as if the MN were local on the subnet. (A "reverse tunnel" mode is available when the edge routers use ingress packet filtering.)
  • 115. Effect on data flow in L3 roaming:
  • 116. Overview of Mobile IP in WLAN:  Agent discovery:  Uses IRDP (ICMP+router discovery Protocol) Multicast/Broadcast  The agent advertisement contains two fields that allow the MN to determine whether it has roamed to a new subnet:  The lifetime field from the agent advertisement  The prefix-length extension
  • 117. Upon determining it is on a foreign subnet, the MN gleans the CoA from the agent advertisement. The CoA can take two forms:  The address of the FA.  CCoA (Note that the CCoA is not advertised by the FA, but it is probably acquired by the MN as a Dynamic Host Configuration Protocol [DHCP] option.)
  • 118. MN Registration Process:  The MN sends a registration request to the FA. If the MN has a CCoA, this step is skipped.  The FA processes the registration request and forwards the request to the HA.  The HA accepts or declines the registration and sends a registration reply to the FA.  The FA processes the registration reply and relays it to the MN.
  • 120. 802.11e:  HCF: Hybrid of DCF & PCF  NO ACK  BLOCK ACK  TX OP
  • 121. EDCA:  EDCA contention access is an extension of the legacy CSMA/CA DCF mechanism to include priorities
  • 122. EDCA (Contd..):  After resolving internal and external collisions an STA is given a TXOP.  If the frame exchange sequence has been completed, and there is still time remaining in the TXOP, the QSTA can may extend the frame exchange sequence by transmitting another frame in the same access category. The QSTA must ensure that the transmitted frame and any necessary acknowledgement can fit into the time remaining in the TXOP.
  • 123. EDCA Admission control:  A station specifies its traffic flow requirements (data rate, delay bounds, packet size, and others) and requests the QAP to create a TSPEC by sending the ADDTS (add TSPEC) management action frame  The QAP calculates the existing load based on the current set of issued TSPECs
  • 124. If the TSPEC is denied, the high priority access category inside the QSTA is not permitted to use the high priority access parameters, but it must use lower priority parameters instead.  Admission control is not intended to be used for the "best effort" and "background" traffic classes
  • 125. HCCA:  The HCF controlled channel access (HCCA) mechanism uses a hybrid coordinator (HC) to centrally manage medium access. The intent of HCCA is to increase efficiency by reducing the contention on the medium.  Delay for HC will be the least  HC control Admission control using TSPEC and grants the TXOP
  • 126. Optional 802.11e features:  Contention-free bursts, -When time remains in a given TXOP -To save 11g from 11b clients by TXOP(g)=1 frame length of 11b  Block acknowledgements,  Direct link protocol,  Active power mode save delivery -Automatic Schedule in terms of beacon periods -APSD operation is invoked by a station by establishing a TSPEC with the APSD flag set.
  • 127. Block acknowledgements: Immediate BLOCK ACK Delayed BLOCK ACK
  • 129. My method is to take the utmost trouble to find the right thing to say, and then to say it with the utmost levity. . George Bernard Shaw, "Answers to Nine Questions" Irish dramatist & socialist (1856 - 1950)