Wireless LANs
LAN/WLAN World
 LANs provide connectivity for interconnecting
computing resources at the local levels of an
organization
 Wired LANs
Limitations because of physical, hard-wired
infrastructure
 Wireless LANs provide
Flexibility
Portability
Mobility
Ease of Installation
Wireless LAN Applications
Medical Professionals
Education
Temporary Situations
Airlines
Security Staff
Emergency Centers
IEEE 802.11 Wireless LAN Standard
In response to lacking standards, IEEE developed
the first internationally recognized wireless LAN
standard – IEEE 802.11
IEEE published 802.11 in 1997, after seven years
of work
Scope of IEEE 802.11 is limited to Physical and
Data Link Layers.
Benefits of 802.11 Standard
Appliance Interoperability
Fast Product Development
Stable Future Migration
Price Reductions
The 802.11 standard takes into account the following
significant differences between wireless and wired LANs:
Power Management
Security
Bandwidth
IEEE 802.11 Terminology
Access point (AP): A station that provides access to the
DS.
Basic service set :
a set is of stationary or mobile wireless stations and an optional central base
station, known as the access point (AP).
Distribution system (DS): A system used to interconnect
a set of BSSs to create an ESS.
 DS is implementation-independent. It can be a wired 802.3 Ethernet LAN,
802.4 token bus, 802.5 token ring or another 802.11 medium.
Extended service set (ESS):Two or more BSS
interconnected by DS
extended service set uses two types of stations: mobile and
stationary
 The mobile stations are normal stations inside a BSS. The stationary
stations are AP stations that are part of a wired LAN.
WLAN Topology
Ad-Hoc Network
The BSS without an AP is a stand-alone network and cannot send data to other BSSs.
they can locate one another and agree to be part of a BSS.
WLAN Topology
Infrastructure
EX: cellular network if we consider each BSS to be a cell
and each AP to be a base station.
Basic service sets (BSSs)
Distribution of Messages
Distribution service (DS)
Used to exchange MAC frames from station in one BSS to
station in another BSS
• When BSSs are connected, the stations within reach of one another can communicate
without the use of an AP.
• Note that a mobile station can belong to more than one BSS at the same time
Station Types
IEEE 802.11 defines three types of stations based on their
mobility in a wireless LAN:
• no-transition
A station is either stationary (not moving) or moving only inside a BSS
• BSS-transition
station can move from one BSS to another, but the movement is confined inside one
ESS.
• and ESS-transition mobility.
A station can move from one ESS to another
IEEE 802.11 Medium Access Control
MAC layer covers three functional areas:
Reliable data delivery
Access control
Security
MAC Sublayer
IEEE 802.11 defines two MAC sublayers:
• the distributed coordination function (DCF).
• and point coordination function (PCF).
MAC Sublayer
Distributed Coordination Function (DCF)
Distributed access protocol
Contention-Based
Makes use of CSMA/CA rather than CSMA/CD for the following
reasons:
Wireless LANs cannot implement CSMA/CD for three
reasons:
1. For collision detection a station must be able to send data and receive collision signals at the same
time( costly stations and increased bandwidth requirements).
2. Collision may not be detected because of the hidden station problem.
3. The distance between stations may result in Signal fading which prevent a station at one end from
hearing a collision at the other end.
Suited for ad hoc network and ordinary asynchronous traffic
CSMAICA in wireless LAN
1. station senses the medium
(checking the energy level at carrier frequency):
a. uses a persistence strategy with back-off
until the channel is idle.
b. if idle channel , waits for of time called
distributed interframe space (DIFS);
then sends a request to send (RTS) Control frame .
2. the destination station receive RTS and waite
for short interframe space (SIFS), than send
clear to send (CTS) control frame,(ready to receive data)
3. The source station sends data after waiting an
amount of time equal to SIFS.
4. The destination station, after waiting for time
equal to SIFS, sends an acknowledgment
collision avoidance CSMAICA
• Network allocation vector (NAV) used to avoid
collision.
• RTS frame includes the duration of time that it needs to occupy the
channel.
• stations affected by this transmission create a timer called (NAV)
• the network allocation vector (NAV) shows the time must pass before
these stations allowed to check the channel for idleness.
• there is no mechanism for collision detection, if the sender has
not received a CTS frame from the receiver, assumes there
has been a collision ,the sender tries again.
MAC Sublayer
Point Coordination Function (PCF)
an optional access method on top of DCF
Implemented in an infrastructure network (not in an ad hoc
network).
Contention-Free
mostly for time-sensitive transmission services like voice or
multimedia.
The AP performs polling stations one after another,
sending any data they have to the AP.
MAC Sublayer
• To give priority to PCF over DCF, another set of interframe spaces
has been defined:
 SIFS - Short Inter Frame Spacing
 Used for immediate response actions e.g ACK, CTS
 PIFS - Point Inter Frame Spacing
 PIFS (PCF IFS) is shorter than the DIFS.
• if, at the same time, a station wants to use only DCF and an AP wants
to use PCF, the AP has priority.
MAC Sublayer
• Repetition interval has been designed to cover both contention-free
(PCF) and contention-based (DCF) traffic to allow DCF accessing the
media.
• The repetition interval starts with control frame, called a beacon
frame.
• When the stations hear the beacon frame, they start their NAV for the
duration of the contention-free period of the repetition interval.
MAC Sublayer
• repetition interval used by the PC (point controller) stations.
• At the end of the contention-free period, the PC sends a CF
end (contention-free end) frame to allow the contention-based
stations to use the medium.
Fragmentation
• The wireless environment is very noisy.
• corrupt frame has to be retransmitted.
• Fragmentation is recommended.
• the division of a large frame into smaller ones.
• It is more efficient to resend a small frame than a
large one.
MAC Frame Format
The MAC layer frame consists of nine fields
MAC Frame Format
• Frame control : 2 bytes long and defines the type of frame and
some control information.
• D: In all frame types except one, this field defines the
duration of the transmission that is used to set the value of
NAV. In one control frame, this field defines the frame ID.
• Addresses: There are four address fields, each 6 bytes
long. The meaning of each address field depends on the
value of the To DS and From DS subfields .
MAC Layer Frames
• Sequence control: This field defines the sequence number of
the frame to be used in flow control.
• Frame body: This field can be between 0 and 2312 bytes, it
contains information based on the type and the subtype
defined in the FC field.
• FCS: The FCS field is 4 bytes long and contains a CRC-32
error detection sequence.
Frame Types
• IEEE 802.11 has three categories of frames:
• management frames:
used for the initial communication between stations and access
points.
• control frames.
used for accessing the channel and acknowledging frames
• data frames.
Data frames are used for carrying data and control information.
Frame Types
Addressing Mechanism
• IEEE 802.11 addressing mechanism specifies four
cases defined by the value of the two flags in the FC
field, To DS and From DS.
Addressing Mechanism
• Case 1: 00, To DS = 0 and From DS = 0
• This means that the frame is not going to a distribution system and is
not coming from a distribution system.
• The ACK frame should be sent to the original sender.
• Case 2: 01, In this case, To DS = 0 and From DS = 1.
• This means that the frame is coming from a distribution system (coming from
an AP ).
• The ACK should be sent to the AP. The addresses are as address 3
contains the original sender of the frame (in another BSS).
Addressing Mechanism
• Case 3: 10, To DS =1 and From DS =O.
• This means that the frame is going to a distribution system ( frame is going
from a station to an AP)
• The ACK is sent to the original station. address 3 contains the final destination
of the frame (in another BSS).
• o Case 4:11, To DS =1 and From DS =1.
• This is the case in which the distribution the frame is going from one AP to
another AP in a wireless distribution system.
• We do not need to define addresses if the distribution system is a wired LAN
because the frame in these cases has the format of a wired LAN frame
(Ethernet, for example).
• Here, we need four addresses to define the original sender, the final
destination, and two intermediate APs.
Addressing Mechanism
Physical Media Defined by Original 802.11
Standard
Industrial-Scientific-Medical (ISM) band
• The 2.4GHz ISM band is divided into 79 bands of
1MHz
Physical Media Defined by Original 802.11
Standard
IEEE 802.11 FHSS(Frequency-hopping spread spectrum)
Operating in 2.4 GHz ISM band
Lower cost, power consumption
Most tolerant to signal interference
IEEE 802.11 DSSS (Direct-sequence spread spectrum)
Operating in 2.4 GHz ISM band
Supports higher data rates
More range than FH or IR physical layers
IEEE 802.11 Infrared
Lowest cost
Lowest range compared to spread spectrum
Doesn’t penetrate walls, so no eavesdropping
IEEE 802.11a , IEEE 802.11b and IEEE
802.11g
IEEE 802.11a
Makes use of 5-GHz band
Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps
Uses orthogonal frequency division multiplexing (OFDM)
IEEE 802.11b
802.11b operates in 2.4 GHz band
Provides data rates of 5.5 and 11 Mbps
Complementary code keying (CCK) modulation scheme
IEEE 802.11g
802.11g operates in 2.4 GHz band
Provides data rates of 22 and 54 Mbps
Uses orthogonal frequency division multiplexing (OFDM)
BLUETOOTH
• Bluetooth is a wireless LAN technology designed to
connect devices of different functions such as
telephones, notebooks, computers, cameras, printers,
coffee makers, and so on.
• A Bluetooth LAN is an ad hoc network, which means
that the network is formed spontaneously.
• Bluetooth defines two types of networks: piconet and
scatternet.
Piconet
• A Bluetooth network is called a piconet, or a small net.
• It can have up to eight stations, one of which is called the master; the rest are
called slaves.
• Maximum of seven slaves. Only one master.
• Slaves synchronize their clocks and hopping sequence with the master.
• But an additional eight slaves can stay in parked state, which means they can be
synchronized with the master but cannot take part in communication until it is
moved from the parked state.
Scatternet
• Piconets can be combined to form what is called a scatternet.
• A slave station in one piconet can become the master in another
piconet.
• Bluetooth devices has a built-in short-range radio transmitter.
Bluetooth layers
• Radio Layer: Roughly equivalent to physical layer of the Internet model. Physical
links can be synchronous or asynchronous.
• Uses Frequency-hopping spread spectrum [Changing frequency of usage]. Changes it
modulation frequency 1600 times per second.
• Uses frequency shift keying (FSK )with Gaussian bandwidth filtering to transform bits to
a signal.
• Baseband layer: Roughly equivalent to MAC sublayer in LANs. Access is using
Time Division (Time slots).
• Length of time slot = dwell time = 625 microsec. So, during one frequency, a sender
sends a frame to a slave, or a slave sends a frame to the master.
• Time division duplexing TDMA (TDD-TDMA) is a kind of half-duplex
communication in which the slave and receiver send and receive data, but not at
the same time (half-duplex). However, the communication for each direction uses
different hops, like walkie-talkies.
Bluetooth layers
Single-secondary communication
• Also called Single-slave communication
• Master uses even-numbered slots
• Slave uses odd-numbered slots
Multiple-secondary communication
Also called Multiple-slave communication
• Master uses even-numbered slots
• Slave sends in the next odd-numbered slot if the packet in the
previous slot was addressed to it.
Physical Links
• Synchronous connection-oriented (SCO)
• Latency is important than integrity.
• Transmission using slots.
• No retransmission.
• Asynchronous connectionless link (ACL)
• Integrity is important than latency.
• Does like multiple-slave communication.
• Retransmission is done.
• L2CAP (Logical Link Control and Adaptation Protocol)
• Equivalent to LLC sublayer in LANs.
• Used for data exchange on ACL Link. SCO channels do not use L2CAP.
• Frame format has 16-bit length [Size of data coming from upper layer in bytes],
channel ID, data and control.
• Can do Multiplexing, segmentation and Reassembly, QoS [with no QoS, best-effort
delivery is provided] and Group mangement [Can do like multicast group, using some
kind of logical addresses].
L2CAP data packet format
SUMMARY
• The wireless LAN access method is CSMA/CA.
• The network allocation vector (NAV) is a timer for collision avoidance.
• The MAC layer frame has nine fields. The addressing mechanism can include up to four
addresses.
• Wireless LANs use management frames, control frames, and data frames.
• Bluetooth is a wireless LAN technology that connects devices (called gadgets) in a small
area.
• A Bluetooth network is called a piconet. Multiple piconets form a network called a
scatternet.
• The Bluetooth radio layer performs functions similar to those in the Internet model's physcial
layer.
• The Bluetooth baseband layer performs functions similar to those in the Internet model's
MAC sublayer.
• A Bluetooth network consists of one master device and up to seven slave devices.
• •A Bluetooth frame consists of data as well as hopping and control mechanisms. A frame is
one, three, or five slots in length with each slot equal to 625 μs.
ZIGBEE
ZigBee
• Technological Standard Created for Control and
Sensor Networks
• Based on the IEEE 802.15.4 Standard
• Created by the ZigBee Alliance
ZIGBEE
• The IEEE 802.15.4 covers the physical layer and the
MAC layer of low-rate WPAN.
• The ZigBee is “an emerging standard that is based on
the IEEE 802.15.4 and adds network construction
(star networks, peer-to-peer/mesh networks, and
cluster-tree networks), application services, and
more”.
– “the software”
– Network, Security &
Application layers
– Brand management
IEEE 802.15.4
– “the hardware”
– Physical & Media Access
Control layers
IEEE 802.15.4 & ZigBee In Context
PHY
868MHz / 915MHz / 2.4GHz
MAC
Network
Star / Mesh / Cluster-Tree
Security
32- / 64- / 128-bit encryption
Application
API
ZigBee
Alliance
IEEE
802.15.4
Customer
Silicon Stack App
The 802 Wireless Space
ZigBee Aims Low
• Low data rate
• Low power consumption
• Small packet devices
ZigBee Frequencies
• Operates in Unlicensed Bands
• ISM 2.4 GHz Global Band at 250kbps
• 868 MHz European Band at 20kbps
• 915 MHz North American Band at 40kbps
What Does ZigBee Do?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s) and
device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats, appliances,
etc.
Lights and Switches
Source: ZigBee Specification Document
How ZigBee Works
• Topology
• Star
• Cluster Tree
• Mesh
• Network coordinator, routers, end devices
How ZigBee Works
• States of operation
• Active
• Sleep
• Devices
• Full Function Devices (FFD’s)
• Reduced Function Devices (RFD’s)
• Modes of operation
• Beacon
• Non-beacon
Slide Courtesy of
ZigBee Mesh Networking
Slide Courtesy of
ZigBee Mesh Networking
Slide Courtesy of
ZigBee Mesh Networking
Source: http://www.zigbee.org/en/resources/#SlidePresentations
Slide Courtesy of
ZigBee Mesh Networking
Slide Courtesy of
ZigBee Mesh Networking
WHY ZIGBEE?
• Standards based
• Low cost
• Can be used globally
• Reliable and self healing
• Supports large number of nodes
• Easy to deploy
• Very long battery life
• Secure
IEEE 802.15.4 STANDARD
IEEE Std 802.15.4 defines the physical layer (PHY) and
medium access control (MAC) sublayer specifications for
low-data-rate wireless connectivity with fixed, portable,
and moving devices with no battery or very limited
battery consumption requirements typically operating in
the personal operating space (POS) of 10 m. It is
foreseen that, depending on the application, a longer
range at a lower data rate may be an acceptable
tradeoff.
IEEE 802.15.4 DEVICE TYPES
• The IEEE 802.15.4 standard (2003) defines the
device types that can be used in a LR-WPAN which
are Full Functional Device (FFD) and Reduced
Functional Device (RFD).
• The RFD can be used in simple applications in which
they do not need to transmit large amounts of data
and they have to communicate only with a specific
FFD
ZIGBEE STACK
IEEE 802.15.4 DEVICE TYPES
• The FFD can work as a PAN coordinator, as a
coordinator, or as a simple device. It can
communicate with either another FFD or a RFD.
PHYSICAL LAYER
• The 802.15.4 standard specifies two different services
that the Physical Layer(PHY) provides.
• The PHY data service controls the radio, and thus, the
transmission and reception of the PPDUs.
• The management service performs Energy Detection
in the channel, Clear Channel Assesment before
sending the messages and provides LQI for the
received packets.
ZIGBEE STANDARD
• ZigBee, a new standard which became publicly
available in June 2005, is based on the IEEE 802.15.4
standard.
• It expands the IEEE 802.15.4 by adding the
framework for the network construction, security and
application layer services.
NETWORK LAYER
• The ZigBee standard works on top of the IEEE
802.15.4 addressing schema by using the standard
64-bit and the short 16-bit addressing.
• Network layer responsibilities:
• Establishment of a new network.
• New device configuration, addressing assignment,
network synchronization
• Frames security
• Message routing.
DEVICE TYPES
• Uses notion of “logical devices.”
• “ZigBee Coordinator” is the first type of logical devices.
• It is responsible for initializing, maintaining, and managing the network.
• Under the coordinator in the network hierarchy is the “ZigBee
router,”
• Responsible for controlling the message routing between the nodes.
• “ZigBee End Device” acts as the end point of the network
structure.
ZIGBEE NETWORK TOPOLOGIES
SECURITY IN ZIGBEE
• Security services provided by ZigBee: “key establishment, key
transport, frame protection, and device management.”
• The security mechanism covers the network and the
application layer.
• The notion of end-to-end security is supported; the source and
destination devices have access and use the same share key.
• In the MAC layer the 802.15.4 AES mechanism provides the
proper security.
Comparison Zigbee and Bluetooth
Properties Bluetooth Zigbee
Modulation technique
Frequency Hopping
Spread Spectrum
(FHSS)
Direct Sequence Spread Spectrum
(DSSS)
Protocol stack size 250 Kbyte 28 Kbyte
Battery
Intended for frequent
recharging
Not rechargeable (one reason
batteries will last for up to 10 years)
Maximum network speed: 1 Mbit/s 250 Kbit/s
Network range:
1 or 100 m based on
radio class
upto 70 m
Typical network join time 3 sec 30 ms
Cost Cheaper Costlier
ZigBee and Other Wireless Technologies
ZIGBEE PROMOTERS
ZIGBEE APPLICATIONS
TELECOM
SERVICES
m-commerce
info services
object interaction
(Internet of Things)
ZigBee
Wireless
Control
that
Simply
Works
TV
VCR
DVD/CD
remote
security
HVAC
lighting control
access control
irrigation
PC &
PERIPHERALS
asset mgt
process
control
environmental
energy mgt
PERSONAL
HEALTH CARE
security
HVAC
AMR
lighting control
access control
patient
monitoring
fitness
monitoring
SOME APPLICATION PROFILES
• Home Automation [HA]
– Defines set of devices used in
home automation
• Light switches
• Thermostats
• Window shade
• Heating unit
• etc.
SOME APPLICATION PROFILES
 Industrial Plant Monitoring
 Consists of device definitions
for sensors used in industrial
control
 Temperature
 Pressure sensors
 Infrared
 etc.
MORE APPLICATION PROFILES
• Multiple profiles at various stages of completion
• Commercial Building Automation
• Building control, management, and monitoring
• Telecom Services/M-commerce
• Automated Meter Reading
• Addresses utility meter reading
• Wireless Sensor Networks
• Very low power unattended networks
• Vendors may form new profile groups within ZigBee
and/or propose private profiles for consideration
• 400+ private profile IDs issued
In-Home Patient Monitoring
• Patients receive better care at reduced cost with more freedom and comfort
– Patients can remain in their own home
• Monitors vital statistics and sends via internet
• Doctors can adjust medication levels
– Allows monitoring of elderly family member
• Sense movement or usage patterns in a home
• Turns lights on when they get out of bed
• Notify via mobile phone when anomalies occur
• Wireless panic buttons for falls or other problems
– Can also be used in hospital care
• Patients are allowed greater movement
• Reduced staff to patient ratio
graphic
graphic
Commercial Lighting Control
• Wireless lighting control
• Dimmable intelligent ballasts
• Light switches/sensors anywhere
• Customizable lighting schemes
• Quantifiable energy savings
• Opportunities in residential, light
commercial and commercial
• Extendable networks
• Lighting network can be integrated with
and/or be used by other building
control solutions
CONCLUSION
• Zigbee applications are in diverse areas
• Zigbee Alliance works as a non-profit organization
which has more than 200 members.
• IEEE 802.15.4 covers Physical Layer And Mac
Layer.
• Zigbee adds network construction,application
services, and more.
Virtual LAN (VLAN)
VLAN Overview (1)
• A VLAN allows a network administrator to create groups of logically
networked devices that act as if they are on their own independent
network, even if they share a common infrastructure with other VLANs.
• Using VLANs, you can logically segment switched networks based on
functions, departments, or project teams.
• You can also use a VLAN to geographically structure your network to
support the growing reliance of companies on home-based workers.
• These VLANs allow the network administrator to implement access
and security policies to particular groups of users.
VLAN Overview (2)
Benefits of VLAN (1)
• Security - Groups that have sensitive data are separated
from the rest of the network, decreasing the chances of
confidential information breaches.
• Faculty computers are on VLAN 10 and completely separated from
student and guest data traffic.
• Cost reduction - Cost savings result from less need for
expensive network upgrades and more efficient use of
existing bandwidth and uplinks.
Benefits of VLAN (3)
Benefits of VLAN (2)
• Higher performance - Dividing flat Layer 2 networks into
multiple logical workgroups (broadcast domains) reduces
unnecessary traffic on the network and boosts performance.
• Broadcast storm mitigation - Dividing a network into VLANs
reduces the number of devices that may participate in a
broadcast storm.
• In the figure you can see that although there are six computers on
this network, there are only three broadcast domains: Faculty,
Student, and Guest.
Benefits of VLAN (3)
• Simpler project or application management - VLANs
aggregate users and network devices to support business or
geographic requirements.
• Having separate functions makes managing a project or
working with a specialized application easier, for example, an
e-learning development platform for faculty.
• It is also easier to determine the scope of the effects of
upgrading network services.
Benefits of VLAN (4)
• Improved IT staff efficiency - VLANs make it easier to
manage the network because users with similar network
requirements share the same VLAN.
• When you provision a new switch, all the policies and procedures
already configured for the particular VLAN are implemented when
the ports are assigned.
• It is also easy for the IT staff to identify the function of a VLAN by
giving it an appropriate name.
• In the figure, for easy identification VLAN 20 could be named
"Student", VLAN 10 could be named "Faculty", and VLAN 30
"Guest."
VLAN in details (1)
• A VLAN is a logically separate IP subnetwork.
• VLANs allow multiple IP networks and subnets to exist on the
same switched network.
• For computers to communicate on the same VLAN, each
must have an IP address and a subnet mask that is
consistent for that VLAN.
• The switch has to be configured with the VLAN and each port
in the VLAN must be assigned to the VLAN.
VLAN in details (2)
• A switch port with a singular VLAN configured on it is
called an access port.
• Remember, just because two computers are
physically connected to the same switch does not
mean that they can communicate.
• Devices on two separate networks and subnets must
communicate via a router (Layer 3), whether or not
VLANs are used.
VLAN in details (3)
Thank You

wireless lan presentation.ppt

  • 1.
  • 2.
    LAN/WLAN World  LANsprovide connectivity for interconnecting computing resources at the local levels of an organization  Wired LANs Limitations because of physical, hard-wired infrastructure  Wireless LANs provide Flexibility Portability Mobility Ease of Installation
  • 3.
    Wireless LAN Applications MedicalProfessionals Education Temporary Situations Airlines Security Staff Emergency Centers
  • 4.
    IEEE 802.11 WirelessLAN Standard In response to lacking standards, IEEE developed the first internationally recognized wireless LAN standard – IEEE 802.11 IEEE published 802.11 in 1997, after seven years of work Scope of IEEE 802.11 is limited to Physical and Data Link Layers.
  • 5.
    Benefits of 802.11Standard Appliance Interoperability Fast Product Development Stable Future Migration Price Reductions The 802.11 standard takes into account the following significant differences between wireless and wired LANs: Power Management Security Bandwidth
  • 6.
    IEEE 802.11 Terminology Accesspoint (AP): A station that provides access to the DS. Basic service set : a set is of stationary or mobile wireless stations and an optional central base station, known as the access point (AP). Distribution system (DS): A system used to interconnect a set of BSSs to create an ESS.  DS is implementation-independent. It can be a wired 802.3 Ethernet LAN, 802.4 token bus, 802.5 token ring or another 802.11 medium. Extended service set (ESS):Two or more BSS interconnected by DS extended service set uses two types of stations: mobile and stationary  The mobile stations are normal stations inside a BSS. The stationary stations are AP stations that are part of a wired LAN.
  • 7.
    WLAN Topology Ad-Hoc Network TheBSS without an AP is a stand-alone network and cannot send data to other BSSs. they can locate one another and agree to be part of a BSS.
  • 8.
    WLAN Topology Infrastructure EX: cellularnetwork if we consider each BSS to be a cell and each AP to be a base station.
  • 9.
  • 10.
    Distribution of Messages Distributionservice (DS) Used to exchange MAC frames from station in one BSS to station in another BSS • When BSSs are connected, the stations within reach of one another can communicate without the use of an AP. • Note that a mobile station can belong to more than one BSS at the same time
  • 11.
    Station Types IEEE 802.11defines three types of stations based on their mobility in a wireless LAN: • no-transition A station is either stationary (not moving) or moving only inside a BSS • BSS-transition station can move from one BSS to another, but the movement is confined inside one ESS. • and ESS-transition mobility. A station can move from one ESS to another
  • 12.
    IEEE 802.11 MediumAccess Control MAC layer covers three functional areas: Reliable data delivery Access control Security
  • 13.
    MAC Sublayer IEEE 802.11defines two MAC sublayers: • the distributed coordination function (DCF). • and point coordination function (PCF).
  • 14.
    MAC Sublayer Distributed CoordinationFunction (DCF) Distributed access protocol Contention-Based Makes use of CSMA/CA rather than CSMA/CD for the following reasons: Wireless LANs cannot implement CSMA/CD for three reasons: 1. For collision detection a station must be able to send data and receive collision signals at the same time( costly stations and increased bandwidth requirements). 2. Collision may not be detected because of the hidden station problem. 3. The distance between stations may result in Signal fading which prevent a station at one end from hearing a collision at the other end. Suited for ad hoc network and ordinary asynchronous traffic
  • 15.
    CSMAICA in wirelessLAN 1. station senses the medium (checking the energy level at carrier frequency): a. uses a persistence strategy with back-off until the channel is idle. b. if idle channel , waits for of time called distributed interframe space (DIFS); then sends a request to send (RTS) Control frame . 2. the destination station receive RTS and waite for short interframe space (SIFS), than send clear to send (CTS) control frame,(ready to receive data) 3. The source station sends data after waiting an amount of time equal to SIFS. 4. The destination station, after waiting for time equal to SIFS, sends an acknowledgment
  • 16.
    collision avoidance CSMAICA •Network allocation vector (NAV) used to avoid collision. • RTS frame includes the duration of time that it needs to occupy the channel. • stations affected by this transmission create a timer called (NAV) • the network allocation vector (NAV) shows the time must pass before these stations allowed to check the channel for idleness. • there is no mechanism for collision detection, if the sender has not received a CTS frame from the receiver, assumes there has been a collision ,the sender tries again.
  • 17.
    MAC Sublayer Point CoordinationFunction (PCF) an optional access method on top of DCF Implemented in an infrastructure network (not in an ad hoc network). Contention-Free mostly for time-sensitive transmission services like voice or multimedia. The AP performs polling stations one after another, sending any data they have to the AP.
  • 18.
    MAC Sublayer • Togive priority to PCF over DCF, another set of interframe spaces has been defined:  SIFS - Short Inter Frame Spacing  Used for immediate response actions e.g ACK, CTS  PIFS - Point Inter Frame Spacing  PIFS (PCF IFS) is shorter than the DIFS. • if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the AP has priority.
  • 19.
    MAC Sublayer • Repetitioninterval has been designed to cover both contention-free (PCF) and contention-based (DCF) traffic to allow DCF accessing the media. • The repetition interval starts with control frame, called a beacon frame. • When the stations hear the beacon frame, they start their NAV for the duration of the contention-free period of the repetition interval.
  • 20.
    MAC Sublayer • repetitioninterval used by the PC (point controller) stations. • At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow the contention-based stations to use the medium.
  • 21.
    Fragmentation • The wirelessenvironment is very noisy. • corrupt frame has to be retransmitted. • Fragmentation is recommended. • the division of a large frame into smaller ones. • It is more efficient to resend a small frame than a large one.
  • 22.
    MAC Frame Format TheMAC layer frame consists of nine fields
  • 23.
    MAC Frame Format •Frame control : 2 bytes long and defines the type of frame and some control information. • D: In all frame types except one, this field defines the duration of the transmission that is used to set the value of NAV. In one control frame, this field defines the frame ID. • Addresses: There are four address fields, each 6 bytes long. The meaning of each address field depends on the value of the To DS and From DS subfields .
  • 24.
    MAC Layer Frames •Sequence control: This field defines the sequence number of the frame to be used in flow control. • Frame body: This field can be between 0 and 2312 bytes, it contains information based on the type and the subtype defined in the FC field. • FCS: The FCS field is 4 bytes long and contains a CRC-32 error detection sequence.
  • 25.
    Frame Types • IEEE802.11 has three categories of frames: • management frames: used for the initial communication between stations and access points. • control frames. used for accessing the channel and acknowledging frames • data frames. Data frames are used for carrying data and control information.
  • 26.
  • 27.
    Addressing Mechanism • IEEE802.11 addressing mechanism specifies four cases defined by the value of the two flags in the FC field, To DS and From DS.
  • 28.
    Addressing Mechanism • Case1: 00, To DS = 0 and From DS = 0 • This means that the frame is not going to a distribution system and is not coming from a distribution system. • The ACK frame should be sent to the original sender. • Case 2: 01, In this case, To DS = 0 and From DS = 1. • This means that the frame is coming from a distribution system (coming from an AP ). • The ACK should be sent to the AP. The addresses are as address 3 contains the original sender of the frame (in another BSS).
  • 29.
    Addressing Mechanism • Case3: 10, To DS =1 and From DS =O. • This means that the frame is going to a distribution system ( frame is going from a station to an AP) • The ACK is sent to the original station. address 3 contains the final destination of the frame (in another BSS). • o Case 4:11, To DS =1 and From DS =1. • This is the case in which the distribution the frame is going from one AP to another AP in a wireless distribution system. • We do not need to define addresses if the distribution system is a wired LAN because the frame in these cases has the format of a wired LAN frame (Ethernet, for example). • Here, we need four addresses to define the original sender, the final destination, and two intermediate APs.
  • 30.
  • 31.
    Physical Media Definedby Original 802.11 Standard
  • 32.
    Industrial-Scientific-Medical (ISM) band •The 2.4GHz ISM band is divided into 79 bands of 1MHz
  • 33.
    Physical Media Definedby Original 802.11 Standard IEEE 802.11 FHSS(Frequency-hopping spread spectrum) Operating in 2.4 GHz ISM band Lower cost, power consumption Most tolerant to signal interference IEEE 802.11 DSSS (Direct-sequence spread spectrum) Operating in 2.4 GHz ISM band Supports higher data rates More range than FH or IR physical layers IEEE 802.11 Infrared Lowest cost Lowest range compared to spread spectrum Doesn’t penetrate walls, so no eavesdropping
  • 34.
    IEEE 802.11a ,IEEE 802.11b and IEEE 802.11g IEEE 802.11a Makes use of 5-GHz band Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps Uses orthogonal frequency division multiplexing (OFDM) IEEE 802.11b 802.11b operates in 2.4 GHz band Provides data rates of 5.5 and 11 Mbps Complementary code keying (CCK) modulation scheme IEEE 802.11g 802.11g operates in 2.4 GHz band Provides data rates of 22 and 54 Mbps Uses orthogonal frequency division multiplexing (OFDM)
  • 35.
    BLUETOOTH • Bluetooth isa wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. • A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously. • Bluetooth defines two types of networks: piconet and scatternet.
  • 36.
    Piconet • A Bluetoothnetwork is called a piconet, or a small net. • It can have up to eight stations, one of which is called the master; the rest are called slaves. • Maximum of seven slaves. Only one master. • Slaves synchronize their clocks and hopping sequence with the master. • But an additional eight slaves can stay in parked state, which means they can be synchronized with the master but cannot take part in communication until it is moved from the parked state.
  • 37.
    Scatternet • Piconets canbe combined to form what is called a scatternet. • A slave station in one piconet can become the master in another piconet. • Bluetooth devices has a built-in short-range radio transmitter.
  • 38.
    Bluetooth layers • RadioLayer: Roughly equivalent to physical layer of the Internet model. Physical links can be synchronous or asynchronous. • Uses Frequency-hopping spread spectrum [Changing frequency of usage]. Changes it modulation frequency 1600 times per second. • Uses frequency shift keying (FSK )with Gaussian bandwidth filtering to transform bits to a signal. • Baseband layer: Roughly equivalent to MAC sublayer in LANs. Access is using Time Division (Time slots). • Length of time slot = dwell time = 625 microsec. So, during one frequency, a sender sends a frame to a slave, or a slave sends a frame to the master. • Time division duplexing TDMA (TDD-TDMA) is a kind of half-duplex communication in which the slave and receiver send and receive data, but not at the same time (half-duplex). However, the communication for each direction uses different hops, like walkie-talkies.
  • 39.
  • 40.
    Single-secondary communication • Alsocalled Single-slave communication • Master uses even-numbered slots • Slave uses odd-numbered slots
  • 41.
    Multiple-secondary communication Also calledMultiple-slave communication • Master uses even-numbered slots • Slave sends in the next odd-numbered slot if the packet in the previous slot was addressed to it.
  • 42.
    Physical Links • Synchronousconnection-oriented (SCO) • Latency is important than integrity. • Transmission using slots. • No retransmission. • Asynchronous connectionless link (ACL) • Integrity is important than latency. • Does like multiple-slave communication. • Retransmission is done. • L2CAP (Logical Link Control and Adaptation Protocol) • Equivalent to LLC sublayer in LANs. • Used for data exchange on ACL Link. SCO channels do not use L2CAP. • Frame format has 16-bit length [Size of data coming from upper layer in bytes], channel ID, data and control. • Can do Multiplexing, segmentation and Reassembly, QoS [with no QoS, best-effort delivery is provided] and Group mangement [Can do like multicast group, using some kind of logical addresses].
  • 43.
  • 44.
    SUMMARY • The wirelessLAN access method is CSMA/CA. • The network allocation vector (NAV) is a timer for collision avoidance. • The MAC layer frame has nine fields. The addressing mechanism can include up to four addresses. • Wireless LANs use management frames, control frames, and data frames. • Bluetooth is a wireless LAN technology that connects devices (called gadgets) in a small area. • A Bluetooth network is called a piconet. Multiple piconets form a network called a scatternet. • The Bluetooth radio layer performs functions similar to those in the Internet model's physcial layer. • The Bluetooth baseband layer performs functions similar to those in the Internet model's MAC sublayer. • A Bluetooth network consists of one master device and up to seven slave devices. • •A Bluetooth frame consists of data as well as hopping and control mechanisms. A frame is one, three, or five slots in length with each slot equal to 625 μs.
  • 45.
  • 46.
    ZigBee • Technological StandardCreated for Control and Sensor Networks • Based on the IEEE 802.15.4 Standard • Created by the ZigBee Alliance
  • 47.
    ZIGBEE • The IEEE802.15.4 covers the physical layer and the MAC layer of low-rate WPAN. • The ZigBee is “an emerging standard that is based on the IEEE 802.15.4 and adds network construction (star networks, peer-to-peer/mesh networks, and cluster-tree networks), application services, and more”.
  • 48.
    – “the software” –Network, Security & Application layers – Brand management IEEE 802.15.4 – “the hardware” – Physical & Media Access Control layers IEEE 802.15.4 & ZigBee In Context PHY 868MHz / 915MHz / 2.4GHz MAC Network Star / Mesh / Cluster-Tree Security 32- / 64- / 128-bit encryption Application API ZigBee Alliance IEEE 802.15.4 Customer Silicon Stack App
  • 49.
  • 50.
    ZigBee Aims Low •Low data rate • Low power consumption • Small packet devices
  • 51.
    ZigBee Frequencies • Operatesin Unlicensed Bands • ISM 2.4 GHz Global Band at 250kbps • 868 MHz European Band at 20kbps • 915 MHz North American Band at 40kbps
  • 52.
    What Does ZigBeeDo? • Designed for wireless controls and sensors • Operates in Personal Area Networks (PAN’s) and device-to-device networks • Connectivity between small packet devices • Control of lights, switches, thermostats, appliances, etc.
  • 53.
    Lights and Switches Source:ZigBee Specification Document
  • 54.
    How ZigBee Works •Topology • Star • Cluster Tree • Mesh • Network coordinator, routers, end devices
  • 55.
    How ZigBee Works •States of operation • Active • Sleep • Devices • Full Function Devices (FFD’s) • Reduced Function Devices (RFD’s) • Modes of operation • Beacon • Non-beacon
  • 56.
    Slide Courtesy of ZigBeeMesh Networking
  • 57.
    Slide Courtesy of ZigBeeMesh Networking
  • 58.
    Slide Courtesy of ZigBeeMesh Networking Source: http://www.zigbee.org/en/resources/#SlidePresentations
  • 59.
    Slide Courtesy of ZigBeeMesh Networking
  • 60.
    Slide Courtesy of ZigBeeMesh Networking
  • 61.
    WHY ZIGBEE? • Standardsbased • Low cost • Can be used globally • Reliable and self healing • Supports large number of nodes • Easy to deploy • Very long battery life • Secure
  • 62.
    IEEE 802.15.4 STANDARD IEEEStd 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sublayer specifications for low-data-rate wireless connectivity with fixed, portable, and moving devices with no battery or very limited battery consumption requirements typically operating in the personal operating space (POS) of 10 m. It is foreseen that, depending on the application, a longer range at a lower data rate may be an acceptable tradeoff.
  • 63.
    IEEE 802.15.4 DEVICETYPES • The IEEE 802.15.4 standard (2003) defines the device types that can be used in a LR-WPAN which are Full Functional Device (FFD) and Reduced Functional Device (RFD). • The RFD can be used in simple applications in which they do not need to transmit large amounts of data and they have to communicate only with a specific FFD
  • 64.
  • 65.
    IEEE 802.15.4 DEVICETYPES • The FFD can work as a PAN coordinator, as a coordinator, or as a simple device. It can communicate with either another FFD or a RFD.
  • 66.
    PHYSICAL LAYER • The802.15.4 standard specifies two different services that the Physical Layer(PHY) provides. • The PHY data service controls the radio, and thus, the transmission and reception of the PPDUs. • The management service performs Energy Detection in the channel, Clear Channel Assesment before sending the messages and provides LQI for the received packets.
  • 67.
    ZIGBEE STANDARD • ZigBee,a new standard which became publicly available in June 2005, is based on the IEEE 802.15.4 standard. • It expands the IEEE 802.15.4 by adding the framework for the network construction, security and application layer services.
  • 68.
    NETWORK LAYER • TheZigBee standard works on top of the IEEE 802.15.4 addressing schema by using the standard 64-bit and the short 16-bit addressing. • Network layer responsibilities: • Establishment of a new network. • New device configuration, addressing assignment, network synchronization • Frames security • Message routing.
  • 69.
    DEVICE TYPES • Usesnotion of “logical devices.” • “ZigBee Coordinator” is the first type of logical devices. • It is responsible for initializing, maintaining, and managing the network. • Under the coordinator in the network hierarchy is the “ZigBee router,” • Responsible for controlling the message routing between the nodes. • “ZigBee End Device” acts as the end point of the network structure.
  • 70.
  • 71.
    SECURITY IN ZIGBEE •Security services provided by ZigBee: “key establishment, key transport, frame protection, and device management.” • The security mechanism covers the network and the application layer. • The notion of end-to-end security is supported; the source and destination devices have access and use the same share key. • In the MAC layer the 802.15.4 AES mechanism provides the proper security.
  • 72.
    Comparison Zigbee andBluetooth Properties Bluetooth Zigbee Modulation technique Frequency Hopping Spread Spectrum (FHSS) Direct Sequence Spread Spectrum (DSSS) Protocol stack size 250 Kbyte 28 Kbyte Battery Intended for frequent recharging Not rechargeable (one reason batteries will last for up to 10 years) Maximum network speed: 1 Mbit/s 250 Kbit/s Network range: 1 or 100 m based on radio class upto 70 m Typical network join time 3 sec 30 ms Cost Cheaper Costlier
  • 73.
    ZigBee and OtherWireless Technologies
  • 74.
  • 75.
    ZIGBEE APPLICATIONS TELECOM SERVICES m-commerce info services objectinteraction (Internet of Things) ZigBee Wireless Control that Simply Works TV VCR DVD/CD remote security HVAC lighting control access control irrigation PC & PERIPHERALS asset mgt process control environmental energy mgt PERSONAL HEALTH CARE security HVAC AMR lighting control access control patient monitoring fitness monitoring
  • 76.
    SOME APPLICATION PROFILES •Home Automation [HA] – Defines set of devices used in home automation • Light switches • Thermostats • Window shade • Heating unit • etc.
  • 77.
    SOME APPLICATION PROFILES Industrial Plant Monitoring  Consists of device definitions for sensors used in industrial control  Temperature  Pressure sensors  Infrared  etc.
  • 78.
    MORE APPLICATION PROFILES •Multiple profiles at various stages of completion • Commercial Building Automation • Building control, management, and monitoring • Telecom Services/M-commerce • Automated Meter Reading • Addresses utility meter reading • Wireless Sensor Networks • Very low power unattended networks • Vendors may form new profile groups within ZigBee and/or propose private profiles for consideration • 400+ private profile IDs issued
  • 79.
    In-Home Patient Monitoring •Patients receive better care at reduced cost with more freedom and comfort – Patients can remain in their own home • Monitors vital statistics and sends via internet • Doctors can adjust medication levels – Allows monitoring of elderly family member • Sense movement or usage patterns in a home • Turns lights on when they get out of bed • Notify via mobile phone when anomalies occur • Wireless panic buttons for falls or other problems – Can also be used in hospital care • Patients are allowed greater movement • Reduced staff to patient ratio graphic graphic
  • 80.
    Commercial Lighting Control •Wireless lighting control • Dimmable intelligent ballasts • Light switches/sensors anywhere • Customizable lighting schemes • Quantifiable energy savings • Opportunities in residential, light commercial and commercial • Extendable networks • Lighting network can be integrated with and/or be used by other building control solutions
  • 81.
    CONCLUSION • Zigbee applicationsare in diverse areas • Zigbee Alliance works as a non-profit organization which has more than 200 members. • IEEE 802.15.4 covers Physical Layer And Mac Layer. • Zigbee adds network construction,application services, and more.
  • 82.
  • 83.
    VLAN Overview (1) •A VLAN allows a network administrator to create groups of logically networked devices that act as if they are on their own independent network, even if they share a common infrastructure with other VLANs. • Using VLANs, you can logically segment switched networks based on functions, departments, or project teams. • You can also use a VLAN to geographically structure your network to support the growing reliance of companies on home-based workers. • These VLANs allow the network administrator to implement access and security policies to particular groups of users.
  • 84.
  • 85.
    Benefits of VLAN(1) • Security - Groups that have sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. • Faculty computers are on VLAN 10 and completely separated from student and guest data traffic. • Cost reduction - Cost savings result from less need for expensive network upgrades and more efficient use of existing bandwidth and uplinks.
  • 86.
  • 87.
    Benefits of VLAN(2) • Higher performance - Dividing flat Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and boosts performance. • Broadcast storm mitigation - Dividing a network into VLANs reduces the number of devices that may participate in a broadcast storm. • In the figure you can see that although there are six computers on this network, there are only three broadcast domains: Faculty, Student, and Guest.
  • 88.
    Benefits of VLAN(3) • Simpler project or application management - VLANs aggregate users and network devices to support business or geographic requirements. • Having separate functions makes managing a project or working with a specialized application easier, for example, an e-learning development platform for faculty. • It is also easier to determine the scope of the effects of upgrading network services.
  • 89.
    Benefits of VLAN(4) • Improved IT staff efficiency - VLANs make it easier to manage the network because users with similar network requirements share the same VLAN. • When you provision a new switch, all the policies and procedures already configured for the particular VLAN are implemented when the ports are assigned. • It is also easy for the IT staff to identify the function of a VLAN by giving it an appropriate name. • In the figure, for easy identification VLAN 20 could be named "Student", VLAN 10 could be named "Faculty", and VLAN 30 "Guest."
  • 90.
    VLAN in details(1) • A VLAN is a logically separate IP subnetwork. • VLANs allow multiple IP networks and subnets to exist on the same switched network. • For computers to communicate on the same VLAN, each must have an IP address and a subnet mask that is consistent for that VLAN. • The switch has to be configured with the VLAN and each port in the VLAN must be assigned to the VLAN.
  • 91.
    VLAN in details(2) • A switch port with a singular VLAN configured on it is called an access port. • Remember, just because two computers are physically connected to the same switch does not mean that they can communicate. • Devices on two separate networks and subnets must communicate via a router (Layer 3), whether or not VLANs are used.
  • 92.
  • 93.