- Wireless LANs use either wired or wireless infrastructure to connect computing devices within a local area. Wireless LANs provide flexibility, portability, mobility and ease of installation compared to wired LANs.
- The IEEE 802.11 standard defines the physical and data link layers for wireless LANs. It addresses issues like power management, security, and bandwidth that are important for wireless networks.
- The MAC layer uses either a contention-based distributed coordination function (DCF) or contention-free point coordination function (PCF). DCF uses CSMA/CA for channel access while PCF uses polling for contention-free access.
Introduction to Wireless LANs, flexibility, portability, mobility, and ease of installation.
Applications of Wireless LANs in medical, educational, security, and emergency sectors.
Development and benefits of IEEE 802.11 standard including interoperability and security.
Definitions of access points, basic service sets, distribution systems, and network topology.
Classification of stations by mobility in WLANs including no-transition, BSS-transition, and ESS-transition.
Functional areas of MAC layer covering reliable data delivery, access control, and security.
Different MAC sublayers including DCF and PCF, their functionalities, and interframe spacing.
Discussion on frame fragmentation in noisy wireless environments and retransmission efficiency.
Overview of MAC frame structure including control, addressing, management, and data frames.
Detailed addressing schemes in WLANs based on the FC field flags and various addressing cases.
Description of the original 802.11 standards defining physical media and frequency characteristics.
Overview of 802.11a, b, and g protocols and features of Bluetooth technology in wireless connectivity.
Introduction of ZigBee technology focusing on low-rate WPAN based on the IEEE 802.15.4 standard.
ZigBee features including low data rates, low power consumption, and multi-device communications.
Diverse applications of ZigBee in home automation, health care, commercial control, etc. Discussion on ZigBee standards, device types, protocols, network layers, and security services.
Introduction to VLANs, benefits including security, cost reduction, performance, and management.
Details on VLAN configurations, switch port definitions, and communication requirements.
LAN/WLAN World
LANsprovide connectivity for interconnecting
computing resources at the local levels of an
organization
Wired LANs
Limitations because of physical, hard-wired
infrastructure
Wireless LANs provide
Flexibility
Portability
Mobility
Ease of Installation
IEEE 802.11 WirelessLAN Standard
In response to lacking standards, IEEE developed
the first internationally recognized wireless LAN
standard – IEEE 802.11
IEEE published 802.11 in 1997, after seven years
of work
Scope of IEEE 802.11 is limited to Physical and
Data Link Layers.
5.
Benefits of 802.11Standard
Appliance Interoperability
Fast Product Development
Stable Future Migration
Price Reductions
The 802.11 standard takes into account the following
significant differences between wireless and wired LANs:
Power Management
Security
Bandwidth
6.
IEEE 802.11 Terminology
Accesspoint (AP): A station that provides access to the
DS.
Basic service set :
a set is of stationary or mobile wireless stations and an optional central base
station, known as the access point (AP).
Distribution system (DS): A system used to interconnect
a set of BSSs to create an ESS.
DS is implementation-independent. It can be a wired 802.3 Ethernet LAN,
802.4 token bus, 802.5 token ring or another 802.11 medium.
Extended service set (ESS):Two or more BSS
interconnected by DS
extended service set uses two types of stations: mobile and
stationary
The mobile stations are normal stations inside a BSS. The stationary
stations are AP stations that are part of a wired LAN.
7.
WLAN Topology
Ad-Hoc Network
TheBSS without an AP is a stand-alone network and cannot send data to other BSSs.
they can locate one another and agree to be part of a BSS.
Distribution of Messages
Distributionservice (DS)
Used to exchange MAC frames from station in one BSS to
station in another BSS
• When BSSs are connected, the stations within reach of one another can communicate
without the use of an AP.
• Note that a mobile station can belong to more than one BSS at the same time
11.
Station Types
IEEE 802.11defines three types of stations based on their
mobility in a wireless LAN:
• no-transition
A station is either stationary (not moving) or moving only inside a BSS
• BSS-transition
station can move from one BSS to another, but the movement is confined inside one
ESS.
• and ESS-transition mobility.
A station can move from one ESS to another
12.
IEEE 802.11 MediumAccess Control
MAC layer covers three functional areas:
Reliable data delivery
Access control
Security
13.
MAC Sublayer
IEEE 802.11defines two MAC sublayers:
• the distributed coordination function (DCF).
• and point coordination function (PCF).
14.
MAC Sublayer
Distributed CoordinationFunction (DCF)
Distributed access protocol
Contention-Based
Makes use of CSMA/CA rather than CSMA/CD for the following
reasons:
Wireless LANs cannot implement CSMA/CD for three
reasons:
1. For collision detection a station must be able to send data and receive collision signals at the same
time( costly stations and increased bandwidth requirements).
2. Collision may not be detected because of the hidden station problem.
3. The distance between stations may result in Signal fading which prevent a station at one end from
hearing a collision at the other end.
Suited for ad hoc network and ordinary asynchronous traffic
15.
CSMAICA in wirelessLAN
1. station senses the medium
(checking the energy level at carrier frequency):
a. uses a persistence strategy with back-off
until the channel is idle.
b. if idle channel , waits for of time called
distributed interframe space (DIFS);
then sends a request to send (RTS) Control frame .
2. the destination station receive RTS and waite
for short interframe space (SIFS), than send
clear to send (CTS) control frame,(ready to receive data)
3. The source station sends data after waiting an
amount of time equal to SIFS.
4. The destination station, after waiting for time
equal to SIFS, sends an acknowledgment
16.
collision avoidance CSMAICA
•Network allocation vector (NAV) used to avoid
collision.
• RTS frame includes the duration of time that it needs to occupy the
channel.
• stations affected by this transmission create a timer called (NAV)
• the network allocation vector (NAV) shows the time must pass before
these stations allowed to check the channel for idleness.
• there is no mechanism for collision detection, if the sender has
not received a CTS frame from the receiver, assumes there
has been a collision ,the sender tries again.
17.
MAC Sublayer
Point CoordinationFunction (PCF)
an optional access method on top of DCF
Implemented in an infrastructure network (not in an ad hoc
network).
Contention-Free
mostly for time-sensitive transmission services like voice or
multimedia.
The AP performs polling stations one after another,
sending any data they have to the AP.
18.
MAC Sublayer
• Togive priority to PCF over DCF, another set of interframe spaces
has been defined:
SIFS - Short Inter Frame Spacing
Used for immediate response actions e.g ACK, CTS
PIFS - Point Inter Frame Spacing
PIFS (PCF IFS) is shorter than the DIFS.
• if, at the same time, a station wants to use only DCF and an AP wants
to use PCF, the AP has priority.
19.
MAC Sublayer
• Repetitioninterval has been designed to cover both contention-free
(PCF) and contention-based (DCF) traffic to allow DCF accessing the
media.
• The repetition interval starts with control frame, called a beacon
frame.
• When the stations hear the beacon frame, they start their NAV for the
duration of the contention-free period of the repetition interval.
20.
MAC Sublayer
• repetitioninterval used by the PC (point controller) stations.
• At the end of the contention-free period, the PC sends a CF
end (contention-free end) frame to allow the contention-based
stations to use the medium.
21.
Fragmentation
• The wirelessenvironment is very noisy.
• corrupt frame has to be retransmitted.
• Fragmentation is recommended.
• the division of a large frame into smaller ones.
• It is more efficient to resend a small frame than a
large one.
MAC Frame Format
•Frame control : 2 bytes long and defines the type of frame and
some control information.
• D: In all frame types except one, this field defines the
duration of the transmission that is used to set the value of
NAV. In one control frame, this field defines the frame ID.
• Addresses: There are four address fields, each 6 bytes
long. The meaning of each address field depends on the
value of the To DS and From DS subfields .
24.
MAC Layer Frames
•Sequence control: This field defines the sequence number of
the frame to be used in flow control.
• Frame body: This field can be between 0 and 2312 bytes, it
contains information based on the type and the subtype
defined in the FC field.
• FCS: The FCS field is 4 bytes long and contains a CRC-32
error detection sequence.
25.
Frame Types
• IEEE802.11 has three categories of frames:
• management frames:
used for the initial communication between stations and access
points.
• control frames.
used for accessing the channel and acknowledging frames
• data frames.
Data frames are used for carrying data and control information.
Addressing Mechanism
• IEEE802.11 addressing mechanism specifies four
cases defined by the value of the two flags in the FC
field, To DS and From DS.
28.
Addressing Mechanism
• Case1: 00, To DS = 0 and From DS = 0
• This means that the frame is not going to a distribution system and is
not coming from a distribution system.
• The ACK frame should be sent to the original sender.
• Case 2: 01, In this case, To DS = 0 and From DS = 1.
• This means that the frame is coming from a distribution system (coming from
an AP ).
• The ACK should be sent to the AP. The addresses are as address 3
contains the original sender of the frame (in another BSS).
29.
Addressing Mechanism
• Case3: 10, To DS =1 and From DS =O.
• This means that the frame is going to a distribution system ( frame is going
from a station to an AP)
• The ACK is sent to the original station. address 3 contains the final destination
of the frame (in another BSS).
• o Case 4:11, To DS =1 and From DS =1.
• This is the case in which the distribution the frame is going from one AP to
another AP in a wireless distribution system.
• We do not need to define addresses if the distribution system is a wired LAN
because the frame in these cases has the format of a wired LAN frame
(Ethernet, for example).
• Here, we need four addresses to define the original sender, the final
destination, and two intermediate APs.
Physical Media Definedby Original 802.11
Standard
IEEE 802.11 FHSS(Frequency-hopping spread spectrum)
Operating in 2.4 GHz ISM band
Lower cost, power consumption
Most tolerant to signal interference
IEEE 802.11 DSSS (Direct-sequence spread spectrum)
Operating in 2.4 GHz ISM band
Supports higher data rates
More range than FH or IR physical layers
IEEE 802.11 Infrared
Lowest cost
Lowest range compared to spread spectrum
Doesn’t penetrate walls, so no eavesdropping
34.
IEEE 802.11a ,IEEE 802.11b and IEEE
802.11g
IEEE 802.11a
Makes use of 5-GHz band
Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps
Uses orthogonal frequency division multiplexing (OFDM)
IEEE 802.11b
802.11b operates in 2.4 GHz band
Provides data rates of 5.5 and 11 Mbps
Complementary code keying (CCK) modulation scheme
IEEE 802.11g
802.11g operates in 2.4 GHz band
Provides data rates of 22 and 54 Mbps
Uses orthogonal frequency division multiplexing (OFDM)
35.
BLUETOOTH
• Bluetooth isa wireless LAN technology designed to
connect devices of different functions such as
telephones, notebooks, computers, cameras, printers,
coffee makers, and so on.
• A Bluetooth LAN is an ad hoc network, which means
that the network is formed spontaneously.
• Bluetooth defines two types of networks: piconet and
scatternet.
36.
Piconet
• A Bluetoothnetwork is called a piconet, or a small net.
• It can have up to eight stations, one of which is called the master; the rest are
called slaves.
• Maximum of seven slaves. Only one master.
• Slaves synchronize their clocks and hopping sequence with the master.
• But an additional eight slaves can stay in parked state, which means they can be
synchronized with the master but cannot take part in communication until it is
moved from the parked state.
37.
Scatternet
• Piconets canbe combined to form what is called a scatternet.
• A slave station in one piconet can become the master in another
piconet.
• Bluetooth devices has a built-in short-range radio transmitter.
38.
Bluetooth layers
• RadioLayer: Roughly equivalent to physical layer of the Internet model. Physical
links can be synchronous or asynchronous.
• Uses Frequency-hopping spread spectrum [Changing frequency of usage]. Changes it
modulation frequency 1600 times per second.
• Uses frequency shift keying (FSK )with Gaussian bandwidth filtering to transform bits to
a signal.
• Baseband layer: Roughly equivalent to MAC sublayer in LANs. Access is using
Time Division (Time slots).
• Length of time slot = dwell time = 625 microsec. So, during one frequency, a sender
sends a frame to a slave, or a slave sends a frame to the master.
• Time division duplexing TDMA (TDD-TDMA) is a kind of half-duplex
communication in which the slave and receiver send and receive data, but not at
the same time (half-duplex). However, the communication for each direction uses
different hops, like walkie-talkies.
Multiple-secondary communication
Also calledMultiple-slave communication
• Master uses even-numbered slots
• Slave sends in the next odd-numbered slot if the packet in the
previous slot was addressed to it.
42.
Physical Links
• Synchronousconnection-oriented (SCO)
• Latency is important than integrity.
• Transmission using slots.
• No retransmission.
• Asynchronous connectionless link (ACL)
• Integrity is important than latency.
• Does like multiple-slave communication.
• Retransmission is done.
• L2CAP (Logical Link Control and Adaptation Protocol)
• Equivalent to LLC sublayer in LANs.
• Used for data exchange on ACL Link. SCO channels do not use L2CAP.
• Frame format has 16-bit length [Size of data coming from upper layer in bytes],
channel ID, data and control.
• Can do Multiplexing, segmentation and Reassembly, QoS [with no QoS, best-effort
delivery is provided] and Group mangement [Can do like multicast group, using some
kind of logical addresses].
SUMMARY
• The wirelessLAN access method is CSMA/CA.
• The network allocation vector (NAV) is a timer for collision avoidance.
• The MAC layer frame has nine fields. The addressing mechanism can include up to four
addresses.
• Wireless LANs use management frames, control frames, and data frames.
• Bluetooth is a wireless LAN technology that connects devices (called gadgets) in a small
area.
• A Bluetooth network is called a piconet. Multiple piconets form a network called a
scatternet.
• The Bluetooth radio layer performs functions similar to those in the Internet model's physcial
layer.
• The Bluetooth baseband layer performs functions similar to those in the Internet model's
MAC sublayer.
• A Bluetooth network consists of one master device and up to seven slave devices.
• •A Bluetooth frame consists of data as well as hopping and control mechanisms. A frame is
one, three, or five slots in length with each slot equal to 625 μs.
ZigBee
• Technological StandardCreated for Control and
Sensor Networks
• Based on the IEEE 802.15.4 Standard
• Created by the ZigBee Alliance
47.
ZIGBEE
• The IEEE802.15.4 covers the physical layer and the
MAC layer of low-rate WPAN.
• The ZigBee is “an emerging standard that is based on
the IEEE 802.15.4 and adds network construction
(star networks, peer-to-peer/mesh networks, and
cluster-tree networks), application services, and
more”.
48.
– “the software”
–Network, Security &
Application layers
– Brand management
IEEE 802.15.4
– “the hardware”
– Physical & Media Access
Control layers
IEEE 802.15.4 & ZigBee In Context
PHY
868MHz / 915MHz / 2.4GHz
MAC
Network
Star / Mesh / Cluster-Tree
Security
32- / 64- / 128-bit encryption
Application
API
ZigBee
Alliance
IEEE
802.15.4
Customer
Silicon Stack App
ZigBee Aims Low
•Low data rate
• Low power consumption
• Small packet devices
51.
ZigBee Frequencies
• Operatesin Unlicensed Bands
• ISM 2.4 GHz Global Band at 250kbps
• 868 MHz European Band at 20kbps
• 915 MHz North American Band at 40kbps
52.
What Does ZigBeeDo?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s) and
device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats, appliances,
etc.
How ZigBee Works
•Topology
• Star
• Cluster Tree
• Mesh
• Network coordinator, routers, end devices
55.
How ZigBee Works
•States of operation
• Active
• Sleep
• Devices
• Full Function Devices (FFD’s)
• Reduced Function Devices (RFD’s)
• Modes of operation
• Beacon
• Non-beacon
WHY ZIGBEE?
• Standardsbased
• Low cost
• Can be used globally
• Reliable and self healing
• Supports large number of nodes
• Easy to deploy
• Very long battery life
• Secure
62.
IEEE 802.15.4 STANDARD
IEEEStd 802.15.4 defines the physical layer (PHY) and
medium access control (MAC) sublayer specifications for
low-data-rate wireless connectivity with fixed, portable,
and moving devices with no battery or very limited
battery consumption requirements typically operating in
the personal operating space (POS) of 10 m. It is
foreseen that, depending on the application, a longer
range at a lower data rate may be an acceptable
tradeoff.
63.
IEEE 802.15.4 DEVICETYPES
• The IEEE 802.15.4 standard (2003) defines the
device types that can be used in a LR-WPAN which
are Full Functional Device (FFD) and Reduced
Functional Device (RFD).
• The RFD can be used in simple applications in which
they do not need to transmit large amounts of data
and they have to communicate only with a specific
FFD
IEEE 802.15.4 DEVICETYPES
• The FFD can work as a PAN coordinator, as a
coordinator, or as a simple device. It can
communicate with either another FFD or a RFD.
66.
PHYSICAL LAYER
• The802.15.4 standard specifies two different services
that the Physical Layer(PHY) provides.
• The PHY data service controls the radio, and thus, the
transmission and reception of the PPDUs.
• The management service performs Energy Detection
in the channel, Clear Channel Assesment before
sending the messages and provides LQI for the
received packets.
67.
ZIGBEE STANDARD
• ZigBee,a new standard which became publicly
available in June 2005, is based on the IEEE 802.15.4
standard.
• It expands the IEEE 802.15.4 by adding the
framework for the network construction, security and
application layer services.
68.
NETWORK LAYER
• TheZigBee standard works on top of the IEEE
802.15.4 addressing schema by using the standard
64-bit and the short 16-bit addressing.
• Network layer responsibilities:
• Establishment of a new network.
• New device configuration, addressing assignment,
network synchronization
• Frames security
• Message routing.
69.
DEVICE TYPES
• Usesnotion of “logical devices.”
• “ZigBee Coordinator” is the first type of logical devices.
• It is responsible for initializing, maintaining, and managing the network.
• Under the coordinator in the network hierarchy is the “ZigBee
router,”
• Responsible for controlling the message routing between the nodes.
• “ZigBee End Device” acts as the end point of the network
structure.
SECURITY IN ZIGBEE
•Security services provided by ZigBee: “key establishment, key
transport, frame protection, and device management.”
• The security mechanism covers the network and the
application layer.
• The notion of end-to-end security is supported; the source and
destination devices have access and use the same share key.
• In the MAC layer the 802.15.4 AES mechanism provides the
proper security.
72.
Comparison Zigbee andBluetooth
Properties Bluetooth Zigbee
Modulation technique
Frequency Hopping
Spread Spectrum
(FHSS)
Direct Sequence Spread Spectrum
(DSSS)
Protocol stack size 250 Kbyte 28 Kbyte
Battery
Intended for frequent
recharging
Not rechargeable (one reason
batteries will last for up to 10 years)
Maximum network speed: 1 Mbit/s 250 Kbit/s
Network range:
1 or 100 m based on
radio class
upto 70 m
Typical network join time 3 sec 30 ms
Cost Cheaper Costlier
ZIGBEE APPLICATIONS
TELECOM
SERVICES
m-commerce
info services
objectinteraction
(Internet of Things)
ZigBee
Wireless
Control
that
Simply
Works
TV
VCR
DVD/CD
remote
security
HVAC
lighting control
access control
irrigation
PC &
PERIPHERALS
asset mgt
process
control
environmental
energy mgt
PERSONAL
HEALTH CARE
security
HVAC
AMR
lighting control
access control
patient
monitoring
fitness
monitoring
76.
SOME APPLICATION PROFILES
•Home Automation [HA]
– Defines set of devices used in
home automation
• Light switches
• Thermostats
• Window shade
• Heating unit
• etc.
77.
SOME APPLICATION PROFILES
Industrial Plant Monitoring
Consists of device definitions
for sensors used in industrial
control
Temperature
Pressure sensors
Infrared
etc.
78.
MORE APPLICATION PROFILES
•Multiple profiles at various stages of completion
• Commercial Building Automation
• Building control, management, and monitoring
• Telecom Services/M-commerce
• Automated Meter Reading
• Addresses utility meter reading
• Wireless Sensor Networks
• Very low power unattended networks
• Vendors may form new profile groups within ZigBee
and/or propose private profiles for consideration
• 400+ private profile IDs issued
79.
In-Home Patient Monitoring
•Patients receive better care at reduced cost with more freedom and comfort
– Patients can remain in their own home
• Monitors vital statistics and sends via internet
• Doctors can adjust medication levels
– Allows monitoring of elderly family member
• Sense movement or usage patterns in a home
• Turns lights on when they get out of bed
• Notify via mobile phone when anomalies occur
• Wireless panic buttons for falls or other problems
– Can also be used in hospital care
• Patients are allowed greater movement
• Reduced staff to patient ratio
graphic
graphic
80.
Commercial Lighting Control
•Wireless lighting control
• Dimmable intelligent ballasts
• Light switches/sensors anywhere
• Customizable lighting schemes
• Quantifiable energy savings
• Opportunities in residential, light
commercial and commercial
• Extendable networks
• Lighting network can be integrated with
and/or be used by other building
control solutions
81.
CONCLUSION
• Zigbee applicationsare in diverse areas
• Zigbee Alliance works as a non-profit organization
which has more than 200 members.
• IEEE 802.15.4 covers Physical Layer And Mac
Layer.
• Zigbee adds network construction,application
services, and more.
VLAN Overview (1)
•A VLAN allows a network administrator to create groups of logically
networked devices that act as if they are on their own independent
network, even if they share a common infrastructure with other VLANs.
• Using VLANs, you can logically segment switched networks based on
functions, departments, or project teams.
• You can also use a VLAN to geographically structure your network to
support the growing reliance of companies on home-based workers.
• These VLANs allow the network administrator to implement access
and security policies to particular groups of users.
Benefits of VLAN(1)
• Security - Groups that have sensitive data are separated
from the rest of the network, decreasing the chances of
confidential information breaches.
• Faculty computers are on VLAN 10 and completely separated from
student and guest data traffic.
• Cost reduction - Cost savings result from less need for
expensive network upgrades and more efficient use of
existing bandwidth and uplinks.
Benefits of VLAN(2)
• Higher performance - Dividing flat Layer 2 networks into
multiple logical workgroups (broadcast domains) reduces
unnecessary traffic on the network and boosts performance.
• Broadcast storm mitigation - Dividing a network into VLANs
reduces the number of devices that may participate in a
broadcast storm.
• In the figure you can see that although there are six computers on
this network, there are only three broadcast domains: Faculty,
Student, and Guest.
88.
Benefits of VLAN(3)
• Simpler project or application management - VLANs
aggregate users and network devices to support business or
geographic requirements.
• Having separate functions makes managing a project or
working with a specialized application easier, for example, an
e-learning development platform for faculty.
• It is also easier to determine the scope of the effects of
upgrading network services.
89.
Benefits of VLAN(4)
• Improved IT staff efficiency - VLANs make it easier to
manage the network because users with similar network
requirements share the same VLAN.
• When you provision a new switch, all the policies and procedures
already configured for the particular VLAN are implemented when
the ports are assigned.
• It is also easy for the IT staff to identify the function of a VLAN by
giving it an appropriate name.
• In the figure, for easy identification VLAN 20 could be named
"Student", VLAN 10 could be named "Faculty", and VLAN 30
"Guest."
90.
VLAN in details(1)
• A VLAN is a logically separate IP subnetwork.
• VLANs allow multiple IP networks and subnets to exist on the
same switched network.
• For computers to communicate on the same VLAN, each
must have an IP address and a subnet mask that is
consistent for that VLAN.
• The switch has to be configured with the VLAN and each port
in the VLAN must be assigned to the VLAN.
91.
VLAN in details(2)
• A switch port with a singular VLAN configured on it is
called an access port.
• Remember, just because two computers are
physically connected to the same switch does not
mean that they can communicate.
• Devices on two separate networks and subnets must
communicate via a router (Layer 3), whether or not
VLANs are used.