SlideShare a Scribd company logo
Wireless Networks
Wireless?
• A wireless LAN or WLAN is a wireless local area
network that uses radio waves as its carrier.
• The last link with the users is wireless, to give a
network connection to all users in a building or
campus.
• The backbone network usually uses cables
Common Topologies
The wireless LAN connects to a wired LAN
• There is a need of an access point that bridges wireless LAN traffic into the
wired LAN.
• The access point (AP) can also act as a repeater for wireless nodes,
effectively doubling the maximum possible distance between nodes.
Common Topologies
Complete Wireless Networks
• The physical size of the network is determined by the maximum reliable
propagation range of the radio signals.
• Referred to as ad hoc networks
• Are self-organizing networks without any centralized control
• Suited for temporary situations such as meetings and conferences.
How do wireless LANs work?
Wireless LANs operate in almost the same way as
wired LANs, using the same networking protocols
and supporting the most of the same
applications.
LAN
Reference model
  Physical layer: conversion of stream of bits into
• signals – carrier generation - frequency selection
• – signal detection – encryption
  Data link layer: accessing the medium –
• multiplexing - error correction – synchronization
  Network layer: routing packets – addressing -
• handover between networks
  Transport layer: establish an end-to-end
• connection – quality of service – flow and
• congestion control
  Application layer: service location – support
• multimedia – wireless access to www
Wireless Network
  The difference between wired and wireless is the
• physical layer and the data link layer
  Wired network technology is based on wires or
• fibers
  Data transmission in wireless networks take place
• using electromagnetic waves which propagates
• through space (scattered, reflected, attenuated)
  Data are modulated onto carrier frequencies
• (amplitude, frequency)
  The data link layer (accessing the medium,
• multiplexing, error correction, synchronization)
• requires more complex mechanisms.
How are WLANs Different?
• They use specialized physical and data link
protocols
• They integrate into existing networks through access
points which provide a bridging function
• They let you stay connected as you roam from one
coverage area to another
• They have unique security considerations
• They have specific interoperability requirements
• They require different hardware
• They offer performance that differs from wired
LANs.
Physical and Data Link Layers
Physical Layer:
• The wireless NIC takes frames of data from
the link layer, scrambles the data in a
predetermined way, then uses the modified
data stream to modulate a radio carrier
signal.
Data Link Layer:
• Uses Carriers-Sense-Multiple-Access with
Collision Avoidance (CSMA/CA).
Integration With Existing Networks
• Wireless Access Points (APs) - a small device
that bridges wireless traffic to your network.
• Most access points bridge wireless LANs into
Ethernet networks, but Token-Ring options are
available as well.
Integration With Existing Networks
Roaming
• Users maintain a continuous connection as they roam
from one physical area to another
• Mobile nodes automatically register with the new
access point.
• Methods: DHCP, Mobile IP
• IEEE 802.11 standard does not
address roaming, you may need
to purchase equipment from one
vendor if your users need to roam
from one access point to another.
Security
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing
the exact hopping sequences or direct
sequence codes used
• The IEEE 802.11 standard specifies optional
security called "Wired Equivalent Privacy"
whose goal is that a wireless LAN offer privacy
equivalent to that offered by a wired LAN. The
standard also specifies optional authentication
measures.
Interoperability
• Before the IEEE 802.11 interoperability was based on
cooperation between vendors.
• IEEE 802.11 only standardizes the physical and
medium access control layers.
• Vendors must still work with each other to ensure
their IEEE 802.11 implementations interoperate
• Wireless Ethernet Compatibility Alliance (WECA)
introduces the Wi-Fi Certification to ensure cross-
vendor interoperability of 802.11b solutions
Hardware
• PC Card, either with integral antenna or with
external antenna/RF module.
• ISA Card with external antenna connected by
cable.
• Handheld terminals
• Access points
Hardware
CISCO Aironet 350 series Wireless Handheld Terminal
Semi Parabolic Antenna BreezeCOM AP
Performance
• 802.11a offers speeds with a theoretically
maximum rate of 54Mbps in the 5 GHz band
• 802.11b offers speeds with a theoretically
maximum rate of 11Mbps at in the 2.4 GHz
spectrum band
• 802.11g is a new standard for data rates of up
to a theoretical maximum of 54 Mbps at 2.4
GHz.
What is 802.11?
• A family of wireless LAN (WLAN) specifications
developed by a working group at the Institute of
Electrical and Electronic Engineers (IEEE)
• Defines standard for WLANs using the following four
technologies
• Frequency Hopping Spread Spectrum (FHSS)
• Direct Sequence Spread Spectrum (DSSS)
• Infrared (IR)
• Orthogonal Frequency Division Multiplexing (OFDM)
• Versions: 802.11a, 802.11b, 802.11g, 802.11e,
802.11f, 802.11i
802.11 - Transmission
• Most wireless LAN products operate in
unlicensed radio bands
• 2.4 GHz is most popular
• Available in most parts of the world
• No need for user licensing
• Most wireless LANs use spread-spectrum radio
• Resistant to interference, secure
• Two popular methods
• Frequency Hopping (FH)
• Direct Sequence (DS)
Frequency Hopping Vs. Direct Sequence
• FH systems use a radio carrier that “hops” from frequency to
frequency in a pattern known to both transmitter and receiver
• Easy to implement
• Resistance to noise
• Limited throughput (2-3 Mbps @ 2.4 GHz)
• DS systems use a carrier that remains fixed to a specific
frequency band. The data signal is spread onto a much larger
range of frequencies (at a much lower power level) using a
specific encoding scheme.
• Much higher throughput than FH (11 Mbps)
• Better range
• Less resistant to noise (made up for by redundancy – it transmits at least
10 fully redundant copies of the original signal at the same time)
802.11a
• Employs Orthogonal Frequency Division
Multiplexing (OFDM)
• Offers higher bandwidth than that of 802.11b, DSSS
(Direct Sequence Spread Spectrum)
• 802.11a MAC (Media Access Control) is same as
802.11b
• Operates in the 5 GHz range
802.11a Advantages
• Ultra-high spectrum efficiency
• 5 GHz band is 300 MHz (vs. 83.5 MHz @ 2.4 GHz)
• More data can travel over a smaller amount of
bandwidth
• High speed
• Up to 54 Mbps
• Less interference
• Fewer products using the frequency
• 2.4 GHz band shared by cordless phones, microwave
ovens, Bluetooth, and WLANs
802.11a Disadvantages
• Standards and Interoperability
• Standard not accepted worldwide
• No interoperability certification available
for 802.11a products
• Not compatible or interoperable with 802.11b
• Legal issues
• License-free spectrum in 5 GHz band not
available worldwide
• Market
• Beyond LAN-LAN bridging, there is limited interest for
5 GHz adoption
802.11a Disadvantages
• Cost
• 2.4 GHz will still has >40% cost advantage
• Range
• At equivalent power, 5 GHz range will be ~50% of
2.4 GHz
• Power consumption
• Higher data rates and increased signal require more
power
• OFDM is less power-efficient then DSSS
802.11a Applications
• Building-to-building connections
• Video, audio conferencing/streaming video,
and audio
• Large file transfers, such as engineering
CAD drawings
• Faster Web access and browsing
• High worker density or high throughput scenarios
• Numerous PCs running graphics-intensive applications
802.11a Vs. 802.11b
802.11a vs.
802.11b
802.11a 802.11b
Raw data rates Up to 54 Mbps
(54, 48, 36, 24,18, 12
and 6 Mbps)
Up to 11 Mbps
(11, 5.5, 2, and
1 Mbps)
Range 50 Meters 100 Meters
Bandwidth UNII and ISM
(5 GHz range)
ISM (2.4000—
2.4835 GHz range)
Modulation OFDM technology DSSS technology
802.11g
• 802.11g is a high-speed extension to 802.11b
• Compatible with 802.11b
• High speed up to 54 Mbps
• 2.4 GHz (vs. 802.11a, 5 GHz)
• Using ODFM for backward compatibility
• Adaptive Rate Shifting
802.11g Advantages
• Provides higher speeds and higher capacity
requirements for applications
• Wireless Public Access
• Compatible with existing 802.11b standard
• Leverages Worldwide spectrum availability
in 2.4 GHz
• Likely to be less costly than 5 GHz alternatives
• Provides easy migration for current users of 802.11b
WLANs
• Delivers backward support for existing 802.11b products
• Provides path to even higher speeds in the future
802.11e Introduces Quality of Service
• Also know as P802.11 TGe
• Purpose:
• To enhance the 802.11 Medium Access
Control (MAC) to improve and manage
Quality of Service (QoS)
• Cannot be supported in current chip design
• Requires new radio chips
• Can do basic QoS in MAC layer
802.11f – Inter Access Point Protocol
• Also know as P802.11 TGf
• Purpose:
• To develop a set of requirements for Inter-Access
Point Protocol (IAPP), including operational and
management aspects
802.11b Security Features
• Wired Equivalent Privacy (WEP) – A protocol to
protect link-level data during wireless transmission
between clients and access points.
• Services:
• Authentication: provides access control to the network by
denying access to client stations that fail to authenticate
properly.
• Confidentiality: intends to prevent information
compromise from casual eavesdropping
• Integrity: prevents messages from being modified while in
transit between the wireless client and the access point.
Authentication
Means:
• Based on cryptography
• Non-cryptographic
• Both are identity-based verification mechanisms
(devices request access based on the SSID –
Service Set Identifier of the wireless network).
Authentication
• Authentication techniques
Privacy
• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data
sequence. The stream is XORed with the data
to be transmitted
• Key sizes: 40bits to 128bits
• Unfortunately, recent attacks have shown that
the WEP approach for privacy is vulnerable to
certain attack regardless of key size
Data Integrity
• Data integrity is ensured by a simple encrypted
version of CRC (Cyclic Redundant Check)
• Also vulnerable to some attacks
Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time). WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
• Identity based systems are vulnerable.
• Packet integrity is poor.
WLAN Migration – Cutting The Cord
• Essential Questions
• Choosing the Right Technology
• Data Rates
• Access Point Placement and Power
• Antenna Selection and Placement
• Connecting to the Wired LAN
• The Site Survey
Transmission Techniques
• We would like to transmit data with:
• Highest possible data rate
• With the minimum level of the signal power
• Minimum channel bandwidth
• Reduced transmitter and receiver complexity
• Wired
• Data received from upper layers are line coded and the voltages are applied to the
medium directly
• Transmissions are often referred to as baseband transmission schemes
• In voice-band modems, Digital Subscriber Line (DSL), and coaxial cable model
applications, the transmitted signal is modulated over a carrier
• Wireless: 3 categories
• Pulse transmission techniques employed mostly in Infrared (IR) applications and,
more recently, in the so-called impulse radio or ultra-wideband (UWB) transmission
• Basic modulation techniques widely used in Time Division Multiple Access (TDMA)
cellular, as well as a number of mobile data networks
• Spread spectrum systems used in the Code Division Multiple Access (CDMA) and in
wireless LANs operating in ISM frequency bands
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 40
ISM Frequency Bands
Extremely
Low
Very
Low
Low Medium High Very
High
Ultra
High
Super
High
Infrared Visible
Light
Ultra-
violet
X-Rays
Audio
AM Broadcast
Short Wave Radio FM Broadcast
Television Infrared wireless LAN
Cellular (840MHz)
NPCS (1.9GHz)
5 GHz
(IEEE 802.11a,
HiperLAN,
HiperLAN2)
 22 MHz channel bandwidth
 Must implement spread spectrum technology
 Must operate at 500 mill-watts or less
902 - 928 MHz
26 MHz
2.4 - 2.4835
GHz
83.5 MHz
(IEEE 802.11b,
Bluetooth)
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 41
Infrared (IR)
 Remote controls for TVs, VCRs, DVD and CD players use IR
technology
 A direct line of sight of the transmitter needed in order to
successfully establish communication link
 New diffused IR technologies can work without LOS inside a room
 Systems are simple to design and are inexpensive
 Use the same signal frequencies used on fiber optic links
 Systems detect only the amplitude of the signal, so interference is
greatly reduced
 IR transmission can be aimed and range extended to a couple of
kilometers and can be used outdoors
 It also offers the highest bandwidth and throughput
 The other way is to transmit omni-directionally and bounce the
signals off of everything in every direction, which reduces the
coverage to 30 - 60 feet
 IR signals cannot penetrate opaque objects
 IEEE 802.11 standard for high-speed diffused IR employs pulse-
position-modulation (PPM) with a wavelength of 850nm–950nm
and data rates of 1 and 2 Mbps
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 42
Microwave and Radio Frequencies
 Microwave:
 Operate at less than 500 milliwatts of power (MW)
 Use narrow-band transmission with single frequency modulation mostly in
the 5.8 GHz band
 Radio Frequency:
 To link appliances that are distributed throughout the house
 Can be categorized as narrowband or spread spectrum
 Narrowband technology includes microwave transmissions which are
high-frequency radio waves that can be transmitted to distances up to 50
Km
 Not suitable for local networks, but could be used to connect networks in
separate buildings
 Transmitted signal in Subscriber Station occupies a much larger
bandwidth than the traditional radio modems
 Two basic techniques used: frequency hopping spread spectrum (FHSS)
and direct sequence spread spectrum (DSSS)
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 43
Spread Spectrum
 Frequency Hopping Spread Spectrum:
 Splits the band into many small subchannels (e.g., 1 MHz)
 Signal then hops from subchannel to subchannel transmitting short
bursts of data on each channel for a set period of time, called dwell
time
 Hopping sequence must be synchronized at the sender and the
receiver or else, the information is lost
 FCC requires that the band is split into at least 75 subchannels
 Extremely difficult to intercept and gives a high degree of security
 Direct Sequence Spread Spectrum:
 Transmission signal is spread over an allowed band
 Two-stage modulation technique: a random binary string, called
the spreading code, is used to modulate the transmitted signal, and
in the second stage, the chips are transmitted over a traditional
digital modulator
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 44
Direct Sequence Spread Spectrum
 Physical layer of the IEEE 802.11 standard employing
DSSS requires a spreading ratio of eleven
 If orthogonal spreading codes are used, then more than
one LAN can share the same band
 However, because DSSS systems use wide subchannels,
the number of co-located LANs is limited by the size of
those subchannels
 As the transmitted chips are much narrower than data
bits, the bandwidth of the transmitted DSSS signal is
much larger than systems without spreading
 The DSSS systems provide a robust signal with better
coverage area than FHSS
 The DSSS systems provide a robust signal with better
coverage area than FHSS

More Related Content

Similar to Wireless Networks 120719.ppt

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
Saikiran Panjala
 
WIRELESS LAN.pptx
WIRELESS LAN.pptxWIRELESS LAN.pptx
WIRELESS LAN.pptx
ShikharAgarwal63
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
Mostafa Ali
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
Adeel Mirza
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
Sanjay Hp
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinRobert Russell
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Saqib Shehzad
 
Presentation on different modes of data communication
Presentation on different modes of data communicationPresentation on different modes of data communication
Presentation on different modes of data communicationTafadzwa Gonera
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
Inocentshuja Ahmad
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
waqas232871
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
Hîmãńshu Mêęńä
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networks
Dooremoore
 
Wifi security
Wifi securityWifi security
Wifi security
Dooremoore
 

Similar to Wireless Networks 120719.ppt (20)

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
WIRELESS LAN.pptx
WIRELESS LAN.pptxWIRELESS LAN.pptx
WIRELESS LAN.pptx
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Presentation on different modes of data communication
Presentation on different modes of data communicationPresentation on different modes of data communication
Presentation on different modes of data communication
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networks
 
Wifi security
Wifi securityWifi security
Wifi security
 

More from AbyThomas54

base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
AbyThomas54
 
Diode.ppt
Diode.pptDiode.ppt
Diode.ppt
AbyThomas54
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
AbyThomas54
 
AMnew.ppt
AMnew.pptAMnew.ppt
AMnew.ppt
AbyThomas54
 
Amplitude Modulation.ppt
Amplitude Modulation.pptAmplitude Modulation.ppt
Amplitude Modulation.ppt
AbyThomas54
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
AbyThomas54
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
AbyThomas54
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
AbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
AbyThomas54
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
AbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
AbyThomas54
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
AbyThomas54
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
AbyThomas54
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
AbyThomas54
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
AbyThomas54
 
Vo ip
Vo ipVo ip
Ch02
Ch02Ch02

More from AbyThomas54 (17)

base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
 
Diode.ppt
Diode.pptDiode.ppt
Diode.ppt
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
 
AMnew.ppt
AMnew.pptAMnew.ppt
AMnew.ppt
 
Amplitude Modulation.ppt
Amplitude Modulation.pptAmplitude Modulation.ppt
Amplitude Modulation.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
Vo ip
Vo ipVo ip
Vo ip
 
Ch02
Ch02Ch02
Ch02
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Wireless Networks 120719.ppt

  • 2. Wireless? • A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. • The last link with the users is wireless, to give a network connection to all users in a building or campus. • The backbone network usually uses cables
  • 3. Common Topologies The wireless LAN connects to a wired LAN • There is a need of an access point that bridges wireless LAN traffic into the wired LAN. • The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the maximum possible distance between nodes.
  • 4. Common Topologies Complete Wireless Networks • The physical size of the network is determined by the maximum reliable propagation range of the radio signals. • Referred to as ad hoc networks • Are self-organizing networks without any centralized control • Suited for temporary situations such as meetings and conferences.
  • 5. How do wireless LANs work? Wireless LANs operate in almost the same way as wired LANs, using the same networking protocols and supporting the most of the same applications.
  • 6. LAN
  • 7. Reference model   Physical layer: conversion of stream of bits into • signals – carrier generation - frequency selection • – signal detection – encryption   Data link layer: accessing the medium – • multiplexing - error correction – synchronization   Network layer: routing packets – addressing - • handover between networks   Transport layer: establish an end-to-end • connection – quality of service – flow and • congestion control   Application layer: service location – support • multimedia – wireless access to www
  • 8. Wireless Network   The difference between wired and wireless is the • physical layer and the data link layer   Wired network technology is based on wires or • fibers   Data transmission in wireless networks take place • using electromagnetic waves which propagates • through space (scattered, reflected, attenuated)   Data are modulated onto carrier frequencies • (amplitude, frequency)   The data link layer (accessing the medium, • multiplexing, error correction, synchronization) • requires more complex mechanisms.
  • 9. How are WLANs Different? • They use specialized physical and data link protocols • They integrate into existing networks through access points which provide a bridging function • They let you stay connected as you roam from one coverage area to another • They have unique security considerations • They have specific interoperability requirements • They require different hardware • They offer performance that differs from wired LANs.
  • 10. Physical and Data Link Layers Physical Layer: • The wireless NIC takes frames of data from the link layer, scrambles the data in a predetermined way, then uses the modified data stream to modulate a radio carrier signal. Data Link Layer: • Uses Carriers-Sense-Multiple-Access with Collision Avoidance (CSMA/CA).
  • 11. Integration With Existing Networks • Wireless Access Points (APs) - a small device that bridges wireless traffic to your network. • Most access points bridge wireless LANs into Ethernet networks, but Token-Ring options are available as well.
  • 13. Roaming • Users maintain a continuous connection as they roam from one physical area to another • Mobile nodes automatically register with the new access point. • Methods: DHCP, Mobile IP • IEEE 802.11 standard does not address roaming, you may need to purchase equipment from one vendor if your users need to roam from one access point to another.
  • 14. Security • In theory, spread spectrum radio signals are inherently difficult to decipher without knowing the exact hopping sequences or direct sequence codes used • The IEEE 802.11 standard specifies optional security called "Wired Equivalent Privacy" whose goal is that a wireless LAN offer privacy equivalent to that offered by a wired LAN. The standard also specifies optional authentication measures.
  • 15. Interoperability • Before the IEEE 802.11 interoperability was based on cooperation between vendors. • IEEE 802.11 only standardizes the physical and medium access control layers. • Vendors must still work with each other to ensure their IEEE 802.11 implementations interoperate • Wireless Ethernet Compatibility Alliance (WECA) introduces the Wi-Fi Certification to ensure cross- vendor interoperability of 802.11b solutions
  • 16. Hardware • PC Card, either with integral antenna or with external antenna/RF module. • ISA Card with external antenna connected by cable. • Handheld terminals • Access points
  • 17. Hardware CISCO Aironet 350 series Wireless Handheld Terminal Semi Parabolic Antenna BreezeCOM AP
  • 18. Performance • 802.11a offers speeds with a theoretically maximum rate of 54Mbps in the 5 GHz band • 802.11b offers speeds with a theoretically maximum rate of 11Mbps at in the 2.4 GHz spectrum band • 802.11g is a new standard for data rates of up to a theoretical maximum of 54 Mbps at 2.4 GHz.
  • 19. What is 802.11? • A family of wireless LAN (WLAN) specifications developed by a working group at the Institute of Electrical and Electronic Engineers (IEEE) • Defines standard for WLANs using the following four technologies • Frequency Hopping Spread Spectrum (FHSS) • Direct Sequence Spread Spectrum (DSSS) • Infrared (IR) • Orthogonal Frequency Division Multiplexing (OFDM) • Versions: 802.11a, 802.11b, 802.11g, 802.11e, 802.11f, 802.11i
  • 20. 802.11 - Transmission • Most wireless LAN products operate in unlicensed radio bands • 2.4 GHz is most popular • Available in most parts of the world • No need for user licensing • Most wireless LANs use spread-spectrum radio • Resistant to interference, secure • Two popular methods • Frequency Hopping (FH) • Direct Sequence (DS)
  • 21. Frequency Hopping Vs. Direct Sequence • FH systems use a radio carrier that “hops” from frequency to frequency in a pattern known to both transmitter and receiver • Easy to implement • Resistance to noise • Limited throughput (2-3 Mbps @ 2.4 GHz) • DS systems use a carrier that remains fixed to a specific frequency band. The data signal is spread onto a much larger range of frequencies (at a much lower power level) using a specific encoding scheme. • Much higher throughput than FH (11 Mbps) • Better range • Less resistant to noise (made up for by redundancy – it transmits at least 10 fully redundant copies of the original signal at the same time)
  • 22. 802.11a • Employs Orthogonal Frequency Division Multiplexing (OFDM) • Offers higher bandwidth than that of 802.11b, DSSS (Direct Sequence Spread Spectrum) • 802.11a MAC (Media Access Control) is same as 802.11b • Operates in the 5 GHz range
  • 23. 802.11a Advantages • Ultra-high spectrum efficiency • 5 GHz band is 300 MHz (vs. 83.5 MHz @ 2.4 GHz) • More data can travel over a smaller amount of bandwidth • High speed • Up to 54 Mbps • Less interference • Fewer products using the frequency • 2.4 GHz band shared by cordless phones, microwave ovens, Bluetooth, and WLANs
  • 24. 802.11a Disadvantages • Standards and Interoperability • Standard not accepted worldwide • No interoperability certification available for 802.11a products • Not compatible or interoperable with 802.11b • Legal issues • License-free spectrum in 5 GHz band not available worldwide • Market • Beyond LAN-LAN bridging, there is limited interest for 5 GHz adoption
  • 25. 802.11a Disadvantages • Cost • 2.4 GHz will still has >40% cost advantage • Range • At equivalent power, 5 GHz range will be ~50% of 2.4 GHz • Power consumption • Higher data rates and increased signal require more power • OFDM is less power-efficient then DSSS
  • 26. 802.11a Applications • Building-to-building connections • Video, audio conferencing/streaming video, and audio • Large file transfers, such as engineering CAD drawings • Faster Web access and browsing • High worker density or high throughput scenarios • Numerous PCs running graphics-intensive applications
  • 27. 802.11a Vs. 802.11b 802.11a vs. 802.11b 802.11a 802.11b Raw data rates Up to 54 Mbps (54, 48, 36, 24,18, 12 and 6 Mbps) Up to 11 Mbps (11, 5.5, 2, and 1 Mbps) Range 50 Meters 100 Meters Bandwidth UNII and ISM (5 GHz range) ISM (2.4000— 2.4835 GHz range) Modulation OFDM technology DSSS technology
  • 28. 802.11g • 802.11g is a high-speed extension to 802.11b • Compatible with 802.11b • High speed up to 54 Mbps • 2.4 GHz (vs. 802.11a, 5 GHz) • Using ODFM for backward compatibility • Adaptive Rate Shifting
  • 29. 802.11g Advantages • Provides higher speeds and higher capacity requirements for applications • Wireless Public Access • Compatible with existing 802.11b standard • Leverages Worldwide spectrum availability in 2.4 GHz • Likely to be less costly than 5 GHz alternatives • Provides easy migration for current users of 802.11b WLANs • Delivers backward support for existing 802.11b products • Provides path to even higher speeds in the future
  • 30. 802.11e Introduces Quality of Service • Also know as P802.11 TGe • Purpose: • To enhance the 802.11 Medium Access Control (MAC) to improve and manage Quality of Service (QoS) • Cannot be supported in current chip design • Requires new radio chips • Can do basic QoS in MAC layer
  • 31. 802.11f – Inter Access Point Protocol • Also know as P802.11 TGf • Purpose: • To develop a set of requirements for Inter-Access Point Protocol (IAPP), including operational and management aspects
  • 32. 802.11b Security Features • Wired Equivalent Privacy (WEP) – A protocol to protect link-level data during wireless transmission between clients and access points. • Services: • Authentication: provides access control to the network by denying access to client stations that fail to authenticate properly. • Confidentiality: intends to prevent information compromise from casual eavesdropping • Integrity: prevents messages from being modified while in transit between the wireless client and the access point.
  • 33. Authentication Means: • Based on cryptography • Non-cryptographic • Both are identity-based verification mechanisms (devices request access based on the SSID – Service Set Identifier of the wireless network).
  • 35. Privacy • Cryptographic techniques • WEP Uses RC4 symmetric key, stream cipher algorithm to generate a pseudo random data sequence. The stream is XORed with the data to be transmitted • Key sizes: 40bits to 128bits • Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to certain attack regardless of key size
  • 36. Data Integrity • Data integrity is ensured by a simple encrypted version of CRC (Cyclic Redundant Check) • Also vulnerable to some attacks
  • 37. Security Problems • Security features in Wireless products are frequently not enabled. • Use of static WEP keys (keys are in use for a very long time). WEP does not provide key management. • Cryptographic keys are short. • No user authentication occurs – only devices are authenticated. A stolen device can access the network. • Identity based systems are vulnerable. • Packet integrity is poor.
  • 38. WLAN Migration – Cutting The Cord • Essential Questions • Choosing the Right Technology • Data Rates • Access Point Placement and Power • Antenna Selection and Placement • Connecting to the Wired LAN • The Site Survey
  • 39. Transmission Techniques • We would like to transmit data with: • Highest possible data rate • With the minimum level of the signal power • Minimum channel bandwidth • Reduced transmitter and receiver complexity • Wired • Data received from upper layers are line coded and the voltages are applied to the medium directly • Transmissions are often referred to as baseband transmission schemes • In voice-band modems, Digital Subscriber Line (DSL), and coaxial cable model applications, the transmitted signal is modulated over a carrier • Wireless: 3 categories • Pulse transmission techniques employed mostly in Infrared (IR) applications and, more recently, in the so-called impulse radio or ultra-wideband (UWB) transmission • Basic modulation techniques widely used in Time Division Multiple Access (TDMA) cellular, as well as a number of mobile data networks • Spread spectrum systems used in the Code Division Multiple Access (CDMA) and in wireless LANs operating in ISM frequency bands
  • 40. Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 40 ISM Frequency Bands Extremely Low Very Low Low Medium High Very High Ultra High Super High Infrared Visible Light Ultra- violet X-Rays Audio AM Broadcast Short Wave Radio FM Broadcast Television Infrared wireless LAN Cellular (840MHz) NPCS (1.9GHz) 5 GHz (IEEE 802.11a, HiperLAN, HiperLAN2)  22 MHz channel bandwidth  Must implement spread spectrum technology  Must operate at 500 mill-watts or less 902 - 928 MHz 26 MHz 2.4 - 2.4835 GHz 83.5 MHz (IEEE 802.11b, Bluetooth)
  • 41. Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 41 Infrared (IR)  Remote controls for TVs, VCRs, DVD and CD players use IR technology  A direct line of sight of the transmitter needed in order to successfully establish communication link  New diffused IR technologies can work without LOS inside a room  Systems are simple to design and are inexpensive  Use the same signal frequencies used on fiber optic links  Systems detect only the amplitude of the signal, so interference is greatly reduced  IR transmission can be aimed and range extended to a couple of kilometers and can be used outdoors  It also offers the highest bandwidth and throughput  The other way is to transmit omni-directionally and bounce the signals off of everything in every direction, which reduces the coverage to 30 - 60 feet  IR signals cannot penetrate opaque objects  IEEE 802.11 standard for high-speed diffused IR employs pulse- position-modulation (PPM) with a wavelength of 850nm–950nm and data rates of 1 and 2 Mbps
  • 42. Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 42 Microwave and Radio Frequencies  Microwave:  Operate at less than 500 milliwatts of power (MW)  Use narrow-band transmission with single frequency modulation mostly in the 5.8 GHz band  Radio Frequency:  To link appliances that are distributed throughout the house  Can be categorized as narrowband or spread spectrum  Narrowband technology includes microwave transmissions which are high-frequency radio waves that can be transmitted to distances up to 50 Km  Not suitable for local networks, but could be used to connect networks in separate buildings  Transmitted signal in Subscriber Station occupies a much larger bandwidth than the traditional radio modems  Two basic techniques used: frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS)
  • 43. Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 43 Spread Spectrum  Frequency Hopping Spread Spectrum:  Splits the band into many small subchannels (e.g., 1 MHz)  Signal then hops from subchannel to subchannel transmitting short bursts of data on each channel for a set period of time, called dwell time  Hopping sequence must be synchronized at the sender and the receiver or else, the information is lost  FCC requires that the band is split into at least 75 subchannels  Extremely difficult to intercept and gives a high degree of security  Direct Sequence Spread Spectrum:  Transmission signal is spread over an allowed band  Two-stage modulation technique: a random binary string, called the spreading code, is used to modulate the transmitted signal, and in the second stage, the chips are transmitted over a traditional digital modulator
  • 44. Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 44 Direct Sequence Spread Spectrum  Physical layer of the IEEE 802.11 standard employing DSSS requires a spreading ratio of eleven  If orthogonal spreading codes are used, then more than one LAN can share the same band  However, because DSSS systems use wide subchannels, the number of co-located LANs is limited by the size of those subchannels  As the transmitted chips are much narrower than data bits, the bandwidth of the transmitted DSSS signal is much larger than systems without spreading  The DSSS systems provide a robust signal with better coverage area than FHSS  The DSSS systems provide a robust signal with better coverage area than FHSS