CN Unit 2
CN Unit 2
MEDIUM ACCESS
The 802 Project defines 12-plus subcommittee standards groups. Some are as follows:
The Data Link layer is divided into two sublayer by the 802 standards:
The LLC sublayer is defined in 802.1 and 802.2. The MAC sublayer is defined in the 802.1, 802.3,
802.5 and 802.12.
II - 1
1. Logical Link Control (LLC) [MAC – Client]
Conceptually, the LLC sublayer sits on top of the MAC sublayer. It's defined by the 802.2 standard
to be topology independent.
The LLC works with the transport layer by providing connection-oriented and connectionless
services. It manages and creates the communication link.
● Connectionless services: Messages are not acknowledged by the receiving device, which
speeds up the processing. Although it sounds unreliable, this type of transfer is commonly
used at this level because the upper OSI layers implement their own error-checking and
control.
● Connection-oriented services: Because each message is acknowledged, this service is
much slower than connectionless services, but it's much more reliable.
Flow Control
Another communications control defined on the LLC sublayer is . The Transport layer
of the OSI model actually manages the mechanisms used to control the flow of data between two
hosts. The Data Link layer defines the data values used in the flow control signaling between two
transmitting hosts.
There are two types of flow control implemented in data communications - software and
hardware:
● Software flow control, common to networking, involves a process called XON/XOFF; which
roughly stands for transmission on/transmission off.
● Hardware flow control, also called RTS/CTS (ready to send/clear to send), uses two wires
in a cable, one for RTS and one for CTS. When either is turned off, the flow is interrupted.
Error Detection
Error detection is the process of detecting whether errors occurred during the transmission of the
bits across the wire. The Data Link layer uses a calculated value called the CRC (Cyclic
Redundancy Check) that's placed into the Data Link trailer that's added to the message frame
before it's sent to the Physical layer. The receiving computer recalculates the CRC and compares
it to the one sent with the data. If the two values are equal, it's assumed that the data arrived
without errors. Otherwise, the message frame may need to be retransmitted under control of an
upper layer. Although the Data Link layer implements error detection, it does not include a
II - 2
function to perform error recovery. This is left for the upper layers to deal with, primarily on the
Transport layer.
2. MAC
The MAC sublayer carries the physical address of each device on the network. This address is
more commonly called a device's MAC address. The MAC address is a 48-bit address that's
encoded on each network device by its manufacturer. It's the MAC address that the Physical layer
uses to move data between nodes of the network.
The MAC layer controls the node's access to the network media and is specific to the individual
protocol. All IEEE 802.3 MACs must meet the same basic set of logical requirements, regardless
of whether they include one or more of the defined optional protocol extensions. The only
requirement for basic communication (communication that does not require optional protocol
extensions) between two network nodes is that both MACs must support the same transmission
rate.
The 802.3 physical layers are specific to the transmission data rate, the signal encoding, and the
type of media interconnecting the two nodes. Gigabit Ethernet, for example, is defined to operate
over either twisted-pair or optical fiber cable, but each specific type of cable or signal-encoding
procedure requires a different physical layer implementation.
II - 3
Access Methods
● Token Passing
II - 4
● Demand Priority
■ 100 Mbps standard called 100VG-AnyLAN. “Hub- based”.
A.
● Aloha
• Mechanism
• random, distributed (no central arbiter), time-multiplex
● Slotted Aloha
o Slotted Aloha additionally uses time-slots, sending must always start at
slot boundaries
II - 5
● "Carrier Sense" describes the fact that a transmitter uses feedback from a
receiver that detects a carrier wave before trying to send. That is, it tries to
detect the presence of an encoded signal from another station before
attempting to transmit. If a carrier is sensed, the station waits for the
transmission in progress to finish before initiating its own transmission.
● "Multiple Accesses" describes the fact that multiple stations send and
receive on the medium. Transmissions by one node are generally received by all
other stations using the medium.
o Carrier sense multiple access with collision detection (CSMA/CD) - suitable for wired
networks
B. :
● Special packet is passed from computer to computer.
● A computer that wants to transmit must wait for a free token.
● Computer takes control of the token and transmits data. Only this computer is
allowed to transmit; others must wait for control of the token.
● Receiving computer strips the data from the token and sends an acknowledgment.
II - 6
● Original sending computer receives the acknowledgment and sends the token on.
● the token comes from the Nearest Active Upstream Neighbor and when the
computer is finished, it goes to the Nearest Active Downstream Neighbor
● uses “beaconing” to detect faults => this method is fault tolerant
● NO contention => equal access to all computers on the network
● NO collisions
a. Token ring
b. Token bus
C.
• If one terminal can be heard by all others, this “central” terminal (a.k.a. base
station) can poll all other terminals according to a certain scheme
• now all schemes known from fixed networks can be used (typical mainframe -
terminal scenario)
• Example: Randomly Addressed Polling
• base station signals readiness to all mobile terminals
• terminals ready to send can now transmit a random number without collision with
the help of CDMA or FDMA (the random number can be seen as dynamic address)
• the base station now chooses one address for polling from the list of all random
numbers (collision if two terminals choose the same address)
• the base station acknowledges correct packets and continues polling the next
terminal
• this cycle starts again after polling all terminals of the list
D.
Duplexing methods
Where these methods are used for dividing forward and reverse communication channels, they
are known as duplexing methods, such as:
Frequency-division duplexing (FDD) means that the transmitter and receiver operate at
different carrier frequencies. The term is frequently used in ham radio operation, where an
II - 7
operator is attempting to contact a repeater station. The station must be able to send and
receive a transmission at the same time, and does so by slightly altering the frequency at
which it sends and receives. This mode of operation is referred to as or
.
Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in
which a node verifies the absence of other traffic before transmitting on a shared transmission
medium, such as an electrical bus, or a band of the electromagnetic spectrum.
"Carrier Sense" describes the fact that a transmitter uses feedback from a receiver that detects a
carrier wave before trying to send. That is, it tries to detect the presence of an encoded signal
from another station before attempting to transmit. If a carrier is sensed, the station waits for the
transmission in progress to finish before initiating its own transmission.
"Multiple Access" describes the fact that multiple stations send and receive on the medium.
Transmissions by one node are generally received by all other stations using the medium.
Types of CSMA
● 1-persistent CSMA
When the sender (station) is ready to transmit data, it checks if the physical medium is busy. If so,
it senses the medium continually until it becomes idle, and then it transmits a piece of data (a
frame). In case of a collision, the sender waits for a random period of time and attempts to
transmit again.
● p-persistent CSMA
When the sender is ready to send data, it checks continually if the medium is busy. If the medium
becomes idle, the sender transmits a frame with a probability p. If the station chooses not to
transmit (the probability of this event is 1-p), the sender waits until the next available time slot and
transmits again with the same probability p. This process repeats until the frame is sent or some
other sender stops transmitting. In the latter case the sender monitors the channel, and when idle,
transmits with a probability p, and so on.
● o-persistent CSMA
Each station is assigned a transmission order by a supervisor station. When medium goes idle,
stations wait for their time slot in accordance with their assigned transmission order. The station
assigned to transmit first transmits immediately. The station assigned to transmit second waits
one time slot (but by that time the first station has already started transmitting). Stations monitor
the medium for transmissions from other stations and update their assigned order with each
detected transmission (i.e. they move one position closer to the front of the queue).
II - 8
CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
CSMA/CD is a modification of pure Carrier sense multiple access (CSMA). CSMA/CD is used to
improve CSMA performance by terminating transmission as soon as a collision is detected, and
reducing the probability of a second collision on retry.
A jam signal is sent which will cause all transmitters to back off by random intervals, reducing the
probability of a collision when the first retry is attempted.
Carrier sense multiple access with collision avoidance (CSMA/CA) is a modification of pure
CSMA. Collision avoidance is used to improve the performance of CSMA by attempting to be less
"greedy" on the channel. If the channel is sensed busy before transmission then the transmission
is deferred for a "random" interval. This reduces the probability of collisions on the channel.
Ethernet has survived as the major LAN technology (it is currently used for approximately 85
percent of the world's LAN-connected PCs and workstations) because its protocol has the
following characteristics:
● It is easy to understand, implement, manage, and maintain
● It allows low-cost network implementations
● It provides extensive topological flexibility for network installation
● It guarantees successful interconnection and operation of standards-compliant products,
regardless of manufacturer
II - 9
Various standards are discussed below:
Types of medium and convention used to represent them
II - 10
● Terminators attached to the end of each segment absorb the signal and keep it from
bouncing back and interfering with trailing signals.
● The Ethernet uses the Manchester encoding scheme.
● An Ethernet can be constructed from a thinner cable known as 10Base2; the original cable
is called 10Base5 (the two cables are commonly called and , respectively).
The “10” in 10Base2 means that the network operates at 10 Mbps, “Base” refers to the
fact that the cable is used in a system, and the “2” means that a given segment
can be no longer than 200 m (a segment of the original 10Base5 cable can be up to 500 m
long). A 10BaseT (Twisted pair) segment is usually limited to under 100 m in length.
● With 10Base2, a T-joint is spliced into the cable. In effect, 10Base2 is used to daisy-chain
a set of hosts together. With 10BaseT, the common configuration is to have several
point-to-point segments coming out of a multiway repeater, sometimes called a .
Multiple 100-Mbps Ethernet segments can also be connected by a hub, but the same is
not true of 1000-Mbps segments.
Advantage:
o A linear sequence of segments connected by repeaters, or multiple segments connected
in a star configuration by a hub, data transmitted by any one host on that Ethernet reaches
all the other hosts.
Disadvantage:
Frame Format:
II - 11
Note that from the host’s perspective, an Ethernet frame has a 14-byte header: two 6-byte
addresses and a 2-byte type field. The sending adaptor attaches the preamble, CRC, and
postamble before transmitting, and the receiving adaptor removes them.
Addresses:
o Each host on an Ethernet has a unique Ethernet address. The address belongs to the
adaptor and burned into ROM.
o Ethernet addresses are typically printed in a form humans can read as a sequence of six
numbers separated by colons. Each number corresponds to 1 byte of the 6-byte address
and is given by a pair of hexadecimal digits, one for each of the 4-bit nibbles in the byte;
leading 0s are dropped.
o For example, 8:0:2b:e4:b1:2 is the human-readable representation of Ethernet address
00001000 00000000 00101011 11100100 10110001 00000010
Transmitter Algorithm:
II - 12
moment an adaptor detects that its frame is colliding with another, it first makes sure to
transmit a 32-bit jamming sequence and then stops the transmission.
o Thus, a transmitter will minimally send 96 bits in the case of a collision: 64-bit preamble
plus 32-bit jamming sequence.
o Suppose host A begins transmitting a frame at time , as shown in (a). It takes it one link
latency (let’s denote the latency as ) for the frame to reach host B. Thus, the first bit of A’
s frame arrives at B at time + , as shown in (b). Suppose an instant before host A’s frame
arrives (i.e., B still sees an idle line), host B begins to transmit its own frame. B’s frame will
immediately collide with A’s frame, and this collision will be detected by host B (c). Host B
will send the 32-bit jamming sequence, as described above. (B’s frame will be a runt.)
Unfortunately, host A will not know that the collision occurred until B’s frame reaches it,
which will happen one link latency later, at time +2× , as shown in (d). Host A must
continue to transmit until this time in order to detect the collision.
Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount
of time and tries again. Each time it tries to transmit but fails, the adaptor doubles the amount of
time it waits before trying again. This strategy of doubling the delay interval between each
retransmission attempt is a general technique known as . Adaptors typically
retry up to 16 times, although the backoff algorithm caps in the above formula at 10.
II - 13
Types of Ethernet:
Successors of Ethernet
On a regular Ethernet segment, all stations share the available bandwidth of 10 Mb/s. With the
increase in traffic, the number of packet collisions goes up, lowering the overall throughput. In
such a scenario, there are two basic approaches to increase the bandwidth.
One is to replace the Ethernet with a higher speed version of Ethernet. Use of Fast Ethernet
operating at 100 Mb/s and Gigabit Ethernet operating at 1000 Mb/s belong to this category. This
approach requires replacement of the old network interface cards (NICs) in each station by new
ones.
The other approach is to use Ethernet switches (let us call it switched Ethernet approach)
that use a high- speed internal bus to switch packets between multiple (8 to 32) cable segments
and offer dedicated 10 Mb/s bandwidth on each segment/ports. In this approach, there is no
need to replace the NICs; replacement of the hub by a switch serves the purpose. This approach
is discussed in the following section.
Switched Ethernet
Switched Ethernet gives dedicated 10 Mb/s bandwidth on each of its ports. On each of the ports
one can connect either a thick/thin segment or a computer.
In Ethernet (IEEE 802.3) the topology, though physically is star but logically is BUS, i.e. the
collision domain of all the nodes in a LAN is common. In this situation only one station can send
the frame. If more than one station sends the frame, there is a collision. A comparison between
the two is shown in Fig. 5.6.1.
In Switched Ethernet, the collision domain is separated. The hub is replaced by a switch,
which functions as a fast bridge. It can recognize the destination address of the received frame
and can forward the frame to the port to which the destination station is connected. The other
ports are not involved in the transmission process. The switch can receive another frame from
another station at the same time and can route this frame to its own final destination. In this case,
both the physical and logical topologies are star.
II - 14
Switched LAN
IEEE 802.3 (Ethernet)
Figure 5.6.1 Difference Between 802.3 and Switched LAN
There are two possible forwarding techniques that can be used in the implementation of Ethernet
switches: and . In the first case, the entire frame is captured at the
incoming port, stored in the switch’s memory, and after an address lookup to determine the LAN
destination port, forwarded to the appropriate port. The lookup table is automatically built up. On
the other hand, a cut-through switch begins to transmit the frame to the destination port as soon
as it decodes the destination address from the frame header.
Fast Ethernet
The 802.u or the fast Ethernet, as it is commonly known, was approved by the IEEE 802
Committee in June 1995. It may not be considered as a new standard but an addendum to the
existing 802.3 standard. The fast Ethernet uses the same frame format, same CSMA/CD protocol
and same interface as the 802.3, but uses a data transfer rate of 100 Mb/s instead of 10 Mb/s.
However, fast Ethernet is based entirely on 10-Base-T, because of its advantages (Although
technically 10-BASE-5 or 10-BASE-2 can be used with shorter segment length).
Fortunately, the Ethernet is designed in such a way that the speed can be increased if
collision domain is decreased. The only two changes made in the MAC layer are the data rate and
the collision domain. The data rate is increased by a factor of 10 and collision domain is
decreased by a factor of 10. To increase the data rate without changing the minimum size of the
frame (576 bits or 76 bytes in IEEE 802.3), it is necessary to decrease the round-trip delay time.
With the speed of 100Mbps the round-trip time reduce to 5.76 microseconds (576 bits/100 Mbps;
II - 15
which was 57.6 microsecond for 10Mbps Normal Ethernet). This means that the collision domain
is decreased 10 fold from 2500 meters (in IEEE802.3) to 250 meters (fast Ethernet).
IEEE has designed two categories of Fast Ethernet: 100Base-X and 100Base-T4.
100Base-X uses two-wire interface between a hub and a station while 100Base-T4 uses four-wire
interface. 100-Base-X itself is divided into two: 100Base-TX and 100base-FX as shown in Fig.
5.6.2.
100 BASE-T4:
This option is designed to avoid overwriting. It is used for half-duplex communication using four
wire-pairs of the existing category 3 UTP cables, which are already available for telephone
services in homes/offices. Two of four pairs are bi- directional; other two are unidirectional. This
means that there are 3 pairs to be used for carrying data, in each direction (2 bi-directional and 1
uni-directional) as shown in Fig. 5.6.3. Because 100Mbps data cannot be handled by voice-grade
UTP, this specification splits the 100 Mbps flow into three 33.66 Mbps flows.
II - 16
Figure 5.6.4 100Base-TX implementation
100 BASE FX:
This option uses two Fiber optic cables, one carry frames from station to hub and other from hub
to station as shown in Fig. 5.6.5. The encoding is using 4B/5B and it uses NRZ-I signaling. The
distance between station and hub should be less than 2000 meters.
Gigabit Ethernet
As applications increased, the demand on the network, newer, high-speed protocols such as FDDI
and ATM became available. However, in the last couple of years, Fast Ethernet has become the
backbone of choice because it’s simplicity and its reliance on Ethernet. The primary goal of
Gigabit Ethernet is to build on that topology and knowledge base to build a higher-speed protocol
without forcing customers to throw away existing networking equipment.
In March 1996, the IEEE 802.3 committee approved the 802.3z Gigabit Ethernet Standardization
project. At that time as many as 54 companies expressed there intent to participate in the
standardization project. The Gigabit Ethernet Alliance was formed in May 1996 by 11 companies.
The Alliance represents a multi-vendor effort to provide open and inter-operable Gigabit Ethernet
products. The objectives of the alliance are:
II - 17
WIRELESS LAN:
The IEEE 802.3 standard has been revised and extended every few years. High-speed versions with
transmission rate as high as 1000 Mbps are currently available.
● Availability of low-cost portable equipments: Due to the technology enhancements, the equipment
costs that are required for WLAN set-up have reduced a lot.
● Mobility: An increasing number of LAN users are becoming mobile. Wireless LAN can provide users
mobility, which is likely to increase productivity, user convenience and various service opportunities.
● Installation speed and simplicity
● Installation flexibility: Wireless technology allows network to go anywhere wire cannot reach.
● Reduced cost of ownership: Long-term cost-benefits are greater in dynamic environment requiring
frequent moves and changes.
● Scalability: Wireless LAN can be configured in a variety of topologies to meet the users need and
can be easily scaled to cover a large area with thousands of users roaming within it.
However, wireless LAN technology needs to overcome a number of inherent limitations and
challenges. Some of the limitations and challenges are mentioned below:
● Lower reliability due to susceptibility of radio transmission to noise and interference.
● Fluctuation of the strength of the received signal through multiple paths causing fading.
● Vulnerable to eavesdropping leading to security problem.
● Limited data rate because of the use of spread spectrum transmission techniques enforced to ISM
band users.
Transmission Media
There are three media that can be used for transmission over wireless LANs. Infrared, radio frequency
and microwave.
Topology
Each computer, mobile, portable or fixed, is referred to as a in 802.11. The difference between a
portable and mobile station is that a portable station moves from point to point but is only used at a fixed
point. Mobile stations access the LAN during movement. Fundamental to the IEEE 802.11 architecture is
the concept of . A BSS is defined as a group of stations that
coordinate their access to the medium under a given instance of medium access control. The geographic
area covered by a BSS is known as the , which is very similar to a cell in a cellular
communication network. All stations with in a BSA with tens of meters in diameter may communicate with
each other directly. The 802.11 standard support the formation of two distinct types of BSSs: ad hoc
network and Infrastructure BSS.
Two or more BSS's are interconnected using a . This concept of DS
increases network coverage. Each BSS becomes a component of an extended, larger network. Entry to the
DS is accomplished with the use of . An access point is a station, thus addressable. So
data moves between the BSS and the DS with the help of these access points.
Creating large and complex networks using BSS's and DS's leads us to the next level of hierarchy,
the . The beauty of the ESS is the entire network looks like an independent basic
service set to the Logical Link Control layer (LLC) . This means that stations within the ESS can
communicate or even move between BSS's transparently to the LLC.
II - 18
The first type of BSS is known as , which consists of a group of stations within the
range of each other. As its name implies, ad hoc networks are temporary in nature, which are typically
created and maintained as needed without prior administrative arrangement. Ad hoc networks can be
formed anywhere spontaneously and can be disbanded after a limited period of time. A typical ad hoc
network is shown in Figure 5.7.5(a).
II - 19
(a) (b)
Figure 5.7.5 (a) Basic Service set (BSS), (b) Infrastructure BSS (ESS)
An ESS can also provide gateway access for wireless users into a wired network. Each end station
associates itself with one access point. Figure 5.7.6 shows three BSSs interconnected through three APs to
a distribution system. If station A associated with AP-1 wants to send a frame to another station associated
with AP- 2, the first sends a frame to its access point (AP-1), which forwards the frame across the
distribution system to the access point AP-2. AP-2 finally delivers it to the destination station. For
forwarding frames across the APs, bridging protocol may be used, which is beyond the scope of IEEE
802.11 standard. However, the 802.11 standard specifies how stations select their access points. The
technique used for this purpose is known as , which involves the following steps:
A station sends a .
All APs within reach reply with a .
The station selects one of the access points, and sends the AP an .
The AP replies with an .
The above protocol is used when a station joins a network or when it wants to discontinue association
with the existing AP because of weakened signal strength or some other reason. The discontinuation of
association takes place whenever a station acquires a new AP and the new AP announces it in step 4
mentioned above. For example, assume that station B is moving away from the BSS of AP-1 towards the
BSS of AP-2. As it moves closer to the BSS of AP-2, it sends probe frames, which is responded eventually by
AP-2. As some of point of time station B prefers AP-2 over AP-1 and associates itself with the access point
AP-2. The above mechanism is known as , as the node is actively searching for an access
point. An access point also periodically sends Beacon frame that advertises the capabilities of the access
point. In response, a station can associate to the AP simply by sending it an Association request frame.
This is known as .
II - 20
Medium Access Control
Most wired LANs products use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the
MAC protocol. Carrier Sense means that the station will listen before it transmits. If there is already
someone transmitting, then the station waits and tries again later. If no one is transmitting then the station
goes ahead and sends what it has. But when more than one station tries to transmit, the transmissions will
collide and the information will be lost. This is where Collision Detection comes into play. The station will
listen to ensure that its transmission made it to the destination without collisions. If a collision occurred
then the stations wait and try again later. The time the station waits is determined by the back off algorithm.
This technique works great for wired LANs but wireless topologies can create a problem for CSMA/CD.
However, the wireless medium presents some unique challenges not present in wired LANs that must be
dealt with by the MAC used for IEEE 802.11. Some of the challenges are:
The wireless LAN is prone to more interference and is less reliable.
The wireless LAN is susceptible to unwanted interception leading to security problems.
There are so called and problems.
In the discussion of both the problem, we shall assume that all radio transmitters have fixed range. When
the receiver is in the range of two active transmitters then the signal will be garbled. It is important to note
that not all stations are in range of two transmitters.
II - 21
Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA)
The solution to these problems is Carrier Sense Multiple Access with Collision Avoidance or CSMA/CA as
shown in Fig.
Sender sends a short frame called RTS (20bytes) to the destination. RTS also
contains the length of the data frame.
Destination station responds with a short (14 bytes) (CTS) frame.
After receiving the CTS, the sender starts sending the data frame.
If collision occurs, CTS frame is not received within a certain period of time.
Framing
The frame format of the IEEE 802.11 is shown in Figure 5.7.10(a). The frames can be categorized into three
types; management frame, control frame and data frame. The management frames are used for
association and disassociation of stations with at the AP, authentication and de-authentication, and timing
and synchronization. The detailed Frame Format is shown in Fig. 5.7.10.
II - 22
MAC HEADER
2 6 6 6 2 6 0-2312 4
Frame Addr. Addr. Addr. Frame CRC
control 1 2 3 4 body
(a)
(b)
Source Desti.
1 0 N/A
Addr. Addr.
(c)
Figure 5.7.10 Frame format for 802.11
Each frame consists of a MAC header, a frame body and a frame check sequence (FCS). The basic
frame can be seen in Figure 5.7.11 below.
MAC Header
AC header will be described in a little while. Frame Body varies from 0-2312 bytes. At last is the FCS field.
The is a 32-bit cyclic redundancy check which ensures there are no errors in the
frame. For the standard generator polynomial see IEEE P802.11.
II - 23
The MAC header consists of seven fields and is 30 bytes long. The fields are frame control, duration,
address 1, address 2, address 3, sequence control, and address 4. The frame control field is 2 bytes long
and is comprised of 11 subfields as shown in Fig. 5.7.12 below.
Protocol Type Subtype To From More Retry Power More WEP Order
Version DS DS Frag Mgmt. Data
2 2 4 1 1 1 1 1 1 1 1
Bits
● The protocol version field is 2 bits in length and will carry the version of the 802.11 standard. The
initial value of 802.11 is 0; all other bit values are reserved.
● Type and subtype fields are 2 and 4 bits, respectively. They work together hierarchically to
determine the function of the frame.
● The remaining 8 fields are all 1 bit in length.
● The To DS field is set to 1 if the frame is destined for the distribution system.
● From DS field is set to 1 when frames exit the distribution system. Note that frames which stay
within their basic service set have both of these fields set to 0.
● The More Frag field is set to 1 if there is a following fragment of the current MSDU.
● Retry is set to 1 if this frame is a retransmission.
● Power Management field indicates if a station is in power save mode (set to 1) or active (set to
0).
● More data field is set to 1 if there is any MSDUs are buffered for that station.
● The WEP field is set to 1 if the information in the frame body was processed with the WEP
algorithm.
● The Order field is set to 1 if the frames must be strictly ordered.
● The Duration/ID field is 2 bytes long. It contains the data on the duration value for each field and
for control frames it carries the associated identity of the transmitting station.
● The address fields identify the basic service set, the destination address, the source address, and
the receiver and transmitter addresses. Each address field is 6 bytes long.
● The sequence control field is 2 bytes and is split into 2 subfields, fragment number and
sequence number.
● Fragment number is 4 bits and tells how many fragments the MSDU is broken into.
● The sequence number field is 12 bits that indicates the sequence number of the MSDU. The
frame body is a variable length field from 0 - 2312. This is the payload.
As the first standard was wrapping up, the creation of a new standards activity begun in the 802.11
standards body. The new activity gave rise to two more standards; IEEE 802.11 b and IEEE 802.11a.
802.11b: This standard was developed by IEEE with the support from the consortium Wireless
Ethernet Compatibility Alliance (WECA). This standard is backward compatible with the original
standard that added two new data rates 5.5 mbps and 11 Mbps using two coding techniques; the
mandatory coding mode known as Complementary Coding Keying (CCK) modulation and Packet
Binary Convolution Coding (PBCC). Because of backward compatibility with the 802.11, this
standard has gained wide popularity with millions of installed base, which is growing rapidly.
II - 24
802.11a: The successor to 802.11b is 802.11a with greater speed and at a different frequency. It
operates at radio frequencies between 5 GHz incorporating a coded multi-carrier scheme known
as Orthogonal Frequency Division Multi-carrier (OFDM). The 5 GHz band is currently unlicensed
and less congested than the 2.4 GHz ISM band. The 802.11a specifies data speed as high as 54
mbps, also supports 6, 12, 24, and 34 mbps. There is trade off between bandwidth and range -
lower bandwidth cases offering increases range. For 54 mbps, the typical range is 20-30 meters.
The 802.11a and 802.11b devices can coexist without interference or reduced performance.
802.11g: The success of 802.11b has led to another extension that provides 22 Mbps
transmission. It retains backward compatibility with the popular 802.11b standard. This standard
will become 802.11g.
Upper
WiFi: Any of the above wireless LAN standards are referred to by the brand name “WiFi”. It essentially
denotes a set of Wireless LAN standards developed by the working group 11 of the IEEE LAN/MAN
Standards Committee (IEEE 802).
WiMAX: The story of wireless LAN cannot be complete without the mention of WiMAX, which stands for
Worldwide Interoperability for Microwave Access by the WiMAX Forum. The forum was formed in June
2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as
Wireless (Metropoliton Area Network) MAN. The Forum describes WiMAX as "a standards-based
technology enabling the delivery of last mile wireless broadband access as an alternative to cable and
DSL". It supports point to multi-point (PMP) broadband wireless access. WiMAX can deliver a maximum of
70 Mbit/s, over a maximum distance of 70 miles (112.6 kilometers). It has some similarities to DSL in this
respect, where one can either have high bandwidth or long range, but not both simultaneously. The other
feature to consider with WiMAX is that available bandwidth is shared between users in a given radio sector,
so if there are many active users in a single sector, each will get reduced bandwidth.
II - 25
Bluetooth:
Bluetooth Architecture:
Bluetooth Architecture
II - 26
Piconet:
II - 27
It is formed by using various piconets. A slave that is present in one piconet
can be act as master or primary in other piconet. This kind of node can
receive message from master in one piconet and deliver the message to its
slave into the other piconet where it is acting as a slave. This type of node
is refer as bridge node. A station cannot be master in two piconets.
II - 28
1. Radio (RF) layer:
It performs modulation/demodulation of the data into RF signals. It
defines the physical characteristics of bluetooth transceiver. It defines
two types of physical link: connection-less and connection-oriented.
5. SDP layer:
It is short for Service Discovery Protocol. It allows to discover the services
available on another bluetooth enabled device.
6. RF comm layer:
It is short for Radio Frontend Component. It provides serial interface with
WAP and OBEX.
7. OBEX:
It is short for Object Exchange. It is a communication protocol to
exchange objects between 2 devices.
8. WAP:
It is short for Wireless Access Protocol. It is used for internet access.
II - 29
9. TCS:
It is short for Telephony Control Protocol. It provides telephony service.
Advantages:
● Low cost.
● Easy to use.
● It can also penetrate through walls.
● It creates an adhoc connection immediately without any wires.
● It is used for voice and data transfer.
Disadvantages:
II - 30
II - 31