unit 2 IEEE 802.11-protocol architecture
unit 2 IEEE 802.11-protocol architecture
Physical layer:
• IEEE 802.11 supports three different physical layers:
- One layer based on infra red and
- Two layers based on radio transmission
• All PHY variants include the provision of the Clear Channel
Assessment signal (CCA)
• This is needed for the MAC mechanisms controlling medium access
and indicates if the medium is currently idle
• The PHY layer offers a service access point (SAP) with 1 or 2 Mbit/s
transfer rate to the MAC layer
Infra red
• The PHY layer, which is based on infra red (IR) transmission, uses near
visible light at 850–950 nm
• The standard does not require a line-of-sight between sender and receiver,
but should also work with diffuse light
• This allows for point-to-multipoint communication
• The maximum range is about 10 m if no sunlight or heat sources interfere
with the transmission
• Typically, such a network will only work in buildings, e.g., classrooms,
meeting rooms etc
• Frequency reuse is very simple – a wall is more than enough to shield one
IR based IEEE 802.11 network from another
• Today, no products are available that offer infra red communication based
on 802.11
• Proprietary products offer, e.g., up to 4 Mbit/s using diffuse infra red light
• Alternatively, directed infra red communication based on IrDA can be used
(IrDA, 2002).
IEEE 802.11 MEDIUM ACCESS CONTROL LAYER
• MAC layer has to control medium access and offer support for
roaming, authentication and power conservation
• Basic services provided by the MAC layer
- Asynchronous data service (mandatory) and
- Time-bounded service (optional)
• Asynchronous service is offered in ad-hoc network mode
• Both service types can be offered using an infrastructure-based
network along with access point coordinating medium access
• Asynchronous service supports broadcast and multi-cast packets,
and packet exchange is based on a ‘best effort’ model (no delay
bounds) can be given for transmission
• Three basic access mechanisms have been defined for IEEE 802.11
- Basic DFWMAC-DCF using CSMA/CA
- DFWMAC-DCF with RTS/CTS extension
- DFWMAC-PCF with polling
• First two methods are Distributed coordination function (DCF),
the third method is called Point coordination function (PCF)
• DCF only offers asynchronous service, while PCF offers both
asynchronous and time-bounded service but needs an access point to
control medium access and to avoid contention
• The MAC mechanisms are also called Distributed foundation
wireless medium access control (DFWMAC)
• For all access methods, several parameters for controlling the
waiting time before medium access are important
- SIFS
- PIFS
- DIFS
• Values of the parameters depend on the PHY and are defined in
relation to a Slot time
• Slot time is derived from the medium propagation delay, transmitter
delay and other PHY dependent parameters
• Slot time is 50 μs for FHSS and 20 μs for DSSS
Medium access and inter-frame spacing
• The medium can be busy or idle (which is detected by the CCA)
• If the medium is busy this can be due to data frames or other
control frames
• During a contention phase several nodes try to access the medium
Short inter-frame spacing (SIFS):
• The shortest waiting time for medium access (so the highest
priority) is defined for short control messages, such as
acknowledgements of data packets or polling responses
• For DSSS SIFS is 10 μs and for FHSS it is 28 μs
Disadvantages:
• Access scheme has problems under heavy or light load
• Depending on the size of the contention window (CW), the random values
can either be too close together (causing too many collisions) or the values
are too high (causing unnecessary delay)
• Small CW causes a higher load on the medium (collision)
• There is a possibility to choose the same random backoff time using a
large CW
• Under a light load, a small CW ensures shorter access delays
• This algorithm is also called exponential backoff
PROBLEM
802.11 - CSMA/CA access Unicast Data Transfer
802.11 - CSMA/CA access Unicast Data Transfer
• A sender is accessing the medium and sending its data.
• The receiver answers directly with an acknowledgement (ACK)
• Receiver accesses the medium after waiting for a duration of SIFS so no
other station can access the medium in the meantime and cause a collision
• The other stations have to wait for DIFS plus their backoff time
• Acknowledgement ensures the correct reception (correct checksum CRC
at the receiver) of a frame on the MAC layer
• It may be important in error-prone environments (wireless environment)
• If no ACK is returned, the sender automatically retransmits the frame
• But now the sender has to wait again and compete for the access right
• There are no special rules for retransmissions
• The number of retransmissions is limited and final failure is reported to the
higher layer
HIDDEN TERMINALS
Hidden terminals
• A sends to B, C cannot receive A
• C wants to send to B, C senses a “free” medium (CS fails)
collision at B, A cannot receive the collision (CD fails)
A is “hidden” for C
• Hidden terminals may cause collisions
EXPOSED TERMINALS
bits 2 2 4 1 1 1 1 1 1 1 1
Protocol To From More Power More
Type Subtype Retry WEP Order
version DS DS Frag Mgmt Data
MAC address format
scenario to DS from address 1 address 2 address 3 address 4
DS
ad-hoc network 0 0 DA SA BSSID -
infrastructure 0 1 DA BSSID SA -
network, from AP
infrastructure 1 0 BSSID SA DA -
network, to AP
infrastructure 1 1 RA TA DA SA
network, within DS
ACK
bytes 2 2 6 6 4
Frame Receiver Transmitter
RTS Duration CRC
Control Address Address
• Request To Send
bytes 2 2 6 6 4
Frame Receiver Transmitter
CTS Duration CRC
Control Address Address
• Clear To Send
802.11 - MAC management
• Synchronization
– try to find a LAN, try to stay within a LAN
– timer etc
• Power management
– sleep-mode without missing a message
– periodic sleep, frame buffering, traffic measurements
• Association/Reassociation
– integration into a LAN
– roaming, i.e. change networks by changing access points
– scanning, i.e. active search for a network
• MIB - Management Information Base
– managing, read, write
Synchronization using a Beacon (infrastructure)
beacon interval
(20ms – 1s)
B B B B
access
point
busy busy busy busy
medium
t
value of the timestamp B beacon frame
Synchronization using a Beacon
(ad-hoc)
beacon interval
B1 B1
station1
B2 B2
station2
D B T T d D B
access
point
busy busy busy busy
medium
p d
station
t
T TIM D DTIM awake
B1 A D B1
station1
B2 B2 a d
station2
t
B beacon frame random delay A transmit ATIM D transmit data