Siemens IEEE802.11 manual Distributed Coordination Function DCF, Station

Page 34

Distributed Coordination Function (DCF)

Station 1

Tx Data to STA 2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Short deferral Short interval ensures ACK is

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

sent while other stations wait

 

 

 

 

 

 

 

 

 

Station 2

Rx data from STA 1

 

 

 

longer

 

 

 

 

 

 

 

 

ACK to STA1

 

 

 

 

 

 

 

 

STA 3’s back-off is shorter than

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

STA 4’s therefore it begins

 

 

 

 

 

 

 

Distributed inter-frame deferral

 

 

transmission first

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Random back-off

 

 

 

 

 

 

 

 

 

 

Distributed inter-

Station 3

 

 

 

 

 

 

frame deferral

 

 

 

 

 

 

 

 

 

 

 

'HWHFWV￿FKDQQHO￿￿EXV\

 

 

 

 

 

 

Detects channel busy

 

 

Tx Data

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Distributed inter-frame deferral

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Distributed inter-

Random back-off

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

frame deferral

 

 

 

 

 

 

 

 

 

 

 

 

 

'HWHFWV￿FKDQQHO￿￿EXV\

 

 

 

 

 

 

Station 4

Detects channel busy

 

 

 

'HWHFWV￿FKDQQHO￿￿EXV\

 

,

© Siemens, 2002

 

 

Image 34
Contents Maximilian Riegel Prolog Ubiquitous Wlan Prolog Wlan has taken off Outline Part Wireless Internet system architecture Generic Internet network architecture PeerLayering means encapsulation HtmlIEEE802.11 seamless integration into the Internet IP based network architecture $*6Wireless LAN IEEE802.11 basic architecture What is unique about wireless? Part 2 IEEE802.11 Overview Wireless IEEE802.11 Standard With 11 Mbps using existing MAC layerIndependent IEEE802.11 ConfigurationsInfrastructure Isochronous Service IEEE802.11 Architecture OverviewIEEE802.11 Protocol Architecture MAC MIBWireless LAN Standardization WIGPart 3 Physical layer IEEE802.11 GHz & 5 GHz Physical Layers GHz Direct Sequence Spread SpectrumFrequency Hopping Spread Spectrum Direct Sequence Spread Spectrum RF Energy is Spread by XOR of Data with PRN SequenceDsss Transmit Spectrum and Channels IEEE802.11a 5GHz PHY Layer SpecificationsKey milestones IEEE802.11g Further Speed Extension for the 2.4GHz Band CCK-OFDM proposal for up to 54 Mbit/s from IntersilSpectrum Designation in the 5 GHz range TPC Transmission Power Control IEEE802.11h Spectrum Transmit Power ManagementDFS Dynamic Frequency Selection … when will 5 GHz WLANs come? Issues of 5 GHz systemsPHY Terminology Physical Layer Convergence Protocol Plcp Part 4 Medium Access Control Basic Access Protocol Features Robust for interferenceCSMA/CA Explained Backoff-WindowDefer access based on Carrier Sense CSMA/CA + ACK protocolDistributed Coordination Function DCF StationHidden Node Provisions STA a STA BIEEE802.11e MAC Enhancements for Quality of Service Edcf Edcf Enhanced Distributed Coordination FunctionPoint Coordination Function PCF IEEE802.11e MAC Enhancements for Quality of Service HCF HCF Hybrid coordination functionFrame Formats MAC Header format differs per TypeAddress Field Description Summary MAC Protocol Features Part 5 MAC layer management Timestamp contains timer value at transmit time Infrastructure Beacon GenerationTiming Synchronization Function TSF All stations maintain a local timerTiming Synchronization Function TSF Timing conveyed by periodic Beacon transmissionsMAC uses a common mechanism for all PHY ScanningScanning required for many functions Passive ScanningInitial connection to an Access Point Active Scanning ExamplePower Management Considerations Mobile devices are battery poweredPower Management Approach If TIM indicates frame buffered Power Management ProcedureBroadcast frames are also buffered in AP MAC Management Frames BeaconPart 6 Wlan Mobility IEEE802.11 Ad Hoc Mode Independent networkingIEEE802.11 Infrastructure Mode Mobility inside a Wlan ‘hotspot’ By link layer functions If AP accepts Reassociation RequestIEEE802.11f Inter-Access Point Protocol Iapp Iapp defines procedures forPart 7 Wlan security Provides for an authentication mechanism IEEE802.11 Privacy and Access ControlShared key authentication is based on WEP privacy mechanism WEP privacy mechanism WEP bit in Frame Control Field indicates WEP usedShared key authentication StationShortcomings of plain WEP security IEEE802.11i Robust Security Network RSN Security association managementLast word about Wlan security Even IEEE802.11i may not be sufficient for public hot-spotsSummary MAC Functionality Part 8 Public hotspot operation Serving customers in public hot spots 〈 Rqrwwrxfk FxvwrphuhtxlsphqwOne solution for every place hotspot Becoming a Wlan operator is easy Cost issuesLegal aspects in Germany How does your favorite storefront look like? Using a web page for initial user interaction How does it work Web based access control AuthPage Functions of an integrated access gateway User management Real-time accounting based on service, duration and volumePolicy engine Functions of an integrated access gateway Network servicesDhcp server for assigning IP addresses to Wlan clients IP router with NAT enginePart 9 Wlan Umts Interworking Umts and Wireless LAN are different GSM/GPRS/UMTS Wlan IEEE802.11Wlan as just another radio access technology of Umts Wlan Umts Interworking Ancient approach ‘tight coupling’Wlan as an extension of a mobile network Tight couplingWlan is much cheaper than 2G/3G OrjdulwkplfvfdohConclusions for Mobile Network Operators Wlan Umts Interworking Now widely accepted ‘loose coupling’ Revenues without competing against aggressive Wlan operatorsWlan loosely coupled to a Mobile Network Each hotspot is SS7 endpointWeb based authentication and mobile network security Standards for WLAN/UMTS interworking Thank you for your attention Questions and comments? EndLiterature