• Tidak ada hasil yang ditemukan

Wireless LAN and Bluetooth

N/A
N/A
Protected

Academic year: 2023

Membagikan "Wireless LAN and Bluetooth"

Copied!
28
0
0

Teks penuh

(1)

Wireless LAN and Bluetooth

(2)

IEEE 802.11

IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers.

The standard defines two kinds of services:

Basic Service Set

Extended Service Set

2

(3)

Basic Service Set

(4)

Basic Service Set

Building block of Wireless Lan.

Stationary or mobile wireless station.

Access Point (AP)

Ad hoc Architecture

Stand alone network.

No AP required

Infrastructure Network

4

(5)

Extended Service Set

(6)

Station Types

• No transition

• BSS transition

• ESS Transition Mobility

6

(7)

MAC Sublayer

(8)

Distributed Coordination Function

• Uses CSMA/CA for Access Method

• Can’t use CSMA/CD for three reason:

Costly equipments Hidden Station

Signal Fading - distance

8

(9)

Distributed Coordination Function

Check the energy level

Waits for a period of time - Distributed interframe space and sends a control

frame request to send.

Waits for a Short interframe space time and the destination sends a control

frame clear to send.

(10)

Distributed Coordination Function

10

(11)

Network Allocation Vector

A station sends a RTS frame to occupy a channel.

Includes the duration of transmission

Other station creates a timer -- Known as NAV

Collision still occur –

How ?

Two or more stations can send the RTS frame at the same time.

There is no such mechanism for collision detection, they assume that CTS not received and employ the back off strategy.

Retransmission occurs.

(12)

Fragmentation

Frame type

Control frame NAV Four address field Sequence # Type and subtype

of FC field CRC

12

(13)

Subfields in FC

(14)

Frame Types

• Management Frames

initial communication

• Control Frames

channel access and acknowledgement

• Data Frame

14

(15)

Frame Types

Values of subfields in control frames

(16)

Addressing mechanism

14.16

Table 14.3 Addresses

16

(17)

Addressing mechanism

(18)

Hidden Station Problem

14.18 18

(19)

Hidden Station Solution

(20)

Bluetooth

20

(21)

Bluetooth

Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks,

computers, cameras, printers, coffee makers, and so on. A Bluetooth LAN is an ad hoc

network, which means that the network is formed spontaneously.

(22)

Bluetooth

Application

Peripheral devices Home Security

Monitoring Devices

Developed from a project of Ericsson Company.

IEEE 802.15

Wireless Personal Area Network

Architecture

Piconet Scatternet

22

(23)

Bluetooth

(24)

Scatternet

24

(25)

Bluetooth Layers

(26)

Bluetooth

• TDD-TDMA

Half duplex communication system where sender and receiver cannot send at the same time.

• Single Secondary communication

Time slot of 625 Micro Second

26

(27)

Baseband Layers

(28)

Baseband Layers

28

Referensi

Dokumen terkait

If the client sends a request using unknown parameters (for example time, elevation or any other dimension that are not advertised in the ServiceMetadata document) these

8.2 Approximation for a Special Case of Distributed Sweep Coverage We first propose a distributed algorithm for a special case of the problem where each mobile sensor visits all static

Figure 5.31 Group Details 5.4.4 Request for supervisor Student request for supervisor section, students can make supervisors from the supervisor panel and send requests, and if the

\ Integrity and Privacy through Authentication Key Exchange Protocols for Distributed Systems renowned as a Request for Comments RFC specification and evolved into what is known as

The application will be designed by using App Inventor for Android developed by Google and Massachusetts Institute of Technology MIT whereas the Bluetooth module will be programmed by

18 Spanning Tree 2  Frame forwarding – Forwarding database for each port  List the addresses of the stations reached through each port  can preloaded or be learned – For a

The draft recommendation on RFID privacy and security published by the European Commission in Febru- ary 2008 states that RFID applications need to operate in a secure manner and that

By adopting pipeline architecture for multi-stream, a high operating frequency, high total throughput, and efficient design of a CCMP AES cipher for IEEE 802.11i is implemented.. In