0% found this document useful (0 votes)
7 views32 pages

WMC Unit 3

The document discusses wireless LANs (WLANs), highlighting their growth, requirements, advantages, and challenges. Key requirements include throughput, node capacity, connection to backbone LANs, and security measures. It also outlines various authentication methods, potential attacks on WLANs, and provides an overview of IEEE 802.11 standards and architecture.

Uploaded by

chotabaccha214
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
7 views32 pages

WMC Unit 3

The document discusses wireless LANs (WLANs), highlighting their growth, requirements, advantages, and challenges. Key requirements include throughput, node capacity, connection to backbone LANs, and security measures. It also outlines various authentication methods, potential attacks on WLANs, and provides an overview of IEEE 802.11 standards and architecture.

Uploaded by

chotabaccha214
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 32
N-ARCHITECTURE, § ITECTURE, PHYS MAC MANA Q.1. vee aie nae by wireless LAN ? Write down some important requ aereless LANs: (R.GRV., Nov. 2018) Ans. A wireless LAN is one that makes use of a wireless transmission medium. WLAN is a fast growing market introducing the flexibility of wireless access into office, home, or production environments. WLANs are typically restricted in their diameter to buildings, a campus single room etc., and are operated by individuals, not by large-scale providers. The main goal of WLANs isto replace office cabling and, additionally to introduce a higher flexibility for ad-hoc communication. Until relatively recently, wireless LANs were little used. The reasons for this included high prices, low data rates, occupational safety concerns, and licensing requirements. As these problems have been addressed, the popularity of wireless LANs has grown rapidly. ‘A wireless LAN must satisfy the some type of requirements typical of any LAN, including high capacity, ability to cover short distances, full connectivity among attached stations, and broadcast capability. Furthermore, there are a number of requirements specific to the wireless LAN environment. Following are the main requirements for wireless LANs — (i) Throughput — To maximize capacity, the medium access control Protocol should make as efficient use as passible of the wireless medium. (ii) Number of Nodes — Wireless LANs may require to support hundreds of nodes across multiple cells. a oton ith — terco! _ (iii) Connection to Backbone LAN- Generally, ee mplished for Slations 5 N is needed. This is easily accomp! i on a wired backbone LAN 1s Jes that connect Infrastry i the use of control modules icture wireless LANs through ire to be accommodation for nh 'ypes of LANs. There may also require “bile users and ad-hoc wireless networks. 120 Wireless and Mobile Computing IR.GPV., B.Tech., VI-Sem, (m (iv) Service Area — For a wireless LAN, a typical Coverage area hag a diameter of 100 to 300 m. (v) Battery Power Consumption — Mobile workers use batte, powered workstations that require to have a long battery life when useq With wireless adapters. This suggests that a MAC protocol that needs mobile Nodes to monitor access points constantly or engage in frequent handshakes with a base station is not suitable. Typical wireless LAN implementations have features to decrease power consumption while not using the network, like a sleep mode, (vi) Transmission Robustness and Security — Unless appropriately designed, a wireless LAN may be interference prone and easily eavesdropped, The design of a wireless LAN must allow reliable transmission even in Noisy environment and should provide some level of security from eavesdropping, (vii) Collocated Network Operation — When wireless LANs become more popular, it is quite likely for two or more wireless LANs to operate in the same area or in some area where interference between the LANs is possible, This type of interference may thwart the normal operation of a MAC algorithm and may permit unauthrorized access to a particular LAN. (viii)License-free Operation — Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band employed by the LAN. (ix) Handoff/Roaming — In wireless LAN, the MAC protocol used should enable mobile stations to move from one cell to another. (x) Dynamic Configuration — MAC addressing and network management aspects of the LAN should allow dynamic and automated addition, deletion, and relocation of end systems without disruption to other users. Q.2. Write and explain the four major challenges for implementing wireless LAN. (R.GPV¥., Dec. 2015) Ans. Several important challenges facing the WLAN industry — (i) Complexity and Cost — The alternatives for implementine WLANs such as IR (infrared), spread spectrum, or traditional radios af far more complex and diversified than the wired LANs. (ii) Bandwidth — Data rate limitations of the wireless medium more serious than those of wired media. . (iii) Coverage — The coverage ofa WLAN operating within 4 buildind is less than that of a single cable or even TP-based LANs. (iv) Interference — WLANs are subject to interference from overlaid WLANs or other users operating in the same frequency bands. jet! (v) Frequency Administration — Radio-based WLANS ate 8" i to expensive and untimely frequency regulations. other isrvan-2029) _ oe / Unit =i 121 03 ges and disadvantages of WLANs, WLAN ad Or (GRY, Dec. 2010) 3 a . Write vantages and disadvantages. (RGR, Dee, 2 ns. Advantages of WLANs ~ Advanta; ; » Dec. 2015) ges of wireless LAN; follows ~ 'S are as (i) Cables not only restrict users but also desi . lesigners of . Only wireless networks . small PDAs, gotepadete orks allow for the design of small, i A oe ign of small, independent : (ii) Nodes can communicate without restriction. Senders and receivers can communicate from anywhere. (ii) Wireless networks can survive disasters, like, earthquakes. (iv) Wireless networks also make it easier for any office — in either an old or new building — to be modified with the new cubicles or furniture. No longer does the design for a remodeled office. . (v) Network cable failures are perhaps the most common source of network problems. Moisture from a leak during a thunderstrom can erode metallic conductors. A user who moves a wired computer may break the network connection, A WLAN eliminates these types of cable failures and increases the overall reliability of the network. Disadvantages of Wireless LANs — (i) Restrictions— All wireless products have to comply with national regulations. Several government and non government institutions worldwide regulate the operation and restrict frequencies to minimize interference. Consequently, it takes a very long time to establish global solutions like, ¢.g., IMT-2000. WLANs are limited to low-power senders and certain licence-free frequency bands. (ii) Cost— While, ¢.8., high-speed Ethernet adapters are 1n the range s PC-card, still cost some 1008. of some 10$, wireless LAN adapters, €.8.» 4 ae (iii) WLANs typically offer lower quality than cee counterparts, The main reasons for this drawback are the lower ban ae due to limitations in radio transmission (¢-8 only dato Mbit/s), uae Tales due to interference (¢.g-» 10-4 instead of 107° for fibre - an (iv) Safety and Security — Using radio waves for data "night interfere with other high-tech equipment in, €-8- hospitals. LAN ? Write advantages and di 0.4. What do you understand by wireless mary, met) “advantages of WLAN. Ans. Refer the ans. of Q.1 and Q3- _ —h—_—C~— SS 122 Wireless and Mobile Computing IR.GPV., B.Tech, Vi-Sem, (m Q.5. How authentication is possible in wireless nan ? List ang dise : the possible attacks on such network. / (RGRY, Nov. 209 Ans, There are three main methods of authentication that Aare Use a today’s wireless LANs — / (i) Open authentication (ii) Shared authentication / (iii) EAP (extensible authentication protocol) authentication, The open authentication method is the simplest, of the methods aj only requires that the end device be aware of the service-set identifier (sip) used on the network, as long as the SSID is known then the device va allowed onto the network. The problem with this method is that the SSID ig ‘ypically broadeast and if it is not, it can be easy to figure out with Passive capturing techniques, The shared auth: entication method is commonly used on i small business wire} less LAN implementations; this method (Pre-shared Key-PSK) that is given to both sides of the ci match then the device is allowed onto the network. The third method uses the extensible authentication Protocol (EAP) and is the most common method used by enterprises. The EAP met authentication server th thod utilizes an credential options. Ng a variety of The most common types of attack are as follows — (i) Probing and Discovery take advantage of the fact that 8 broadcasts to communicate with individual and USES a shareq ke ‘onnection; if they at is queried for authentication usi Tools — A host of tools have emerged that 02.11 infrastructures 5 wireless clients. With these Probing and ‘an easily locate, and take advantage § Security safeguards. One of the most common of these tools is Netstumbl: ler, a Windows-based Program that uses active scanning to detect low Security access points. Once the access point 8 detected a number of exploits can be mounted against the network. (4) MAC Identify Spoof Attacks — In an 802.11 WLAN, MAC addresses are openly broadcasted over the air. The security implication is tit potential attackers can sniff the air looking for valid MAC addresses associ! with authorized WLAN Users, access points and even wired infra components, such as switches and Touters. Once detected, programs us Spoof these addresses, whereby intruders can Masquerade as a vad 8 wal client or access Point. Naturally, this can compromise a WLAN if authentication is the only security scheme employed. so! (iii) Denial of Service Attacks — Because WLANs bot ie ensed ISM & U-NII public bands with a limited number © the unlic ish vani-2023) Unit =i 123 Js, RF interference is a common onal quality and network availability dec; a to their advantage, debilitating WL, a this include RF frequency jammj. i ing this inclu ‘quency jamming and exploits wall, which flood the WLAN, pews sich (iv) Man in the Middle Attacks ~ A man in the mi from the interception and Possible modification of atte pac ae two communicating Parties, Such as a wireless client and AP. Man in the middle attacks succeed if the systems can’t distinguish communications with an intended recipient from those with the intervening attacker, ) Static WEP Cracking Programs ~ Soon after it was first introduced, the Wired Equivalency Protocol (WEP) was broken due to the fact that WEP uses static keys which can be easily cracked, While these deficiencies were soon corrected with the WiFi Protected Access (WPA) protocol and 802.11i (WPA2), both of which leverage dynamic kes, many WLANs continue to use WEP-based security. As a result, they are still vulnerable to WEP cracking programs. (vi) Rogue Access Point Attack Programs — A number of “Togue access point attack programs” exist which allow attackers to perform a number of stealth attacks by posing as host access points on a WLAN network. (vii) Misconfigured Clients — Due to the nature of the 802.11 specification enterprise WLANs are vulnerable to security risks when new hosts or clients enter the network and when ad-hoc networking is allowed. A wired host with an enabled WLAN adapter, for example, could unwittingly connect to an utknown WLAN. An attacker would then be able to compromise the host machine via the open WLAN adapter through routing features on Linux and Windows and mount an attack against the wired connection. Similarly, the overflow of RF signals means that accidental connections can occur with neighbouring WLANs, which can comproimise the security of trusted networks. Q.6. Explain various wireless LAN technologies in detail giving their Pros and cons, Also make comparison among them. aK hi ee . ji ized according to the y Ans, In general, wireless LANs are categori i transmission technique which is employed. Mainly, three technologies are used " ara a, (IR) LANs- An individual cell ofan IR LAN is limited toa si ” ike infrared light does not penetrate opaque walls. a single Pape d Spectrum LANs - This type of LAN makes use of spread try ee eer ein In general, these LANs operate in the ISM a i asesinstens Medical) bands so that no FCC licensing is needed lustrial, Scientitic, for their use in United States. coal ——_ problem. As interference increases, SEO ~ a . .GP.V., B.Tech., Vig, 124 Wireless and Mobile Computing i tLaNa $m. (ry sf ve — This type of | does not use Spe (iii) Narrowband. ee microwave frequencies. Some oj they Te ee fi Reales that need FCC licensing, while others U8 ong lucts ope of the unlicensed ISM Sie ans, of Q3 — Refer 7 ar . wo am ad 3.1 gives a comparison of the key characteristig of three technologies — aaa Table 3.1 ) 2; 800 t0 900 mm .7. Explain the overview of the IEEE 802.11, (R.GRV, June 2010) Or Write a short note on IEEE 802.11, (R.GRV,, Dec. 2004) What is IEEE 802,11 ? WL luets are available. As the standard’s numbet indicates, this standard belongs to the Soup of 802.x LAN standards. The Standard specifies the physical and medium access layer adapted to the special Tequirements of wireless LANs, but offers the same interface as the others 0 higher layers to maintain interoperability. The primary goal of the stand! Was the specification of, a simple and robust WLAN which offers time-bounded and asynchronous Services, Additional features of the WLAN should include the support of power Hunagement to save battery Power, the handling of hidden nodes, and tH ability to operate worldwide. The 2.4 GHz ISM band, which is available aot) : Unit - Il 125 i und the world was chi for the origi countries arol ‘osen for the original standard, mei for the standard were 1 Mbit/s mandatory and 2 Mbit/s oe 3 With neat sketch, explain architecture of 802.11 LAN. Also explain (R.GPV., June 2004, 2008, 2011) logic is WAC loge Ha With the help of a neat diagram explain the architecture and functions f Ac layer in 802.11 standard. (R.GPV, June 2009) Ans. Fig. 3.1 shows the model developed by the 802.11 working group. na wireless LAN, the smallest building block is a basic service set (BSS), which has some number of stations executing the same MAC protocol and ing for access to the same shared wireless medium. A BSS can be jgolated oF it may connect to a backbone distribution system (DS) through an gooess point (AP). The access point acts like a bridge. MAC protocol may be fully distributed or controlled by a control coordination function kept in the erally, the BSS corresponds to what is referred to asa cell in socess point. Gen the literature. The DS can be a switch, a wired network, or a wireless network. Fig. 3.1 shows the simplest configuration, in which each station belongs toa single BSS. It means that each station is within wireless range only of other stations within the same BSS. Itis also possible for two BSSs to overlap so that a single station could participate in more than one BSS. geographically, Inaddition, the association between a station and a BSS is dynamic. Stations may tum off, come within range, and go out of range. STA = Station Fig. 3.1 Architecture of 802.11 / r more basic service sets The exte; : Mt nded service set (ESS) has two Of MN” ving tected by a distribution ee) Typically, the distribution system i Sigg set ote LAN but can be any communications network. The oe A Setlooks like a single logical LAN to the logical link control (LLC) level. ™ .GPLV., B.Tech., VI-Sem, 126 Wireless and Mobile Computing IR. my is i ted as part of a station, int (AP) is implement 7 In fig. 3.1, an ek provides access to oe a ich ln, AP is the logic within as acting as a station. A portal is ber St ; te pean panne with a traditional wired L ; “Pe ral aici enacted ser such as a router or bridge, that is p: © Wireg implemented in a device, nt TAN and that is attached to the ium access control (MAC) logic is show, MAC Logic — LEE ei function (DCF) sublayer makes use in fig. 3.2. The distribu ier sense multiple access) algorithm. When a Station of a simple CSMA ee it listens to the medium. In case the medium jg has a MAC. frame to ia shi * hsewiak, the station must wait until the current eee eee ee befare tate. The DCF does not include penenussn eek eel (ie, CSMA/CD) since collision detection 's not ae ree network. Dynamic range of the signals on the medium Ee aie that ataneniting station cannot effectively distinguish incoming Sear ionic noise and the effects of its own on Transmit Frame ‘Yes Exponential Backoff While Medium Idle Access Control Logic Fig. 3.2 IEEE 802.11 Medium — ow MAEAOIVIL, Q.9. Explain the architecture of IEEE 802.11. (R.GP.V, Dec. 2014) Ans. Refer the ans. of Q.8. Q.10. Describe 802.11 architecture. How can you achieve wireless LAN security ? (R.GPV., Dec. 2012) Ans. 802.11 Architecture — Refer the ans. of Q.8. Wireless LAN Security — To address the WLAN security issues, a set of capabilities has been developed by the 802.1 li task group. To achieve strong ity into WLANs, the Wi-Fi Alliance promulgated Wi-F i Protected Access pieihes a Wi-Fi standard. WPA is a set of security mechanisms that removes the security issues of 802.11 and was based on the current state of the 802.11i standard. i, namely, Three main security areas are addressed by IEEE ae - ae - thentication, key management, and data transfer poe a of an authenticati on server (AS) and defines a more robu use ° m, . ication. The AS also plays arole in key 4: rove authentication. The ; ey ding Frets ME 1i offers three different encryption schemes, The a iy encryption standard (AES) with 128-bit keys is used by the scheme that et ity 128 Wireless and Mobile Computing RRGPV,BTech, ys a long term solution. | Q.11. Explain various IEEE 802 standards and basic Orchitecty, IEEE 802.11 standard. (GRY, Dec. 2011, Noy 9 4 Ans, The various standards of IEEE 802 are as follows — 5 (i) 802.1 - The high level interface standard addresses ma related to network architecture, interconnection and management, Moreoyt it deals with issues related to the higher OSI layers. % (ii) 802.2—Logical link control (LLC) and media access contro] (Ag are two sublayers within 802.2 that are equivalent of the OST data link layer, (iii) 802.3 - Carrier sense multiple access with collision detect (CSMA/CD) standards cover a variety of architectures that are Benerally bases on the Ethernet as originally proposed by Metcalfe and Boggs, (iv) 802.4 — The token bus network standard describ. token bus network operates. (v) 802.5 — The token ring network standard describe token ring network operates. eS how the S How the (vi) 802.6 - The metropolitan area network (MAN) standard describes the operation of network covering bigger distances. Another MAN standard, the distributed queue dual bus (DQDB) by the ANSI is an adoption of the IEEE MAN standard. (vii) 802.7 — The broadband Technical Advisory Group provides guidance to other groups that are involved in establishing broadband LAN standards (viii) 802.8 — The Fibre Optic Technical Advisory Group provides guidance to other groups that are involved in establishing LAN standards using | fibre optic cable. (x) 802.9 — Integrated data and voice networks standards covet the architecture for networks that carry both voice and data like ISDNs. (x) 802.10 — A LAN sec security capability like enc transfer. urity addresses the implementation of tyption /decryption network management and dala _ (4) 802.11 ~ The wireless LAN standard covers multiple transmission methods for wireless transmission. (xil) 802.12 - The demand priority access method is one of newer groups which are inv; olved in developing specifications for 100 MbF* speed over twisted-pair wires, ms ic i Unit - I 129 é (sit) 80214 — Cable TV based broadband communication network hin on 5 — Wirel ¥ i) 02.15 — Wireless personal area network (WPAN) working group 802.16 - Broadband wireless access (BBWA) working group. vi) 302.17- Resilient packet ring working group (RPRWG) for use in and WAN for transfer of data packets at rates scalable to many Gps, M rehitecture of IEEE 802.11 - Refer the ans. of Q.8. 2. Explain IEEE 802.La in brief. Ans JEEE 302.11a offers upto 54 Mbit/s using OFDM (IEEE 1999), cally aimed at the US 5 GHz U-NII (Unlicensed national information i tructure) bands. The FCC (US) regulations offer three different 100 it domains for the use of 802.11a, each with a different legal maximum yer oP — 5,15-5.25 GHz/50 mW, 5.25-5.35 GHz/250 mW, and 5.725- : 5G 1 W. ETSI (Europe) defines different frequency bands for Europe “515-535 GHzand 5.47-5.725 GHz and requires two additional mechanisms dynamic frequency selection (DFS) and transmit power control foroperation ; (PC). Maximum transmit power is 200 mW EIRP for the lower frequency tondand 1 WEIRP for the higher frequency band. DFS and TPC are not necessary, sfihe transmit power stays below 50mW EIRP and only 5.15-5.25 GHzare used. to 54 Mbit/s IEEE 802.11a uses many To be able to offer data rates up! gies. The system uses 52 subcarriers (48 data + 4 pilot) that PSK, 16-QAM, or 64-QAM. To mitigate transmission errors, FEC is applied using coding rates of 1/2, 2/3 or 3/4. Tuble 3.2 gives an overview of the standardized combinations of modulation and coding schemes together with the resulting data rates. different technolo; ae modulated using BPSK, Q Table 3.2 Rate Dependent Parameters for IEEE 802.1a Data Coded | Coded Bits bing Modulation one Bits per | per OFDM Subcarrier | Symbol Af BPSK | 1/2 1 b BPSK 3/4 1 ig QPSK 1/2 2 “4 QPSK 3/4 2 ae 1/2 4 ® 1-QAM 3/4 4 . -QAM 243 6 4 | o4-gam | 3/4 6 ne ou. Explain IEEE 802.11» in brief, ns the first commercial 802.11 Todu ie offered proprietary solutions with 1 iMbee A wen aa sriarket segmentation, TEEE 802. 11b soon followed and th anne sapplement to the original standard (Higher-speed Physical layer = sae ne GHz band). This standard describes a new PHY layer and sian 3 eaenoce ssful version of IEEE 802.11 available today, a ding on the current interference and the distan ; and receiver 802.11b systems offer 11, 5.5, 2, or 1 bie a eam data rate is approximately 6 Mbit/s. The lower data rates 1 and 2 Mbit/s use the 11-chip Barker sequence and DBPSK or DQPSK, Tespectively. The new data rates 5.5 and 11 Mbit/s use 8-chip complementary code keying (CCK). The standard defines several packet formats for the physical layer. The mandatory format -interoperates with the original versions of 802.11. The optional versions provide a more efficient data transfer due to shorter headers/ different coding schemes and can coexist with other 802.11 versions. However, the standard states that control all frames shall be transmitted at one of the basic rates, so they will be understood by all stations in a BSS. 0.15. Explain the packet format for IEEE 802.11b. Ans. Fig. 3.5 shows two packet formats standardized for 802.11b. bod mandatory format is called Jong PLCP PPDU, in which the rate and ane tial field is in multiples of 100 kbit/s. Thus, Ox0A represtal® tot ‘nI4is used for 2 Mbit/s, 0x37 for 5.5 Mbit/s and Ox6E for i a > ne *Peamble and the header are transmitted at 1 Mbt none OUT ‘Mional short PLCP PPDU format differs in severd’ Wave a “chronization field consists of 56 scrambled zeros instea : eel topat® shor start frame delimiter SFD cones td ihe short PLC PD: FD of the long format — 0000 0101 the long PLCP PPDU. Receivers that Stead 10 0000 for the Only the Jt 0011 36 twill not detect the start ofa frame, ready ; : ‘ "be : fen mated ae Mb DBPSK. The following header smi al e — i GPLV., B.Tech., Vi- 132. Wireless and Mobile Computing [RGPV. B.Tech. ViSem, 4 . ich is also the lowest available data transmit at 2 Mbit, Dore at hort frames, as shown in fi; Ene aS ength of the overhead is only half for re a 235.m) is useful for e.g. short, but time critical, dat . Long PLCP PPDU Format : fe eae a 8 aT PLCP Header PLCP Preamble 1,2, 5.5 or 11 Mbitis 192 ps at 1 Mbit/s DBPSK at (Optional) Short PLCP PPDU Format (Op' 5 fire! 16 8 3 bl PLCP Header PLCP Preamble Oe pOrsK) (1 Mbit/s, DBPSK) 96 ps 2,55 or 11 Mbit/s Fig. 3.5 IEEE 802.11b PHY Packet Formats 0.16. Write short note on JEEE 802.11g. Ans. IEEE 802.11g introducing new modulation schemes, forward ert; correction and OFDM also allows for higher data rates i.e., above 20 Mbit/s a 2.4 GHz. This approach should be backward compatible to 802.11 and should benefit from the better propagation characteristics at 2.4 GHz compared to 5 GH Currently, chips for 54 Mbit/s are available as well as first products. An altemative proposal for 802.11g suggests the so called packet binary convolutional coding (PBCC) to reach a data rate of 22 Mbit/s. While the 54 Mbit/s OFDM mode is mandatory, the 22 Mbit/s PBCC mode can be used as an option. The decision between 802.11a and 802.11g is not obvious. Many 802.11a products ar already available and the 5 GHz band is (currently) not as crowded as the 24 GHz band where not only microwave ovens, but also Bluetooth, operate. Coverage is better at 2.4 GHz and fewer access points are needed, lowering the overall system cost. 802.11g access points can also communicate wit 802.11b devices as the current 802.11g products show. Dual mode devices will be available covering 802.11a and 802.11 (band g). Ifa high traffic volume Per square metre is expected (¢.g., hot spots in airport terminals), the smallet cells of 802. 11a access points and the higher number of available channels(° avoid interference) at 5 GHz are clear advantages. 0.17. Draw and explain the architecture of 802.11a, 802.116 802.11g. (R.GPV,, Dec. 28) Or Explain LAN architecture 802.11a, band g. (R.GPV., Det: aa Aw fer the ans. ofQ.12, Q.14, Q.15 and Q.16. Os 134 Wireless and Mobile Computing IR.GPV,, B.Tech., Vi-Sem, itecture with a neat di, s ‘EE 802.11 protocol arch re 2 Q.19. Explain the IE] (RGPY,, Noy, ny (My Ans, Refer the ans. of Q.18. i ic IN and th, inctions of various layers of WLA: € Proto, a Ans. The functions of various layers of WLAN are as follows — a i erts a stream of bits into g; i) Physical Layer —This layer conv ' : that can ie transmitted on the sender side. At the receiver, the physica} lay tansforms the signals back into a bit stream. For wireless communication the physical layer is responsible for frequency selection, generation of the can frequency, signal detection, modulation of data onto a carrier frequen, encryption. 3 (ii) Data Link Layer — This layer is responsible for accessin, medium, multiplexing of different data streams, correction of transm; errors, and synchronization. The data link layer is also responsible fora point-to-point connection between two devices or a point-to. connection between one sender and several receivers. (iii) Network Layer — This layer is Tespon: through a network or establishing a connection many other intermediate systems. (iv) Transport Layer — This layer is responsible for establishing an end-to-end connection. (») Application Layer — Finally, of all transmission-oriented layers, Protocol Architecture — Refer the ans. of Q.18, I8hal cy and 8 the ission Teliable “Multipoint sible for Touting packets between two entities over the applications are situated ontop Q.21. Describe the Physical layer architecture of 802.11 standard, (RGR, Dec. 2013, June 2020) Ans, Several Physical layers are defined by the 802.11 standard to operate with the MA‘ i i ; sublayer and the physic#! medium-dependent (PMD) sublayer, , PCLP is the upper sublayer and Communicates with the MAC layer Y Using the Service Primitives through the Physical layer service access point! (sah Based on instructions from the MAC layer, the PCLP maps a LLC (logical Control) protocol data unit (PDU) into a format which is appropriate for trans™ aM AC Stee Physical medium, In addition the LLC PDU also is know" MAC service data unit(MSDU) because iti the data field at the MAC Iy® Protocol data unit PDU) consists ofa header containing management inform" 5 at Unit - Il 135 Fa “ oo da block of user informa-tion known as a service data unit ai . delivers incoming frames from the wireless medium to the MAC 4 bap @ " ee Othe pLcr station. As depicted in fig. 3.7, the MAC sublayer adds a header eo! Be yn and the a a CRC (cyclic oda CY check) field sed the receiver tO Network u ah Openin, g the integrity of the penne: re eames. Then the pice sublayer adds two pats tQ forma PLCP. frame a PLCP PDU (PPDU). Data Link Layer fist part is a preamble Logical Link Control i tains synchro- a iio ea le 802.11) Physical Layer Physical Lay related information. Specific Coveapseen Procedure sructure of a PLCP frame Physical Medium Dependent depends on the particular as physical layer with which it Fig. 3.7 Position of the TEEE-802.11 Standard is associated, within the ISO PMD sublayer is concerned with the characteristics of the physical medium and the specific transmission techniques used to transmit information over a particular medium. In order to carry out the transmission and reception functions, the PLCP and the PMD communicate by means of primitives. 0.22, Explain the physical layer of IEEE 802.11 standard. ‘Ans, TEEE 802.11 supports three different physical layers — one layer based on infra red and two layers based on radio transmission. All PHY variants include the provision of the clear channel’ ‘assessment signal (CCA). The CCA isneeded for the MAC mechanisms controlling medium access and indicates ifthe medium is currently idle. The PHY layer offers a service access point (SAP) with 1 or 2 Mbits transfer rate to the MAC layer. ‘The three versions of @ PHY layer defined in the standard are described below — Frequency Hopping Spread Spectrum — FHSS is a spread spectrum. for the coexistence of multiple networks in the same technique which allows Ds Contention-free Service Contention 142 Wireless and Mobile Computing it diagram, 0.26. With the help of neal functions of MAC layer in 802.11 standard. Joys one of two methods to gain access to Ans, MAC sublayer employs ecified in terms of coordination functgg’ . The protocol for these is spe¢ r ; oe aieni when a station within a BSS may transmit and when it i is od is distributed coordination function (DCR), y Santis rh transfer on a best-effort basis. By using the ph ail the stations contend for the channels for each packet transmission, h addition, 802.11 also defines an optional point coordination function (pc , that uses a centralized decision maker, such as an AP, to regulate transmission, and to provide contention-free frame transfers. / P. The architecture of these two coordination functions within the Mac sublayer is shown in fig. 3.15. The DCF remains directly on top ofthe physical layer and the PCF is implemented on top of the DCF. Five physical layer protocols are shown in fig. 3.15. Both the DCF and the PCF can operate concurrently in the same BSS to provide alternating contention and contention. free transmission periods. All stations are needed to support the distributed coordination function. In an ad-hoc network, the stations use only the DCF, In other networks, the stations can operate using just the DCF or a coexisting combination of the DCF and PCF. [RGRV., B.Tech, Vi-Sem fy Oy explain the architecture a nd Service Point Coordination Function (PCI Mac Layer Distribution Coordination Function (DCF) Physical Layer Fig. 3.15 IEEE-802,11 MAC Architecture Now, we explain these functions in detail. (@) Distrit eacrti scarier sense me nifited Coordination Function (DCF) — DCF is based © Sense multiple access with collision avoidance (CSMA/CA) method, 146 Wireless and Mobile Computing IR.GPV., B.Tech. Vi-Sem, (m | Q.28. What do you mean by hidden terminal problem ? How itis Wide in IEEE 802.11 2 8 Or Explain MAC-DCF with RTS/CTS extension. Ans. Hidden terminal problem occurs if one station can receive two others but those stations cannot receive each other. The two stations may sense the channel is idle, send a frame, and cause a collision at the receiver in the middle, To deal with this problem the standard IEEE 802.11 defines an additiona, mechanism using two control packets, RTS and CTS. The use of the mechanism is optional, however, every 802.11 node has to implement the functions to react properly upon reception of RTS/CTS control packets, Fig. 3.17 shows the use of RTS and CTS. DIFS | Sender Receiver Other ar Defer Access Contention Fig. 3.17 IEEE 802.11 Hidden Node Provisions for _ Contention-free Access After. waiting for DIFS, the sender can issue a request to send (RTS) control packet. The RTS packet thus is not given any higher priority compared to other data packets. The RTS packet includes the receiver of the data transmission to come and the duration of the whole data transmission. This duration specifies the time interval necessary to transmit the whole data frame and the acknowledgement related to it. Every node receiving this RTS 0 has to set its net allocation vector (NAV) in accordance with the duration field. The NAV then specifies the earliest point at which the station can ty access the medium again. . If the receiver of the data transmission receives the RTS, it answers x a clear to send (CTS) message after waiting for SIFS. This CTS packe contains the duration field again and all stations receiving this packet fn receiver of the intended data transmission have to adjust their NAV. The. a a set of receivers need not be the same as the first set receiving the RTS pae Now all nodes within receiving distance around sender and receiver are info™ that they have to wait more time before accessing the medium. —_ TWO dUulvovwns nn here is in the Subtype field, usually RTS, CTS, or ACK. | 0.30. Discuss the role of MAC management in IEEE 802.1), Ans. MAC management plays a central role in an IEEE 802.1] station it more or less controls all functions related to system integration, i.e, integai of a wireless station into a BSS, formation of an ESS, synchronization stations etc. The following functions of MAC management are given below. (i) Synchronization — Functions to support finding a wireless Lay synchronization of internal clocks, generation of beacon signals. , Each node of an 802.11 network maintains an internal clock. synchronize the clocks of all nodes, IEEE 802.11 specifies a timing synchronization function (TSF). Synchronized clocks are needed for power management, but also for coordination of the PCF and for synchronization of the hopping sequence in an FHSS system. Using PCF, the local timer of node can predict the start of a super frame, i.e., the contention free and contention period. FHSS physical layers need the same hopping sequences that all nodes can communicate within a BSS. Within a BSS, timing is conveyed by the periodic transmissions of a beacon frame. A beacon contains a timestamp and other management information used for power management and roamté The timestamp is used by a node to adjust its local clock. The node is a required to hear every beacon to stay synchronized; however, from time i time internal clocks should be adjusted. The transmission of a beacon fram? not always periodic because the beacon frame is also deferred if the met! is busy. ii g Sink il (ii) Power Management — Its function is to control trans? a . ier ; “ehout ml! activity for power conservation, e.g., periodic sleep, buffering, withou a frame. savil ” i ef-S8 Wireless devices are battery powered. Therefore, pow io" mechanisms are crucial for the commercial success of such devices: sii! : ive dat, LAN protocols assume that stations are always ready to recelve dal map (TIM) With every CaCO ee ae ee Me rlist of | min buffered data. The mobile state learn that it has a buffered dat, wi | help of checking beacon and traffic indication map (TIM). The Mobile g h with buffered data transmits a power-save poll to access point, [f the mo, station is in active mode, then access point transmits the buffered data, iy 0.33. Write short note on HIPERLAN. (R.GRK, Dec. 2004, June 2007, 2011, Nov, 2018) Or Discuss the requirements and architecture of HIPERLAN-I. (R.GP.V, Dec. 2009, 2017) Or With necesssary diagrams explain the HIPERLAN-I, requirements and architecture. (R.GP.¥, June 2010) Or Explain HIPERLAN protocol in detail. (R.GP. V; Dec. 2014, 2020) Ans. The HIPERLAN is acronym for HIgh PErformance Radio LAN. It was initiated by the RES-10 group of the ETSI as a pan-European standard for high-speed wireless local networks. The so-called HIPERLAN-1, the firs defined technology by this standard group, started in 1992 and completed i a 2023) Unit - Ill 153 stiv@ RLAN-! was based on certain functional requirements specified 1997. ge 1993, CEPT released spectrum at 5 and 17 GHz for the ty TSE jon of the HIPERLAN. The HIPERLAN 5.15-5.35 GHz band for i np lee operation was the first band which was employed by a WLAN lige 5 GHz. Fig. 3.23 depicts the overall format of the HIPERLAN gonda®4 22 completion of the HIPERLAN-1. In addition to HIPERLAN-1, gctivities “MIPERLAN-2, that aims at higher data rates and intends to we have date ATM as well as IP type access. Other versions of HIPERLAN 3 TPERACCESS for remote access and HIPERLINK to interconnect ae 5 in the backbone. swi HIPERLAN HIPERACCESS HIPERLINK| TYPE2 HIPERLAN TYPE 1 Wireless IP Wireless IP oes andar Broadband Remote Access Interconnect Wireless Fig. 3.23 Divisions of HIPERLAN Activities The functional requirements for the HIPERLAN-I as defined by ETSI are as follows — (i) Data rates of 23.529 Mbps (ii) Coverage of upto 100 m (iii) Multi-hop ad-hoc networking capability (iv) Support of time-bounded services (v) Support of power saving. ___ The overall architecture of an ad-hoc network in HIPERLAN-| is shown in fig. 3.24. In HIPERLAN-1’s ad-hoc network architecture, a multi-hop ‘opology is considered that also permits overlay of two WLANs. As illustrated inthis figure, the multi-hop routing extends the HIPERLAN communication beyond the radio range of a single node. Each HIPERLAN is either a forwarder tepresented by “F’) or anon-forwarder. Simply, a non-forwarder node accepts Packet which is intended for it. A forwarder node retransmits the received ee when the packet does not have its own node address, to other terminals P neigh ee oThood. Each non-forwarder node should choose at least one of eee ours as a forwarder. Inter-HIPERLAN forwarding requires bilateral tonforuc” and agreement between two HIPERLANS. The forwarder and Toutin, arder nodes require to periodically update many databases to support 8 and maintain the operation of a HIPERLAN. In fig. 3.24, solid lines i IR.GPV., B.Tech, yj. 154 Wireless and Mobile Computing Sem ications between two terminals and dash, 10-4 mmunications z led denis ee for forwarding. Three of the terminals, |, 4 ; lenot I thy lng "indicating that they have forwarding one 6y, represented by letter ‘F in IPERLANS, A and B, and terminal 4s mt Sean iene Iso act as a bridge between the two, bey of both WLANs that can al HIPERLAN A Fig. 3.24 Ad-hoc Network Architecture in the HIPERLAN-1 0.34. Define HiperLAN technology. Ans, Refer the ans. of Q.33, (R.GP.Y., Dec. 2015) Ans. In HIPERLAN-1, the PHY lay that is divided j Spacing) in the European Union olé ed States, In the United States, there®* 3 more channels at 5,795.5 825 GHz bands. The transmission power ca dBm), and modulation is the single carrier GMSK we Tate: ig Mbps, Receivers would include a DFE to ee la rates, Consumes considerable electronic power. It 8° Gllging to use GMSK with the DFE for the implementation of Te lata rates, The Multisymbo| Modulation techniques embedded it A OFDM systems permit Simple implementation of fallback data rates. Fall 2023) wot! 2 — ; Unit 455 ( "le ented in systems by simple reduction oj is it ed eee et interval while the symbol interval j ot jn the HIPER -1, the PHY layer codes each Aiea is kept 984 gs with @ maximum of 47 codewords per packet and Ae ae fo aig the equalizer 50-bits per peo Contention Phase f the number of cycle synch soterv® | priority | i Yield } 1 i : : i Data! {Detection | } {Listening ‘Transmission { priority } Elimination ! i i 4 Assertion } Survival } i ; ; ; Verification i : Fig. 3.25 Channel Access Cycle in the HIPERLAN-1 In HIPERLAN, the nonpreemptive multiple access (NPMA) protocol is used which is a listen before talk protocol and supports both asynchronous and isochronous (voice-oriented) transmissions. Carrier sensing in HIPERLAN- | is active, rather than passive as in 802.11, and contention resolution and ACKing is mandatory. HIPERLAN MAC defines priority scheme anda lifetime foreach packet, that facilitates the control of QoS. The MAC layer: also handles the encryption and power conservation in addition to. the routing. The MAC address of the HIPERLAN-1 employs six bytes to support IEEE 802.2 LLC and to be compatible with other 802 standards. Each packet contains six address fields which identify source, destination, and jmmediate neighbour ‘tansmitters and receivers. ; The basi principle ofthe HIPERLAN-1 MAC protocolis show fig. 325. When aterminal senses the medium to be free for atleast 1,700-bit durations, ‘Limmediately transmits. In case the channel is busy, the terminal access = phases when the channel becomes available. These phases (as illustrat "" fig. 3.25) are prioritization phase, contention phase, and eae Phase. During the prioritization phase, i terminals svth ighes Priority, among the five available priority evels, will survive and alae wi bi for the next time that the channel is available. To implement this p) ae combing algorithm is used in five slo%, each 256-bits long. At the ene prioritization period, all the termin: isten to the asserted highest prio als list a 1. This {sure that all terminals have understood the asserted priority level. Thi SI reer re reese errr eee rears bed a oe was enuirery F contention in the 802.11 a AN-2 protoco I stack. in HIP! 0.36. Draw and explain (RGP. V, June 2004, Dec. 20] 3,2 Mn ol stack is shown in fig. 3.26. Pro, Ans, The HIPERLAN-2 protoc {to the number of MAC ang : : : ec stacks in mop 44 a ST ees that handles as usual al] functigy, i f sical la’ : : ees vodulation, forward error lame a detectio, synchronization etc. Data link control (DLC) layer 0 : Cc Function the RLC sublayer and error control functions. If an AP comprises many APh then each APT needs an own MAC instance. MAC of an AP allocates each Mp a certain capacity to guarantee connection quality depending on available resources. DLC is divided into a control and a user part above the MAC j classical connection-oriented systems such as cellular phones or PSTN, thi separation is common. The user part contains error control mechanisms, Using acknowledgements and retransmissions, HIPERLAN-2 offers reliable day transmission. A repetition mode can be used for broadcast transmissions tha provides increased reliability by repeating data packets. In addition, unacknowledged data transmission is available. In the DLC layer, the radi link control (RLC) sublayer comprises most control functions. Associatio control function (ACF) controls association and authentication of new Mi aes Unit - 157 on pronization of the radio cell via beacons. DLC Use! jo a pucc) service controls connection setup, er oe Fa Connection | modificat Jy, the radio resource control (RRC) handles han dito nN of itimate within a . am , pic centro! — Convergence Layer LC user SAP joai Link Control Sublayer Data Link Control basic Data ‘Transport Function Fig. 3.26 HIPERLAN-2 Protocol Stack There is a convergence layer on top of the DLC layer. This highest layer of HIPERLAN-2 standardization may comprise reassembly and segmentation functions and adaptations to fixed LANs, 3G networks etc. 0.37. What is HIPERLAN-2 ? Draw and explain HIPERLAN-2 protocol stack, (R.GPV., June 2020) Ans, HIPERLAN-2 is designed as a fast wireless connection for several 'ypes of networks such as UMTS backbone network, ATM and IP networks. HIPERLAN-2 allows interconnection into almost any type of fixed network technology. The basic services provided in HIPERLAN-2 are QoS in voice, deta and video transmission. Iti also provided unicast, multicast and broadcast transmissions. Also refer the ans. of Q.36. 0.38, Explain the protocol architecture of HIPERLAN and also mark the advantage and So emaee of HIPERLAN. (R.GP. V, Nov. 2019) Ans, Refer the ans. of Q.36. [ fy Unit - Table 3.3 nit ill 159 802.116 2.4 GHz 11 Mb/s 5 Mb/s 802.11a 32 Mb/s fax a access CSMA/CA Cenitral Tesource ontrol/Media sharing e . contro/TDMA/rpp tivity ; /onnection-| Connection. (ol less orientated Iticast Yes Yes Yes as support Point Point ATM/802 control control function function Dsss Single Carrier Ip/RSVP/DiffSery (full control) Single carrier with Dynamic Frequency Selection Frequency selection ihentication No No NAI/IEEE . address/X.509 | Encryption 40-bit RC4 | 40-bit RC4 | DES, 3DES Handover support No No No Fixed network support | Ethernet Ethernet —_| Ethernet, IP, ATM, UMTS, FireWire, PPP Management 802.11 MIB pee aa Radio link quality No Link adap Control . Discuss various 241. Explain architecture of Bluetooth networks. Dec. 2009. 2017) 2004, "Ss of Bluetooth network. (R.GP.V., June 2004, 2010) 4 GRY. Dec. “€ 4 short note on Bluetooth. & ie in connecting its ns, : became interes in 1994, Four “bite The LM. Ericsson Company thout cables in 1994 i st “erogmtes to other devices (c.g, PDAS) WIDE cic (special intere Ps kia and Toshiba) for interconnecting ie, gan CEM; Intel, Nokia and Jess standard f id of short yi? Consortium) to develop a wire ies with the ai NE an, i accessori communication devices and 160 Wireless and Mobile Computing IR.GPV., B.Tech., Vi-Sem, “ ny S Nameg range, low-power, inexpensive wireless radios. The project wa: Bluetooth, after Harald Blaatand (Bluetooth) II (940-981), a Viking king why unified started. Denmark and Norway, also without cables. Although the original idea was just to overcome the cables betwee; it soon started to expand in scope and encroach on the area of wireless LANs, While this move makes the standard more useful, it also Creates Some competition for mindshare with 802.11. The two systems also interfere Wit each other electrically, to make matters worse. It is also noticed th; Packard introduced an infrared network for connecting computer without wires some years ago, but it never really caught on in a The main aim of Bluetooth developing a single-chip, based wireless network technology. At the same time the Bluetooth development started, a study group within IEEE 802.11 wireless personal area network (WPAN) discussed under the following five criteria — N devig, at Hewlety, Peripherals bit way, low-cost, Tadio. (@ Distinct Identity — Origin establish a second 802.11 standard. (ii) Compatibility — Compatibility with IEEE 802 standard. (iii) Market Potential — How many applications, devices, vendors, customers are available for a certain technology ? (iv) Technical Feasibility — Prototypes are required for further discussion, so the study group would not rely on paper work. (v) Economic Feasibility — Everything developed within this group should be cheaper compared to othe ally the study group did not want to t solutions and permit for high-volume Production. Bluetooth meets these criteria so the WPAN group cooperated with the Bluetooth consortium. To understand the networkin; ig of Bluetooth devices a quick introduction to its key features is necessary, , 164 Wireless and Mobile Computing IR.GPV., B.Tech., Vi-Se, 9.43. What will be the impact on piconet in Blueto connected to mobile units ? Explain. (RGPY., Ans. Refer the ans. of Q.41. 0.44, How do IEEE 802.11, HIPERLAN2 and Blu Solve the hidden terminal problem. (My oth devic ‘es Dec. 2073 2016 etooth respecg (R.GPRY, ey one Ans, 802.11 uses the MACA mechanism sending PTS/CTS (7 Point) to sat the hidden terminal problem. For HIPERLAN2 this problem does ne, exist ag pe AP controls all medium access. If aterminal Unicate atal and thus, does not interfere. In Bluetooth, too, are no hidden terminals (8 Point the master controls all visible slaves. If a terminal does not see the master it Participate in communication. If this terminal sends anyway it will Not interfere _ this terminal then acts as master with a different hopping sequence, 9.45. Compare IEEE 802. 11, HIPERLAN-2, and Bluetooth with regard to their ad-hoc capabilities. (R.GRY, Dec. 2011) Ans, Table 3.4 summariz: is hidden it cannot comm es the characteristics of 802.11, HIPERLAN., and Bluetooth. Table 3.4 Spectrum 2.4 GHz 5 GHz Max data rate 1.2 Mbps 32 Mbps Connections PrP, PTMP Frequency selection FHSS 48 subcarrier DSSs OFDM Authentication No Address Fixed networks Ethernet Ethernet, ATM, FireWire, UMTS Yes DES, 3DES CQDDR Encryption Option 40-bit RC4 No 40-bit RC4 2.46. Explain different user scenarios for a Bluetooth network. of ‘ i 5 « aless picone’s Ans, Many different user scenarios are there for wireless P! WPANs — @ Connection of Peripheral Devices — At present, vane ; are connected to g desktop computer via wires. This type of com gif several disadvantage: S — each device has its own type of cables © ie Plugs are needed, wires block office ost devié® ik, Mm space. In a wireless ee to ot are needed for data transmission, However, batteries now av sup the power Supply, as the wires not only transfer data but als Periph eral devices with Pow q iyont-202 3) Unit - Il 165 ii) Support of Ad-| -hoc Networking — Imagine several people coming 1, discussing issues, exchanging data. For instance, students might eet > -e, with the teacher distributing data to their personal digital assistants ). es freless networks can support this type of interaction; small devices rots othave WLAN adapters following the IEEE 802.11 standard, but cheaper feooth chips builtin. Gi) Bridging of Networks — Using wireless piconets, a mobile phone abe connected to a PDA or laptop in a simple way. Mobile phones will not pave full WLAN adapters built in, but could have a Bluetooth chip. The mobile e can then act as a bridge between the local piconet and e.g., the global gsM network (see fig. 3.30). « ( for instance, On. arrival at an airport, @ person’s mobile could receive e-mail via os ay GSM and forward it to the laptop which is still in a suitcase. Via a piconet, a file “Nae” ce server could update local C2 information stored ona laptop ae bie the, person * Fig. 3.30 Example Configurations with a Bluetooth-based Piconet 0.47. Discuss the protocol architecture of Bluetooth. Ans. The Bluetooth standard has many protocols grouped loosely into layers. IEEE is working on modifying Bluetooth to shachorn into the 802 model better. The basic Bluetooth architecture is shown in fig. 3.31. Starting as a simple idea, itnow covers over 2,000 pages dealing with not only the Bluetooth protocols stack can be divided into a core specification (Bluetooth, 2001 a), which describes the protocols from physical layer to data link control together with management function, and profile specifications (Bluetooth, 2001 b). Application a Profiles Apatic Service [one] se rl Telepho mien Audio | ote | titan canal eee ical A ‘Control Adaptation Protoco as Data Link Layer Physical Physical Radio Lane Fig. 3.31 The 302.15 Version of the Bluetooth Protoco! Architecture ON eS a * ee 166 Wireless and Mobile Computing IRGRV., B.Tech, Vion m layer is the physical radio layer, which Corresponds ¢.. all etna ee in the OSI and 802 models. This layer deay tadio transmission and modulation. th Next the baseband layer is somewhat analogous to the MAC Sublayery, also includes elements of the physical layer. It deals with how the mage controls time slots and how these slots are grouped into frames, le Next comes a layer with a group of somewhat related protocols, The j manager set up the logical channels between devices, including see functions and parameter negotiation. The logic link control aday 00 Proto shields the upper layer from the details of transmission. Audio and layer deals with audio and control respectively. The applications CaN get ay them directly, without having to go through the L2CAP protocol, The next layer up is the middleware layer. Which contains a mix of, iftereny protocols. The top layer is where the applications and profiles are located, use of the protocols in lower layers to get their work done. Each application has its own dedicated subset of the protocols. Specific devices, such as ahe usually contain only those protocols needed by that application and No others, The three lowest layers of the Bluetooth protocol stack are discussed below. These layers are roughly corresponds to the physical and MAC sublayers, () Radio Layer — This layer moves the bits from master to slave or vice versa. It is the lower-power system with a tange of 10 metres operating in the 2.4 GHz ISM band. The band is divided into 79 channels of 1 MHzeach. Modulation is frequency shift keying, with 1-bit per Hz giving a gross data rate of 1 Mbps, but much of thi S spectrum is consumed by overhead. To allocate the channel fairly, frequency hoping spectrum is used with 1600 hops‘: and a dwell time of 625 1 sec. Because both 802.11 and Blu the same 79 channels, They mate ‘etooth operate in the 2.4 GHz ISM banda: they interfere with each other. Since Bluetooth hopsst faster than 802.11, it is far more likely that a Bluetooth device will ruin 802! transmission than the other way arround, (ii) Baseband Layer — The baseband layer is the closest io Bluetooth has toa MAC sublayer, It turns the raw bit stream into frames » defines some key formats. This is traditional time division multiplexing" the master getting half the slots and the slaves sharing the other half. Fram can be 1, 3 or 5 slots long. . i ye Each frame is transmitted over a logical channel, called a link, ven the master and a 1 ni-2023) river” Unit - ll 167 other is the SCO (synchronous connection oriented) \i je , such oh telephone connections. This type of channel ination fi sed slot in each direction. Due to the time-critical nature of SCO links, fence wat wer them are never retransmitted. Instead, forward error correction oan e sed © provide high reliability. Aslave may have up to three SCO links with > master. Bach SCO link can transmit one 64,000 bps PCM audio channel (iii) Logic Link Control Adaption Protocol — It has three major functions. Tt accepts packets of up to 64 kB from the upper layers and breaks them into frames for transmission. At the far end, the frames are reassembled into packets aB8!D- It also handles the multiplexing and demultiplexing of multiple packet en a packet has been reassembled, the L2CAP layer determines sources. Wh which upper layer protocol to hand it to. LICAP fulfills the quality of service requirements, both when links are established and during normal operation. Also negotiated at setup time is the maximum. payload size allowed, to prevent a large-packet device from drowning a small-packet device. This feature is needed because not all devices can handle the 64 kB maximum packet. 0.48. Explain Bluetooth protocol and, ‘protocol stack. (R.GP V, June 2010) ‘Ans, Refer the ans. of Q.47. 0.49. Comment on physical and MAC layer of ‘Bluetooth technology. (R.GRV, Dec. 2020) er of Bluetooth — Bluetooth employs the 2.4 and is unlicensed and can be ower regulations are so any technology lisions with other Ans. Physical (Radio) Lay GHz ISM frequency band. This frequency b: employed by devices as long as specific frequency and pt followed. Accordingly, this frequency band is crowded and using this band should have mechanism in withstanding co} technologies using the same frequency band. Also refer the ans. of Q.47 (i). Bluetooth MAC Layer — Bluetooth baseband plays a crucial role in the MAC layer as it supports the functions of MAC and helps in frequency hoppne Clock synchronization etc. The linkage between Bluetooth devices is based on a masters ‘lationship, where one device becomes the master and other device become Slaves, A master can control not more than seven active slaves. This structure " called piconet, Within a piconet, the master device and slave devices convey time division duplex (TDD) manner where the data transmissions use UP whole frequency slot (1 MHz) with downlink (from the master to slaves a Uplink (from slaves to master) transmis ion divided into different time OS. This is shown in fig. 3.32. Silat master has the function similar to that of point cO0 ave . Unit - I 169 st mes, the ees is unchanged. However, after the t scai he e, the next frequency used is the frequency which sh aera of multiple time slots, as depicted in the fig. 3.33. jould be used 50. Draw ai ns. There are 3.34. This sta ves within ind explain the frame structure of Bluetooth protocol, different frame formats of Bluetooth, one of them i i rts with an access code that usually identifies i shown in radio range of two mast i Fe na oat i dic : ast ters can tell which traffic is fc secon d field containing 54-bit header typical MAC sublayer fields. Fi i. 1d of upto 2744-bits. ee nally The header field itself contain various subfields. The Address field identific whieh of the eight active devices the frame is intended for. The Type fi a vefines the frame type (ACL, SCO, Poll, or null) the type of error ee ysed in the data field, and how many slots long the frame is. The Flow a asserted bY @ slave when its buffer is full and cannot receive any more ne this is primitive form of flow control. The Acknowledgement bit is used to piggyback an ACK onto a frame. The Sequence bit is used to number the frames to detect retransmissions. After that, comes the 18-bit header Checksum. This 18-bit header repeated three times to form 54-bit header shown in fig. 3.34. them. the data fiel is oe 0-2744 Bits Bits 34 201 F Als ‘The 18-bit header is repeated three times for a total of S4-bits Fig. 3.34 A Typical Bluetooth Data Frame a formats are used for the data field for ACL frames. The sco simpler though — the data field is always 240-bits. Three variants s of actual payload, with the rest are defi ae weined, permitting 80, 160, or 240-bit e chien error correction. In the most are just repeated three times, the same aS e header. ing Bluetooth 257, What are the advantages and disadvantages of usi (RGPV., Dec. 2013) base devi din ices as a sensor network ? Explain. » Advantages of Bluetooth — (i See tuetooth does not require @ clea s. This means that the devices nee reliable version (80-bit payload), ight between the r line of si ing each other, Synoeg 4 .d not be fac Unit - 1474 9, Discuss the features of Bluetooth enable. ; 05 d devices and their security Hands-free mobile telephony. r pureS> (R.GRY, Noy *» Nov. 2 ja Ans. The most common types of Bluetooth devices and s ie ets are summarized in table 3.5, ‘ome of their e) k Table 3.5 : Bluetooth Devices and Features Mobile phone Interface with a Bluetooth hands-free headset, Audio streaming from PC, TV, MP3 player or hi-fi Exchange contact details (business cards), calendar entries, photos, etc. with other Bluetooth devices. Connect to PC to transfer or back-up files. Connect to the internet via a Bluetooth access point. Exchange contact details (business cards), calendar entries, photos, etc. with other Bluetooth devices. PDA Headset of Connect to PDA or PC to transfer or back-up files, headphones system. ‘Audio streaming froma PC or hi-fi system to Bluetooth headphones. Extend a LAN to include Bluetooth enabled devices. Internet connectivity for Bluetooth devices. Audio transceiver Access point Bluetooth enable a range of devices, such as laptops or PDAs. As for WLAN NICS, they form factors, with USB dongl Serial adapter for plug-and-play co serial RS-232 device. from Bluetooth enabled device. Bluetooth adapters are available in @ range of es being the most popular. nnectivity to any tion capabil Provide satellite navig@ 4 with requ enabled devices loade software. Provide wireless © modem.

You might also like