14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for...
-
Upload
caitlin-dalton -
Category
Documents
-
view
218 -
download
0
Transcript of 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for...
![Page 1: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/1.jpg)
14.1
Chapter 14
Wireless LANs
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
![Page 2: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/2.jpg)
14.2
14-1 IEEE 802.1114-1 IEEE 802.11
IEEE has defined the specifications for a wireless IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical LAN, called IEEE 802.11, which covers the physical and data link layers.and data link layers.
ArchitectureMAC SublayerPhysical Layer
Topics discussed in this section:Topics discussed in this section:
![Page 3: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/3.jpg)
Architecture
Provide two kinds of services The Basic Service Set (BSS) The Extended Service Set (ESS)
The Basic Service Set Made up of stationary or mobile wireless
station and the access point (AP) The BSS is categories by without AP and
with AP
14.3
![Page 4: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/4.jpg)
14.4
A BSS without an AP is called an ad hoc network;
a BSS with an AP is called an infrastructure network.
Note
![Page 5: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/5.jpg)
The BSS without AP
This is a stand-alone network Cannot send a data among BSSs They can locate one another and
agree to be part of a BSS
14.5
![Page 6: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/6.jpg)
14.6
Figure 14.1 Basic service sets (BSSs)
![Page 7: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/7.jpg)
Extended Service Set
Made up of two or more BSSs with APs The BSS are connected through a
distribution system The distribution system connect APs in
the BSSs The stations can be
Mobile – normal station in a BSS Stationary – refers as AP stations where it
is part of wired LAN
14.7
![Page 8: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/8.jpg)
14.8
Figure 14.2 Extended service sets (ESSs)
![Page 9: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/9.jpg)
Station Types
IEEE 802.11 defines three types based on mobility in a wireless LAN : No transition
Not moving Moving only inside a BSS
BSS-transition Move from one BSS to another BUT the movement is inside one ESS
ESS-transition Move from one ESS to another
14.9
![Page 10: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/10.jpg)
MAC Sublayer
IEEE 802.11 defines two MAC Sublayers DCF (Distributed Coordination Function) PCF (Point Coordination Function)
Figure 14.3 shows the relationship between two MAC sublayers The LLC sublayer The physical layer
14.10
![Page 11: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/11.jpg)
14.11
Figure 14.3 MAC layers in IEEE 802.11 standard
![Page 12: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/12.jpg)
DCF (Distribution Coordination Function) Uses CSMA/CA as access method Why not CSMA/CD ?
When collision is detected, a station must be able to send and receive a collision signal at the same time. This can mean costly station and increased bandwidth requirements
If there are the hidden station problems, a collision may not be detected
The distance between stations are great so signal fading could prevent from hearing a collision
14.12
![Page 13: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/13.jpg)
14.13
Figure 14.4 CSMA/CA flowchart
![Page 14: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/14.jpg)
CSMA/CA Flowchart
Before sending a frame Uses Persistence strategy with back-off
until the channel idle If the channel is idle, wait for a period of
time called the DIFS (Distributed Interframe Space)
Sends the control frame called the RTS (Request To Send)
14.14
![Page 15: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/15.jpg)
Continue …
After received the RTS Waiting a period of time called the SIFS
(Short Interframe Space) The destination station sends a control
frame called the CTS (Clear To Send) to the source station
This control frame indicates the destination station is ready to receive a data
14.15
![Page 16: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/16.jpg)
Continue …
After waiting an amount of time equal to SIFS, the source station starts send a data
At destination station After waiting an amount of time equal to
SIFS, send an acknowledgement** to show the time frame is received
**Acknowledgement is the way to inform about arrival packet of data
14.16
![Page 17: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/17.jpg)
14.17
Figure 14.5 CSMA/CA and NAV
![Page 18: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/18.jpg)
NAV (Network Allocation Vector) How do other stations defer sending
their data if one station acquires access? In other words, how is the collision avoidance aspect of this protocol accomplished? The key is a feature called NAV.
14.18
![Page 19: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/19.jpg)
Continue ..
When a station send the RTS frame It includes the duration of occupy for the
channel This station create a timer called NAV that
shows how much time must pass before other stations are allowed to check the channel for idleness
Collision during handshaking It is happened during when RTS and CTS are in
transition Uses back-off strategy and sender tries again
14.19
![Page 20: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/20.jpg)
PCF (Point Coordination Function) Optional access method and can be
implemented in an infrastructure network
It is also implemented on top of DCF Mostly used for time-sensitive
transmission
14.20
![Page 21: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/21.jpg)
Continue …
PCF has a centralised and contention-free polling access
The AP performs polling for the stations and the stations sending data to the AP
To set priority to PCF, interframe spaces have been defined PIFS – shorter than the DIFS SIFS – Same as that in DIFS
Example : at the same time, (1) a station wants use only DCF, (2) AP wants use PCF, so as a result the AP has priority
14.21
![Page 22: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/22.jpg)
Continue …
Due to priority of PCF over DCF, stations only use DCF may not access to the medium
To prevent this, a repetition interval has been designed to cover Contention-free (PCF) Contention-based (DCF)
14.22
![Page 23: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/23.jpg)
Continue …
The repetition interval which is repeated continuously as shown in Figure 14.6
It is start with a special control frame (beacon frame) When the stations hear a beacon frame It starts the NAV during contention-free
period
14.23
![Page 24: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/24.jpg)
14.24
Figure 14.6 Example of repetition interval
![Page 25: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/25.jpg)
Continue …
During the repetition interval The PC sends a pool frame The PC receives data The PC sends ACK or receives ACK or do
any combination of these At the end, the PC sends CF end
(contention-free end) frame to allow the contention-based stations use the medium
14.25
![Page 26: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/26.jpg)
Fragmentation
A corrupt frame has been retransmitted due to noisy in the wireless environment
Therefore, recommends fragmentation of large frame
It is more efficient to resend a small frame than a large one
14.26
![Page 27: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/27.jpg)
Frame Format
The MAC layer consists of nine fields as shown in Figure 14.7 FC (Frame Control) – defines the type and
control information D – defines the duration of the transmission Addresses – defines there are 4 addresses SC (sequence control) – defines sequence
number of the frame Frame body – defines the types and
subtypes of FC field FCS – defines error detection sequence
using CRC-32 scheme
14.27
![Page 28: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/28.jpg)
14.28
Figure 14.7 Frame format
![Page 29: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/29.jpg)
14.29
Table 14.1 Subfields in FC field
![Page 30: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/30.jpg)
Frame Types
A wireless LAN defined by IEEE 802.11 has three categories of frames Management Frames
Used for initial communication between stations and APs
Control Frames Used for accessing the channel and
acknowledging the frame as shown in Figure 14.8
Data Frames Used for carrying data and control information
14.30
![Page 31: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/31.jpg)
14.31
Figure 14.8 Control frames
![Page 32: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/32.jpg)
14.32
Table 14.2 Values of subfields in control frames
![Page 33: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/33.jpg)
Addressing Mechanism
Specifies four cases by defining the value of the two flags in the FC field such To DS and From DS as shown in Table 14.3
The interpretation of the four addresses (address 1 to address 4) in the MAC frame depends on the value of these flags
Note : Address 1 is always the address of the next device; Address 2 is always the address of the previous devices; Address 3 is the address of the final station if it is not defined by address 1; Address 4 is the address of original source station if it is not same as address 2
14.33
![Page 34: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/34.jpg)
14.34
Table 14.3 Addresses
![Page 35: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/35.jpg)
Case 1 : 00(refers to Table 14.3) To DS = 0 ; The frame is not going
to to a distribution system From DS = 0 ; The frame is not
coming from a distribution system The frame is going from one station
in a BSS to another without passing through the distribution system as shown in Figure 14.9 (a)
14.35
![Page 36: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/36.jpg)
14.36
Figure 14.9 Addressing mechanisms
![Page 37: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/37.jpg)
Case 2 : 01
To DS = 0 and From DS = 1; the frame is coming from a distribution system (AP) and going to the station (original)
The ACK frame should be sent to the AP Note : the address 3 contains the
original sender of the frame (in another BSS) as shown in Figure 14.9 (b)
14.37
![Page 38: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/38.jpg)
Case 3 : 10
To DS = 1 and From DS = 0; The frame is going to the distribution system (AP) from the station
The ACK frame is sent to the original station
Note : Address 3 contains the final destination of the frame (in another BSS) as shown in Figure 14.9 (c)
14.38
![Page 39: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/39.jpg)
Case 4 : 11
To DS = 1 and From DS = 1; The frame is going from one AP to another AP in a wireless distribution system
Do not to define addresses if the distribution system is a wired LAN because the frame in these cases has the format of wired LAN frame (Ethernet)
Note : need four addresses to define the original sender, the final destination and two intermediate APs as shown in Figure 14.9 (d)
14.39
![Page 40: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/40.jpg)
Hidden and Exposed Station Problems Based on Figure 14.10, Station A can
hear a signal transmitted by B or C Assume;
Station B is sending a data to station A In the middle, station C also sends data to
station A However, station C is out of B’s range and
transmission from B cannot reach C Therefore, C thinks the medium is free Station C sends data to A which results in a
collision at A because station A receiving data from both B and C
14.40
![Page 41: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/41.jpg)
14.41
Figure 14.10 Hidden station problem
1 2
![Page 42: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/42.jpg)
Continue …
In this case, station B and C are hidden between each other with respect to A
Hidden stations can reduce the capacity of the network because of the possibility of collision
The solution is the handshake frames (RTS and CTS) as shown in Figure 14.11 where the RTS message from B reaches A but not C
Station C knows some hidden station is using the channel and refrains from transmitting until duration is over
14.42
![Page 43: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/43.jpg)
14.43
The CTS frame in CSMA/CA handshake can prevent collision from
a hidden station.
Note
![Page 44: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/44.jpg)
14.44
Figure 14.11 Use of handshaking to prevent hidden station problem
![Page 45: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/45.jpg)
Exposed Station Problem
In this problem, a station is refrain from using a channel when it is available
Figure 14.12 shows station A is transmitting to station B
Station C has a data to send to station D which can be sent without interfering with the transmission from A to B
However, station C is exposed to transmission from A; station C hears what A is sending and refrains from sending
Station C is too conservative and wastes the capacity of the channel
14.45
![Page 46: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/46.jpg)
14.46
Figure 14.12 Exposed station problem
![Page 47: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/47.jpg)
Handshaking
Station C hears the RTS from A but does not hear the CTS from B
Station C, after hearing the RTS from A, can wait for a time so that the CTS from B reaches A
It then sends the RTS to D to show that it needs to communicate with D
Both station B and A may hear this RTS but station A is in the sending state, not the receiving state
Station B, however, responds with a CTS
14.47
![Page 48: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/48.jpg)
Continue ….
The problem begun, if station A has started sending its data
Station C cannot hear the CTS from station D because of the collision
Station C cannot send its data to D Station C remains exposed until A
finishes sending its data as shown in Figure 14.13
14.48
![Page 49: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/49.jpg)
14.49
Figure 14.13 Use of handshaking in exposed station problem
![Page 50: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/50.jpg)
Physical Layer
Except the infrared, all implementations are operate in the industrial, scientific and medical (ISM) band which defines three unlicensed bands in the three ranges 902-928 MHz 2.400 – 4.835 GHz 5.725 – 5.850 GHz
See Figure 14.14
14.50
![Page 51: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/51.jpg)
14.51
Table 14.4 Physical layers
![Page 52: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/52.jpg)
14.52
Figure 14.14 Industrial, scientific, and medical (ISM) band
![Page 53: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/53.jpg)
14.53
14-2 BLUETOOTH14-2 BLUETOOTH
BluetoothBluetooth is a wireless LAN technology designed to is a wireless LAN technology designed to connect devices of different functions such as connect devices of different functions such as telephones, notebooks, computers, cameras, printers, telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A Bluetooth LAN is an ad coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which means that the network is formed hoc network, which means that the network is formed spontaneously. spontaneously.
ArchitectureBluetooth LayersBaseband LayerL2CAP
Topics discussed in this section:Topics discussed in this section:
![Page 54: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/54.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Architecture
Defines two type of networks Piconet Scatternet
14.54
![Page 55: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/55.jpg)
Piconet
It is also called small net Its can have up to 8 stations One primary, the rest are secondary Communication can be one-to-one or
one-to-many
14.55
![Page 56: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/56.jpg)
Continue ..
An additional eight secondaries can be in the “parked state”
A secondary in a “parked state” is synchronised with the primary but cannot take part in communication until it is moved from the “parked state”
ONLY eight stations can be active To activate a station from the “parked
state”, an active station must go to the “parked state”
14.56
![Page 57: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/57.jpg)
14.57
Figure 14.19 Piconet
![Page 58: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/58.jpg)
Scatternet
It has been formed by the combinations of piconet
A secondary station in one piconet can be the primary in another piconet
This station can receive messages from the primary in the first piconet (as a secondary) and acting as a primary, deliver them to secondaries in the second piconet
A station can be a member of two piconets
14.58
![Page 59: 14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.](https://reader035.fdocuments.in/reader035/viewer/2022081513/56649d365503460f94a0e1df/html5/thumbnails/59.jpg)
14.59
Figure 14.20 Scatternet