Model Questions
Model Questions
Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless
routers that form the base stations or access.
Basic Service Set (BSS) − A basic service set is a group of stations communicating at the
physical layer level. BSS can be of two categories depending upon the mode of operation−
Infrastructure BSS − Here, the devices communicate with other devices through access points.
Duration − It is a 2-byte field that specifies the time period for which the frame and its
acknowledgment occupy the channel.
Address fields − There are three 6-byte address fields containing addresses of source,
immediate destination, and final endpoint respectively.
Data − This is a variable-sized field that carries the data from the upper layers. The maximum
size of the data field is 2312 bytes.
Q2) Explain the Physical Layer and services offered by IEEE 802.11.
Ans :- IEEE 802.11 Services
The 802.11 standard defines services that provide the functions that the LLC layer requires for
sending MAC Service Data Units (MSDUs) between two entities on the network. These
services, which the MAC layer implements, fall into two categories:
Station Services These include Authentication, Deauthentication, Privacy, and MSDU delivery.
The following sections define the station and distribution system services.
Station Services
The 802.11 standard defines services for providing functions among stations. A station may be
within any wireless element on the network, such as a handheld PC or handheld scanner. In
addition, all access points implement station services. To provide necessary functionality, these
stations need to send and receive MSDUs and implement adequate levels of security.
Authentication
Because wireless LANs have limited physical security to prevent unauthorized access, 802.11
defines authentication services to control LAN access to a level equal to a wired link. Every
802.11 station, whether part of an independent BSS or an ESS network, must use the
authentication service prior to establishing a connection (referred to as an association in 802.11
terms) with another station with which it will communicate. Stations performing authentication
send a unicast management authentication frame to the corresponding station.
The IEEE 802.11 standard defines the following two authentication services:
Open system authentication This is the 802.11 default authentication method. It is a very simple
two-step process. First the station wanting to authenticate with another station sends an
authentication management frame containing the sending station's identity. The receiving station
then sends back a frame indicating whether it recognizes the identity of the authenticating
station.
Shared key authentication This type of authentication assumes that each station has received a
secret shared key through a secure channel independent from the 802.11 network. Stations
authenticate through shared knowledge of the secret key. Use of shared key authentication
requires implementation of the Wired Equivalent Privacy algorithm (WEP).
Deauthentication
When a station wants to disassociate from another station, it invokes the deauthentication
service. Deauthentication is a notification and cannot be refused. A station performs
deauthentication by sending an authentication management frame (or group of frames to
multiple stations) to advise of the termination of authentication.
Privacy
With a wireless network, all stations and other devices can hear data traffic taking place within
range on the network, seriously affecting the security level of a wireless link. IEEE 802.11
counters this problem by offering a privacy service option that raises the security level of the
802.11 network to that of a wired network.
The privacy service, applying to all data frames and some authentication management frames,
is based on the 802.11 Wired Equivalent Privacy (WEP) algorithm that significantly reduces
risks if someone eavesdrops on the network.
Router Free
Connecting to files on other computers and/or the Internet without the need for a wireless router
is the main advantage of using an ad hoc network. Because of this, running an ad hoc network
can be more affordable than a traditional network---you don't have the added cost of a router.
However, if you only have one computer an ad hoc network won't be possible.
Mobility
Ad hoc networks can be created on the fly in nearly any situation where there are multiple
wireless devices. For example: emergency situations in remote locations make a traditional
network nearly impossible, but "The medical team can utilize 802.11 radio NICs in their laptops
and PDAs and enable broadband wireless data communications as soon as they arrive on the
scene."
Speed
Creating an ad hoc network from scratch requires a few settings changes and no additional
hardware or software. If you need to connect multiple computers quickly and easily, then an ad
hoc network is an ideal solution.
--------------------------------------------------------------------
(b)Explain the applications of adhoc Wireless network.
Ans:- In the Windows operating system, ad hoc is a communication mode (setting) that allows
computers to directly communicate with each other without a router. Wireless mobile ad hoc
networks are self-configuring, dynamic networks in which nodes are free to move.
Such wireless networks lack the complexities of infrastructure setup and administration,
enabling devices to create and join networks "on the fly".[3]
Each device in a MANET is free to move independently in any direction, and will therefore
change its links to other devices frequently. Each must forward traffic unrelated to its own use,
and therefore be a router. The primary challenge in building a MANET is equipping each device
to continuously maintain the information required to properly route traffic.
This becomes harder as the scale of the MANET increases due to
1) the desire to route packets to/through every other node,
2) the percentage of overhead traffic needed to maintain real-time routing status,
3) each node has its own goodput to route independent and unaware of others needs, and
4) all must share limited communication bandwidth, such as a slice of radio spectrum.
Such networks may operate by themselves or may be connected to the larger Internet. They
may contain one or multiple and different transceivers between nodes. This results in a highly
dynamic, autonomous topology. MANETs usually have a routable networking environment on
top of a link layer ad hoc network.
Q4) Explain and compare the media access control mechanism of DCF Methods adopted
in IEEE 802.11 WEAN.
Ans :- Distributed coordination function (DCF) is a mandatory technique used to prevent
collisions in IEEE 802.11-based WLAN standard (Wi-Fi). It is a medium access control (MAC)
sublayer technique used in areas where carrier-sense multiple access with collision avoidance
(CSMA/CA) is used.
Technique
The basic technique of DCF is as follows −
When a station has a frame to transmit, it waits for a random backoff time. The random backoff
time is defined by a contention window having a random number of time slots. The backoff time
is given by the following equation −
Timebackoff = random()×Timeslots
Here, the function generates a random number and is the time period for one slot.
If the station senses that the channel is busy during the contention period, it pauses its timer till
the channel is clear.
At the end of the backoff period, if the channel is clear, the station will wait for an amount of time
equal to DIFS (Distributed Inter-Frame Space) and sense the channel again.
If the channel is still clear, the station transmits a RTS (request to send) frame.
The destination station responds using a CTS (clear to send) frame if it is available.
After the frames are sent, the transmitting station waits for a time equal to SIFS (Short
Inter-Frame Space) for the acknowledgement.
At the end of this transmission process, the station again waits for the backoff time before the
next transmission.
WAP architecture
WAP services
1. WAP Architecture
i. It provides a scalable and extensible environment for application development of mobile
ii. This is achieved using layered design of protocol stack. The layers resemble the layers of OSI
model.
iii. Each layer is accessible by layers above as well as by other services and applications
through a set of well defined interface.
iv. External applications may access session, transaction, security and transport layers directly.
2. WAP services
In addition to a new protocol stack, WAP 2.x introduced many other new features and services.
These new features expand the capabilities of wireless devices and allow developers to create
more useful applications and services. The following is a summary of the features of interest:
WAP Push. WAP Push enables enterprises to initiate the sending of information on the server
using a push proxy. This capability was introduced in WAP 1.2, but has been enhanced in WAP
2.x. Applications that require updates based on external information are particularly suited for
using WAP Push. Examples include various forms of messaging applications, stock updates,
airline departure and arrival updates, and traffic information. Before WAP Push was introduced,
the wireless user was required to poll the server for updated information, wasting both time and
bandwidth.
User Agent Profile (UAProf). The UAProf enables a server to obtain information about the client
making the request. In WAP 2.x, it is based on the Composite Capabilities/Preference Profiles
(CC/PP) specification as defined by the W3C. It works by sending information in the request
object, allowing wireless servers to adapt the information being sent according to the client
device making the request.
External Functionality Interface (EFI). This allows the WAP applications within the WAE to
communicate with external applications, enabling other applications to extend the capabilities of
WAP applications, similar to plug-ins for desktop browsers.
Wireless Telephony Application (WTA). The WTA allows WAP applications to control various
telephony applications, such as making calls, answering calls, putting calls on hold, or
forwarding them. It allows WAP WTA-enabled cell phones to have integrated voice and data
services.
Persistent storage interface. WAP 2.x introduces a new storage service with a well-defined
interface to store data locally on the device. The interface defines ways to organize, access,
store, and retrieve data.
Data synchronization. For data synchronization, WAP 2.x has adopted the SyncML solution. As
outlined in Chapter 10, "Enterprise Integration through Synchronization," SyncML provides an
XML-based protocol for synchronizing data over both WSP and HTTP.
Multimedia Messaging Service (MMS). MMS is the framework for rich-content messaging.
Going beyond what is possible for SMS, MMS can be used to transmit multimedia content such
as pictures and videos. In addition, it can work with WAP Push and UAProf to send messages
adapted specifically for the target client device.
Ans :- Direct sequence spread spectrum (DSSS) is a transmission technology used in local
area wireless network transmissions. In this technology, a data signal at the sending station is
combined with a high data rate bit sequence, which divides user data based on a spreading
ratio.
The benefits of using DSSS are resistance to jamming, sharing single channels among multiple
users, less background noise and relative timing between transmitter and receivers.
This term is also known as direct sequence code division multiple access.
TABLE OF CONTENTS
Direct sequence spread spectrum (DSSS) is a transmission technology used in local area
wireless network transmissions. In this technology, a data signal at the sending station is
combined with a high data rate bit sequence, which divides user data based on a spreading
ratio.
The benefits of using DSSS are resistance to jamming, sharing single channels among multiple
users, less background noise and relative timing between transmitter and receivers.
This term is also known as direct sequence code division multiple access.
Advertisement
The stream of information in DSSS is divided into small pieces, each associated with a
frequency channel across spectrums. Data signals at transmission points are combined with a
higher data rate bit sequence, which divides data based on a spreading ratio. The chipping code
in a DSSS is a redundant bit pattern associated with each bit transmitted. This helps to increase
the signal's resistance to interference. If any bits are damaged during transmission, the original
data can be recovered due to the redundancy of transmission.
The entire process is performed by multiplying a radio frequency carrier and a pseudo-noise
(PN) digital signal. The PN code is modulated onto an information signal using several
modulation techniques such as quadrature phase-shift keying (QPSK), binary phase-shift keying
(BPSK), etc. A doubly-balanced mixer then multiplies the PN modulated information signal and
the RF carrier. Thus, the TF signal is replaced with a bandwidth signal that has a spectral
equivalent of the noise signal. The demodulation process mixes or multiplies the PN modulated
carrier wave with the incoming RF signal. The result produced is a signal with a maximum value
when two signals are correlated. Such a signal is then sent to a BPSK demodulator. Although
these signals appear to be noisy in the frequency domain, bandwidth provided by the PN code
permits the signal power to drop below the noise threshold without any loss of information.
Q7)Explain with an example the DSR routine protocol. And discuss how power 802.11
infrastructure architecture.
And :- The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol
designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows
the network to be completely self-organizing and self-configuring, without the need for any
existing network infrastructure or administration.
DSR has been implemented by numerous groups, and deployed on several testbeds. Networks
using the DSR protocol have been connected to the Internet. DSR can interoperate with Mobile
IP, and nodes using Mobile IP and DSR have seamlessly migrated between WLANs, cellular
data services, and DSR mobile ad hoc networks.
The protocol is composed of the two main mechanisms of "Route Discovery" and "Route
Maintenance", which work together to allow nodes to discover and maintain routes to arbitrary
destinations in the ad hoc network. All aspects of the protocol operate entirely on-demand,
allowing the routing packet overhead of DSR to scale automatically to only that needed to react
to changes in the routes currently in use.
The protocol allows multiple routes to any destination and allows each sender to select and
control the routes used in routing its packets, for example for use in load balancing or for
increased robustness. Other advantages of the DSR protocol include easily guaranteed
loop-free routing, support for use in networks containing unidirectional links, use of only "soft
state" in routing, and very rapid recovery when routes in the network change. The DSR protocol
is designed mainly for mobile ad hoc networks of up to about two hundred nodes, and is
designed to work well with even very high rates of mobility.
DSR is officially defined by an Internet-Draft. As of August 2003, the most current is "The
Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)"
The most current explanation of the DSR protocol can be found in David B. Johnson, David A.
Maltz, and Josh Broch.
To achieve a long run-time for battery-operated portable electronic devices that incorporate
wireless transceivers, efficient power management of the radio is a critical requirement. The
power management function of IEEE 802.11 wireless local area networks (WLANs) allows
stations (STAs) to operate in the doze mode so that their power consumption is significantly
reduced. Hence, efficient algorithms to manage when and how often a STA enters and exits
doze mode are crucial to battery-operated STAs. We address this problem by developing a
novel model for stochastic analysis of timer-based power management in infrastructure IEEE
802.11 WLANs. Based on this model, the probabilities that a STA is active, idle, or dozing are
derived, and the power consumption of the STA, number of frames buffered, and average delay
per frame are obtained. These results enable an efficient power management algorithm that
optimizes the idle timer and doze duration at the STA and the frame buffer at the access point.
Moreover, similar statistics for the basic power management method in the IEEE 802.11
standard are derived as a special case of the proposed timer-based power management
scheme. Numerical results are presented to demonstrate the effectiveness of the proposed
algorithms.
The signals modulated with these techniques are hard to interfere and cannot be jammed. An
intruder with no official access is never allowed to crack them. Hence, these techniques are
used for military purposes. These spread spectrum signals transmit at low power density and
has a wide spread of signals.
Pseudo-Noise Sequence
A coded sequence of 1s and 0s with certain auto-correlation properties, called as Pseudo-Noise
coding sequence is used in spread spectrum techniques. It is a maximum-length sequence,
which is a type of cyclic code.
Narrow-band Signals
The Narrow-band signals have the signal strength concentrated as shown in the following
frequency spectrum figure.
This is frequency hopping technique, where the users are made to change the frequencies of
usage, from one to another in a specified time interval, hence called as frequency hopping. For
example, a frequency was allotted to sender 1 for a particular period of time. Now, after a while,
sender 1 hops to the other frequency and sender 2 uses the first frequency, which was
previously used by sender 1. This is called as frequency reuse.
The frequencies of the data are hopped from one to another in order to provide a secure
transmission. The amount of time spent on each frequency hop is called as Dwell time.
Q9) Briefly explain about the system and protocol architecture of 802.11.
Ans :- Wireless LANs are those Local Area Networks that use high frequency radio waves
instead of cables for connecting the devices in LAN. Users connected by WLANs can move
around within the area of network coverage. Most WLANs are based upon the standard IEEE
802.11 or WiFi.
1) Stations (STA) − Stations comprise all devices and equipments that are connected to the
wireless LAN. A station can be of two types:
Wireless Access Pointz (WAP) − WAPs or simply access points (AP) are generally wireless
routers that form the base stations or access.
Client. − Clients are workstations, computers, laptops, printers, smartphones, etc.
Each station has a wireless network interface controller.
2) Basic Service Set (BSS) −A basic service set is a group of stations communicating at
physical layer level. BSS can be of two categories depending upon mode of operation:
Infrastructure BSS − Here, the devices communicate with other devices through access points.
Independent BSS − Here, the devices communicate in peer-to-peer basis in an ad hoc manner.
3) Extended Service Set (ESS) − It is a set of all connected BSS.
Advantages of WLANs
They provide clutter free homes, offices and other networked places.
The LANs are scalable in nature, i.e. devices may be added or removed from the network at a
greater ease than wired LANs.
The system is portable within the network coverage and access to the network is not bounded
by the length of the cables.
Installation and setup is much easier than wired counterparts.
The equipment and setup costs are reduced.
Disadvantages of WLANs
Since radio waves are used for communications, the signals are noisier with more interference
from nearby systems.
Greater care is needed for encrypting information. Also, they are more prone to errors. So, they
require greater bandwidth than the wired LANs.
WLANs are slower than wired LANs.
The protocols in the Bluetooth standard can be loosely grouped into the physical layer, data link
layer, middleware layer, and application layer as shown in the following diagram −
Baseband − This protocol takes the services of radio protocol. It defines the addressing
scheme, packet frame format, timing, and power control algorithms.
Data Link Layer − This includes Baseband, Link Manager Protocol (LMP), and Logical Link
Control and Adaptation Protocol (L2CAP).
Link Manager Protocol (LMP) − LMP establishes logical links between Bluetooth devices and
maintains the links for enabling communications. The other main functions of LMP are device
authentication, message encryption, and negotiation of packet sizes.
Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP provides adaption between
upper layer frame and baseband layer frame format. L2CAP provides support for both
connection-oriented as well as connectionless services.
RFComm − It is short for Radio Frontend Component. It provides a serial interface with WAP.
Adopted Protocols − These are the protocols that are adopted from standard models. The
commonly adopted protocols used in Bluetooth are Point-to-Point Protocol (PPP), Internet
Protocol (IP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and
Wireless Application Protocol (WAP).
Service Discovery Protocol (SDP)− SDP takes care of service-related queries like device
information so as to establish a connection between contending Bluetooth devices.
Applications Layer − This includes the application profiles that allow the user to interact with the
Bluetooth applications.
The diagram below shows the different types of inter − frame spacing starting from the
shortest duration (highest priority) to the longest duration (lowest priority). Among these,
DISF is mandatory and SISF is the next most common one.
When a station needs to send multiple frames, RISF is introduced between the individual
frames. It ensures that no other station finds a chance to occupy the channel within the frame
burst.
The duration of SIFS is equal to the sum of delays in radio frequency (RF), Physical Layer
Convergence Procedure (PLCP) and processing delay of MAC (medium access control) layer.
In IEEE 802.11 networks, SIFS is the inter-frame spacing maintained before and after the
transmission of an acknowledgment frame and Clear To Send (CTS) frame. The duration of
SISF is usually 10 μs.
The Access Point (AP) which coordinates the communications centrally, waits for PIFS duration
to grasp the channel. Since PIFS is less than DIFS duration, the AP always has the priority to
access the channel over the other stations. PISF is calculated as the sum of SISF and slot time.
DCF Inter-frame Space (DISF)
Distributed coordination function (DCF) is a mandatory technique used to prevent collisions in
IEEE 802.11-based WLAN standard (Wi-Fi). It is a medium access control (MAC) sublayer
technique used in areas where carrier-sense multiple access with collision avoidance
(CSMA/CA) is used.
Using DCF technique, a station needs to sense the status of the wireless channel before it can
place its request to transmit a frame. The time interval that a station should wait before it sends
its request frame is known as DCF Interframe Spacing (DIFS). DISF is calculated as the sum of
SISF and twice the slot time.
Q12) Explain about DCF and PCF in IEEE 802.11 MAC layer.
Ans:- WLAN DCF vs PCF-Difference between DCF and PCF medium access types
WLAN stands for Wireless Local Area Network. It is a small network consisting of Access Points
and Stations. Access points are like Base stations and Stations are like clients or work stations
or PCs or laptops. Both DCF and PCF are 802.11 medium access types. DCF stands for
distributed coordination function and PCF stands for Point coordination function. In this page we
will see difference between DCF and PCF medium access types defined in IEEE 802.11 WLAN
standard. These are the mechanisms for the implementation of CSMA/CA in Wireless LAN.
CSMA/CA refers to Carrier Sense Multiple Access with Collision Avoidance.
Before we see difference between DCF and PCF; let us understand about carrier sense. The
carrier sense refers to sensing of the medium by the station to know whether the medium is
occupied by some other station or it is free to transmit. There are basically two mechanism to
sense the medium.
• Check layer-1 i.e. physical layer to check for carrier presence
• Virtual Carrier Sense function i.e. NAV(Network Allocation Vector)
Pls. note that once NAV is set, stations can update it further provided frame duration exceeds
currently set value of the NAV. If the frame duration is less than the NAV already set, it will not
be changed/altered.
Almost most of the wlan traffic uses DCF mac access type, this is because this access type is
same as standard ethernet which provides contention based service. DCF makes it possible for
multiple STAs to communicate without the need of central control. Hence it can be used in IBSS
as well as infrastructure network type. As mentioned earlier, each station first checks for
medium and transmits only when medium is idle. If the medium is not idle they will defer the
transmission and employ simple exponential back-off algorithm in order avoid collisions.
There are two main rules which can be applied for all the transmissions based on DCF concept.
These rules are as mentioned below.
WLAN PCF-Point Coordination Function
coordinators are used to ensure that the medium is provided without contention. Point
coordinators reside in access points, so the PCF is restricted to infrastructure networks. To gain
priority over standard contention based services, the PCF allows stations to transmit frames
after a shorter interval. The PCF is not widely implemented.
However, the IEEE designed the PCF so stations that implement only the distributed
coordination function (DCF) will interoperate with point coordinators.
Contention-free service is not provided full-time. Periods of contention-free service arbitrated by
the point coordinator alternate with the standard DCF-based service.
Frame Control(FC) –
It is 2 bytes long field which defines type of frame and some control information. Various fields
present in FC are:
Type:
It is a 2 bit long field which determines the function of frame i.e management(00), control(01) or
data(10). The value 11 is reserved.
Subtype:
It is a 4 bit long field which indicates sub-type of the frame like 0000 for association request,
1000 for beacon.
To DS:
It is a 1 bit long field which when set indicates that destination frame is for DS(distribution
system).
From DS:
It is a 1 bit long field which when set indicates frame coming from DS.
More frag (More fragments):
It is 1 bit long field which when set to 1 means frame is followed by other fragments.
Retry:
It is 1-bit long field, if the current frame is a retransmission of an earlier frame, this bit is set to 1.
Power Mgmt (Power management):
It is 1-bit long field that indicates the mode of a station after successful transmission of a frame.
Set to 1 the field indicates that the station goes into power-save mode. If the field is set to 0, the
station stays active.
More data:
It is 1-bit long field that is used to indicate receiver that a sender has more data to send than the
current frame. This can be used by an access point to indicate to a station in power-save mode
that more packets are buffered or it can be used by a station to indicate to an access point after
being polled that more polling is necessary as the station has more data ready to transmit.
WEP:
It is 1 bit long field which indicates that the standard security mechanism of 802.11 is applied.
Order:
It is 1 bit long field, if this bit is set to 1 the received frames must be processed in strict order.
Duration/ID –
It is 4 bytes long field which contains the value indicating the period of time in which the medium
is occupied(in µs).
Address 1 to 4 –
These are 6 bytes long fields which contain standard IEEE 802 MAC addresses (48 bit each).
The meaning of each address depends on the DS bits in the frame control field.
SC (Sequence control) –
It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence number (12 bits) and
Fragment number (4 bits). Since acknowledgement mechanism frames may be duplicated
hence, a sequence number is used to filter duplicate frames.
Data –
It is a variable length field which contain information specific to individual frames which is
transferred transparently from a sender to the receiver(s).
The following are some of the important differences between CSMA/CA and CSMA/CD.
CSMA/CD CSMA/CA
It only reduces the recovery time. Whereas CSMA/ CA minimizes the possibility of
collision.
CSMA / CD resends the data frame Whereas CSMA / CA will first transmit the intent to
whenever a conflict occurs. send for data transmission.