0% found this document useful (0 votes)
57 views11 pages

WLAN Intro:: Infrastructure Mode. Logically, An Ad-Hocconfiguration Is Analogous To A Peer-To

The document compares IEEE 802.11a, 802.11b, and 802.11g wireless networking standards. It discusses their operating frequencies, data rates, modulation techniques, compatibility, number of supported users per access point, and costs. 802.11a operates at 5GHz, 802.11b at 2.4GHz, and 802.11g can operate at both 2.4GHz and 5GHz frequencies.

Uploaded by

murthy venkata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views11 pages

WLAN Intro:: Infrastructure Mode. Logically, An Ad-Hocconfiguration Is Analogous To A Peer-To

The document compares IEEE 802.11a, 802.11b, and 802.11g wireless networking standards. It discusses their operating frequencies, data rates, modulation techniques, compatibility, number of supported users per access point, and costs. 802.11a operates at 5GHz, 802.11b at 2.4GHz, and 802.11g can operate at both 2.4GHz and 5GHz frequencies.

Uploaded by

murthy venkata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

WLAN Intro:

Support for wireless local area networks (WLANs) in corporate offices and
employee’s homes isbecoming a necessary activity for networking professionals,
requiring new knowledge and training. Thepurpose of the article is to provide
readers with a basic understanding of the 802.11 techniques,
concepts, architecture and principles of operations. The standard was designed
astransmission systembetween devices by using radio frequency (RF) waves rather
than cable infrastructure, and it providesmobile, cost-effective solutions,
significantly reducing the network installation cost per user.

Architecturally, WLANs usually act as a final link between end user equipment
and the wired structure
of corporate computers, servers and routers.
The standard not only defines the specifications, but also includes a wide range of
services including:
support of asynchronous and time-bounded (time-critical) delivery services;
continuity of service within extended areas via a Distributed System, such as
Ethernet;
accommodation of transmission rates;
support of most market applications;
multicast (including broadcast) services;
network management services; and,
registration and authentication services.

Topology:
WLAN topologies

IEEE 802.11 supports three basic topologies for WLANs: the Independent Basic
Service Set (IBSS), theBasic Service Set (BSS), and the Extended Service Set
(ESS). All three configurations are supported bythe MAC layer
implementation.The 802.11 standard defines two modes: ad hoc/IBSS and
infrastructure mode. Logically, an ad-hocconfiguration is analogous to a peer-to-
peer office network in which no single node is required to
function as a server. IBSS WLANs include a number of nodes or wireless
stationsthat communicatedirectly with one another on an ad-hoc, peer-to-peer
basis, building a full-mesh or partial-meshtopology. Generally, ad-hoc
implementations cover a limited area and aren’t connected to any largernetwork.
Using infrastructure mode, the wireless network consists of at least one access
point connected to thewired network infrastructure and a set of wireless end
stations. This configuration is called a BasicService Set (BSS). Since most
corporate WLANs require access to the wired LAN for services (file
servers, printers, Internet links), they will operate in infrastructure mode and rely
on an Access Point(AP) that acts as the logical server for a single WLAN cell or
channel. Communications between twonodes, A and B, actually flow from node A
to the AP and then from the AP to node B. The AP is
necessary to perform a bridging function and connect multiple WLAN cells
orchannels, and to connectWLAN cells to a wired enterprise LAN.
An Extended Service Set (ESS) is a set of two or more BSSs forming a single
subnetwork. ESSconfigurations consist of multiple BSS cells that can be linked by
either wired or wireless backbones.
IEEE 802.11 supports ESS configurations in which multiple cells use the same
channel, and usedifferent channels to boost aggregate throughput.

Comparison of IEEE 802.11a, IEEE 802.11b and IEEE 802.11g

Abstract
IEEE 802.11 based Wireless Local Area Networks (WLANs) are becoming
popular in home, enterprise and public access areas primarily due to their low cost,
simplicity of installation and high data rates. While WLANs continue to be
predominantly data centric, there is growing interest in using WLANs for voice
and text data especially in enterprise markets. This paper will present the
comparison of different WLAN technologies analytically and theoretically. In this
I consider IEEE 802.11a, 802.11b and 802.11g systems and compare their basic
structure bandwidths, frequency, data rate, user access points, maximum available
channels cost, modulation encoding technique, density and backward
compatibility. I show that the analytical results are in close agreement with those
from simulations and conclude the paper by highlighting some key factors that
dictate the capacity of WLANs.

Introduction

802.11a operates in the 5-GHz frequency band. This frequency band, called the
Universal Networking Information Infrastructure (UNII) band, is divided into three
parts. UNII-1 is for indoor use, and the antenna must be fixed to the radio; UNII-2
is for indoor or outdoor use, with either a fixed or remote antenna; and UNII-3 is
for outdoor bridging only. 802.11a’s bandwidth and frequency is 5GHz and speed
is of 54 Mbps (Effective speed - 50% rated speed), it use OFDM for the
modulation.

802.11b operates in 2.4GHz band. Its speed is 11 Mbps (Effective speed - half of
rated speed). It covers up to 300 feet distance. Its capacity is 32 users per Access
Point. Its range is quite large and used where range matters rather then the density.
It normally installed in both business and homes for easiest migration between the
two locations, also being deployed in “hot spots” such as hotels, airports and
Starbucks.

802.11g operates in 2.4GHz band same as that of 802.11b but it increases the speed
of 802.11b up to 22 Mbps. Its Poor range (although better than that of 802.11a). An
Apple technical note describes the peak performance range of its 802.11g
equipment as 50 feet or less. Its speed decreases dramatically as the distance
increase.

In this paper we will compare the performances of IEEE 802.11a, IEEE 802.11b
and IEEE 802.11g in aspects.

1. Channels
2. Data Rate (speed)
3. Frequency and modulation Technique
4. Range &Density Comparison
5. Compatibility
6. Number of Users per access point
7. Cost
8. Comparison Summary Chart

Multiple Channels
802.11 systems divide the spectrum into channels so that multiple access points can each be set
to a different channel and operate close by without interference. However, 802.11b and 11g use
overlapping channels, which means that out of the 11 channels used in the U.S., only channels 1,
6 and 11 can be used, effectively allowing only three access points to operate without
interference. With 802.11a, 12 access points can operate in the same vicinity because it uses 12
channels that do not overlap.

Data Rate (Speed)


The data rate of IEEE 802.11a is 54 Mbps. The data rate of IEEE 802.11b is 11
Mbps. The data rate of IEEE 802.11g is 54 Mbps. Moreover the data rate is
distance dependent. As the distance increase the data rate is decreases. In the graph
the data rate of IEEE 802.11g falls to 6Mbps as the distance increase to 180feet.
IEEE 802.11a requires access point at every 50 feet while 802.11b requires the
access points after every 300 feet in each direction.

Frequency and Modulation Technique


The frequency of IEEE 802.11a is 5GHz, the frequency of IEEE 802.11b is
2.4GHz and same is of IEEE 802.11g. That is the reason IEEE 802.11b and IEEE
802.11g can work in the same network without making any trouble. The
modulation encoding technique used by IEEE 802.11a is OFDM (orthogonal
frequency division Multiplexing), IEEE 802.11b use DSSS and CCK while IEEE
802.11g uses DSSS and PBCC. The difference in modulation encoding technique
also make the IEEE 802.11a incompatible with IEEE 802.11b and IEEE 802.11g
networks. 802.11a and 802.11g use common 802.11 medium access control
(MAC) layer functions. As a result, protocols responsible for operation of the
network, including security, power management and fragmentation, are essentially
the same. 802.11a and 802.11g only implement physical layer functions, such as
modulation and demodulation, not the higher layer stuff.

Compatibility Comparison
IEEE 802.11b and IEEE 802.11g both are compatible with each other because of
two reasons. Both use the same frequency band i.e. 2.4GHz and same frequency
modulation encoding technique i.e. DSSS although IEEE 802.11b use CKK and
IEEE 802.11g use PBCC. As the IEEE 802.11g and IEEE 802.11b are compatible
to each other. That’s why the customers who don’t need to send data frequently
(where speed is not a issue.) and are using IEEE 802.11b are not upgrading their
systems to IEEE 802.11g. The speed is time delay is occur if IEEE 802.11b is
using CKK and IEEE 802.11g is using PBCC (due to conversion) but Details of
making b and g work well together occupied much of the lingering technical
process. In older networks, however, the presence of an 802.11b participant
significantly reduces the speed of an 802.11g network. As the data rate of IEEE
802.11g is 54Mbps and data rate of IEEE 802.11b is 11Mbps so it cause the
802.11g device to reduce the data rate to effectively the same rates used by
802.11b. 802.11a and 802.11g use common 802.11 medium access control (MAC)
layer functions. As a result, protocols responsible for operation of the network,
including security, power management and fragmentation, are essentially the same.
Compatibility chart of IEEE 802.11a, IEEE 802.11b with IEEE 802.11g is shown
below.

Physical Layer
802.11a 802.11b 802.11g
protocol
802.11a yes No No
802.11b No Yes Yes
802.11g No Yes yes

Maximum Users per Access Point


IEEE 802.11a supports the 64 users per access point. IEEE 802.11b supports 32
users per access point. IEEE 802.11g also supports the 64 users per access point.
But as the range of b is more as compared to that of IEEE 802.11a and IEEE
802.11g that’s why in a particular “cell” IEEE 802.11b support more users as
compare to that of IEEE 802.11a and IEEE 802.11g. IEEE 802.11b (often called
Wi-Fi) the ability to serve up to four to five times more users than they now do. It
also opens the possibility for using IEEE 802.11 networks in more demanding
applications, such as wireless multimedia video transmission and broadcast MPEG.

Cost
IEEE 802.11a is costly. IEEE 802.11b is of low price. But if we compare IEEE
802.11a and IEEE 802.11b with IEEE 802.11g, we find that IEEE 802.11g is less
expensive then IEEE 802.11a but expensive then that of IEEE 802.11b. The
appliances of IEEE 802.11g may interfere on the unregulated signal frequency. But
reports shown that that prices will lose rapidly as the time passed. Specially the
prices of the devices that supports the IEEE 802.11g.

Range and Density Comparison


The range of IEEE 802.11g is greater then IEEE 802.11a and almost same as that
of IEEE 802.11g but its density is much poor as compare to IEEE 802.11a but
quite better then that of IEEE 802.11b.

We prefer to use IEEE 802.11g where the range coverage is hard issue and
environment is less populated (mean the density is not an issue).

Comparison Summary Chart


I have summarized the entire measuring units of IEEE 802.11a; IEEE 802.11b,
IEEE 802.11g in the chart shown below and you will get a clear idea of these
standards.

IEEE 802.11a IEEE 802.11b IEEE 802.11g


Standard
Sep. 99 Sep 99 May 2003
Ratified
Raw Data
54 Mbps 11 Mbps 54 Mbps
Rates
Average

Actual 4-5 Mbps 27 Mbps 20-25 Mbps(tbd)

Throughput
Frequency 5 GHz 2.4 GHz 2.4 GHz
Available
300 MHz 83.5 MHz 83.5 MHz
Spectrum
Modulation
OFDM DSSS/CCK DSSS/PBCC
Encoding
# Channels/
12/8 11/3 11/3
non-overlapping

Conclusion

Following results can be extracted from the above material.

 Consider waiting for 802.11g products if you have a relatively large installed
base of 802.11b. You'll be able to upgrade to 802.11g rather easily.
 Implement 802.11a now within existing 802.11b networks if you have
specific areas needing high performance (e.g., conference and computer
rooms). As with the point above, however, end-users will need 802.11a/b
NICs to ensure interoperability.
 If cost is issue then use IEEE 802.11b which are low in price, but IEEE
802.11a is more costly.
 If range is issue then use IEEE 802.11a. it cover more as compare to IEEE
802.11b and IEEE 802.11a (about 4 times greater then IEEE 802.11b).
 If the network is populated (i.e. the number of users per access point are
greater in number) then use IEEE 802.11b or IEEE 802.11g(but preference
should be given to IEEE 802.11g as it has more data rate 54 Mbps as compare to
IEEE 802.11b which has 11 Mbps).

IEEE 802.11 is a set of standards for wireless local area network (WLAN)
computer communication. The terms 802.11 and Wi-Fi are often used
interchangeably but there is slight difference between the two.

(A) 802.11a
Frequency- 5 GHz
Typical Data Rate – 23 Mbit/s
Max Data rate – 54 Mbit/s
Range – 115 feet

(B) 802.11b
Frequency – 2.4 GHz
Typical Data Rate – 4.5 Mbit/s
Max Data rate – 11 Mbit/s
Range – 115 feet

(G) 802.11g
Frequency – 2.4 GHz
Typical Data Rate – 19 Mbit/s
Max Data rate – 54 Mbit/s
Range – 125 feet

(N) 802.11n
Frequency – 5GHz and/or 2.4GHz
Typical Data Rate – 74 Mbit/s
Max Data rate – 300 Mbit/s (2 streams)
Range – 230 feet

HIPERLAN

HIgh PErformance Radio LAN


HIPERLAN is a new standard for Radio LANs developed in Europe by ETSI
HIPERLAN is an interoperability standard which specifies a common air interface
MAC and PHY layers in OSI model
HIPERLAN will be a family of standards
HIPERLAN 1 is described in detail
MAC supports centralized mode (CM) (APs) and
direct mode (DM) (ad-hoc)
• Ad-hoc mode assumes “single cell” area
• For multihop HIPERLANs (nodes outside radio
range), some nodes become forwarder
• Radio Cells need to overlap to implement
forwarding mechanism
• Forwarders buffer packets
• Mobility may create fragmented LANs.

MANET OVERVIEW:

A mobile ad hoc network (MANET) is a continuously self-configuring,


infrastructure-less network of mobile devices connected without wires. Ad hoc is
Latin and means "for this purpose".[

MANETs are a kind of Wireless ad hoc network that usually has a routable
networking environment on top of a Link Layer ad hoc network. MANETs consist
of a peer-to-peer, self-forming, self-healing network. MANETs circa 2000-2015
typically communicate at radio frequencies (30 MHz - 5 GHz)

Stands for "Mobile Ad Hoc Network." A MANET is a type of ad hoc network that
can change locations and configure itself on the fly. Because MANETS are mobile,
they use wireless connections to connect to various networks. This can be a
standard Wi-Fi connection, or another medium, such as a cellular or satellite
transmission.

Some MANETs are restricted to a local area of wireless devices (such as a group
of laptop computers), while others may be connected to the Internet. For example,
A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles
to communicate with roadside equipment. While the vehicles may not have a direct
Internet connection, the wireless roadside equipment may be connected to the
Internet, allowing data from the vehicles to be sent over the Internet. The vehicle
data may be used to measure traffic conditions or keep track of trucking fleets.
Because of the dynamic nature of MANETs, they are typically not very secure, so
it is important to be cautious what data is sent over a MANET.
MANET Properties:

●Rapidly deployable, self configuring.


●No need for existing infrastructure.
●Wireless links.
●Nodes are mobile, topology can be very dynamic.
●Nodes must be able to relay traffic since
communicating nodes might be out of range.
●A MANET can be a standalone network or it can be connected to
external networks(Internet).

APPLICATIONS:

Military scenarios
Sensor networks
Rescue operations
Students on campus
Free Internet connection sharing
Conferences

Classification of routing Protocols in MANET’s


Classification of routing protocols in MANET’s can be done in many ways,
but most of
these are done depending on routing strategy and network structure[8, 24].
According to
the routing strategy the routing protocols can be categorized as Table-
driven and source
initiated, while depending on the network structure these are classified as
flat routing,
hierarchical routing and geographic position assisted routing [8]. B oth the
Table-driven
and source initiated protocols come under the Flat routing see [fig 5.1].
5.2.1

Table-Driven routing protocols(Proactive)


These protocols are also called as proactive protocols since they maintain the routing
information even before it is needed [17]. Each and every node in the network maintains
routing information to every other node in the network. Routes information is
generally kept in the routing tables and is periodically updated as the network topology
changes. Many of these routing protocols come from the link-state routing [8]. There
exist some differences between the protocols that come under this category depending
on the routing information being updated in each routing table. Furthermore, these
routing protocols maintain different number of tables.The proactive protocols are not
suitable for larger networks, as they need to maintain node entries for each and every
node in the routing table of every node. This causes more overhead in the routing table
leading to consumption of more bandwidth.

On Demand routing protocols(Reactive)

These protocols are also called reactive protocols since they don’t maintain routing
information or routing activity at the network nodes if there is no communication. If a
node wants to send a packet to another node then this protocol searches for the route in
an on-demand manner and establishes the connection in order to transmit and receive
the packet [28]. The route discovery usually occurs by flooding the route request
packets
throughout the network.

You might also like