跳转至

4.0 Wireless Networking

Wireless Networking Challenges

Core Challenge Categories

Challenge TypeSpecific IssuesImpact on Network Design
Physical Signal IssuesAttenuation (rain, water, dust)Higher error rates, need for error correction
Reflections (water bodies, fog)Signal distortion, multipath effects
Diffractions (hills, buildings)Coverage gaps, dead zones
Infrastructure ConstraintsAntenna icingService interruption, maintenance requirements
Zoning restrictionsLimited transmission power, reduced coverage
Device LimitationsPower consumption (especially IoT)Battery life considerations, sleep modes
Security VulnerabilitiesWide signal propagationOpen to eavesdropping, need for encryption

Error Rate Comparison

Wired Networks:    [Low Error Rate]     ████░░░░░░ (10-30%)
Wireless Networks: [Higher Error Rate]  ███████░░░ (70-90%)

IEEE 802.11 (WLAN) Architecture

WLAN Design Goals and Trade-offs

GoalBenefitTrade-off/Challenge
Ease of useSimple setup and roamingPotential security vulnerabilities
Power efficiencyExtended battery lifeMay limit transmission power/range
License-free operationNo regulatory costsInterference from other devices
Robustness to noiseReliable communicationComplex error correction needed
Global usabilityUniversal deploymentDifferent regional regulations
SecurityProtected communicationsPerformance overhead

Security Protocol Evolution

WEP (Weak) → WPA → WPA2 → WPA3 (Current)
     ↓         ↓      ↓        ↓
   Broken   Better  Strong  Strongest

Note: All protocols only protect wireless links, not end-to-end communication.

WLAN Network Types Comparison

AspectAd Hoc (IBSS)Infrastructure
Central ControlNoneAccess Point (AP)
ConnectivityDirect peer-to-peerAll through AP
Range LimitationNodes must be in direct rangeExtended through AP relay
Wired Network AccessNoYes (via AP)
Typical DurationShort-livedPermanent/Long-term
ScalabilityLimited (small groups)High (multiple APs)
Relay CapabilityNoYes (AP provides buffering)

IEEE 802.11 Architecture Hierarchy

Extended Service Set (ESS)
├── Basic Service Set 1 (BSS1)
│   ├── Access Point 1
│   ├── Station A
│   ├── Station B
│   └── Station C
├── Basic Service Set 2 (BSS2)
│   ├── Access Point 2
│   ├── Station D
│   └── Station E
└── Distribution System (DS)
    └── Connects all APs

Example: University campus network (Unifi) = ESS with multiple BSSs

Service Classification

Service CategorySpecific ServicesPrimary Function
Station ServicesAuthenticationVerify device identity
De-authenticationRemove authenticated station
PrivacyPrevent eavesdropping
Data deliveryTransport data packets
Distribution ServicesAssociationLink station to AP
Mobility managementHandle roaming between APs
IntegrationConnect to other network types

Medium Access Control (MAC) - Key Differences

ProtocolDetection MethodTimingUse Case
Ethernet CSMA/CDCollision DetectionAFTER collision occursWired networks
Wireless CSMA/CACollision AvoidanceBEFORE transmissionWireless networks

RTS/CTS Mechanism Visualization

Scenario: Station A wants to send data to Station B

Step 1: Station A broadcasts RTS
A ----[RTS]----> B
  \             /
   \           /
    v         v
    C         D
(hears RTS,  (hears RTS,
 defers)      defers)

Step 2: Station B responds with CTS
A <---[CTS]----- B
  ^             ^
   \           /
    \         /
    C         D
(hears CTS,  (hears CTS,
 defers)      defers)

Step 3: Data transmission
A =====[DATA]===> B
(Other stations remain silent)

Binary Exponential Backoff Calculation Example

Problem: Station fails to receive CTS after sending RTS. Calculate backoff time.

AttemptBackoff WindowRandom SlotsWait Time (if slot = 20μs)
1st0 to 2^1-1 = [0, 1]Random(0, 1)0μs or 20μs
2nd0 to 2^2-1 = [0, 3]Random(0, 3)0μs, 20μs, 40μs, or 60μs
3rd0 to 2^3-1 = [0, 7]Random(0, 7)0μs to 140μs
nth0 to 2^n-1Random(0, 2^n-1)Exponentially increasing

Full Duplex Analysis

ConfigurationSimultaneous TX/RXCollision RiskImplementation
Single ChannelImpossibleHighStandard CSMA/CA
Multiple ChannelsPossibleLowSeparate TX/RX channels
Advanced TechniquesLimitedMediumInterference cancellation

802.11 Standards Performance Comparison

StandardMax BandwidthFrequencyReal-world Performance
802.11b11 Mbps2.4 GHz~5-6 Mbps
802.11g54 Mbps2.4 GHz~25-30 Mbps
802.11n100+ Mbps2.4/5 GHz~50-70 Mbps

Performance Degradation Factors: * Interference and fading * Distance from AP * Number of concurrent users * Environmental obstacles

Bluetooth / Personal Area Network (PAN)

Bluetooth vs IEEE 802.11 Comparison

FeatureBluetoothIEEE 802.11 (WiFi)
Range~10 meters100+ meters
Frequency2.45 GHz ISM2.4 GHz, 5 GHz ISM
Primary UseDevice connectivityInternet access
Power ConsumptionLow (especially BLE)Higher
Network TopologyPiconet/ScatternetBSS/ESS
Max Devices7 active slaves per masterHundreds per AP
Application FocusCable replacementData networking
Protocol LayersPhysical, Link, MACMAC, Physical

Bluetooth Network Topology

Piconet 1                    Piconet 2
    M1                          M2
   /|\                         /|\
  / | \                       / | \
 S1 S2 S3                    S4 S5 S6
    |                           |
    +-------- Bridge -----------+
            (Scatternet)

M = Master device
S = Slave device

Key Constraints: * Each piconet: 1 master + up to 7 active slaves * Scatternet: Multiple interconnected piconets * Bridge device can be slave in multiple piconets

Bluetooth Applications and Use Cases

Application CategoryExamplesPower Requirements
Data/Voice AccessHeadsets, speakersStandard Bluetooth
Cable ReplacementKeyboards, mice, printersStandard Bluetooth
IoT SensorsHealth monitors, beaconsBluetooth Low Energy (BLE)
File TransferPhone to laptopStandard Bluetooth

Power Consumption Analysis

Standard Bluetooth: ████████░░ (High power)
Bluetooth LE (BLE): ██░░░░░░░░ (Very low power)

Battery Life Impact:
IoT Device with Standard BT: Days to weeks
IoT Device with BLE:         Months to years

Wireless Technologies Summary

Frequency Band Utilization

TechnologyFrequencyBand TypeLicense Required
IEEE 802.11b/g/n2.4 GHzISMNo
IEEE 802.11a/n/ac5 GHzISMNo
Bluetooth2.45 GHzISMNo

ISM Band Advantages: License-free operation, global availability ISM Band Disadvantages: Interference from other devices (microwaves, etc.)

Technology Selection Matrix

Use CaseRange NeededDevice CountPower SensitivityRecommended Technology
Home InternetHighManyLowIEEE 802.11
Device PairingLowFewMediumBluetooth
IoT SensorsLowManyHighBluetooth LE
Enterprise NetworkHighVery ManyLowIEEE 802.11 with multiple APs

Common Exam Calculation Types

1. Backoff Time Calculation Given: Collision attempt number n, slot time Formula: Backoff window = [0, 2^n - 1] Wait time = Random_slot × Slot_time

2. Throughput Estimation Factors: Nominal bandwidth, interference level, distance, concurrent users Real throughput ≈ Nominal × Efficiency_factor

3. Range vs Power Trade-off Higher transmission power = Greater range but higher power consumption Lower power (BLE) = Shorter range but extended battery life