![電信基礎(chǔ)論文 關(guān)于WLAN的簡介英文版 Talking About WLAN technology.doc_第1頁](http://file1.renrendoc.com/fileroot2/2020-1/12/771aefbe-8032-49ed-82a1-bb7c1b98fe01/771aefbe-8032-49ed-82a1-bb7c1b98fe011.gif)
![電信基礎(chǔ)論文 關(guān)于WLAN的簡介英文版 Talking About WLAN technology.doc_第2頁](http://file1.renrendoc.com/fileroot2/2020-1/12/771aefbe-8032-49ed-82a1-bb7c1b98fe01/771aefbe-8032-49ed-82a1-bb7c1b98fe012.gif)
![電信基礎(chǔ)論文 關(guān)于WLAN的簡介英文版 Talking About WLAN technology.doc_第3頁](http://file1.renrendoc.com/fileroot2/2020-1/12/771aefbe-8032-49ed-82a1-bb7c1b98fe01/771aefbe-8032-49ed-82a1-bb7c1b98fe013.gif)
![電信基礎(chǔ)論文 關(guān)于WLAN的簡介英文版 Talking About WLAN technology.doc_第4頁](http://file1.renrendoc.com/fileroot2/2020-1/12/771aefbe-8032-49ed-82a1-bb7c1b98fe01/771aefbe-8032-49ed-82a1-bb7c1b98fe014.gif)
![電信基礎(chǔ)論文 關(guān)于WLAN的簡介英文版 Talking About WLAN technology.doc_第5頁](http://file1.renrendoc.com/fileroot2/2020-1/12/771aefbe-8032-49ed-82a1-bb7c1b98fe01/771aefbe-8032-49ed-82a1-bb7c1b98fe015.gif)
已閱讀5頁,還剩4頁未讀, 繼續(xù)免費閱讀
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
Talking About WLAN technology:802.11xXu Shumin International School, Class 2009215102, 09212759Beijing University of Post and TelecommunicationEmail: l AbstractIn just the past few years, wireless LANs have come to occupy a significant niche in the local area network market. Increasingly, organizations are finding that wireless LANs are an indispensable adjunct to traditional wired LANs, to satisfy requirements for mobility, relocation, ad hoc networking, and coverage of locations difficult to wire.l Key Words: WLAN; IEEE 802.11; Telecommunicationl 1. IntroductionAs the name suggests, a Wireless Local Area Network (WLAN) is one that makes use of a wireless transmission medium. It is quite convenient data transmission system, which has been using Radio Frequency (RF) to replace the traditional Coaxial that form the Local Area Network (LAN), makes the WLAN use simple access architecture allows users to pass through it.l 2. Wireless LAN TechnologyWireless LANs are generally categorized according to the transmission technique that is used. All current wireless LAN products fall into one of the following categories (Table 1).u 2.1 Infrared (IR) LANs: An individual cell of an IR LAN is limited to a single room, because infrared light does not penetrate opaque walls.n 2.1.1 Strengths and WeaknessThe spectrum for infrared is virtually unlimited, which presents the possibility of achieving extremely high data rates. In addition, infrared shares some properties of visible light that make it attractive for certain types of LAN configurations. Another strength of infrared is that the equipment is relatively inexpensive and simple.However, the infrared medium also exhibits some drawbacks. Many indoor environments experience rather intense infrared background radiation, from sunlight and indoor lighting.n 2.1.2 Transmission TechniquesThere are three alternative transmission techniques commonly used for IR data transmission: the transmitted signal can be focused and aimed (as in a remote TV control); it can be radiated omnidirectionally; or it can be reflected from a light colored ceiling.Directed-beam IR can be used to create point-to-point links. In this mode, the range depends on the emitted power and on the degree of focusing.An omnidirectional configuration involves a single base station that is within line of sight of all other stations on the LAN.In a diffused configuration, all of the IR transmitters are focused and aimed at a point on a diffusely reflecting ceiling.u 2.2 Spread spectrum LANs: This type of LAN makes use of spread spectrum transmission technology. In most cases, these LANs operate in the ISM (industrial, scientific, and medical) bands so that no Federal Communications Commission (FCC) licensing is required for their use in the United States.n 2.2.1 ConfigurationExcept for quite small offices, a spread spectrum wireless LAN makes use of a multiple-cell arrangement (Table 2). Adjacent cells make use of different center frequencies within the same band to avoid interference.Within a given cell, the topology can be either hub or peer to peer. In a hub topology, the hub is typically mounted on the ceiling and connected to a backbone wired LAN to provide connectivity to stations attached to the wired LAN and to stations that are part of wireless LANs in other cells. A peer-to-peer topology is one in which there is no hub. A MAC algorithm such as CSMA is used to control access. This topology is appropriate for ad hoc LANs.n 2.2.2 Transmission IssuesA desirable, though not necessary, characteristic of a wireless LAN is that it be usable without having to go through a licensing procedure.u 2.3 Narrowband microwave: These LANs operate at microwave frequencies but do not use spread spectrum. Some of these products operate at frequencies that require FCC licensing, while others use one of the unlicensed ISM bands.n 2.3.1 Licensed Narrowband RFMicrowave radio frequencies usable for voice, data, and video transmission are licensed and coordinated within specific geographic areas to avoid potential interference between systems. The advantage is that it guarantees interference-free communication.n 2.3.2 Unlicensed Narrowband RFThe first vendor to introduce a narrowband wireless LAN using the unlicensed ISM spectrum is the Radio LAN. It makes use of a peer-to-peer configuration and it is unstable.l 3. IEEE 802.11 Architecture and Serviceu 3.1 IEEE 802.11 ArchitectureThe smallest building block of a WLAN is a basic service set (BSS), which consist of some number of stations executing the same MAC protocol and competing for access to the same shared wireless medium. A BSS may be isolated or it may connect to a backbone distribution system (DS) through an access point (AP). The MAC protocol may be fully distributed or controlled by a central coordination function housed in the AP. The BSS generally corresponds to what is referred to as a cell in the literature. The DS can be a switch, a wired network, or a wireless network. The simplest configuration is shown in Figure 3.u 3.2 IEEE 802.11 ServicesIEEE 802.11 defines nine services that need to be provided by the wireless LAN to provide functionally equivalent to that which is inherent to wired LANs (Table 4).n The service provider can be either the station or the DS.n Three of the services are used to control IEEE 802.11 LAN access and confidentiality. Six of the services are used to support delivery of MAC service data units (MSDUs) between stations.l 4. IEEE 802.11 Medium Access Controlu 4.1 Reliable Data DeliveryIEEE 802.11 includes a frame exchange protocol to solve the reliability of data delivery. When a station receives a data frame from another station, it returns an ACK frame to the source station. If the source does not receive an ACK within a short period of time, the source retransmits the frame. To further enhance reliability, a source first issues a Request to Send (RTS) frame to the destination, then the destination responds with a Clear to Send (CTS). After receiving the CTS, the source transmits the data frame, and the destination responds with an ACK.u 4.2 MAC FrameMAC Frame Types:n Control Frames assist in the reliable delivery of data frames.n Data Frames: There are eight data frame subtypes, organized into two groups. The first four define frames that carry upper-level data from the source station to the destination station. The remaining four do not in fact carry any user data.n Management Frames are used to manage communications between stations and APs. Functions covered include management of associations (request, response, reassociation, dissociation, and authentication).u 4.3 Access ControlThe 802.11 working group considered two types of proposals for a MAC algorithm:n Distributed Access Protocols, which, like Ethernet, distribute the decision to transmit over all the nodes using a carrier-sense mechanism;n Centralized Access Protocols, which involve regulation of transmission by a centralized decision maker.n The end result for 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access control mechanism with an optional centralized control built on top of that.Figure 5 illustrates the architecture.l 5. IEEE 802.11 Physical Layeru 5.1 Original IEEE 802.11 Physical LayerThree physical media are defined in the original 802.11 standa
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 三年級數(shù)學(xué)下冊兩位數(shù)乘兩位數(shù)的口算乘法
- 第3課 聽覺(教案)-2023-2024學(xué)年六年級科學(xué)下冊同步備課(青島版)
- 山東藝術(shù)學(xué)院《計算機(jī)網(wǎng)絡(luò)C》2023-2024學(xué)年第二學(xué)期期末試卷
- 內(nèi)蒙古師范大學(xué)《管理學(xué)導(dǎo)論》2023-2024學(xué)年第二學(xué)期期末試卷
- 鄭州軌道工程職業(yè)學(xué)院《數(shù)據(jù)訪問技術(shù)框架方向》2023-2024學(xué)年第二學(xué)期期末試卷
- 長春醫(yī)學(xué)高等??茖W(xué)?!峨娔X圖文設(shè)計》2023-2024學(xué)年第二學(xué)期期末試卷
- 陜西中醫(yī)藥大學(xué)《機(jī)電一體化設(shè)計》2023-2024學(xué)年第二學(xué)期期末試卷
- 吉林師范大學(xué)《生物分析與檢測》2023-2024學(xué)年第二學(xué)期期末試卷
- 山東青年政治學(xué)院《國際采購實務(wù)》2023-2024學(xué)年第二學(xué)期期末試卷
- 廣東財貿(mào)職業(yè)學(xué)院《醫(yī)學(xué)微生物學(xué)Ⅱ》2023-2024學(xué)年第二學(xué)期期末試卷
- 2025年魯泰集團(tuán)招聘170人高頻重點提升(共500題)附帶答案詳解
- 2024-2025學(xué)年成都高新區(qū)七上數(shù)學(xué)期末考試試卷【含答案】
- 企業(yè)員工食堂管理制度框架
- 《辣椒主要病蟲害》課件
- 電力溝施工組織設(shè)計-電纜溝
- 2024年煤礦安全生產(chǎn)知識培訓(xùn)考試必答題庫及答案(共190題)
- 《法律援助》課件
- 小兒肺炎治療與護(hù)理
- GB/T 36547-2024電化學(xué)儲能電站接入電網(wǎng)技術(shù)規(guī)定
- 學(xué)校物業(yè)管理投標(biāo)書范本
- 《高處作業(yè)安全》課件
評論
0/150
提交評論