




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、畢業(yè)外文翻譯無(wú)線局域網(wǎng)技術(shù)最近幾年,無(wú)線局域網(wǎng)開(kāi)始在市場(chǎng)中獨(dú)霸一方。越來(lái)越多的機(jī)構(gòu)發(fā)現(xiàn)無(wú)線局域網(wǎng)是傳統(tǒng)有線局域網(wǎng)不可缺少的好幫手,它可以滿足人們對(duì)移動(dòng)、布局變動(dòng)和自組網(wǎng)絡(luò)的需求,并能覆蓋難以鋪設(shè)有線網(wǎng)絡(luò)的地域。無(wú)線局域網(wǎng)是利用無(wú)線傳輸媒體的局域網(wǎng)。就在前幾年,人們還很少使用無(wú)線局域網(wǎng)。原因包括成本高、數(shù)據(jù)率低、職業(yè)安全方面的顧慮以及需要許可證。隨著這些問(wèn)題的逐步解決,無(wú)線局域網(wǎng)很快就開(kāi)始流行起來(lái)了。無(wú)線局域網(wǎng)的應(yīng)用局域網(wǎng)的擴(kuò)展在20世紀(jì)80年代后期出現(xiàn)的無(wú)線局域網(wǎng)早期產(chǎn)品都是作為傳統(tǒng)有線局域網(wǎng)替代品而問(wèn)世的。無(wú)線局域網(wǎng)可以節(jié)省局域網(wǎng)纜線的安裝費(fèi)用,簡(jiǎn)化重新布局和其他對(duì)網(wǎng)絡(luò)結(jié)構(gòu)改動(dòng)的任務(wù)。但是,
2、無(wú)線局域網(wǎng)的這個(gè)動(dòng)機(jī)被以下一系列的事件打消。首先,隨著人們?cè)絹?lái)越清楚地認(rèn)識(shí)到局域網(wǎng)的重要性,建筑師在設(shè)計(jì)新建筑時(shí)就包括了大量用于數(shù)據(jù)應(yīng)用的預(yù)先埋設(shè)好的線路。其次,隨著數(shù)據(jù)傳輸技術(shù)的發(fā)展,人們?cè)絹?lái)越依賴(lài)于雙絞線連接的局域網(wǎng)。特別是3類(lèi)和5類(lèi)非屏蔽雙絞線。大多數(shù)老建筑中已經(jīng)鋪設(shè)了足夠的3類(lèi)電纜,而許多新建筑里則預(yù)埋了5類(lèi)電纜。因此,用無(wú)線局域網(wǎng)取代有線局域網(wǎng)的事情從來(lái)沒(méi)有發(fā)生過(guò)。但是,在有些環(huán)境中無(wú)線局域網(wǎng)確實(shí)起著有線局域網(wǎng)替代品的作用。例如,象生產(chǎn)車(chē)間、股票交易所的交易大廳以及倉(cāng)庫(kù)這樣有大型開(kāi)闊場(chǎng)地的建筑;沒(méi)有足夠雙絞線對(duì),但又禁止打洞鋪設(shè)新線路的有歷史價(jià)值的建筑;從經(jīng)濟(jì)角度考慮,安裝和維護(hù)有線
3、局域網(wǎng)劃不來(lái)的小型辦公室。在以上這些情況下,無(wú)線局域網(wǎng)向人們提供了一個(gè)有效且更具吸引力的選擇。其中大多數(shù)情況下,擁有無(wú)線局域網(wǎng)的機(jī)構(gòu)同時(shí)也擁有支持服務(wù)器和某些固定工作站的有線局域網(wǎng)。因此,無(wú)線局域網(wǎng)通常會(huì)鏈接到同樣建筑群內(nèi)的有線局域網(wǎng)上。所以我們將此類(lèi)應(yīng)用領(lǐng)域成為局域網(wǎng)的擴(kuò)展。建筑物的互連無(wú)線局域網(wǎng)技術(shù)的另一種用途是鄰樓局域網(wǎng)之間的連接,這些局域網(wǎng)可以是無(wú)線的也可以是有線的。在這種情況下,兩個(gè)樓之間采用點(diǎn)對(duì)點(diǎn)的無(wú)線鏈接。被鏈接的設(shè)備通常是網(wǎng)橋或路由器。這種點(diǎn)對(duì)點(diǎn)的單鏈路從本質(zhì)上看不是局域網(wǎng),但通常我們也把這種應(yīng)用算作無(wú)線局域網(wǎng)。漫游接入漫游接入提供局域網(wǎng)和帶有天線的移動(dòng)數(shù)據(jù)終端之間的無(wú)線鏈接,
4、如膝上型電腦和筆記本電腦。這種應(yīng)用的一個(gè)例子是從外地出差回來(lái)的職員將數(shù)據(jù)從個(gè)人移動(dòng)電腦傳送到辦公室的服務(wù)器上。漫游接入在某種延伸的環(huán)境下也是十分有用的,如在建筑群之外操作的一臺(tái)電腦或一次商務(wù)行為。在以上兩種情況下,用戶會(huì)帶著自己的電腦隨意走動(dòng),并希望可以從不同的位置訪問(wèn)有線局域網(wǎng)上的服務(wù)器。自組網(wǎng)絡(luò)自組網(wǎng)絡(luò)(ad hoc network)是為了滿足某些即時(shí)需求而臨時(shí)而建立的一種對(duì)等網(wǎng)絡(luò)(沒(méi)有中央服務(wù)器)例如,有一群職員,每人帶著一臺(tái)膝上電腦或掌上電腦,會(huì)聚在商務(wù)會(huì)議室或課堂上。這些職員會(huì)將他們的電腦鏈接起來(lái),形成一個(gè)臨時(shí)性的、僅僅在會(huì)議期間存在的網(wǎng)絡(luò)。無(wú)線局域網(wǎng)的要求無(wú)線局域網(wǎng)必須滿足所有局域
5、網(wǎng)的典型要求,包括大容量、近距離的覆蓋能力、相連站點(diǎn)間的完全連接性以及廣播能力。另外,無(wú)線局域網(wǎng)環(huán)境還有一些特殊的要求。以下是一些無(wú)線局域網(wǎng)最終要的要求:吞吐量:媒體接入控制協(xié)議應(yīng)當(dāng)盡可能地有效利用無(wú)線媒體以達(dá)到最大的容量。節(jié)點(diǎn)數(shù)量:無(wú)線局域網(wǎng)可能需要支持分布在多個(gè)蜂窩中的上百個(gè)節(jié)點(diǎn)。連接到主干局域網(wǎng):在大多數(shù)情況下,要求能夠與主干有線局域網(wǎng)的站點(diǎn)相互連接。對(duì)于有基礎(chǔ)設(shè)施的無(wú)線局域網(wǎng),很容易通過(guò)利用控制模塊完成這個(gè)任務(wù),控制模塊本身就連接著這兩種類(lèi)型的局域網(wǎng)。對(duì)于移動(dòng)用戶和自組無(wú)線網(wǎng)絡(luò)來(lái)說(shuō),可能需要滿足這個(gè)要求。電池能量消耗:移動(dòng)工作人員用的是由電池供電的工作站,它需要在使用無(wú)線適配器的情況下
6、,電池供電時(shí)間足夠長(zhǎng)。這就是說(shuō),要求移動(dòng)節(jié)點(diǎn)不停地監(jiān)視接入點(diǎn)或者經(jīng)常要與基站握手的mac協(xié)議是不適用的。通常,無(wú)線局域網(wǎng)的實(shí)現(xiàn)都具有在不使用網(wǎng)絡(luò)時(shí)減少能量消耗的特殊性能,如睡眠模式。傳輸健壯性和安全性:除非涉及合理,無(wú)線局域網(wǎng)很容易受到干擾并且容易被竊聽(tīng)。無(wú)線局域網(wǎng)的設(shè)計(jì)必須做到即使在噪音較大的環(huán)境中也能可靠傳輸,并且為應(yīng)用提供某種程度的安全性,以防竊聽(tīng)。并列的網(wǎng)絡(luò)操作:隨著無(wú)線局域網(wǎng)變得越來(lái)越流行,很可能有兩個(gè)或者更多無(wú)線局域網(wǎng)同時(shí)存在于一個(gè)區(qū)域內(nèi),或在局域網(wǎng)之間可能存在干擾的某些區(qū)域內(nèi)運(yùn)行。這種干擾可能會(huì)阻礙mac算法的正常運(yùn)行,還可能造成對(duì)特定局域網(wǎng)的非法接入。不需要許可證的操作:用戶希
7、望購(gòu)買(mǎi)和運(yùn)行的是這樣的無(wú)線局域網(wǎng)產(chǎn)品,它們不需要專(zhuān)門(mén)為局域網(wǎng)所使用的頻帶而申請(qǐng)?jiān)S可證。切換和漫游:無(wú)線局域網(wǎng)中使用的mac協(xié)議應(yīng)當(dāng)讓移動(dòng)站點(diǎn)能夠從一個(gè)蜂窩移動(dòng)到另一個(gè)蜂窩。動(dòng)態(tài)配置:局域網(wǎng)在mac地址機(jī)制和網(wǎng)絡(luò)管理方面應(yīng)當(dāng)允許端系統(tǒng)能夠動(dòng)態(tài)且自動(dòng)地增加、刪除和移動(dòng)位置,并且不打擾到其他用戶。無(wú)線局域網(wǎng)技術(shù)無(wú)線局域網(wǎng)通常根據(jù)它所采用的傳輸技術(shù)進(jìn)行分類(lèi)。目前所有無(wú)線局域網(wǎng)產(chǎn)品都可歸為以下三個(gè)大類(lèi)之一:紅外線(ir)局域網(wǎng):紅外線局域網(wǎng)的一個(gè)蜂窩只能限制在一個(gè)房間里,因?yàn)榧t外線無(wú)法穿過(guò)不透明的墻。擴(kuò)頻局域網(wǎng):這種類(lèi)型的局域網(wǎng)利用了擴(kuò)頻傳輸技術(shù)。在大多數(shù)情況下,這些局域網(wǎng)運(yùn)行在ism(個(gè)人、科學(xué)和醫(yī)學(xué)
8、)波段內(nèi),因此,在美國(guó)使用這些局域網(wǎng)不需要聯(lián)邦通信委員會(huì)(fcc)發(fā)放的許可證。窄帶微波:這些局域網(wǎng)運(yùn)行在微波頻率是,但沒(méi)有使用擴(kuò)頻技術(shù)。其中有些產(chǎn)品運(yùn)行的頻率需要fcc的許可證,而其他一些產(chǎn)品則使用了不需要許可的波段。 無(wú)線局域網(wǎng)有一個(gè)特性是人們樂(lè)意接受的,雖然不是必要的,那就是不需要通過(guò)麻煩的授權(quán)過(guò)程就能使用。每個(gè)國(guó)家的許可證發(fā)放制度都不一樣,這就使事情變得更加復(fù)雜。在美國(guó),fcc在ism波段內(nèi)特許了兩個(gè)不需要許可證的應(yīng)用:最大功率為1瓦的擴(kuò)頻系統(tǒng)合最大運(yùn)行功率為0.5瓦的低功率系統(tǒng)。自從fcc開(kāi)放了這個(gè)波段以來(lái),在擴(kuò)頻無(wú)線局域網(wǎng)中的應(yīng)用就越來(lái)越普遍。1990年ieee802.11工作組成
9、立,它的憲章就是要為無(wú)線局域網(wǎng)開(kāi)發(fā)mac協(xié)議以及物理媒體規(guī)約。無(wú)線局域網(wǎng)中最小的模塊是基本服務(wù)集(basic service set, bss),它由一些執(zhí)行相同mac協(xié)議并爭(zhēng)用同一共享媒體完成接入的站點(diǎn)組成?;痉?wù)集可以是孤立的,也可以通過(guò)接入點(diǎn)(access point, ap)連到主干分發(fā)系統(tǒng)(distribution system, ds)上。接入點(diǎn)的功能相當(dāng)于網(wǎng)橋。mac協(xié)議可以是完全分布式的,也可以由位于接入點(diǎn)的中央?yún)f(xié)調(diào)功能控制。bbs通常與文獻(xiàn)中的蜂窩相對(duì)應(yīng),而ds則有可能是交換機(jī)或有線網(wǎng)絡(luò),也可以是無(wú)線網(wǎng)絡(luò)。mac層的主要任務(wù)是在mac實(shí)體之間傳送msdu,這個(gè)任務(wù)是由分發(fā)服
10、務(wù)實(shí)現(xiàn)的。分發(fā)服務(wù)的正常運(yùn)行需要該ess內(nèi)所有站點(diǎn)的信息,而這個(gè)信息是由與關(guān)聯(lián)(association)相關(guān)的服務(wù)提供的。在分發(fā)服務(wù)向站點(diǎn)交付數(shù)據(jù)或者接收來(lái)自站點(diǎn)的數(shù)據(jù)之前,該站點(diǎn)必須要建立關(guān)聯(lián)。標(biāo)準(zhǔn)基于移動(dòng)性定義了三種轉(zhuǎn)移類(lèi)型:無(wú)轉(zhuǎn)移:這種類(lèi)型的站點(diǎn)或者是固定的,或者只在一個(gè)bss的直接通信范圍內(nèi)移動(dòng)。bss轉(zhuǎn)移:這種類(lèi)型的站點(diǎn)移動(dòng)是在同一ess內(nèi)從一個(gè)bss移動(dòng)到另一個(gè)bss。在這種情況下,該站點(diǎn)的數(shù)據(jù)交付需要尋址功能,能識(shí)別出該站點(diǎn)的新位置。ess轉(zhuǎn)移:它的定義是指站點(diǎn)從一個(gè)ess的bss到另一個(gè)ess的bss移動(dòng)。只有從某種意義上看該站點(diǎn)是能夠移動(dòng)的,才能支持這種類(lèi)型的轉(zhuǎn)移。802.1
11、1工作組考慮了兩類(lèi)mac算法建議:分布式接入?yún)f(xié)議和集中式接入?yún)f(xié)議。分布式接入?yún)f(xié)議類(lèi)似于以太網(wǎng),采用載波監(jiān)聽(tīng)機(jī)制把傳輸?shù)臎Q定權(quán)分布到所有節(jié)點(diǎn)。集中式接入?yún)f(xié)議由一個(gè)集中的決策模塊來(lái)控制發(fā)送。分布式接入?yún)f(xié)議對(duì)于對(duì)等工作站形式的自組網(wǎng)絡(luò)是有意義的,同時(shí)也可能對(duì)主要是突發(fā)性通信量的其他一些無(wú)線局域網(wǎng)頗具吸引力。如果一個(gè)局域網(wǎng)的配置是由許多互連的無(wú)線站點(diǎn)和以某種形式連接到主干有線局域網(wǎng)的基站組成,則采用集中式接入控制是自然而然的事情。當(dāng)某些數(shù)據(jù)是時(shí)間敏感的或者是高優(yōu)先級(jí)的時(shí),這種方法特別有用。ieee802.11的最終結(jié)果是一個(gè)稱(chēng)為分布式基礎(chǔ)無(wú)線mac(distributed foundation wir
12、eless mac,dfwmac)的算法,它提供了一個(gè)分布式接入控制機(jī)制,并在頂端具有可選的集中式控制。mac層的低端子層是分布式協(xié)調(diào)功能(distributed coordination function , dcf).dcf采用爭(zhēng)用算法向所有通信量提供接入。正常的異步通信量直接使用dcf。點(diǎn)協(xié)調(diào)功能(point coordination function, pcf)是一個(gè)集中式mac算法,用于提供無(wú)爭(zhēng)用服務(wù)。分布式協(xié)調(diào)功能dcf子層使用一種簡(jiǎn)單的csma(載波監(jiān)聽(tīng)多點(diǎn)接入)算法。如果站點(diǎn)有一個(gè)mac幀要發(fā)送,則先監(jiān)聽(tīng)媒體。如果媒體空閑,站點(diǎn)可以發(fā)送。否則,該站點(diǎn)必須等待直到當(dāng)前的發(fā)送結(jié)束。
13、dcf不包括沖突檢測(cè)功能(csma/cd),因?yàn)樵跓o(wú)線網(wǎng)絡(luò)中進(jìn)行沖突檢測(cè)是不實(shí)際的。媒體上信號(hào)變動(dòng)范圍很大,所以如果正在傳輸?shù)恼军c(diǎn)接收到微弱信號(hào),它無(wú)法區(qū)分這是噪聲還是因?yàn)樽约旱膫鬏敹鴰?lái)的影響。為了保證算法的平穩(wěn)和公平運(yùn)行,dcf包含了一組等價(jià)于優(yōu)先級(jí)策略的時(shí)延。我們首先考慮一個(gè)稱(chēng)為幀間間隔(interframe space,ifs)時(shí)延。采用ifs后csma的接入規(guī)則如下:1。有幀要傳輸?shù)恼军c(diǎn)先監(jiān)聽(tīng)媒體。如果媒體是空閑的,等待ifs長(zhǎng)的一段時(shí)間,再看媒體是否空閑,如果是空閑,立即發(fā)送。2。如果媒體是忙的(或是一開(kāi)始就發(fā)現(xiàn)忙,或是在ifs空閑時(shí)間內(nèi)發(fā)現(xiàn)媒體忙),則推遲傳輸,并繼續(xù)監(jiān)聽(tīng)媒體直到
14、當(dāng)前的傳輸結(jié)束。3。一旦當(dāng)前的傳輸結(jié)束,站點(diǎn)再延遲ifs一段時(shí)間。如果媒體在這段時(shí)間內(nèi)都是空閑的,則站點(diǎn)采用二進(jìn)制指數(shù)退避策略等待一段時(shí)間后再監(jiān)聽(tīng)媒體,如果媒體依然是空閑的,則可以傳輸。在退避期間,如果媒體又變忙了,退避定時(shí)器暫停,并在媒體變空閑后恢復(fù)計(jì)時(shí)。點(diǎn)協(xié)調(diào)功能pcf是在dcf之上實(shí)現(xiàn)的另一種接入方式。其操作由中央輪詢(xún)主控器(點(diǎn)協(xié)調(diào)器)的輪詢(xún)構(gòu)成。點(diǎn)協(xié)調(diào)在發(fā)布輪詢(xún)時(shí)采用pifs。因?yàn)閜ifs比difs小,所以點(diǎn)協(xié)調(diào)器在發(fā)布輪詢(xún)和接收響應(yīng)時(shí)能獲取媒體并封鎖所有的異步通信量。點(diǎn)協(xié)調(diào)器不斷地發(fā)布輪詢(xún),并永遠(yuǎn)封鎖所有異步通信量。為了避免這種情況,定義了一個(gè)稱(chēng)為超幀(superframe)的時(shí)間間
15、隔。在超幀時(shí)間的開(kāi)始部分,點(diǎn)協(xié)調(diào)器以循環(huán)方式向所有配置成輪詢(xún)的站點(diǎn)發(fā)布輪詢(xún)。然后,在余下的超幀時(shí)間里,點(diǎn)協(xié)調(diào)器空閑,允許異步通信量有一段爭(zhēng)用接入的時(shí)間。在超幀開(kāi)始時(shí),點(diǎn)協(xié)調(diào)器可以在給定時(shí)間內(nèi)獲得控制權(quán)和發(fā)布輪詢(xún),這由選項(xiàng)決定。由于響應(yīng)站點(diǎn)發(fā)出的幀的長(zhǎng)度是變化的,所以這個(gè)時(shí)間間隔也是變化的。超幀剩余的時(shí)間用于基于爭(zhēng)用的接入。在超幀末尾,點(diǎn)協(xié)調(diào)器泳pifs時(shí)間爭(zhēng)用媒體接入權(quán)。如果媒體是空閑的,點(diǎn)協(xié)調(diào)器可以立刻接入,然后又是一個(gè)全超幀期。不過(guò),媒體在超幀末尾有可能是忙的。在這種情況下,點(diǎn)協(xié)調(diào)器必須等待直到媒體空閑并獲得接入。其結(jié)果是下一個(gè)循環(huán)中相應(yīng)縮短的超幀期。wireless lanin just
16、 the past few years, wireless lans have come to occupy a significant niche in the local area network market. increasingly, organizations are finding that wireless lans are an indispensable adjunct to traditional wired lans, as they satisfy requirements for mobility, relocation, ad hoc networking, an
17、d coverage of locationsdifficult to wire. as the name suggests, a wireless lan is one that makes use of a wireless transmission medium. until relatively recently, wireless lans were little used; the reasons for this included high prices, low data rates, occupational safety concerns, and licensing re
18、quirements. as these problems have been addressed, the popularity of wireless lans has grown rapidly.in this section, we first look at the requirements for and advantages of wireless lans, and then preview the key approaches to wireless lan implementation.wireless lans applicationsthere are four app
19、lication areas for wireless lans: lan extension, crossbuilding interconnect, nomadic access, and ad hoc networks. let us consider each of these in turn.lan extensionearly wireless lan products, introduced in the late 1980s, were marketed as substitutes for traditional wired lans. a wireless lan save
20、s the cost of the installation of lan cabling and eases the task of relocation and other modifications to network structure. however, this motivation for wireless lans was overtaken by events. first, as awareness of the need for lan became greater, architects designed new buildings to include extens
21、ive prewiring for data applications. second, with advances in data transmission technology, there has been an increasing reliance on twisted pair cabling for lans and, in particular, category 3 unshielded twisted pair. most older building are already wired with an abundance of category 3 cable. thus
22、, the use of a wireless lan to replace wired lans has not happened to any great extent.however, in a number of environments, there is a role for the wireless lan as an alternative to a wired lan. examples include buildings with large open areas, such as manufacturing plants, stock exchange trading f
23、loors, and warehouses; historical buildings with insufficient twisted pair and in which drilling holes for new wiring is prohibited; and small offices where installation and maintenance of wired lans is not economical. in all of these cases, a wireless lan provides an effective and more attractive a
24、lternative. in most of these cases, an organization will also have a wired lan to support servers and some stationary workstations. for example, a manufacturing facility typically has an office area that is separate from the factory floor but which must be linked to it for networking purposes. there
25、fore, typically, a wireless lan will be linked into a wired lan on the same premises. thus, this application area is referred to as lan extension.cross-building interconnectanother use of wireless lan technology is to connect lans in nearby buildings, be they wired or wireless lans. in this case, a
26、point-to-point wireless link is used between two buildings. the devices so connected are typically bridges or routers. this single point-to-point link is not a lan per se, but it is usual to include this application under the heading of wireless lan.nomadic accessnomadic access provides a wireless l
27、ink between a lan hub and a mobile data terminal equipped with an antenna, such as a laptop computer or notepad computer. one example of the utility of such a connection is to enable an employee returning from a trip to transfer data from a personal portable computer to a server in the office. nomad
28、ic access is also useful in an extended environment such as a campus or a business operating out of a cluster of buildings. in both of these cases, users may move around with their portable computers and may wish access to the servers on a wired lan from various locations.ad hoc networkingan ad hoc
29、network is a peer-to-peer network (no centralized server) set up temporarily to meet some immediate need. for example, a group of employees, each with a laptop or palmtop computer, may convene in a conference room for a business or classroom meeting. the employees link their computers in a temporary
30、 network just for the duration of the meeting.wireless lan requirementsa wireless lan must meet the same sort of requirements typical of any lan, including high capacity, ability to cover short distances, full connectivity among attached stations, and broadcast capability. in addition, there are a n
31、umber of requirements specific to the wireless lan environment. the following are among the most important requirements for wireless lans:throughput. the medium access control protocol should make as efficient use as possible of the wireless medium to maximize capacity.number of nodes. wireless lans
32、 may need to support hundreds of nodes across multiple cells.connection to backbone lan. in most cases, interconnection with stations on a wired backbone lan is required. for infrastructure wireless lans, this is easily accomplished through the use of control modules that connect to both types of la
33、ns. there may also need to be accommodation for mobile users and ad hoc wireless networks.service area. a typical coverage area for a wireless lan may be up to a 300 to 1000 foot diameter.battery power consumption. mobile workers use battery-powered workstations that need to have a long battery life
34、 when used with wireless adapters. this suggests that a mac protocol that requires mobile nodes to constantlymonitor access points or to engage in frequent handshakes with a base stationis inappropriate.transmission robustness and security. unless properly designed, a wireless lan may be interferenc
35、e-prone and easily eavesdropped upon. the design of a wireless lan must permit reliable transmission even in a noisy environment and should provide some level of security from eavesdropping.collocated network operation. as wireless lans become more popular, it is quite likely for two of them to oper
36、ate in the same area or in some area where interference between the lans is possible. such interference may thwart the normal operation of a mac algorithm and may allow unauthorized access to a particular lan.license-free operation. users would prefer to buy and operate wireless lan products without
37、 having to secure a license for the frequency band used by the lan.handowroaming. the mac protocol used in the wireless lan should enable mobile stations to move from one cell to another.dynamic configuration. the mac addressing and network management aspects of the lan should permit dynamic and aut
38、omated addition, deletion, and relocation of end systems without disruption to other users.physical medium specificationthree physical media are defined in the current 802.11 standard:infrared at 1 mbps and 2 mbps operating at a wavelength between 850 and 950 nm.direct-sequence spread spectrum opera
39、ting in the 2.4-ghz ism band. up to 7 channels, each with a data rate of 1 mbps or 2 mbps, can be used.frequency-hopping spread spectrum operating in the 2.4-ghz ism band. the details of this option are for further study.wireless lan technologywireless lans are generally categorized according to the
40、 transmission techniquethat is used. all current wireless lan products fall into one of the following categories:infrared (ir) lans. an individual cell of an ir lan is limited to a single room, as infrared light does not penetrate opaque walls.spread spectrum lans. this type of lan makes use of spre
41、ad spectrum transmission technology. in most cases, these lans operate in the ism (industrial, scientific, and medical) bands, so that no fcc licensing is required for their use in the u.s.narrowband microwave. these lans operate at microwave frequencies but do not use spread spectrum. some of these
42、 products operate at frequencies that require fcc licensing, while others use one of the unlicensed ism bands.a set of wireless lan standards has been developed by the ieee 802.11 committee. the terminology and some of the specific features of 802.11 are unique to this standard and are not reflected
43、 in all commercial products. however, it is useful to be familiar with the standard as its features are representative of required wireless lan capabilities.the smallest building block of a wireless lan is a basic service set (bss), which consists of some number of stations executing the same mac pr
44、otocol and competing for access to the same shared medium. a basic service set may be isolated, or it may connect to a backbone distribution system through an access point. the access point functions as a bridge. the mac protocol may be fully distributed or controlled by a central coordination funct
45、ion housed in the access point. the basic service set generally corresponds to what is referred to as a cell in the literature. an extended service set (ess) consists of two or more basic service sets interconnected by a distribution system. typically, the distribution system is a wired backbone lan
46、. the extended service set appears as a single logical lan to the logical link control (llc) level. the standard defines three types of stations, based on mobility:no-transition. a station of this type is either stationary or moves only within the direct communication range of the communicating stat
47、ions of a single bss.bss-transition. this is defined as a station movement from one bss to another bss within the same ess. in this case, delivery of data to the station requires that the addressing capability be able to recognize the new location of the station.ess-transition. this is defined as a
48、station movement from a bss in one ess to a bss within another ess. this case is supported only in the sense that the station can move. maintenance of upper-layer connections supported by 802.11 cannot be guaranteed. in fact, disruption of service is likely to occur. details of this option are for f
49、urther study.the 802.11 working group considered two types of proposals for a mac algorithm: distributed-access protocols which, like csmaicd, distributed the decision to transmit over all the nodes using a carrier-sense mechanism; and centralized access protocols, which involve regulation of transm
50、ission by a centralized decision maker. a distributed access protocol makes sense of an ad hoc network of peer workstations and may also be attractive in other wireless lan configurations that consist primarily of bursty traffic. a centralized access protocol is natural for configurations in which a
51、 number of wireless stations are interconnected with each other and with some sort of base station that attaches to a backbone wired lan; it is especially useful if some of the data is time-sensitive or high priority.the end result of the 802.11 is a mac algorithm called dfwmac (distributed foundati
52、on wireless mac) that provides a distributed access-control mechanism with an optional centralized control built on top of that. figure 13.20 illustrates the architecture. the lower sublayer of the mac layer is the distributed coordination function (dcf). dcf uses a contention algorithm to provide a
53、ccess to all traffic. ordinary asynchronous traffic directly uses dcf. the point coordination function (pcf) is a centralized mac algorithm used to provide contention-free service. pcf is built on top of dcf and exploits features of dcf to assure access for its users. let us consider these two subla
54、yers in turn.distributed coordination functionthe dcf sublayer makes use of a simple csma algorithm. if a station has a mac frame to transmit, it listens to the medium. if the medium is idle, the station may transmit; otherwise, the station must wait until the current transmission is complete before
55、 transmitting. the dcf does not include a collision-detection function (i.e., csmaicd) because collision detection is not practical on a wireless network. the dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals
56、 from noise and the effects of its own transmission. to ensure the smooth and fair functioning of this algorithm, dcf includes a set of delays that amounts to a priority scheme. let us start by considering a singledelay known as an interframe space (ifs). in fact, there are three different ifs value
57、s, but the algorithm is best explained by initially ignoring this detail. using an ifs, the rules for csma access are as follows:i. a station with a frame to transmit senses the medium. if the medium is idle, the station waits to see if the medium remains idle for a time equal to ifs, and, if this i
58、s so, the station may immediately transmit.2. if the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the ifs idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.3.
59、once the current transmission is over, the station delays another ifs. if the medium remains idle for this period, then the station backs off using a binary exponential backoff scheme and again senses the medium. if the medium is still idle, the station may transmit.point coordination functionpcf is an alternative access method implemented on top of the dcf. the operation consists of polling with
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年軍隊(duì)文職人員招聘之軍隊(duì)文職管理學(xué)練習(xí)題(二)及答案
- 護(hù)理實(shí)習(xí)生筆試題及答案
- 商標(biāo)法務(wù)面試題及答案
- 遺產(chǎn)繼承過(guò)程管理合同(2篇)
- 2023年四川公務(wù)員《行政職業(yè)能力測(cè)驗(yàn)》試題真題及答案
- 小王子遇見(jiàn)各種星球的感悟
- 設(shè)備采購(gòu)說(shuō)明文書(shū)
- 2025年工程塑料及合金合作協(xié)議書(shū)
- 新疆維吾爾自治區(qū)哈密市伊州區(qū)2024-2025學(xué)年八年級(jí)上學(xué)期期末生物學(xué)試題(含答案)
- 個(gè)人護(hù)理用品行業(yè)市場(chǎng)分析與銷(xiāo)售策略制定
- 【正版授權(quán)】 IEC 63310:2025 EN Functional performance criteria for AAL robots used in connected home environment
- 2025屆新高考政治沖刺備考復(fù)習(xí)把握高考趨勢(shì)+科學(xué)高效命題
- 最終版附件1:“跨學(xué)科主題學(xué)習(xí)”教學(xué)設(shè)計(jì)(2025年版)
- 2025年春季安全教育主題班會(huì)教育記錄
- 2024年春季學(xué)期低年級(jí)學(xué)雷鋒講奉獻(xiàn)主題班會(huì)
- 2025年度環(huán)保咨詢(xún)與評(píng)估服務(wù)合同范本模板
- 全國(guó)計(jì)算機(jī)等級(jí)考試一級(jí)試題及答案(5套)
- K3-PLM售前培訓(xùn)(PPT101頁(yè))
- 中國(guó)河流湖泊
- 建設(shè)工程廉政風(fēng)險(xiǎn)防控手冊(cè)
- 軍事地形學(xué)知識(shí)總結(jié)
評(píng)論
0/150
提交評(píng)論