Wlan——Introduction to 802.11 protocol physical layer key technologies (OFDM, MIMO, BSS) and CSMA/CD mechanism

Table of contents

Development of 802.11 protocol

802.11 protocol physical layer key technologies

Channel Bonding Technology

OFDM/OFDMA technology

Short-Gi Short Guard Interval Technology

MIMO/MU-MIMO technology

QAM technology

Quick identification of BSS Color

802.11 MAC Layer Key Technology CSMA/CD Mechanism

Why Wireless Proposed the CSMA/CD Mechanism

Working Mechanism of CSMA/CD

How CSMA/CD works

Key Technologies of CSMA/CD

hidden nodes and exposed nodes


Development of 802.11 protocol

802.11 protocol naming

The naming of the 802.11 protocol was proposed by the IEEE (Institute of Electronics and Electrical Engineers)

 

802.11 protocol related standards

The 802.11 physical layer standard defines the wireless working frequency band, modulation and coding method, and the highest speed support

The 802.11 MAC layer standard defines how to optimize the transmission between 802.11 base stations; control and maintain the communication between 802.11 base stations on the shared channel

 

802.11 Physical Layer Protocol and WiFi Generation


802.11 protocol physical layer key technologies

Basic concepts about channels

Carrier:     the transmission channel (channel)    

Subcarrier:  It is a subchannel (dividing the carrier into multiple subcarriers)

Basic concept of spatial flow

The radio sends multiple signals at the same time, each signal is a spatial stream; different spatial streams mean that each antenna transmits different data

If two antennas transmit different data, it is called 2 spatial stream; if two antennas transmit the same data, it cannot be called 2 spatial stream

That is: 3 spatial streams means that 3 antennas are necessary, but 3 antennas are not necessarily 3 spatial streams

Precautions

The 2.4GHz frequency band only supports up to 4 spatial streams

The 5GHz frequency band only supports up to 8 spatial streams

That is: even if there are 12 antennas in the 5GHz frequency band, there can only be 8 spatial streams

Key Technologies of 802.11 Protocol Physical Layer

Channel bonding, OFDM/OFDMA, Short-Gi, MIMO/MU-MIMO, QAM, BSS and other technologies

Short-Gi and channel bonding can be modified; the number of spatial streams is a hardware parameter and cannot be changed after the device leaves the factory

Channel Bonding Technology

A standard channel is 20MHz and contains 52 subcarriers

Two adjacent channels can be bundled together, doubling the channel, doubling the subcarriers, and doubling the rate

Which protocols support channel bonding

802.11n/ac/ax support channel bonding

For 802.11n and 802.11ac Wave 1 protocols, only support bonding to 40MHz

For 802.11ax and 802.11ac Wave 2 protocols, support bonding up to 160MHz

Bond two adjacent 20MHz

OFDM/OFDMA technology

OFDM Orthogonal Frequency Division Multiplexing Technology

Before the emergence of OFDMA, FH (FHSS) and DS (DSSS) technologies were used, and these two technologies are no longer used

The role of OFDM

OFDM divides the channel into several orthogonal sub-channels, each sub-channel uses a sub-carrier for modulation, and transmits data in parallel; improves spectrum utilization

Which protocols use OFDM

802.11a/g/n/ac

OFDMA Orthogonal Frequency Division Multiple Access Technology

The difference between OFDM and OFDMA

Compared with OFDM, there is only one STA and AP communicating at the same time (one user completely occupies all subcarriers in each time segment (this time period is very small, and there is basically no delay when there are few users))

OFDMA supports communication between multiple STAs and APs at the same time (for each time segment, subcarriers are allocated according to user needs)

Precautions

A maximum of 74 concurrent users are supported (when the bandwidth is 160MHz, 160MHz is obtained through 20MHz bandwidth binding)

Which protocols use OFDMA

Currently only 802.11ax (WiFi6) uses the OFDMA protocol

Short-Gi Short Guard Interval Technology

The guard interval is necessary for OFDM technology, there must be GI between data blocks to protect data reliability and avoid collisions with each other

In 802.11a/g, normal GI is used, and the guard interval is 800ns

802.11n has improved it, shortening the guard interval from 800nx to 400ns, increasing the transmission rate while avoiding interference

Which protocols use Short-Gi

802.11n, 802.11ac use Short-Gi

The normal GI used by 802.11a/g

802.11ax has a smaller GI interval

MIMO/MU-MIMO technology

SISO/MISO/SIMO/MIMO - multiple input multiple output

MIMO technology evolved from SISO, MISO, and SIMO

MIMO technology allows only one user to use multiple antennas for multiple data input and multiple output at the same time, doubling the transmission rate

MIMO technology can also be called SU-MIMO technology (single user multiple input multiple output technology)

Which protocols use MIMO and SU-MIMO technology

802.11n, 802.11ac Wave1, 802.11ac Wave2 uplink

The difference between uplink and downlink

Uplink: data sent by the terminal to the AP

Downlink: AP sends data to the terminal

MU-MIMO multi-user multiple input multiple output technology

Allow multiple users to use multiple antennas for multiple input and multiple output communication at the same time

It also supports multiple input and multiple output for a single user at the same time using multiple antennas

Which protocols use MU-MIMO technology

802.11ac Wave2 downlink, 802.11ax uplink and downlink

MIMO - Beamforming

MIMO technology and MU-MIMO technology can realize beamforming technology and improve anti-interference ability through phase difference

What is beamforming

When there are multiple transmitting antennas at the transmitting end, the technology of adjusting the signals sent from each antenna to significantly improve the signal strength at the receiving end (achieved by phase; peak and peak, trough to trough makes the signal strength higher; peak to trough makes signal weakening)

Which protocols use beamforming

Beamforming originated from the 802.11n protocol and continues to be used with the 802.11ac and ax protocols

QAM technology

QAM technology is used to transmit digital signals to the carrier through modulation, which can change the amount of data carried by each subcarrier, change the amount of data transmitted, and change the transmission rate

For example: 256-QAM, 256 is 2 to the 6th power, so each subcarrier can carry 6bit data

Disadvantages of QAM

When the QAM is larger, its transmission range is smaller (for example: the more data a single space carries, the denser the data, the farther away it is, the harder it is to see)

Quick identification of BSS Color

BSS is a technology to distinguish the same channel; currently only 802.11ax supports BSS technology

Add the BSS color field in the Phy header to "color" the data from different BSS

Each channel is assigned a color that identifies a set of Basic Service Sets (BSS) that should not interfere

 


802.11 MAC Layer Key Technology CSMA/CD Mechanism

Why Wireless Proposed the CSMA/CD Mechanism

CSMA/CA Mechanisms Used by Wired Networks

Listen before sending, listen while sending, stop sending due to conflict, resend after random delay

That is: before sending data, check whether the link is in use; when sending data, also check whether there is other data to send on this link, and stop sending if there is a conflict; wait for a certain random time after stopping sending, and then check the link after the time passes Whether to use it; send it if it is idle, and wait for a certain random time if it is not idle

 

Can the wireless directly use the wired CSMA/CA mechanism?

The wireless cannot use the CSMA/CA mechanism, and the specific reasons are as follows

1. For wireless, the wireless is in a half-duplex working state, and the wireless client does not have the ability to send and receive data at the same time; that is, the wireless client cannot receive the intercepted data when sending data

2. Since the coverage of the site (AP) is wired, other sites cannot be detected (as shown in the figure below: STA exists in both site A and site B, but the sites cannot detect each other—this is a hidden node)

Working Mechanism of CSMA/CD

Therefore, wireless cannot detect conflicts, and can only avoid conflicts as much as possible, ensure that conflicts do not occur, and ensure that only one client sends data at the same time; this is the mechanism of CSMA/CD

main components

CS: Carrier Sense; Sense before sending data to ensure the line is free and reduce the chance of collision

MA: Multiple access; data sent by each station can be received by multiple stations at the same time

CA: Collision Avoidance conflict avoidance; minimize the probability of collision

How CSMA/CD works

RTS/CTS (Request To Send/Clear To Send, request to send/permission to send)

Through times to reduce the conflict mechanism caused by node problems; nodes mainly include hidden nodes and exposed nodes

RTS frame - broadcast

When the sender wants to send data, it will first send an RTS signal to reserve the right to use the link with the receiver;

Make other devices within the range of the sender not send data to the sender within the specified time after receiving the RTS

It can be AP→STA, or STA→AP; generally speaking, RTS is sent by STA, and CTS is sent by AP

CTS frame - broadcast

After receiving the RTS, the receiver sends a CTS signal to reply to the sender if it agrees;

Make other devices within the range of the receiver not send data to the receiver within a certain period of time after receiving the CTS

The NAV bar graph represents the NAV timer, which is carried by the header of the RTS and CTS frames

Key Technologies of CSMA/CD

The 802.11MAC layer mainly consists of two sublayers

Distributed Coordination Function DCF (Distributed Coordination Function)

Using the CSMA/CA mechanism, each STA obtains the right to send data frames by contending for the channel.

Point Coordination Function PCF (Point Coordination Function)

Using the access algorithm of centralized control, the sending right of the data frame is handed over to each STA in turn in a method similar to inquiry, so as to avoid collisions and conflicts

There must be a DCF mechanism in the 802.11 protocol, and PCF is optional

Interframe Space IFS

SIFS ( Short Interval Between Frames)

Used to separate a session

The interval between AP and terminal sending RTS and CTS, and the interval between CTS and data and ACK

PIFS (PCF Interframe Space)

Used in PCF to send data frames and management frames

DIFS (DFS Interframe Space)

Used in DCF to send data frames and management frames

When a data frame is sent, the waiting time to send the next data frame

EIFS

In the case of an error in the previous frame, the sending node has to delay the EIFS time period before sending the next frame

backoff time

If multiple STAs need to send data and all detect that the channel is busy, a backoff algorithm needs to be executed (if the channel is not detected to be busy, the backoff time also needs to be executed, and the method conflicts)

Each STA randomly backs off for a period of time before sending data (the backoff time is an integer multiple of the time slot)

The STA detects the channel every time it passes through a time slot. If the channel is idle, the backoff time continues to count down

If the channel is busy, freeze the backoff timer; wait for the channel to become idle again and then wait for DIFS, then continue counting down from the remaining time until the backoff timer is reduced to 0, and then the STA starts sending data frames

 

hidden nodes and exposed nodes

Solve the conflict between hidden nodes and exposed nodes through RTS/CTS

The RTS/CTS of 802.11m cannot solve the hidden node problem, only the RTS/CTS of 802.11ac and ax can solve it (by carrying the bandwidth indication)

Hidden node—both STAs are within the coverage of the same AP, but the two STAs cannot detect each other

(STA1 and STA2 both belong to AP1, but they cannot detect each other; from the perspective of STA1, STA2 is a hidden node)

If there is no RTS/CTS mechanism, STA1 and STA2 cannot perceive whether the other party is sending data, and may conflict

If there is an RTS/CTS mechanism

STA1 sends RTS to reserve the channel

AP broadcasts CTS after receiving RTS

STA1 prepares to send data after receiving CTS; STA2 enters a silent state after receiving CTS

 

Exposed Node—Two STAs can be detected, but the other STA belongs to a different AP coverage area

(STA1 and STA2 can detect each other, but STA1 belongs to AP1, STA2 belongs to AP2)

AP1 and AP2 belong to the same channel, when PC1 sends data to AP1, PC2 also wants to send data to AP2

If there is no RTS/CTS, when PC2 listens to the channel, it will hear that PC1 is sending data, and mistakenly think that it cannot send data to AP2 at this time, but in fact its sending will not affect the data reception of AP1, which leads to The emergence of the so-called exposed node problem of PC2

With the RTS/CTS mechanism

PC1 sends RTS, after PC2 receives it, PC2 does not send data to PC1

AP1 sends CTS to PC1, but PC2 does not receive the CTS sent by AR1; at this time, PC2 can send data to this channel

Guess you like

Origin blog.csdn.net/m0_49864110/article/details/132207303