IEEE 802.11ac 论文
基于IEEE 802.11ac的多用户MIMO传输方案的优化设计及其性能分析

MI MO ( MU. MI MO1 t r a n s mi s s i o n . T h i s wa s v e r y d i f e r e n t f r o m he t f o r me r I E E E 8 0 2 . 1 1 s t a n d a r d ’ S p r o t o c o l s . T h e
M U- MI M O r t a n s mi s s i o n t e c h n i q u e i n I E EE 8 0 2 . 1 1 a c d r a f t wa s s t u d i e d nd a p r o p o s e d s o me o p t i ma l d e s i g n s . Fi n a l l y , t h e
J I Ba o — f e n g ’ 。 , S ONG Ka n g , HUANG Yo n g . mi n g YANG Lv . x i
( 1 . S c h o o l o f I n f o r ma t i o n S c i e n c e a n d E n g i n e e r i n g , S o u t h e a s t U n i v e r s i t y , Na n j h a g 2 1 0 0 9 6 , C h i n a ;
Pe e r i f I o D r ma n , c e a n a 1 l ) y s i " s a n do , t p t i i ma l de 1 e s i g n 0 f t M U. U— Ml I M U o t r a n s mi s s i o n s c h e me ba s e d o n I EEE 8 0 2 . 1 l a c
WLAN标准IEEE802_11ac_ad及其关键技术

在障碍物,收发设备能避开障碍物快 速重建一条新的链路进行通信。波束 赋形可以通过波束切换、相位加权天 线阵列、多天线阵列等不同的技术来 实现。
2.4 802.11ad支持多种物理层类 型及其应用场景 I E E E 802.11a d支持多种物理层
类型,包括控制物理层、单载波物理 层、低功率单载波物理层、O F D M物 理层。
WLAN标准 IEEE802.11ac/ad 及其关键技术
马满仓1 郑建勇2 郭 静2 卢继华2 1.中国电子系统工程研究所 2.北京理工大学
摘要
阐述了WLAN技术的发展现状,并详述IEEE802.11ac/ad标准中新增关键技术。MU-MIMO及MAC层增 强技术是IEEE802.11ac标准中的两大新增技术,而多频段互操作快速会话迁移(FST)技术以及自适应波 束赋形技术是I E E E802.11a d标准中的关键技术改进,同时进一步阐述了802.11a d标准中支持的不同物理 层类型及其应用场景。
● 针对无线视频、快速文件传输 等应用场景和60 G H z无线通信技术特 点 , 引 入 新 的 组 网 方 式 —— 个 人 基 本 服务集(PBSS)。
● 采用增强的安全协议和功率管 理技术。
● 支持在2.4 G H z、5 G H z和 60 GHz频带之间的快速会话转移。
● 支持与其他60 G H z系统(如 IEEE 802.15.3c及802.19)的共存。
2.3 自适应波束赋形 虽然IEEE 802.11ad在60 GHz的
频段上拥有更宽的带宽,并能够达 到更高的传输速率,但是相比于2.4 G H z或5 G H z频段其衰减更加严重。 为了解决这个问题IEEE 802.11ad采 用自适应波束赋形技术来实现10 m 以上大距离的数据传输。自适应波束 赋形通过自适应调整天线方向,减小 波束宽度以获得较高的天线增益,减 少干扰,扩大信号覆盖范围。此外, 如果在收发设备的视距传播路径上存
无线局域网论文写作范例(期刊投稿5篇)

无线局域网论文写作范例(期刊投稿5篇)无线局域网(wirelesslocalareanetwork,WLAN)发展迅速,为满足无线局域网发展需求,IEEE802.11做为无线局域网的主流标准也不断制定和改善目前无线局域网协议。
尽管目前IEEE802.11n协议全面提升了网络吞吐量,已经可以达到600Mbps的传输速率。
但是随着无线通信业务和宽带数据业务的不断发展,对系统传输速率和吞吐量提出了更高的要求。
以下是我们整理的5篇无线局域网论文,供你参考借鉴。
范文第一篇(1)题目:基于移动终端的无线局域网用户行为研究摘要:随着移动智能终端的广泛使用以及无线通信技术的迅速发展,无线局域网深入改变了用户的生活和交流方式。
但由于无线空间传播信道所独具的开放性以及特殊辐射性,产生了许多隐私泄露的隐患。
实验在公共环境下对无线局域网通信数据进行了还原,基于当前多类市场主流终端应用充分挖掘了无线网用户行为。
在对用户及其行为建模之后,采用基于加权相似度的非监督聚类算法,进一步研究用户的社会性特征与潜在兴趣趋向。
目的是明确用户的真正需求,增加用户之间的直接关联,便于设计更加贴近用户的协议与服务,优化改进无线网络机制。
实验结果表明该方法能够有效分析用户行为,聚类用户群体。
研究结论对改善无线网用户使用体验,防范用户隐私泄露以及定制个性化网络服务均具有现实意义。
关键词:无线局域网;用户行为分析;聚类;隐私分析;机器学习0引言如今智能终端设备对于有线网络基础架构的依赖逐渐减少,政府与企业也在大力推动建设城市公共场所的无线网络,这使得无线局域网成为了用户在固定场所下的最优网络解决方案。
但公共场所的无线局域网保密措施较差,终端设备接入时可能引发的安全问题日益增多。
密码攻击、脚本注入、会话劫持等恶意攻击方式均可以截获网络中数据流量,导致用户个人信息遭到泄露。
因此,通过监控网络流量,对用户行为进行分析,可以在提高第三方服务商个性化服务质量的同时,有效改善网络运行效率,为网络提供更加优质的管理。
ieee802.11无线局域网协议分析系统的分析与实现

——一些蔓盔堂堡圭兰堡垒壅AbstractThestandardsofWLAN(WirelessLocalArea/Network)hayedevelopedmoreperfectthrougheverylargemanufactureandexpert’seffortsinrecentyears.WLANhasgotmoreandmoreextensiveapplicationsinthewholeworldandisplayinganmoreandmoreimportantroleinmanyfields.~feanwhile.theusersandadministratorsoftheWLANsallputforwardhigherandhigherrequesttothesecurityofWLAN,andexpecttoutilizemoreperfectWU州protocolsanalysissystemtocarryonreal—timecontrolandmanagementtoWLAN.Atpresent.thereisnoripeWLANprotocolsanalysissystemtoputonmarketathome.So.itisgreatlymeannigfultoresearchthe孔ANstandardsanddevelopWLANprotoc01sanalysissystemwithindependentintellectualpropertyright.ThisthesisputsuptherealWLANofinfrastructuremodebasedonIEEE802.11.AndthroughusingthewirelessLANforalongtime,IhavecarriedonfurtherjnvestjgationonmainrespectsofWLAN,andutilizedtechnologystudiedindependentlytosolvesomekeyproblemsofadministratingandcontrolIingWLAN.ThisthesisintroducesthedifferentstandardsandthecomponentsofWLANatfirst,andthennarratesIEEE802.1lgff4Cprotocolsinservice、姒Caccessmodes(DCFandPCF)、scanningdetail.includingMAC&svnchronization、security、connection、powermanagement,andetc.ItalsoanalysesvariouskindsofMACframestructureofIEEE802.iiwirelessLANinparticular.ThethesisprovidesframeworkchartofnetworkprotocolsanalysisresearchonhowtocaptureIEEE802·IIWLANsystem,andthenmakesadeepfordifferentkindsofDackets.andthengivesdifferentmethodsandgivewirelesseards.Iresearchthemethodsoffilteringpackets2——一——些查查兰堡圭兰竺丝兰actualflowchartofprogramming.Inthedecodingmodule,Igivetheflowchartofthetopmanagementfunctionofdecodingmoduleandthekeydatastructures.Intheend,IgivethedesignmethodsofChinesesysteminterfaceinLinux,andprovidethegraphicinterfacethatthesystemoperates.ThesystemsuccessfullycapturesvariouskindsofframesinWLANbasedonIEEE802.11.andcandecodeandreproducetheIEEE802.11MACprotocollayer、thethirdprotocollayerandthehigherprotocollayerofa11packets,andcanalsofilterandcountvariouskindsofframesinrealtime.ThissystemprovidesausefultoolformonitoringandadministratingWLAN.Atthesametime,itcanalsoprovidetechonologystorageforsecuritytechnologyofWLAN.KeyWords:WLAN,IEEE802.1l,capturingpackets。
IEEE80211ac

虽然有11个Channels可用,若以802.11b 为例,所需频宽RF Bandwidth: 22MHz,因此仅有三个不会互相干扰之Channel 存在。
(图片来源:/wiki/List_of_WLAN_channels)这也就是一般在无线网路建置中,在一个空间中,若无线AP 仅支援2.4GHz 802.11 b/g/n,则建议最多布建三台,且三台AP 各设定使用Channel 1/6 /11,才能有互不干扰之最佳效果。
除了无线网路使用于2.4 GHz频带,蓝芽、家用无线电话都在使用,甚至连微波炉都可能会在这个频带内。
而5GHz在美国地区能用的范围有5.180~5.850GHz,以5MHz 区分一个Channel,可用的Channels 有36~165,因此才能容纳802.11ac 最高160 MHz 之频宽要求。
但5GHz也不是完全没有缺点,因为频率越高,波长越短,绕射(diffraction)程度越低,也就是遇到障碍不容易绕过,因此在相同功率上之有效传输距离会较2.4GHz 来的短。
802.11ac 所需160 MHz 之频宽可利用通道集成技术(Channel Bonding)来达成,也就是可使用连续Contiguous 80+80 MHz 或非连续Discontinuous 80+80 MHz,使总频宽达到160 MHz。
下表为在单一空间流使用不同频宽(Bandwidth) 在802.11n 与802.11ac 之理论传输速率:2.支援最多8空间流(MIMO Spatial Streams)MIMO 是Multi-input Multi-output 之缩写,可用此法表示:T x R :S发射天线数量x 接收天线数量:空间流数例如:3x3:3 MIMO表示有三个发射天线与三个接收天线,共提供三个空间流(Spatial Streams)。
在企业方案所提供之无线解决方案,也会看到如MIMO: 4x4:3,表示有四个发射天线与四个接收天线,却仅提供三个空间流数量,其优点在于使用N+1 的冗余收发器,可针对信号衰减和硬体故障提供有效保护,使三个空间流之性能和覆盖范围更大且更稳定。
IEEE802.11无线局域网中无线接入点的设计与实现

西北1二业大学硕士论文:IEEE80211无线局域网中无线接八点的设计与实现摘要基于IEEE802.1lb协议的无线局域网是数据通信里的新兴领域,它所提供的无线宽带接入功能在很大程度上满足了用户在移动(低速)情况下对无线数据传输宽带接入的需求,具有巨大的市场前景。
无线局域网络中的核心设备…无线接入点(AccessPoint),其性能的好坏将直接影响网络的系统容量与业务处理能力,无线接入点的研究对于无线局域网的应用与发展具有重要意义。
本文论述了基于IEEE802.1lb无线局域网(WLAN)的接入点设备的系统软硬件设计,重点介绍了软件系统中各个模块的功能和基本流程,然后对底层的驱动模块进行了详细说明,包括了子模块的划分、具体的实现流程和上下层的接口,最后给出了相关测试结果和说明。
该软件的开发平台使用了嵌入式实时操作系统Vxworks下的集成开发环境TornadoII,开发过程遵循了典型的嵌入式软件开发流程,经过系统联调和严格测试表明:系统能够高效的完成数据交换任务、灵活简便的进行配置、任务运行正常、资源较为节省。
其设计思想和实现手段对于相关网络底层设备的开发具有很好的借鉴意义。
通过有关部门的严格测试,该设备已投入使用,效果良好。
关键词:WLANIEEE802.11接入点实时性堕I!三些盔堂堡主鲨塞!!曼垦曼!壁!:!!垂墼旦垫塑!丕垄堡△皇蝗垡盐皇壅型ABSTRACTWirelessLocalAteaNetworks(WLAN)basedonIEEE802.11biSanewandboomingbranchindatacommunication,whichhasapromisingfuture.AmongtheWLANnetworks,theAccessPoint(AP)isthemostimportantdevice,anditsandthethroughputofthenetworkgreatly.performancewouldaffecttherangeTherefore.theresearchonthisdeviceisofgreatsignificanceforWLANsystem.Thisdissertationdescribesthegeneralarchitectureofhardwareandsoftwaresystem,andthefunctionsandtheprocessesofeachsoftwaremodulearepresentedingeneral.Afterthatthepaperdescribesthelowleveldrivermoduleindetails,includingtheinterfaceswithuplevelandhardware.someimportantstructuresandsub.modules.etc.ThissoftwareWasdesignedonthebasisoftheembeddedrealtimeoperationsystem(RTOS)Vxworks,undertheintegrateddevelopingenvironment(IDE)TornadoII,anditkepttothedevelopingprocessforembeddedsoftware,whichCanbeconsultedforthedevelopmentofrealtimedatatransmissionsoftware.Afterthereleaseofthefirstedition,thedeviceWasstrictlytestedandevaluated,whichmanifestedthegoodperformanceofthedevice.IthasbeenputintoapplicationnowandthereactioniSnotbadKEYWORDS:WLANIEEE802.11AccessPointRTOS.II.塑韭三些盔堂堡主堡塞!!曼垦曼墨丝:!!蒌垡旦墓旦主垂垡堡△盅堕垦盐兰壅塑————一第一章绪论1.1项目的背景互联网的发展已经进入了一个比较成熟的阶段,便利的网络极大的丰富了人们的行为,高效的信息化平台使企业、政府、校园等诸多部门的工作效率得到了很大的提高,同时工作方式也得到了极大的改进。
基于802.11a协议基带处理器发送端接口控制设计和实现
py c ( Y l eo t nto sI py c l e idf e m t d t hsa ) r h e r . hsa r t n t e o t hs i P l H a f w k n i a , e h h h a y e l y i e a
6 9 1M 二5M s a s r s h S , S , A 6Q M M, 2 M, 4 b dttnf re wt B K Q K 1Q M, A p a r e a i P a t P 6 4
实现的优化,以提高系统的工作速度并减少硬件资源的消耗。
关键词
基带处理器, P AA T R , 8 .a FG , E A I E 1 L E 0 l E 2
英文摘要
ABS RACT T
Ir et , e l aa a w r ( N hv be a d a d e s ils l nto s A ) e n eo o r i n n ya wr s o r e k WL e c r e c e a e pr f i p
Sf a /a w rc- s d ic i o ie ae t lr hsal e o w rH r a od i a vr ao f r c cn oe o pyi l r t e d e e g n ef tn n f o r l f c a , n i t y
计算机 毕业论文 外文文献翻译 中英文:IEEE802.11 媒体接入控制
英文资料与中文翻译IEEE 802.11 MEDIUM ACCESS CONTROLThe IEEE 802.11 MAC layer covers three functional areas:reliable data delivery, medium access control, and security. This section covers the first two topics.Reliable Data DeliveryAs with any wireless network, a wireless LAN using the IEEE 802.11 physical and MAC layers is subject to considerable unreliability. Noise, interference, and other propagation effects result in the loss of a significant number of frames. Even with error-correction codes, a number of MAC frames may not successfully be received. This situation can be dealt with by reliability mechanisms at a higher layer. such as TCP. However, timers used for retransmission at higher layers are typically on the order of seconds. It is therefore more efficient to deal with errors at the MAC level. For this purpose, IEEE 802.11 includes a frame exchange protocol. When a station receives a data frame from another station. It returns an acknowledgment (ACK) frame to the source station. This exchange is treated as an atomic unit, not to be interrupted by a transmission from any other station. If the source does not receive an ACK within a short period of time, either because its data frame was damaged or because the returning ACK was damaged, the source retransmits the frame.Thus, the basic data transfer mechanism in IEEE802.11 involves an exchange of two frames. To further enhance reliability, a four-frame exchange may be used. In this scheme, a source first issues a request to send (RTS) frame to the destination. The destination then responds with a clear to send (CTS). After receiving the CTS, the source transmits the data frame, and the destination responds with an ACK. The RTS alerts all stations that are within reception range of the source that an exchange is under way; these stations refrain from transmission in order to avoid a collision between two frames transmitted at the same time. Similarly, the CTS alerts all stations that are within reception range of the destination that an exchange is under way. The RTS/CTS portion of the exchange is a required function of the MAC but may be disabled.Medium Access ControlThe 802.11 working group considered two types of proposals for a MAC algorithm: distributed access protocols, which, like Ethernet, distribute the decision to transmit over all the nodes using a carrier-sense mechanism; and centralized access protocols, which involve regulation of transmission by a centralized decision maker. A distributed access protocol makes sense for an ad hoc network of peer workstations (typically an IBSS) and may also be attractive in other wireless LAN configurations that consist primarily of burst traffic. A centralized access protocol is natural for configurations in which a umber of wireless stations are interconnected with each other and some sort of base station that attaches to a backbone wired LAN: it is especially useful if some of the data is time sensitive or high priority.The end result for 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access control mechanism with an optional centralized control built on top of that. Figure 14.5 illustrates the architecture. The lower sub-layer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. Ordinary asynchronous traffic directly uses DCE. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. PCF is built on top of DCF and exploits features of DCF to assure access for its users. Let us consider these two sub-layers in turn.MAClayerFigure 14.5 IEEE 802.11 Protocol ArchitectureDistributed Coordination FunctionThe DCF sub-layer makes use of a simple CSMA (carrier sense multiple access) algorithm, which functions as follows. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; otherwise the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision detection function (i.e. CSMA/CD) because collision detection is not practical on a wireless network. The dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission.To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an inter-frame space (IFS). In fact, there are three different IFS values, but the algorithm is best explained by initially ignoring this detail. Using an IFS, the rules for CSMA access are as follows (Figure 14.6):Figure 14.6 IEEE 802.11 Medium Access Control Logic1. A station with a frame to transmit senses the medium. If the medium is idle. It waits to see if the medium remains idle for a time equal to IFS. If so , the station may transmit immediately.2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the back-off time, if the medium becomes busy, the back-off timer is halted and resumes when the medium becomes idle.4. If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred.To ensure that back-off maintains stability, a technique known as binary exponential back-off is used. A station will attempt to transmit repeatedly in the face of repeated collisions, but after each collision, the mean value of the random delay is doubled up to some maximum value. The binary exponential back-off provides a means of handling a heavy load. Repeated failed attempts to transmit result in longer and longer back-off times, which helps to smooth out the load. Without such a back-off, the following situation could occur. Two or more stations attempt to transmit at the same time, causing a collision. These stations then immediately attempt to retransmit, causing a new collision.The preceding scheme is refined for DCF to provide priority-based access by the simple expedient of using three values for IFS:●SIFS (short IFS):The shortest IFS, used for all immediate responseactions,as explained in the following discussion●PIFS (point coordination function IFS):A mid-length IFS, used by thecentralized controller in the PCF scheme when issuing polls●DIFS (distributed coordination function IFS): The longest IFS, used as aminimum delay for asynchronous frames contending for access Figure 14.7a illustrates the use of these time values. Consider first the SIFS.Any station using SIFS to determine transmission opportunity has, in effect, the highest priority, because it will always gain access in preference to a stationwaiting an amount of time equal to PIFS or DIFS. The SIFS is used in the following circumstances:●Acknowledgment (ACK): When a station receives a frame addressed onlyto itself (not multicast or broadcast) it responds with an ACK frame after, waiting on1y for an SIFS gap. This has two desirable effects. First, because collision detection IS not used, the likelihood of collisions is greater than with CSMA/CD, and the MAC-level ACK provides for efficient collision recovery. Second, the SIFS can be used to provide efficient delivery of an LLC protocol data unit (PDU) that requires multiple MAC frames. In this case, the following scenario occurs. A station with a multi-frame LLC PDU to transmit sends out the MAC frames one at a time. Each frame is acknowledged after SIFS by the recipient. When the source receives an ACK, it immediately (after SIFS) sends the next frame in the sequence. The result is that once a station has contended for the channel, it will maintain control of the channel until it has sent all of the fragments of an LLC PDU.●Clear to Send (CTS):A station can ensure that its data frame will getthrough by first issuing a small. Request to Send (RTS) frame. The station to which this frame is addressed should immediately respond with a CTS frame if it is ready to receive. All other stations receive the RTS and defer using the medium.●Poll response: This is explained in the following discussion of PCF.longer than DIFS(a) Basic access methoddefers(b) PCF super-frame constructionFigure 14.7 IEEE 802.11 MAC TimingThe next longest IFS interval is the: PIFS. This is used by the centralized controller in issuing polls and takes precedence over normal contention traffic. However, those frames transmitted using SIFS have precedence over a PCF poll.Finally, the DIFS interval is used for all ordinary asynchronous traffic.Point C00rdination Function PCF is an alternative access method implemented on top of the DCE. The operation consists of polling by the centralized polling master (point coordinator). The point coordinator makes use of PIFS when issuing polls. Because PI FS is smaller than DIFS, the point coordinator call seize the medium and lock out all asynchronous traffic while it issues polls and receives responses.As an extreme, consider the following possible scenario. A wireless network is configured so that a number of stations with time, sensitive traffic are controlled by the point coordinator while remaining traffic contends for access using CSMA. The point coordinator could issue polls in a round—robin fashion to all stations configured for polling. When a poll is issued, the polled station may respond using SIFS. If the point coordinator receives a response, it issues another poll using PIFS. If no response is received during the expected turnaround time, the coordinator issues a poll.If the discipline of the preceding paragraph were implemented, the point coordinator would lock out all asynchronous traffic by repeatedly issuing polls. To prevent this, an interval known as the super-frame is defined. During the first part of this interval, the point coordinator issues polls in a round, robin fashion to all stations configured for polling. The point coordinator then idles for the remainder of the super-frame, allowing a contention period for asynchronous access.Figure l4.7 b illustrates the use of the super-frame. At the beginning of a super-frame, the point coordinator may optionally seize control and issues polls for a give period of time. This interval varies because of the variable frame size issued by responding stations. The remainder of the super-frame is available for contention based access. At the end of the super-frame interval, the point coordinator contends for access to the medium using PIFS. If the medium is idle. the point coordinator gains immediate access and a full super-frame period follows. However, the medium may be busy at the end of a super-frame. In this case, the point coordinator must wait until the medium is idle to gain access: this result in a foreshortened super-frame period for the next cycle.OctetsFC=frame control SC=sequence controlD/I=duration/connection ID FCS=frame check sequence(a ) MAC frameBitsDS=distribution systemMD=more data MF=more fragmentsW=wired equivalent privacy RT=retryO=orderPM=power management (b) Frame control filedFigure 14.8 IEEE 802.11 MAC Frame FormatMAC FrameFigure 14.8a shows the 802.11 frame format when no security features are used. This general format is used for all data and control frames, but not all fields are used in all contexts. The fields are as follows:● Frame Control: Indicates the type of frame and provides contr01information, as explained presently.● Duration/Connection ID: If used as a duration field, indicates the time(in-microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier.●Addresses: The number and meaning of the 48-bit address fields dependon context. The transmitter address and receiver address are the MAC addresses of stations joined to the BSS that are transmitting and receiving frames over the wireless LAN. The service set ID (SSID) identifies the wireless LAN over which a frame is transmitted. For an IBSS, the SSID isa random number generated at the time the network is formed. For awireless LAN that is part of a larger configuration the SSID identifies the BSS over which the frame is transmitted: specifically, the SSID is the MAC-level address of the AP for this BSS (Figure 14.4). Finally the source address and destination address are the MAC addresses of stations, wireless or otherwise, that are the ultimate source and destination of this frame. The source address may be identical to the transmitter address and the destination address may be identical to the receiver address.●Sequence Control: Contains a 4-bit fragment number subfield used forfragmentation and reassembly, and a l2-bit sequence number used to number frames sent between a given transmitter and receiver.●Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDUis a LLC protocol data unit or MAC control information.●Frame Check Sequence: A 32-bit cyclic redundancy check. The framecontrol filed, shown in Figure 14.8b, consists of the following fields.●Protocol Version: 802.11 version, current version 0.●Type: Identifies the frame as control, management, or data.●Subtype: Further identifies the function of frame. Table 14.4 defines thevalid combinations of type and subtype.●To DS: The MAC coordination sets this bit to 1 in a frame destined to thedistribution system.●From DS: The MAC coordination sets this bit to 1 in a frame leaving thedistribution system.●More Fragments: Set to 1 if more fragments follow this one.●Retry: Set to 1 if this is a retransmission of a previous frame.●Power Management: Set to]if the transmitting station is in a sleep mode.●More Data: Indicates that a station has additional data to send. Each blockof data may be sent as one frame or a group of fragments in multiple frames.●WEP:Set to 1 if the optional wired equivalent protocol is implemented.WEP is used in the exchange of encryption keys for secure data exchange.This bit also is set if the newer WPA security mechanism is employed, as described in Section 14.6.●Order:Set to 1 in any data frame sent using the Strictly Ordered service,which tells the receiving station that frames must be processed in order. We now look at the various MAC frame types.Control Frames Control frames assist in the reliable delivery of data frames. There are six control frame subtypes:●Power Save-Poll (PS-Poll): This frame is sent by any station to the stationthat includes the AP (access point). Its purpose is to request that the AP transmit a frame that has been buffered for this station while the station was in power saving mode.●Request to Send (RTS):This is the first frame in the four-way frameexchange discussed under the subsection on reliable data delivery at the beginning of Section 14.3.The station sending this message is alerting a potential destination, and all other stations within reception range, that it intends to send a data frame to that destination.●Clear to Send (CTS): This is the second frame in the four-way exchange.It is sent by the destination station to the source station to grant permission to send a data frame.●Acknowledgment:Provides an acknowledgment from the destination tothe source that the immediately preceding data, management, or PS-Poll frame was received correctly.●Contention-Free (CF)-End: Announces the end of a contention-freeperiod that is part of the point coordination function.●CF-End+CF-Ack:Acknowledges the CF-End. This frame ends thecontention-free period and releases stations from the restrictions associated with that period.Data Frames There are eight data frame subtypes, organized into two groups. The first four subtypes define frames that carry upper-level data from the source station to the destination station. The four data-carrying frames are as follows: ●Data: This is the simplest data frame. It may be used in both a contentionperiod and a contention-free period.●Data+CF-Ack: May only be sent during a contention-free period. Inaddition to carrying data, this frame acknowledges previously received data.●Data+CF-Poll: Used by a point coordinator to deliver data to a mobilestation and also to request that the mobile station send a data frame that it may have buffered.●Data+CF-Ack+CF-Poll: Combines the functions of the Data+CF-Ack andData+CF-Poll into a single frame.The remaining four subtypes of data frames do not in fact carry any user data. The Null Function data frame carries no data, polls, or acknowledgments. It is used only to carry the power management bit in the frame control field to the AP, to indicate that the station is changing to a low-power operating state. The remaining three frames (CF-Ack, CF-Poll,CF-Ack+CF-Poll) have the same functionality as the corresponding data frame subtypes in the preceding list (Data+CF-Ack, Data+CF-Poll, Data+CF-Ack+CF-Poll) but withotit the data. Management FramesManagement frames are used to manage communications between stations and APs. The following subtypes are included:●Association Request:Sent by a station to an AP to request an association,with this BSS. This frame includes capability information, such as whether encryption is to be used and whether this station is pollable.●Association Response:Returned by the AP to the station to indicatewhether it is accepting this association request.●Reassociation Request: Sent by a station when it moves from one BSS toanother and needs to make an association with tire AP in the new BSS. The station uses reassociation rather than simply association so that the new AP knows to negotiate with the old AP for the forwarding of data frames.●Reassociation Response:Returned by the AP to the station to indicatewhether it is accepting this reassociation request.●Probe Request: Used by a station to obtain information from anotherstation or AP. This frame is used to locate an IEEE 802.11 BSS.●Probe Response: Response to a probe request.●Beacon: Transmitted periodically to allow mobile stations to locate andidentify a BSS.●Announcement Traffic Indication Message: Sent by a mobile station toalert other mobile stations that may have been in low power mode that this station has frames buffered and waiting to be delivered to the station addressed in this frame.●Dissociation: Used by a station to terminate an association.●Authentication:Multiple authentication frames are used in an exchange toauthenticate one station to another.●Deauthentication:Sent by a station to another station or AP to indicatethat it is terminating secure communications.IEEE802.11 媒体接入控制IEEE 802.11 MAC层覆盖了三个功能区:可靠的数据传送、接入控制以及安全。
[说明]第五代WiFi802.11ac
802.11ac对设计和测量的挑战关键字:WiFi802.11ac发射机接收机被业界认为是第五代WiFi的802.11ac正在呼之欲出,它与之前的WiFi标准制式有哪些方面的不同,为什么会被业界如此看好,让我们先来了解一下WiFi和WLAN的历史。
无线局域网(WLAN)推行之初被普遍认可的两个国际标准是IEEE802.11a和802.11b。
最初设计这些标准的目的是为满足便携式电脑在家和办公室环境中可随意移动的要求。
随后,在一些机场、酒店、咖啡屋和购物广场也开始允许通过无线接入(商业命名为Wi-Fi),随时随地上网、查询电子邮件等,扩展了无线宽带的功能。
虽然无线宽带连接的数据速度曾经很有限,例如,802.11a在5 GHz 频段可提供的最高速率是54 Mbps,而 802.11b在2.4 GHz只有11 Mbps,但这两个频段都是免费的,即不需要授权的。
为了尽量减少来自其它同频设备的干扰,这两个标准都采用了扩频传输技术和比较复杂的编码技术。
2003年, IEEE(美国电气及电子工程师学会)颁布了802.11g,依旧工作在2.4 GHz频段,但是数据速率可以达到54 Mbps。
与此同时,一种新的应用模式即在家庭和小型办公室里可连接多个设备并在设备间进行数据共享,对无线局域网的数据传输速率提出更高要求,从而使得一个新的研究项目应运而生,这就是于2009公布的802.11n 的由来。
为了使单信道的数据速率最高可以超过100 Mbps,在802.11n标准中引入的MIMO (即多输入-多输出,或空间数据流)技术,利用物理上完全分离的最多4个发射和4个接收天线,对不同数据进行不同的调制/解调,来达到传输较高的数据容量的目的。
在表1中例举出了当前一些比较超前的应用模式,这些模式需要更高的数据传输量来支持“无线办公”的要求。
表1,新型WLAN应用模式为了满足以上这些需要,IEEE内部设立了两个项目工作组,以“极高吞吐量(Very High Throughput)”为目标进行立项研究。
IEEE-802.11ac生产测试概述
IEEE-802.11ac生产测试概述IEEE 802.11ac生产测试概述(1)2012-12-28 10:48 Robin C114中国通信网我要评论(0)字号:T | T802.11ac是由IEEE 802.11ac工作组(TGac)提出的全新WLAN标准,其目标是提供超高速(VHT)的本地无线连接技术——峰值传输速率10倍于当前WLAN 802.11n HT标准,通信带宽最高可达160MHz(四倍于802.11n标准),及最高8路MIMO信号通路。
AD:IEEE 802.11ac 是正在被集成到无线设备中的全新WLAN (无线局域网) 标准。
支持该标准的产品目前已面市,各生产厂商已开始进入量产阶段。
生产测试工程师需要既能够支持新的802.11ac 测试规范,又可以兼容已有各WLAN 标准和其他无线连接技术的测试仪器。
本文参照技术规范草案介绍了802.11ac 标准的主要生产测试项目、其用途及相关的测试方法。
802.11ac 简介802.11ac 是由IEEE 802.11ac 工作组(TGac) 提出的全新WLAN标准,其目标是提供超高速(VHT)的本地无线连接技术——峰值传输速率10倍于当前WLAN 802.11n HT标准,通信带宽最高可达160MHz(四倍于802.11n标准),及最高8路MIMO信号通路。
本文依据技术规范[1],介绍了802.11ac设备量产所需的测试要求。
生产测试需求从生产测试的角度看,必须了解WLAN 标准的变化和演进并提前制定计划。
例如,由于通信带宽达到80 MHz ,802.11ac 测试设备显然需要具有更宽的处理带宽用以信号分析和产生而实现对被测物的测试。
这正如当年802.11n标准被引入时的情形,当时需要部署足以测试带宽达到40 MHz 的测试设备。
测试物理连接方案当802.11n 标准引入时,一个重要的问题是如何搭建测试系统以对由多天线组成的MIMO系统进行测试。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
IEEE 802.11ac: Enhancements for Very High Throughput WLANs
Eng Hwee Ong and Jarkko Kneckt
knowledge, this is one of the first studies to introduce the draft 802.11ac amendment and analyze its potential benefits in terms of MAC performance gains as compared to existing 802.11n devices over various frame aggregation mechanisms. The remainder of this paper is organized as follows. Section II presents an overview of the key mandatory and optional PHY features together with the MAC enhancements of 802.11ac over the existing 802.11n standard. Section III provides the numerical analysis of 802.11ac and 802.11n MAC performances in terms of maximum throughput and MAC efficiency. Section IV validates the numerical analysis with simulation results, and compares the performance analysis between 802.11ac and 802.11n over various frame aggregation mechanisms. Finally, Section V concludes this paper with some directions for future work. II. OVERVIEW OF K EY PHY F EATURES AND MAC E NHANCEMENTS In general, 802.11ac could be seen as a lateral extension of 802.11n in which the two basic notions of multiple input, multiple output (MIMO) and wider channel bandwidth, anchored in 802.11n [5], [6] are enhanced. The basic idea is that the theoretical maximum PHY data rate can be linearly increased by a factor of the number of spatial streams (transmit/receive antennas) or channel bandwidth. In other words, PHY data rate can be doubled (quadrupled) by doubling the number of spatial streams or (and) channel bandwidth. Fig. 1 illustrates the key mandatory and optional PHY features, as well as the MAC enhancements introduced in 802.11ac. Note that the blocks in dashed lines represent the new PHY features and key MAC enhancements of 802.11ac in contrast to 802.11n at the time of writing. A. Mandatory and Optional PHY Features As depicted in Fig. 1, 802.11ac maintains most of the mandatory PHY features of 802.11n such as binary convolutional coding (BCC) for forward error correction, basic MIMO, modulation and coding schemes (MCSs) of 0 to 7, and regular guard interval of 800 ns. The key difference in these mandatory features is the support of 80 MHz channel bandwidth for an approximately twofold increase in data rate as compared to 802.11n where 40 MHz is the largest channel bandwidth. As a result, 802.11ac mandates only a single
Nokia Research Center It¨ amerenkatu 11 – 13, FIN-00180 Helsinki, Finland Email: {eng-hwee.ong, jarkko.kneckt}@
Olli Alanen, Zheng Chang, Toni Huovinen, and Timo Nihtil¨ a
I. I NTRODUCTION In recent years, the continued effort in pursuit of gigabit wireless communications has been most noticeable in the IEEE 802.11 WLAN [1]. For example in 2010, the Wireless Gigabit (WiGig) Alliance, formed by a consortium of industry leaders, has completed the first draft of the WiGig specification [2] that defines a unified architecture to enable tri-band communications over the frequency bands of 2.4, 5, and 60 GHz. The WiGig specification, which aims to achieve multi-gigabit wireless communication in the 60 GHz band, has since been contributed to the new 802.11ad amendment. It is built on the existing 802.11 standard where interoperability with the 2.4 and 5 GHz bands are based on the existing 802.11b/a/g/n and the upcoming 802.11ac standards. In this paper, we focus on gigabit solution in the 5 GHz band where the emerging 802.11ac amendment [3] could provide a maximum PHY data rate of close to 7 Gbps. To be more specific, it promises MAC throughput of more than 500 Mbps for a single user scenario and aggregated MAC throughput of more than 1 Gbps for a multi-user scenario, both utilizing no more than 80 MHz of channel bandwidth. Consequently, 802.11ac is targeted at higher data rate services such as high-definition television, wireless implementation of high-definition multimedia interface (HDMI replacement), and lately the wireless display applications which according to the report in [4] could result in an expected shipment of 50 million wireless video devices in 2015. To the best of the authors’
Magister Solutions Ltd Hannikaisenkatu 41, FIN-40100 Jyv¨ askyl¨ a, Finland Email: {fistname}@magister.fi
Abstract—The IEEE 802.11ac is an emerging very high throughput (VHT) WLAN standard that could achieve PHY data rates of close to 7 Gbps for the 5 GHz band. In this paper, we introduce the key mandatory and optional PHY features, as well as the MAC enhancements of 802.11ac over the existing 802.11n standard in the evolution towards higher data rates. Through numerical analysis and simulations, we compare the MAC performance between 802.11ac and 802.11n over three different frame aggregation mechanisms, viz., aggregate MAC service data unit (A-MSDU), aggregate MAC protocol data unit (A-MPDU), and hybrid A-MSDU/A-MPDU aggregation. Our results indicate that 802.11ac with a configuration of 80MHz and single (two) spatial stream(s) outperforms 802.11n with a configuration of 40 MHz and two spatial streams in terms of maximum throughput by 28% (84%). In addition, we demonstrate that hybrid A-MSDU/AMPDU aggregation yields the best performance for both 802.11n and 802.11ac devices, and its improvement is a function of the maximum A-MSDU size.