SlideShare une entreprise Scribd logo
1  sur  30
IIEEEEEE 880022..1111 
WWIIRREELLEESSSS LLAANN 
V.Par thipan Assistant Professor ,Saveetha 
University
 LANs provide connectivity for 
interconnecting computing resources at the 
local levels of an organization 
 Wired LANs 
Limitations because of physical, hard-wired 
infrastructure 
 Wireless LANs provide 
Flexibility 
Portability 
Mobility 
Ease of Installation
 In response to lacking standards, IEEE 
developed the first internationally recognized 
wireless LAN standard – IEEE 802.11 
 IEEE published 802.11 in 1997, after seven 
years of work 
 Most prominent specification for WLANs 
 Scope of IEEE 802.11 is limited to Physical 
and Data Link Layers.
 Appliance Interoperability 
 Fast Product Development 
 Stable Future Migration 
 Price Reductions 
 The 802.11 standard takes into account 
the following significant differences 
between wireless and wired LANs: 
Power Management 
Security 
Bandwidth
IEEE 802.3 
Carrier 
Sense 
IEEE 802.4 
Token 
Bus 
IEEE 802.5 
Token 
Ring 
IEEE 802.11 
Wireless 
IEEE 802.2 
Logical Link Control (LLC) 
PHY 
OSI Layer 1 
(Physical) 
Mac 
OSI Layer 2 
(Data Link)
 Medical Professionals 
 Education 
 Temporary Situations 
 Airlines 
 Security Staff 
 Emergency Centers
 In historical building and small office where 
cabling is not economical. 
 Supports nomadic access by providing a 
wireless link between a LAN hub and mobile 
data terminal with an antenna. 
 Creation of an adhoc n/ws. 
i.e peer to peer network with no centralized 
server that is set up temporarily to meet 
some immediate need.
CM 
10 Mbps 
Ethernet 
switch 
UM 
Bridge 
Or 
Router 
Server 
100 Mbps Ethernet switch 
Server
 Mostly a wireless Lan will be linked into a wired LAN. This is called LAN 
Extension. 
 Control Module is wireless LAN acts as an interface to a wired LAN 
 If all wireless end systems are within the range of a single control module, 
then it is called single cell wireless LAN. 
 If multiple control Module are present ,then it is multiple cell wireless LAN. 
 CM- control module uses polling or token passing scheme to regulate 
access from end systems. 
 Hubs or user module(UM), that control number of stations directly without a 
wired LAN, can also be a part of wireless LAN
 Wireless LAN requirement:- 
 throughput – should provide high capacity. 
 Number of nodes –should support many data. 
 Connectivity of backbone LAN. 
 Battery power consumption- use battery powered workstations , so when 
not using n/w, can be set to sleep mode to reduce power consumption. 
 Transmission robustness and security: 
Highly interference prone should provide reliable transfer. 
 coallocated network operation –Wireless LAN operating in same area may 
face interference. 
 License free operation – should provide wireless products without license 
for frequency based used. 
 Hand off (or) Roaming – mobile station can move from cell to another. 
 Dynamic configuration: automated addition or relocation of end systems 
without disruption to others.
WWLLAANN TTOOPPOOLLOOGGYY 
AADD--HHOOCC NNEETTWWOORRKK
WWLLAANN TTooppoollooggyy 
IInnffrraassttrruuccttuurree
 Access point (AP): A station that provides access 
to the DS. 
 Basic service set (BSS): A set of stations 
controlled by a single AP. 
 Distribution system (DS): A system used to 
interconnect a set of BSSs to create an ESS. 
DS is implementation-independent. It can be a wired 
802.3 Ethernet LAN, 802.4 token bus, 802.5 token 
ring or another 802.11 medium. 
 Extended service set (ESS):Two or more BSS 
interconnected by DS 
 Portal: Logical entity where 802.11 network 
integrates with a non 802.11 network.
 Distribution service (DS) 
Used to exchange MAC frames from station in 
one BSS to station in another BSS 
 Integration service 
Transfer of data between station on IEEE 
802.11 LAN and station on integrated IEEE 
802.x LAN
 Association 
Establishes initial association between station 
and AP. Each station must send its identify to 
all others through AP 
 Re-association 
Enables transfer of association from one AP to 
another, allowing station to move from one 
BSS to another 
 Disassociation 
Association termination notice from station or 
AP
RREE--AASSSSOOCCIIAATTIIOONN
 Authentication 
Establishes identity of stations to each other 
 De-authentication 
Invoked when existing authentication is 
terminated 
 Privacy 
Prevents message contents from being read by 
unintended recipient.
IEEE 802.11 MMEEDDIIUUMM AACCCCEESSSS 
CCOONNTTRROOLL 
 MAC layer covers three functional areas: 
Reliable data delivery 
Access control 
Security
MMAACC FFRRAAMMEE FFOORRMMAATT 
2 2 6 6 6 2 6 0-2312 4 
Frame 
Control 
Duration 
ID 
Addr 1 Addr 2 Addr 3 Sequence Addr 4 
Control 
Frame CRC 
Body 
802.11 MAC Header 
Bits: 2 2 4 1 1 1 1 1 1 1 1 
Protocol 
Version Type SubType To 
DS 
Retry Pwr 
Mgt 
More 
Data 
WEP Order 
From More 
DS 
Frag 
Frame Control Field
MMAACC LLAAYYEERR FFRRAAMMEESS 
 Data Frames 
 Control Frames 
RTS,CTS,ACK and PS-POLL 
 Management Frames 
Authentication and De-Authentication 
Association, Re-Association, and Disassociation 
Beacon and Probe frames
IISS WWLLAANN SSEECCUURREE ?? 
The Parking Lot 
attack 
Man in the 
middle attack 
Freely available 
tools like Air 
Snort, WEP 
crack to snoop 
into a WLAN
PHYSICAL MMEEDDIIAA DDEEFFIINNEEDD BBYY 
OORRIIGGIINNAALL 880022..1111 SSTTAANNDDAARRDD 
 Frequency-hopping spread spectrum 
Operating in 2.4 GHz ISM band 
Lower cost, power consumption 
Most tolerant to signal interference 
 Direct-sequence spread spectrum 
Operating in 2.4 GHz ISM band 
Supports higher data rates 
More range than FH or IR physical layers 
 Infrared 
Lowest cost 
Lowest range compared to spread spectrum 
Doesn’t penetrate walls, so no eavesdropping
FREQUENCY HHOOPPPPIINNGG SSPPRREEAADD 
SSPPEECCTTRRUUMM 
 Signal is broadcast over seemingly random series of 
radio frequencies 
 Signal hops from frequency to frequency at fixed 
intervals 
 Receiver, hopping between frequencies in 
synchronization with transmitter, picks up message 
 Advantages 
Efficient utilization of available bandwidth 
Eavesdropper hear only unintelligible blips 
Attempts to jam signal on one frequency succeed only at 
knocking out a few bits
DIRECT SSEEQQUUEENNCCEE SSPPRREEAADD 
SSPPEECCTTRRUUMM 
 Each bit in original signal is represented by 
multiple bits in the transmitted signal 
 Spreading code spreads signal across a 
wider frequency band 
 DSSS is the only physical layer specified for 
the 802.11b specification 
802.11a and 802.11b differ in use of chipping 
method 
802.11a uses 11-bit barker chip 
802.11b uses 8-bit complimentary code keying 
(CCK) algorithm
IEEE 880022..1111AA AANNDD IIEEEEEE 
880022..1111BB 
 IEEE 802.11a – limited data rate 
Makes use of 5-GHz band 
Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps 
Uses orthogonal frequency division multiplexing (OFDM) 
 IEEE 802.11b 
802.11b operates in 2.4 GHz band 
Provides data rates of 5.5 and 11 Mbps 
Complementary code keying (CCK) modulation scheme. 
Multiple carrier signals at different frequency sending some of the 
bits on each channel.
IEEE 802.11 standards : 
IEEE 802.11 a 
Multipath Effect(Multipath Fading) 
is simply a term used to describe the multiple 
Paths the radio wave may follow between 
transmitter and receiver
IEEE 802.11 standards : 
IEEE 802.11 a 
Orthogonal Frequency Division Multiplexing(OFDM) 
OFDM a digital multi-carrier modulation method. A large 
number of closely-spaced orthogonal sub-carriers are used to 
carry data. 
Although the principles and some of the benefits have 
been known since the 1960s, OFDM is popular for 
wideband communications today by way of low-cost digital 
signal processing components that can efficiently calculate 
the FFT.
IEEE 802.11 standards : 
IEEE 802.11 a 
Frequency = 5 GHz 
Maximum Speed = 54 Mbps 
Range = about 35 meters(Varies) 
Encoding Scheme = OFDM
IEEE 802.11 standards : 
IEEE 802.11 b 
Frequency = 2.4 GHz (ISM band) 
Maximum Speed =11 Mbps 
Range = about 38meters(Varies) 
Encoding Scheme = DSSS 
Modulation Technique= BPSK(1 Mbps), 
DQPSK(2 Mbps), CCK(5.5 Mbps,11Mbps)
FFUUTTUURREE OOFF WWLLAANN 
WLANs move to maturity 
Higher Speeds 
Improved Security 
Seamless end-to-end protocols 
Better Error control 
Long distances 
New vendors 
Better interoperability 
Global networking

Contenu connexe

Tendances

W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Wireless network
Wireless networkWireless network
Wireless networkmattglover0
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE ArchitectureManje Gowda
 

Tendances (20)

W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Wireless network
Wireless networkWireless network
Wireless network
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Isdn networking
Isdn networkingIsdn networking
Isdn networking
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Network layers
Network layersNetwork layers
Network layers
 
Mobile ipv6
Mobile ipv6Mobile ipv6
Mobile ipv6
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 

En vedette

En vedette (20)

IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Lect3
Lect3Lect3
Lect3
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
token bus
 token bus token bus
token bus
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Token bus standard
Token bus standardToken bus standard
Token bus standard
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Token bus
Token busToken bus
Token bus
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 

Similaire à Ieee 802.11 wireless lan

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Darpan Patel
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptxMinecraftJava
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 

Similaire à Ieee 802.11 wireless lan (20)

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Darsh
DarshDarsh
Darsh
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wlan 2
Wlan 2Wlan 2
Wlan 2
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
Seminar
SeminarSeminar
Seminar
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
 
J010216776
J010216776J010216776
J010216776
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Unit 3
Unit 3Unit 3
Unit 3
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 

Plus de Parthipan Parthi (20)

Inheritance
Inheritance Inheritance
Inheritance
 
Switch statement mcq
Switch statement  mcqSwitch statement  mcq
Switch statement mcq
 
Oprerator overloading
Oprerator overloadingOprerator overloading
Oprerator overloading
 
802.11 mac
802.11 mac802.11 mac
802.11 mac
 
Computer network
Computer networkComputer network
Computer network
 
Session 6
Session 6Session 6
Session 6
 
Queuing analysis
Queuing analysisQueuing analysis
Queuing analysis
 
WAP
WAPWAP
WAP
 
Alternative metrics
Alternative metricsAlternative metrics
Alternative metrics
 
Ethernet
EthernetEthernet
Ethernet
 
Data structures1
Data structures1Data structures1
Data structures1
 
Data structures 4
Data structures 4Data structures 4
Data structures 4
 
Data structures2
Data structures2Data structures2
Data structures2
 
Data structures 3
Data structures 3Data structures 3
Data structures 3
 
Input output streams
Input output streamsInput output streams
Input output streams
 
Io stream
Io streamIo stream
Io stream
 
Dbms lab questions
Dbms lab questionsDbms lab questions
Dbms lab questions
 
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
 
New syllabus combined_civil_services
New syllabus combined_civil_servicesNew syllabus combined_civil_services
New syllabus combined_civil_services
 
Pspice
PspicePspice
Pspice
 

Dernier

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Dernier (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Ieee 802.11 wireless lan

  • 1. IIEEEEEE 880022..1111 WWIIRREELLEESSSS LLAANN V.Par thipan Assistant Professor ,Saveetha University
  • 2.  LANs provide connectivity for interconnecting computing resources at the local levels of an organization  Wired LANs Limitations because of physical, hard-wired infrastructure  Wireless LANs provide Flexibility Portability Mobility Ease of Installation
  • 3.  In response to lacking standards, IEEE developed the first internationally recognized wireless LAN standard – IEEE 802.11  IEEE published 802.11 in 1997, after seven years of work  Most prominent specification for WLANs  Scope of IEEE 802.11 is limited to Physical and Data Link Layers.
  • 4.  Appliance Interoperability  Fast Product Development  Stable Future Migration  Price Reductions  The 802.11 standard takes into account the following significant differences between wireless and wired LANs: Power Management Security Bandwidth
  • 5. IEEE 802.3 Carrier Sense IEEE 802.4 Token Bus IEEE 802.5 Token Ring IEEE 802.11 Wireless IEEE 802.2 Logical Link Control (LLC) PHY OSI Layer 1 (Physical) Mac OSI Layer 2 (Data Link)
  • 6.  Medical Professionals  Education  Temporary Situations  Airlines  Security Staff  Emergency Centers
  • 7.  In historical building and small office where cabling is not economical.  Supports nomadic access by providing a wireless link between a LAN hub and mobile data terminal with an antenna.  Creation of an adhoc n/ws. i.e peer to peer network with no centralized server that is set up temporarily to meet some immediate need.
  • 8. CM 10 Mbps Ethernet switch UM Bridge Or Router Server 100 Mbps Ethernet switch Server
  • 9.  Mostly a wireless Lan will be linked into a wired LAN. This is called LAN Extension.  Control Module is wireless LAN acts as an interface to a wired LAN  If all wireless end systems are within the range of a single control module, then it is called single cell wireless LAN.  If multiple control Module are present ,then it is multiple cell wireless LAN.  CM- control module uses polling or token passing scheme to regulate access from end systems.  Hubs or user module(UM), that control number of stations directly without a wired LAN, can also be a part of wireless LAN
  • 10.  Wireless LAN requirement:-  throughput – should provide high capacity.  Number of nodes –should support many data.  Connectivity of backbone LAN.  Battery power consumption- use battery powered workstations , so when not using n/w, can be set to sleep mode to reduce power consumption.  Transmission robustness and security: Highly interference prone should provide reliable transfer.  coallocated network operation –Wireless LAN operating in same area may face interference.  License free operation – should provide wireless products without license for frequency based used.  Hand off (or) Roaming – mobile station can move from cell to another.  Dynamic configuration: automated addition or relocation of end systems without disruption to others.
  • 13.  Access point (AP): A station that provides access to the DS.  Basic service set (BSS): A set of stations controlled by a single AP.  Distribution system (DS): A system used to interconnect a set of BSSs to create an ESS. DS is implementation-independent. It can be a wired 802.3 Ethernet LAN, 802.4 token bus, 802.5 token ring or another 802.11 medium.  Extended service set (ESS):Two or more BSS interconnected by DS  Portal: Logical entity where 802.11 network integrates with a non 802.11 network.
  • 14.  Distribution service (DS) Used to exchange MAC frames from station in one BSS to station in another BSS  Integration service Transfer of data between station on IEEE 802.11 LAN and station on integrated IEEE 802.x LAN
  • 15.  Association Establishes initial association between station and AP. Each station must send its identify to all others through AP  Re-association Enables transfer of association from one AP to another, allowing station to move from one BSS to another  Disassociation Association termination notice from station or AP
  • 17.  Authentication Establishes identity of stations to each other  De-authentication Invoked when existing authentication is terminated  Privacy Prevents message contents from being read by unintended recipient.
  • 18. IEEE 802.11 MMEEDDIIUUMM AACCCCEESSSS CCOONNTTRROOLL  MAC layer covers three functional areas: Reliable data delivery Access control Security
  • 19. MMAACC FFRRAAMMEE FFOORRMMAATT 2 2 6 6 6 2 6 0-2312 4 Frame Control Duration ID Addr 1 Addr 2 Addr 3 Sequence Addr 4 Control Frame CRC Body 802.11 MAC Header Bits: 2 2 4 1 1 1 1 1 1 1 1 Protocol Version Type SubType To DS Retry Pwr Mgt More Data WEP Order From More DS Frag Frame Control Field
  • 20. MMAACC LLAAYYEERR FFRRAAMMEESS  Data Frames  Control Frames RTS,CTS,ACK and PS-POLL  Management Frames Authentication and De-Authentication Association, Re-Association, and Disassociation Beacon and Probe frames
  • 21. IISS WWLLAANN SSEECCUURREE ?? The Parking Lot attack Man in the middle attack Freely available tools like Air Snort, WEP crack to snoop into a WLAN
  • 22. PHYSICAL MMEEDDIIAA DDEEFFIINNEEDD BBYY OORRIIGGIINNAALL 880022..1111 SSTTAANNDDAARRDD  Frequency-hopping spread spectrum Operating in 2.4 GHz ISM band Lower cost, power consumption Most tolerant to signal interference  Direct-sequence spread spectrum Operating in 2.4 GHz ISM band Supports higher data rates More range than FH or IR physical layers  Infrared Lowest cost Lowest range compared to spread spectrum Doesn’t penetrate walls, so no eavesdropping
  • 23. FREQUENCY HHOOPPPPIINNGG SSPPRREEAADD SSPPEECCTTRRUUMM  Signal is broadcast over seemingly random series of radio frequencies  Signal hops from frequency to frequency at fixed intervals  Receiver, hopping between frequencies in synchronization with transmitter, picks up message  Advantages Efficient utilization of available bandwidth Eavesdropper hear only unintelligible blips Attempts to jam signal on one frequency succeed only at knocking out a few bits
  • 24. DIRECT SSEEQQUUEENNCCEE SSPPRREEAADD SSPPEECCTTRRUUMM  Each bit in original signal is represented by multiple bits in the transmitted signal  Spreading code spreads signal across a wider frequency band  DSSS is the only physical layer specified for the 802.11b specification 802.11a and 802.11b differ in use of chipping method 802.11a uses 11-bit barker chip 802.11b uses 8-bit complimentary code keying (CCK) algorithm
  • 25. IEEE 880022..1111AA AANNDD IIEEEEEE 880022..1111BB  IEEE 802.11a – limited data rate Makes use of 5-GHz band Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps Uses orthogonal frequency division multiplexing (OFDM)  IEEE 802.11b 802.11b operates in 2.4 GHz band Provides data rates of 5.5 and 11 Mbps Complementary code keying (CCK) modulation scheme. Multiple carrier signals at different frequency sending some of the bits on each channel.
  • 26. IEEE 802.11 standards : IEEE 802.11 a Multipath Effect(Multipath Fading) is simply a term used to describe the multiple Paths the radio wave may follow between transmitter and receiver
  • 27. IEEE 802.11 standards : IEEE 802.11 a Orthogonal Frequency Division Multiplexing(OFDM) OFDM a digital multi-carrier modulation method. A large number of closely-spaced orthogonal sub-carriers are used to carry data. Although the principles and some of the benefits have been known since the 1960s, OFDM is popular for wideband communications today by way of low-cost digital signal processing components that can efficiently calculate the FFT.
  • 28. IEEE 802.11 standards : IEEE 802.11 a Frequency = 5 GHz Maximum Speed = 54 Mbps Range = about 35 meters(Varies) Encoding Scheme = OFDM
  • 29. IEEE 802.11 standards : IEEE 802.11 b Frequency = 2.4 GHz (ISM band) Maximum Speed =11 Mbps Range = about 38meters(Varies) Encoding Scheme = DSSS Modulation Technique= BPSK(1 Mbps), DQPSK(2 Mbps), CCK(5.5 Mbps,11Mbps)
  • 30. FFUUTTUURREE OOFF WWLLAANN WLANs move to maturity Higher Speeds Improved Security Seamless end-to-end protocols Better Error control Long distances New vendors Better interoperability Global networking