SlideShare une entreprise Scribd logo
1  sur  22
PRESENTATION
ON
IEEE 802.11
Prepared By:
Shreejan Acharya
BEX 68114
Slides Includes
Introduction
Physical Layer
Architecture
Frame format
Different Protocols
Media Access Control (MAC)
Introduction
 Created and maintained by IEEE
 Set of media control(MAC) and physical layer
 Used to implement wireless local area
network(WLAN)
 In the frequency band 2.4,3.6,5 and 60 GHz
 Wi-fi refers to the IEEE 802.11 communication for
WLAN
The Linksys WRT54G contains a router with an
802.11b/g radio and two antennas
Introduction cntd.
Adopted in 1997
Family of 802
Origins in a 1985 ruling by the U.S. Federal
Communications commission
Consist of series of half duplex over the air
modulation
Uses same basic protocols
It uses two spread spectrum technology
Frequency Hopping Spread Spectrum (FHSS)
 Direct Sequence Spread Spectrum (DSSS)
802.11 Physical Layer (PHY)
The 802.11 physical layer (PHY) is the interface
between the MAC and the wireless media where
frames are transmitted and received.
 The PHY provides three functions.
 First, the PHY provides an interface to exchange
frames with the upper MAC layer for transmission and
reception of data.
Secondly, the PHY uses signal carrier and spread
spectrum modulation to transmit data frames over
the media.
 Thirdly, the PHY provides a carrier sense indication
back to the MAC to verify activity on the media.
Architectures
Station (STA) Architecture:
 It contains IEEE 802.11
conformant MAC and PHY
interface to the wireless
medium, but does not
provide access to a
distribution system
Access-Point Architecture:
 Device that contains
IEEE802.11 conformant
MAC and PHY interface to
the wireless medium, and
provide access to a
distribution system for
associated stations
 Implemented in infra-
structure products that
connect to wired backbones
General terminologies
BSS (basic service set):
Group of stations that communicate each other
IBSS(independent basic service set):
It is a BSS without access point
Extended Service Set (ESS):
A set of one or more Basic Service Sets inter
connected by a distribution System (DS)
BSS IBSS
General terminologies cntd
Service Set Identifier (SSID):
It is network name similar to domain id
One network (ESS or IBSS) has one SSID
Basic Service Set Identifier (BSSID)
It is cell identifier and is 6 octets long
Similar to NW ID in pre-IEEE Wave LAN systems
Frame format
Bytes 2 22 6 6
6
66 2 6 0-
2312
4
Frame control Durati
on ID
A1 A2 A3 seq.ctr
l
A4 Frame
body
CRC
802.11 MAC header
Bits :2
2 2 4 1 1 1 1 1 1 1
Protocol
version
type Sub
type
To DS From
DS
More
flag
Retry Pwr
Mgt
More
data
wep rsvd
Frame control Field
protocols
802.11 legacy
Release in Jun 1997
Original version of 802.11
Specifies two net bit rate 1or 2 mbits per sec
It has forward error correction code
Three alternatives physical layer
Diffuse infrared
Frequency hopping spread spectrum
Direct sequence spread spectrum
802.11a(ofdm waveform)
Release in sep 1999
Data rates 1.5 to 54 mbit/s
First widely accepted 802 family
Operates at 5GHz frequency band
Less range
802.11b
Release on the market in 2000
Maximum raw data rate of 11mbit/s
High throughput
Low cost
Interference problem
802.11g
Release on june 2003
Operates in the 2.4 GHz band
Uses OFDM based transmission scheme
Operates at the average bit rate of 22 Mbit/s or
maximum 54 Mbit/s
Its hardware are full back compatible with
802.11b hardware
802.11n
Release on October 2009
It is the improvement over previous 802.11
standard
It has MIMO antennas
Operates at the 2.4 GHz or less than 5GHz
bands
Data rates from 54 Mbit/s to 600 Mbit/s
802.11ac
Release in December 2013
It is an amendment to IEEE 802.11
It has wider channels(80 or 160 MHz)
Operates at 5GHz band
It supports multi-user MIMO
Data rates up to 1300 Mbit/s
802.11ad
Release in Dec 2012
It defines new physical layer for 802.11 n/w
Operates in the 60GHz millimeter wave
spectrum
Product implementing this standard are being
brought under the name of wigig brand
Peak transmission rate 7 Gbit/s
Other Protocols
802.11 AH
Estimated to release 2016
Bandwidth 900MHz
802.11 AJ
 Estimated to release 2016
Bandwidth 24/60
802.11 AX
Estimated to release 2019
Bandwidth 2.4/5
802.11 Media Access Control
 The 802.11 MAC layer provides functionality to allow reliable data
delivery for the upper layers over the wireless PHY media.
 The data delivery itself is based on an asynchronous, best-effort,
connectionless delivery of MAC layer data.
 There is no guarantee that the frames will be delivered successfully.
 The 802.11 MAC provides a controlled access method to the shared
wireless media called Carrier-Sense Multiple Access with Collision
Avoidance (CSMA/CA).
 CSMA/CA is similar to the collision detection access method
deployed by 802.3 Ethernet LANs.
802.11 Media Access Control cntd
Another function of the 802.11 MAC is to
protect the data being delivered by providing
security and privacy services.
 Security is provided by the authentication
services and by Wireless Equivalent Privacy
(WEP), which is an encryption service for data
delivered on the WLAN.
Security
For security 802.11 specifies two
Authentication modes:
OSA(Opens Systems Authentication)
• Device that request to access the network is granted
without any security check
Shared Key Authentication
• Device that request to access the network is granted
with security check
• WEP: wired equivalent privacy
ESSID offers casual separation of traffic
THANK YOU

Contenu connexe

Tendances

Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsTarek Nader
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 

Tendances (20)

WLAN
WLANWLAN
WLAN
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Ethernet
EthernetEthernet
Ethernet
 
WLAN
WLANWLAN
WLAN
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systems
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 

En vedette

Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treeoneous
 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional wavesRick Turner
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmissionAnuj Rajput
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 

En vedette (20)

Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning tree
 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional waves
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 

Similaire à wireless network IEEE 802.11 (20)

Seminar
SeminarSeminar
Seminar
 
802 standerd
802 standerd802 standerd
802 standerd
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
wifi network
wifi networkwifi network
wifi network
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 
802.11 mac
802.11 mac802.11 mac
802.11 mac
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
8 wlans
8 wlans8 wlans
8 wlans
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Lect4
Lect4Lect4
Lect4
 
Lect4
Lect4Lect4
Lect4
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Darsh
DarshDarsh
Darsh
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 

Dernier

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Dernier (20)

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

wireless network IEEE 802.11

  • 2. Slides Includes Introduction Physical Layer Architecture Frame format Different Protocols Media Access Control (MAC)
  • 3. Introduction  Created and maintained by IEEE  Set of media control(MAC) and physical layer  Used to implement wireless local area network(WLAN)  In the frequency band 2.4,3.6,5 and 60 GHz  Wi-fi refers to the IEEE 802.11 communication for WLAN The Linksys WRT54G contains a router with an 802.11b/g radio and two antennas
  • 4. Introduction cntd. Adopted in 1997 Family of 802 Origins in a 1985 ruling by the U.S. Federal Communications commission Consist of series of half duplex over the air modulation Uses same basic protocols It uses two spread spectrum technology Frequency Hopping Spread Spectrum (FHSS)  Direct Sequence Spread Spectrum (DSSS)
  • 5. 802.11 Physical Layer (PHY) The 802.11 physical layer (PHY) is the interface between the MAC and the wireless media where frames are transmitted and received.  The PHY provides three functions.  First, the PHY provides an interface to exchange frames with the upper MAC layer for transmission and reception of data. Secondly, the PHY uses signal carrier and spread spectrum modulation to transmit data frames over the media.  Thirdly, the PHY provides a carrier sense indication back to the MAC to verify activity on the media.
  • 6. Architectures Station (STA) Architecture:  It contains IEEE 802.11 conformant MAC and PHY interface to the wireless medium, but does not provide access to a distribution system Access-Point Architecture:  Device that contains IEEE802.11 conformant MAC and PHY interface to the wireless medium, and provide access to a distribution system for associated stations  Implemented in infra- structure products that connect to wired backbones
  • 7. General terminologies BSS (basic service set): Group of stations that communicate each other IBSS(independent basic service set): It is a BSS without access point Extended Service Set (ESS): A set of one or more Basic Service Sets inter connected by a distribution System (DS)
  • 9. General terminologies cntd Service Set Identifier (SSID): It is network name similar to domain id One network (ESS or IBSS) has one SSID Basic Service Set Identifier (BSSID) It is cell identifier and is 6 octets long Similar to NW ID in pre-IEEE Wave LAN systems
  • 10. Frame format Bytes 2 22 6 6 6 66 2 6 0- 2312 4 Frame control Durati on ID A1 A2 A3 seq.ctr l A4 Frame body CRC 802.11 MAC header Bits :2 2 2 4 1 1 1 1 1 1 1 Protocol version type Sub type To DS From DS More flag Retry Pwr Mgt More data wep rsvd Frame control Field
  • 11. protocols 802.11 legacy Release in Jun 1997 Original version of 802.11 Specifies two net bit rate 1or 2 mbits per sec It has forward error correction code Three alternatives physical layer Diffuse infrared Frequency hopping spread spectrum Direct sequence spread spectrum
  • 12. 802.11a(ofdm waveform) Release in sep 1999 Data rates 1.5 to 54 mbit/s First widely accepted 802 family Operates at 5GHz frequency band Less range
  • 13. 802.11b Release on the market in 2000 Maximum raw data rate of 11mbit/s High throughput Low cost Interference problem
  • 14. 802.11g Release on june 2003 Operates in the 2.4 GHz band Uses OFDM based transmission scheme Operates at the average bit rate of 22 Mbit/s or maximum 54 Mbit/s Its hardware are full back compatible with 802.11b hardware
  • 15. 802.11n Release on October 2009 It is the improvement over previous 802.11 standard It has MIMO antennas Operates at the 2.4 GHz or less than 5GHz bands Data rates from 54 Mbit/s to 600 Mbit/s
  • 16. 802.11ac Release in December 2013 It is an amendment to IEEE 802.11 It has wider channels(80 or 160 MHz) Operates at 5GHz band It supports multi-user MIMO Data rates up to 1300 Mbit/s
  • 17. 802.11ad Release in Dec 2012 It defines new physical layer for 802.11 n/w Operates in the 60GHz millimeter wave spectrum Product implementing this standard are being brought under the name of wigig brand Peak transmission rate 7 Gbit/s
  • 18. Other Protocols 802.11 AH Estimated to release 2016 Bandwidth 900MHz 802.11 AJ  Estimated to release 2016 Bandwidth 24/60 802.11 AX Estimated to release 2019 Bandwidth 2.4/5
  • 19. 802.11 Media Access Control  The 802.11 MAC layer provides functionality to allow reliable data delivery for the upper layers over the wireless PHY media.  The data delivery itself is based on an asynchronous, best-effort, connectionless delivery of MAC layer data.  There is no guarantee that the frames will be delivered successfully.  The 802.11 MAC provides a controlled access method to the shared wireless media called Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA).  CSMA/CA is similar to the collision detection access method deployed by 802.3 Ethernet LANs.
  • 20. 802.11 Media Access Control cntd Another function of the 802.11 MAC is to protect the data being delivered by providing security and privacy services.  Security is provided by the authentication services and by Wireless Equivalent Privacy (WEP), which is an encryption service for data delivered on the WLAN.
  • 21. Security For security 802.11 specifies two Authentication modes: OSA(Opens Systems Authentication) • Device that request to access the network is granted without any security check Shared Key Authentication • Device that request to access the network is granted with security check • WEP: wired equivalent privacy ESSID offers casual separation of traffic