SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
WLAN – IEEE 802.11
IEEE 802.11




802.11 standard only covers the physical layer PHY
and medium access layer MAC.
PHY divided into two sublayers :−
−





Physical layer convergence protocol (PLCP)
Physical medium dependent (PMD)

PLCP – it provides a carrier sense signal called
clear channel assessment (CCA), and provides a
common PHY service access point (SAP).
PMD – handles modulation and encoding
/decoding of signals.
Cont..


MAC – support the association and re-association
of a station to an access point and roaming between
different access point ,control
authentication,encryption, synchronization and
power management.
PHY Layer


802.11 supports three versions of PHY layer
−

FHSS – Frequency hopping spread spectrum

−

DSSS – Direct sequence spread spectrum

−

Infra red

[Spread Spectrum-techniques involve spreading the bandwidth
needed to transmit data.]
FHSS Frame Structure











Synchronization – 80 bit SYN (010101....), used to
SYN potential receiver.
Start frame delimiter (SFD) – indicate the start of
frame.
PLCP_PDU length word (PLW) – length of payload
PLCP Signalling field (PSF) – indicate data rate of
payload 0000 – 1Mbits/sec, granularity 500 Kbits/sec.
Header error check (HEC) – 16 bit checksum
DSSS Frame Structure


Self Study
MAC Layer


Three basic access mechanisms have been
defined for IEEE 802.11:(based on
CSMA/CA,RTS/CTS and polling) :−

First two method summarized as distributed
coordination function (DCF).


−

offers ASYN service and not require any access point
to control.

Third, point coordination function (PCF).


offers both ASYN and time-bounded service but need
an access point to control medium access.
Medium Access and Inter-frame Spacing







Short inter-frame spacing (SIFS) – shortest waiting
for medium access (highest priority) ex. Control msg.
PCF inter-frame spacing (PIFS) – used for time
bounded services.
DCF inter-frame spacing (DCF) – longest waiting
time and has the lowest priority for medium access.

[Contention – duration in which several nodes try to access
the medium]
Access Mechanism




DFWMAC-DCF using access mechanism
based on CSMA/CA.
Based on random access scheme with
carrier sense and collision avoidance
through random backoff.
Basic DFWMAC-DCF example
DFWMAC-DCF with RTS/CTS




In this,after waiting for DIFS + backoff time , the sender can issue a request
to send(RTS).
RTS will have same priority , it includes the recevier of the data transmission
and whole duration (data frame + ACK).



Other nodes receive this RTS will set its NAV(net allocation vector).



Receiver will answer RTS with CTS message after waiting for SIFS.



This CTS will also include duration of transmission
DFWMAC-PCF with polling



PCF- Point Coordination Function
It requires an access point that controls
medium access and polls the single nodes.
MAC frames



Frame control – serve
several purposes.











Duration/ID – indicating the
period of time in which the
medium is occupied, used to
set the NAV.
Address 1 to 4 – four
address fields contain
standard IEEE 802 MAC
addresses (48 bits each),
meaning of each address is
depend upon the DS bits.
Sequence control – seq.
no used to filter duplicates.











Protocol version – current protocol
version.
Type – function of frame : management
(00), control (01), or data (10) and value
(11) is reserved.
Subtype – subtype for management
frame: (0000) for association req. ,
(1000) beacon , RTS (1011), CTS
(1100).
More fragments – 1 more frag.
Present.
Retry – if retransmission set to 1.
Power Management – set to 1 then
power saver mode.
More data – indicate more data is
present between access point and
station nodes.
Interpretation of MAC addresses









Ad-hoc network – exchange of MAC frame between two
wireless nodes without a distribution system.
Infrastructure network(from AP) – frame physically
originates from an access point.
Infrastructure network (to AP) – station sends a packet to
another station via the access point.
Infrastructure network (within DS) – packet transmitted
between two access points.
BSSID – basic service set ID , DA – destination address , SA – source
address,RA – receiver address , TA – transmitter address.
MAC Management
Perform following tasks:







SYN – finding a wireless LAN, SYN of internal clock,
generation of becon signals.
Power Management – to control, transmitter activity
for power management (periodic sleep,buffering,
without missing a frame).
Roaming – joining a network,changing of access
points,scanning for access points.
Management information base(MIB) – parameters
representing the current state, can be accessed via
standardized protocol : simple network management
protocol (SNMP).
SYN










To SYN clocks of all nodes , timing
synchronization function (TSF).
Within a BSS, timing is conveyed by the
periodic transmissions of a beacon frame.
Beacon contains a timestamp and other
management information used for power
management and roaming.
Transmission of a beacon frame is not always
periodic as it deferred if the medium is busy.
In infra-based network , AP performs SYN by
transmitting the periodic beacon signal.
SYN example





Beacon intervals are not shifted if one beacon is
delayed.
Timestamp of beacon always reflects the real
transmit time, not the scheduled time.
Power Management






Wireless devices are battery powered , i.e power
saving mechanisms are crucial.
Basic idea of power management is to switch off the
transceiver whenever it is not needed.
PM is simple for sending device, but PM for receiver
can't known is advance.



Receiver “walk up” the transceiver periodically.



Power saving includes two states for a station:

Sleep and awake



Buffering of data in sender.
Power Management (Cont.)










Sender communicate with power saving station then
it has to buffer data.
If a station detects that it is a destination of a
buffered packet it has to stay awake until the
transmission takes place.
Walk up at right moment require the timing
synchronization function(TSF).
Power management in infra-based network is
simpler.
Beacon sent by the access point, a traffic indicating
map(TIM) is transmitted.
Power Management example

DTIM – delivery traffic indication map
Power Management in Ad-hoc
Self Study
Roaming


Moving between AP is called roaming.

Steps are as follows :

Check current link quality and scanning for another AP.



Scanning involves the active search for another BSS.
–

Passive scanning means listening into the medium to find
other n/w. i.e receiving beacon msg.

–

Active scanning means also sending a probe

–

and , beacon and prob responses used to join the new BSS



Select the best AP and send association request.



New BSS response the association request
IEEE 802.11b & 802.11a
Self Study
HIPERLAN






HIPERLAN – High Performance Local Area
Network
ETSI (European Telecommunication Standard
Institute) standardized HIPERLAN
HIPERLAN is a WLAN allowing for node
mobility and supporting ad-hoc and
infrastructure-based topologies.
Bluetooth


In 1998 five companies
(Ericsson,Intel,IBM,Nokia,Toshiba) founded
the Bluetooth consortium with the goal of
developing a single-chip,low-cost,radio-based
wireless network technology.
Bluetooth Architecture



Networking
Protocol Stack
Bluetooth Architecture (Networking)








It operate on 79 channels in the 2.4 GHz
band with 1 MHz carrier spacing.
Each device perform frequency hopping
with 1600 hops/s in a random fashion.
Piconet – it is a collection of Bluetooth device
which are SYN to the same hopping
sequence.
Piconet is a collection of devices with different
roles.
Cont.
















One device in piconet is master (M)
All other device connected to the
master are act as a slaves(S).
Two additional devices : parket
devices (P) and stand-by (SB)
P – known but they do not have
connection.
SB – do not participated in the
piconet.
M determine the hopping pattern in
the piconet
Slaves have to SYN to this pattern.
Each piconet has one master and
exctly 7 simultaneous slaves.
Formation of Piconet












As all devices use a same hopping
sequence they must be SYN.
Step 1 Master sending its clock
and device ID .
Step 2 hopping pattern is
determined by the device ID , a 48bit worldwide unique identifier.
Step 3 slaves adjust their internal
clock according to the master and
participated in the piconet.
All active devices are assigned a
3-bit active member address
(AMA).
All parket devices use an 8-bit
parket member address(PMA).
Formation of Scatternet






Groups of piconet called
scatternet.
Many piconet with
overlapping coverage can
form scatternet.
If a device wants to
participate in more then
one piconet, then it has to
SYN to the hopping seq. of
the piconet it wants to take
part in.
Bluetooth (Protocol Stack)


Protocol stack can be divided into two parts





Core specification
Profile specification

Core specification comprise following elements:

Radio



Baseband



Link Manager Protocol





Logical Link Control and adaptation
protocol (L2CAP)
Service discovery protocol
Bluetooth:Protocol
Stack:Core:Radio










It specifies the air interface i.e frequencies,
modulation and transmit power.
Bluetooth uses the license-free frequency
band at 2.4 GHz.
A frequency hopping/time-division duplex
scheme is used for transmission, with a fast
hopping rate of 1600 hops/sec.
A time interval between two hops is 625
mico sec.
Each slot uses different frequency
Bluetooth:Protocol
Stack:Core:Baseband



It manages frequncy hopping ,medium access and also defines the
packet format.



It defines 1-slot, 3-slot and 5 slot for higher data rates.



No frequency hopping is performed within packets.



In above example the master or one out of seven slaves may transmit data
in an alternative fashion.
Bluetooth:Protocol
Stack:Core:Baseband (Cont..)



Components of a bluetooth packet at baseband layer, packet
contains following three fields :





Access code– used for timing SYN and piconet
identification.
Packet header – used for addess, packet type , flow
and error control and checksum.The three bit active
member address (AMA) represent the active address
of the slave.
Payload – up to 343 bytes payload can be
transferred.
Bluetooth:Protocol
Stack:Core:Physical Link


It offers two different types of links:

Synchronous connection-oriented link(SCO)






For this master reserve two consecutive slots
(forward and return slots) at fixed intervals
Master can support upto three simultaneous
SCO links to the same slave or to different
slaves.

Asynchronous connectionless link(ACL)




Data applications , point-to-multipoint
transfer scenarios
Only one ACL links can exist between a master
and slave.
Bluetooth:Example data
transmission







Master always uses the even number of frequency slots ,
odds slots are for the slaves
Every sixth slot is used for an SCO link
ACL link use single or multiple slots providing asymmetric
bandwith
THANK YOU

Más contenido relacionado

La actualidad más candente (20)

IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Wireless channels
Wireless channels Wireless channels
Wireless channels
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Medium
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Magic tee
Magic tee  Magic tee
Magic tee
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Ch17
Ch17Ch17
Ch17
 
Chapter#9
Chapter#9Chapter#9
Chapter#9
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
Mobile Radio Propagations
Mobile Radio PropagationsMobile Radio Propagations
Mobile Radio Propagations
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 

Destacado

802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeEfiong Etuk
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 

Destacado (12)

Lan architecture
Lan architectureLan architecture
Lan architecture
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your Life
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 

Similar a WLAN - IEEE 802.11

FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)Anup Bista
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Laniamtheone90
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
The osi model layers
The osi model layersThe osi model layers
The osi model layersINFitunes
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdfarkurkuri
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 

Similar a WLAN - IEEE 802.11 (20)

WLAN
WLANWLAN
WLAN
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Mac 802.11
Mac 802.11Mac 802.11
Mac 802.11
 
RK-4 Signaling System.ppt
RK-4 Signaling System.pptRK-4 Signaling System.ppt
RK-4 Signaling System.ppt
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 

Más de Rahul Hada

Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical SystemRahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering IntroductionRahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using JavaRahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installationRahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud ComputingRahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell ProgrammingRahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobilityRahul Hada
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Quality planning
Quality planningQuality planning
Quality planningRahul Hada
 

Más de Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Último

Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 

Último (20)

Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 

WLAN - IEEE 802.11

  • 1. WLAN – IEEE 802.11
  • 2. IEEE 802.11   802.11 standard only covers the physical layer PHY and medium access layer MAC. PHY divided into two sublayers :− −   Physical layer convergence protocol (PLCP) Physical medium dependent (PMD) PLCP – it provides a carrier sense signal called clear channel assessment (CCA), and provides a common PHY service access point (SAP). PMD – handles modulation and encoding /decoding of signals.
  • 3. Cont..  MAC – support the association and re-association of a station to an access point and roaming between different access point ,control authentication,encryption, synchronization and power management.
  • 4. PHY Layer  802.11 supports three versions of PHY layer − FHSS – Frequency hopping spread spectrum − DSSS – Direct sequence spread spectrum − Infra red [Spread Spectrum-techniques involve spreading the bandwidth needed to transmit data.]
  • 5. FHSS Frame Structure      Synchronization – 80 bit SYN (010101....), used to SYN potential receiver. Start frame delimiter (SFD) – indicate the start of frame. PLCP_PDU length word (PLW) – length of payload PLCP Signalling field (PSF) – indicate data rate of payload 0000 – 1Mbits/sec, granularity 500 Kbits/sec. Header error check (HEC) – 16 bit checksum
  • 7. MAC Layer  Three basic access mechanisms have been defined for IEEE 802.11:(based on CSMA/CA,RTS/CTS and polling) :− First two method summarized as distributed coordination function (DCF).  − offers ASYN service and not require any access point to control. Third, point coordination function (PCF).  offers both ASYN and time-bounded service but need an access point to control medium access.
  • 8. Medium Access and Inter-frame Spacing    Short inter-frame spacing (SIFS) – shortest waiting for medium access (highest priority) ex. Control msg. PCF inter-frame spacing (PIFS) – used for time bounded services. DCF inter-frame spacing (DCF) – longest waiting time and has the lowest priority for medium access. [Contention – duration in which several nodes try to access the medium]
  • 9. Access Mechanism   DFWMAC-DCF using access mechanism based on CSMA/CA. Based on random access scheme with carrier sense and collision avoidance through random backoff.
  • 11. DFWMAC-DCF with RTS/CTS   In this,after waiting for DIFS + backoff time , the sender can issue a request to send(RTS). RTS will have same priority , it includes the recevier of the data transmission and whole duration (data frame + ACK).  Other nodes receive this RTS will set its NAV(net allocation vector).  Receiver will answer RTS with CTS message after waiting for SIFS.  This CTS will also include duration of transmission
  • 12. DFWMAC-PCF with polling   PCF- Point Coordination Function It requires an access point that controls medium access and polls the single nodes.
  • 13. MAC frames  Frame control – serve several purposes.      Duration/ID – indicating the period of time in which the medium is occupied, used to set the NAV. Address 1 to 4 – four address fields contain standard IEEE 802 MAC addresses (48 bits each), meaning of each address is depend upon the DS bits. Sequence control – seq. no used to filter duplicates.      Protocol version – current protocol version. Type – function of frame : management (00), control (01), or data (10) and value (11) is reserved. Subtype – subtype for management frame: (0000) for association req. , (1000) beacon , RTS (1011), CTS (1100). More fragments – 1 more frag. Present. Retry – if retransmission set to 1. Power Management – set to 1 then power saver mode. More data – indicate more data is present between access point and station nodes.
  • 14. Interpretation of MAC addresses     Ad-hoc network – exchange of MAC frame between two wireless nodes without a distribution system. Infrastructure network(from AP) – frame physically originates from an access point. Infrastructure network (to AP) – station sends a packet to another station via the access point. Infrastructure network (within DS) – packet transmitted between two access points. BSSID – basic service set ID , DA – destination address , SA – source address,RA – receiver address , TA – transmitter address.
  • 15. MAC Management Perform following tasks:    SYN – finding a wireless LAN, SYN of internal clock, generation of becon signals. Power Management – to control, transmitter activity for power management (periodic sleep,buffering, without missing a frame). Roaming – joining a network,changing of access points,scanning for access points. Management information base(MIB) – parameters representing the current state, can be accessed via standardized protocol : simple network management protocol (SNMP).
  • 16. SYN      To SYN clocks of all nodes , timing synchronization function (TSF). Within a BSS, timing is conveyed by the periodic transmissions of a beacon frame. Beacon contains a timestamp and other management information used for power management and roaming. Transmission of a beacon frame is not always periodic as it deferred if the medium is busy. In infra-based network , AP performs SYN by transmitting the periodic beacon signal.
  • 17. SYN example   Beacon intervals are not shifted if one beacon is delayed. Timestamp of beacon always reflects the real transmit time, not the scheduled time.
  • 18. Power Management    Wireless devices are battery powered , i.e power saving mechanisms are crucial. Basic idea of power management is to switch off the transceiver whenever it is not needed. PM is simple for sending device, but PM for receiver can't known is advance.  Receiver “walk up” the transceiver periodically.  Power saving includes two states for a station: Sleep and awake  Buffering of data in sender.
  • 19. Power Management (Cont.)      Sender communicate with power saving station then it has to buffer data. If a station detects that it is a destination of a buffered packet it has to stay awake until the transmission takes place. Walk up at right moment require the timing synchronization function(TSF). Power management in infra-based network is simpler. Beacon sent by the access point, a traffic indicating map(TIM) is transmitted.
  • 20. Power Management example DTIM – delivery traffic indication map
  • 21. Power Management in Ad-hoc Self Study
  • 22. Roaming  Moving between AP is called roaming. Steps are as follows : Check current link quality and scanning for another AP.  Scanning involves the active search for another BSS. – Passive scanning means listening into the medium to find other n/w. i.e receiving beacon msg. – Active scanning means also sending a probe – and , beacon and prob responses used to join the new BSS  Select the best AP and send association request.  New BSS response the association request
  • 23. IEEE 802.11b & 802.11a Self Study
  • 24. HIPERLAN    HIPERLAN – High Performance Local Area Network ETSI (European Telecommunication Standard Institute) standardized HIPERLAN HIPERLAN is a WLAN allowing for node mobility and supporting ad-hoc and infrastructure-based topologies.
  • 25. Bluetooth  In 1998 five companies (Ericsson,Intel,IBM,Nokia,Toshiba) founded the Bluetooth consortium with the goal of developing a single-chip,low-cost,radio-based wireless network technology.
  • 27. Bluetooth Architecture (Networking)     It operate on 79 channels in the 2.4 GHz band with 1 MHz carrier spacing. Each device perform frequency hopping with 1600 hops/s in a random fashion. Piconet – it is a collection of Bluetooth device which are SYN to the same hopping sequence. Piconet is a collection of devices with different roles.
  • 28. Cont.         One device in piconet is master (M) All other device connected to the master are act as a slaves(S). Two additional devices : parket devices (P) and stand-by (SB) P – known but they do not have connection. SB – do not participated in the piconet. M determine the hopping pattern in the piconet Slaves have to SYN to this pattern. Each piconet has one master and exctly 7 simultaneous slaves.
  • 29. Formation of Piconet       As all devices use a same hopping sequence they must be SYN. Step 1 Master sending its clock and device ID . Step 2 hopping pattern is determined by the device ID , a 48bit worldwide unique identifier. Step 3 slaves adjust their internal clock according to the master and participated in the piconet. All active devices are assigned a 3-bit active member address (AMA). All parket devices use an 8-bit parket member address(PMA).
  • 30. Formation of Scatternet    Groups of piconet called scatternet. Many piconet with overlapping coverage can form scatternet. If a device wants to participate in more then one piconet, then it has to SYN to the hopping seq. of the piconet it wants to take part in.
  • 31. Bluetooth (Protocol Stack)  Protocol stack can be divided into two parts    Core specification Profile specification Core specification comprise following elements: Radio  Baseband  Link Manager Protocol   Logical Link Control and adaptation protocol (L2CAP) Service discovery protocol
  • 32. Bluetooth:Protocol Stack:Core:Radio      It specifies the air interface i.e frequencies, modulation and transmit power. Bluetooth uses the license-free frequency band at 2.4 GHz. A frequency hopping/time-division duplex scheme is used for transmission, with a fast hopping rate of 1600 hops/sec. A time interval between two hops is 625 mico sec. Each slot uses different frequency
  • 33. Bluetooth:Protocol Stack:Core:Baseband  It manages frequncy hopping ,medium access and also defines the packet format.  It defines 1-slot, 3-slot and 5 slot for higher data rates.  No frequency hopping is performed within packets.  In above example the master or one out of seven slaves may transmit data in an alternative fashion.
  • 34. Bluetooth:Protocol Stack:Core:Baseband (Cont..)  Components of a bluetooth packet at baseband layer, packet contains following three fields :   Access code– used for timing SYN and piconet identification. Packet header – used for addess, packet type , flow and error control and checksum.The three bit active member address (AMA) represent the active address of the slave. Payload – up to 343 bytes payload can be transferred.
  • 35. Bluetooth:Protocol Stack:Core:Physical Link  It offers two different types of links: Synchronous connection-oriented link(SCO)    For this master reserve two consecutive slots (forward and return slots) at fixed intervals Master can support upto three simultaneous SCO links to the same slave or to different slaves. Asynchronous connectionless link(ACL)   Data applications , point-to-multipoint transfer scenarios Only one ACL links can exist between a master and slave.
  • 36. Bluetooth:Example data transmission    Master always uses the even number of frequency slots , odds slots are for the slaves Every sixth slot is used for an SCO link ACL link use single or multiple slots providing asymmetric bandwith