SlideShare una empresa de Scribd logo
1 de 7
TELE COMMUNICATIONS
Assignment Topic:
IEEE 802.11 Architecture
Assignment Submitted To:
Miss Anila Majeed
Assignment Submitted By:
Shefa Idrees (101631049)
Assignment Submission Date:
20-May-2019
Post Graduate College for Women, Samnabad Lahore
IEEE 802.11 Architecture
What is IEEE 802.11?
In 1990, IEEE 802 Committee formed a new working group, IEEE 802.11, specifically devoted
to wireless LANs, with a charter to develop a MAC protocol and physical medium
specification.
WLANs
Wireless LANs are those Local Area Networks which use high frequency radio waves instead
of cables for connecting the devices in LAN. Users connected by WLANs can move around
within the area of network coverage. Most WLANs are based upon the standard IEEE 802.11
or WIFI.
The Architecture of IEEE 802.11
The IEEE 802.11 architecture consists of several components. These components interact to
provide a wireless LAN that supports station mobility transparently to the upper layers.
They include:
 STA - Station
 AP - Access Point
 BSS - Basic Service Set
 IBSS- Independent BSS
 ESS - Extended Service Set
 A set of Infrastructure BSSs.
 Connection of APs
 Tracking of mobility
 DS - Distribution System
 AP communicates with another
802.11Architecture
ESS
 WLAN is based on cellular architecture.
 Stations (STAs) comprise all the devices and equipment which are connected to the
WLAN. A station can be of two types:
o Wireless Access Points (WAP): WAPs or simply Access Points (AP) are
generally wireless routers which form the Base Stations or Access.
o Client: Clients are workstations, computers, laptops, printers, smartphones, etc.
 Basic Service Set (BSS) is a group of stations communicating at Physical Layer level.
BSS can be of two categories depending upon the mode of operation:
o Infrastructure BSS: Here, the devices communicate with other devices
through Access Points.
o Independent BSS (IBSS): Mobile Station (MS) in BSS with no connection to
other BSSs form IBSS. Here, the devices communicate in peer-to-peer basis in
an ad-hoc manner.
 Each cell/Basic Service Set (BSS) is controlled by a base station/Access Point (AP).
 Access Points are connected with backbone called Distribution System (DS).
 The whole interconnected WLAN through DS form Extended Service Set (ESS).
 AP functions as a bridge and a relay point.
 In BSS, MS communicate through the AP
 IBSS is since an ad hoc network, where station communicate directly.
 To integrate 802.11 with 802.2 (Wired LAN), a portal is used.
 Portal is a device such as bridge or router attached to DS.
IEEE LAN Standards
Layer 1 Physical Layer
Limitations:
 Cannot organize streams of bits.
 Cannot name or identify computers.
 Cannot communicate with the upper-level layers.
 Cannot decide which computer will transmit binary data.
Layer 2 Data Link Layer
Uses:
 Framing to organize or group the data bits.
 An addressing process to identify computers called flat addressing convention.
 Logical Link Control (LLC) to communicate with the upper-level layers.
 Media Access Control (MAC) to decide which computer will transmit binary data, from
a group in which all computers are trying to transmit at the same time.
Purpose of Sub-layers
 LLC or Logical Link Control serves to communicate upward to Network layer,
independent of the specific LAN technology used and Upper layer.
 MAC or Media Access Control serves to access and communicate downward to the
technology-specific Physical layer.
MAC Addressing
 Every computer has a unique way of identifying itself via MAC address or physical address.
 The physical address is located on the Network Interface Card (NIC).
 MAC addresses have no structure, and are considered flat address spaces.
 MAC addresses are sometimes referred to as burned-in addresses (BIAs) because they are
burned into read-only memory (ROM) and are copied into random-access memory (RAM)
when the NIC initializes.
MAC Frame Format
The IEEE 802.11 MAC accepts MSDUs (MAC Service Data Unit) from higher layers in the protocol
stack for the purpose of reliably sending those MSDUs to the equivalent layer of the protocol stack in
another station.
 MAC adds information to the MSDU in the form of headers & trailers to create an MPDU
(MAC Protocol Data Unit).
 MPDU is then passed on to the physical layer to be sent over the wireless medium to the other
station.
 MAC may fragment MSDUs into several frames.
 The maximum size of a MAC frame is 2048 octets.
Frame Fields
 Frame Control: Indicates the type of frame provides control information. Control
information includes whether the frame is to or from a DS and privacy information.
 Duration/ID: If used as a duration field, indicates the time (in microseconds) the
channel will be allocated for successful transmission of a MAC frame.
 Address 1: MAC address of wireless host or AP to receive this frame.
 Address 2: MAC address of wireless host or AP transmitting this frame.
 Address 3: MAC address of router interface to which AP is attached.
 Address 4: Used only in ad hoc mode.
 Sequence Control: Sequence number used to number frames sent between a given
transmitter and receiver.
 Frame Body or Payload: Contains the message.
 CRC: The last field contains error detection information.
MAC Modes
The 802.11 MAC protocol designed with two modes of communication
 Distributed Coordination Function (DCF)
The basic 802.11 MAC layer uses the Distributed Coordination Function (DCF) to share the
medium between multiple stations, based on Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA)
o All stations are equal
o "Listen before talk”
o Station waits for quiet period on network
o Begins to transmit data
o Detects possible collisions
 Point Coordination Function (PCF)
This is available only in "infrastructure" mode, where stations are connected to the network
through an Access Point (AP). This mode is optional, and only very few APs or Wi-Fi adapters
actually implement.
PCF defines two periods:
o The Contention Free Period (CFP) - In the CP, DCF is used.
o The Contention Period (CP) - In the CFP, the AP sends Contention-Free-Poll
packets to each station, one at a time, to give them the right to send a packet.
The AP is the coordinator.
LLC Services
The services of Logical Link Control (LLC) include:
 Unacknowledged connectionless service
o No flow- and error-control mechanisms
o Data delivery not guaranteed
 Connection-mode service
o Logical connection set up between two users
o Flow- and error-control provided
 Acknowledged connectionless service
o Cross between previous two
o Datagrams acknowledged
o No prior logical setup
LLC Operations
Type 1 Operation: Type 1 operation supports unacknowledged connectionless service. There
is no acknowledgment, flow control, or error control.
Type 2 Operation: Type 2 operation supports connection-mode service, using mechanisms
similar to HDLC.
Type 3 Operation: Type 3 operation supports acknowledged connectionless service. Each
transmitted PDU is acknowledged using a stop-and-wait technique.

Más contenido relacionado

La actualidad más candente

Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
Viku1985
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
hemant Hrhemant5
 

La actualidad más candente (20)

Computer Network
Computer NetworkComputer Network
Computer Network
 
Network technology ppt
Network technology pptNetwork technology ppt
Network technology ppt
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Lan man wan
Lan man wanLan man wan
Lan man wan
 
Types of-networks
Types of-networksTypes of-networks
Types of-networks
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer Networks
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...
 
Computer network
Computer networkComputer network
Computer network
 
lan
 lan lan
lan
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Computer network
Computer networkComputer network
Computer network
 
Computer Networks and Its Types
Computer Networks and Its TypesComputer Networks and Its Types
Computer Networks and Its Types
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 

Similar a Tele Communications - IEEE 802.11

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
fherjaramillo
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
Ashish Khare
 

Similar a Tele Communications - IEEE 802.11 (20)

Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 
WLAN
WLANWLAN
WLAN
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
LAN
LANLAN
LAN
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
Lect4
Lect4Lect4
Lect4
 
Lect4
Lect4Lect4
Lect4
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Advanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteAdvanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture note
 
Ethernet
EthernetEthernet
Ethernet
 

Más de Shefa Idrees

Pakistan Foreign Policy...Its objectives and Principles
Pakistan Foreign Policy...Its objectives and PrinciplesPakistan Foreign Policy...Its objectives and Principles
Pakistan Foreign Policy...Its objectives and Principles
Shefa Idrees
 

Más de Shefa Idrees (20)

Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsData Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
 
Interrupts in CPU
Interrupts in CPUInterrupts in CPU
Interrupts in CPU
 
Relational Algebra Operations
Relational Algebra OperationsRelational Algebra Operations
Relational Algebra Operations
 
Query trees
Query treesQuery trees
Query trees
 
Description of everything necessary for startup
Description of everything necessary for startupDescription of everything necessary for startup
Description of everything necessary for startup
 
Presentation Skills
Presentation SkillsPresentation Skills
Presentation Skills
 
File Handling in Assembly Prezi slides
File Handling in Assembly Prezi slidesFile Handling in Assembly Prezi slides
File Handling in Assembly Prezi slides
 
Paragraph Types and Ways to Write Them
Paragraph Types and Ways to Write ThemParagraph Types and Ways to Write Them
Paragraph Types and Ways to Write Them
 
Memo Writing
Memo WritingMemo Writing
Memo Writing
 
Cover letters
Cover lettersCover letters
Cover letters
 
Pakistan Foreign Policy...Its objectives and Principles
Pakistan Foreign Policy...Its objectives and PrinciplesPakistan Foreign Policy...Its objectives and Principles
Pakistan Foreign Policy...Its objectives and Principles
 
The constitution of pakistan
The constitution of pakistanThe constitution of pakistan
The constitution of pakistan
 
Report & its types
Report & its typesReport & its types
Report & its types
 
Project proposal
Project proposalProject proposal
Project proposal
 
Model abstract
Model abstractModel abstract
Model abstract
 
Importance & Significance of Islamic Civilization
Importance & Significance of Islamic CivilizationImportance & Significance of Islamic Civilization
Importance & Significance of Islamic Civilization
 
Significance & Importance of Studying the Life of Holy Prophet (S.A.W)
Significance & Importance of Studying the Life of Holy Prophet (S.A.W)Significance & Importance of Studying the Life of Holy Prophet (S.A.W)
Significance & Importance of Studying the Life of Holy Prophet (S.A.W)
 
The Complete Diode Model
The Complete Diode ModelThe Complete Diode Model
The Complete Diode Model
 
Digital Logic & Design
Digital Logic & DesignDigital Logic & Design
Digital Logic & Design
 
Table of Contents
Table of ContentsTable of Contents
Table of Contents
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Tele Communications - IEEE 802.11

  • 1. TELE COMMUNICATIONS Assignment Topic: IEEE 802.11 Architecture Assignment Submitted To: Miss Anila Majeed Assignment Submitted By: Shefa Idrees (101631049) Assignment Submission Date: 20-May-2019 Post Graduate College for Women, Samnabad Lahore
  • 2. IEEE 802.11 Architecture What is IEEE 802.11? In 1990, IEEE 802 Committee formed a new working group, IEEE 802.11, specifically devoted to wireless LANs, with a charter to develop a MAC protocol and physical medium specification. WLANs Wireless LANs are those Local Area Networks which use high frequency radio waves instead of cables for connecting the devices in LAN. Users connected by WLANs can move around within the area of network coverage. Most WLANs are based upon the standard IEEE 802.11 or WIFI. The Architecture of IEEE 802.11 The IEEE 802.11 architecture consists of several components. These components interact to provide a wireless LAN that supports station mobility transparently to the upper layers. They include:  STA - Station  AP - Access Point  BSS - Basic Service Set  IBSS- Independent BSS  ESS - Extended Service Set  A set of Infrastructure BSSs.  Connection of APs  Tracking of mobility  DS - Distribution System  AP communicates with another 802.11Architecture
  • 3. ESS  WLAN is based on cellular architecture.  Stations (STAs) comprise all the devices and equipment which are connected to the WLAN. A station can be of two types: o Wireless Access Points (WAP): WAPs or simply Access Points (AP) are generally wireless routers which form the Base Stations or Access. o Client: Clients are workstations, computers, laptops, printers, smartphones, etc.  Basic Service Set (BSS) is a group of stations communicating at Physical Layer level. BSS can be of two categories depending upon the mode of operation: o Infrastructure BSS: Here, the devices communicate with other devices through Access Points. o Independent BSS (IBSS): Mobile Station (MS) in BSS with no connection to other BSSs form IBSS. Here, the devices communicate in peer-to-peer basis in an ad-hoc manner.  Each cell/Basic Service Set (BSS) is controlled by a base station/Access Point (AP).  Access Points are connected with backbone called Distribution System (DS).  The whole interconnected WLAN through DS form Extended Service Set (ESS).  AP functions as a bridge and a relay point.  In BSS, MS communicate through the AP  IBSS is since an ad hoc network, where station communicate directly.  To integrate 802.11 with 802.2 (Wired LAN), a portal is used.  Portal is a device such as bridge or router attached to DS.
  • 4. IEEE LAN Standards Layer 1 Physical Layer Limitations:  Cannot organize streams of bits.  Cannot name or identify computers.  Cannot communicate with the upper-level layers.  Cannot decide which computer will transmit binary data. Layer 2 Data Link Layer Uses:  Framing to organize or group the data bits.  An addressing process to identify computers called flat addressing convention.  Logical Link Control (LLC) to communicate with the upper-level layers.  Media Access Control (MAC) to decide which computer will transmit binary data, from a group in which all computers are trying to transmit at the same time. Purpose of Sub-layers  LLC or Logical Link Control serves to communicate upward to Network layer, independent of the specific LAN technology used and Upper layer.  MAC or Media Access Control serves to access and communicate downward to the technology-specific Physical layer.
  • 5. MAC Addressing  Every computer has a unique way of identifying itself via MAC address or physical address.  The physical address is located on the Network Interface Card (NIC).  MAC addresses have no structure, and are considered flat address spaces.  MAC addresses are sometimes referred to as burned-in addresses (BIAs) because they are burned into read-only memory (ROM) and are copied into random-access memory (RAM) when the NIC initializes. MAC Frame Format The IEEE 802.11 MAC accepts MSDUs (MAC Service Data Unit) from higher layers in the protocol stack for the purpose of reliably sending those MSDUs to the equivalent layer of the protocol stack in another station.  MAC adds information to the MSDU in the form of headers & trailers to create an MPDU (MAC Protocol Data Unit).  MPDU is then passed on to the physical layer to be sent over the wireless medium to the other station.  MAC may fragment MSDUs into several frames.  The maximum size of a MAC frame is 2048 octets. Frame Fields  Frame Control: Indicates the type of frame provides control information. Control information includes whether the frame is to or from a DS and privacy information.  Duration/ID: If used as a duration field, indicates the time (in microseconds) the channel will be allocated for successful transmission of a MAC frame.  Address 1: MAC address of wireless host or AP to receive this frame.  Address 2: MAC address of wireless host or AP transmitting this frame.  Address 3: MAC address of router interface to which AP is attached.  Address 4: Used only in ad hoc mode.  Sequence Control: Sequence number used to number frames sent between a given transmitter and receiver.  Frame Body or Payload: Contains the message.  CRC: The last field contains error detection information.
  • 6. MAC Modes The 802.11 MAC protocol designed with two modes of communication  Distributed Coordination Function (DCF) The basic 802.11 MAC layer uses the Distributed Coordination Function (DCF) to share the medium between multiple stations, based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) o All stations are equal o "Listen before talk” o Station waits for quiet period on network o Begins to transmit data o Detects possible collisions  Point Coordination Function (PCF) This is available only in "infrastructure" mode, where stations are connected to the network through an Access Point (AP). This mode is optional, and only very few APs or Wi-Fi adapters actually implement. PCF defines two periods: o The Contention Free Period (CFP) - In the CP, DCF is used. o The Contention Period (CP) - In the CFP, the AP sends Contention-Free-Poll packets to each station, one at a time, to give them the right to send a packet. The AP is the coordinator.
  • 7. LLC Services The services of Logical Link Control (LLC) include:  Unacknowledged connectionless service o No flow- and error-control mechanisms o Data delivery not guaranteed  Connection-mode service o Logical connection set up between two users o Flow- and error-control provided  Acknowledged connectionless service o Cross between previous two o Datagrams acknowledged o No prior logical setup LLC Operations Type 1 Operation: Type 1 operation supports unacknowledged connectionless service. There is no acknowledgment, flow control, or error control. Type 2 Operation: Type 2 operation supports connection-mode service, using mechanisms similar to HDLC. Type 3 Operation: Type 3 operation supports acknowledged connectionless service. Each transmitted PDU is acknowledged using a stop-and-wait technique.