SlideShare una empresa de Scribd logo
1 de 46
UNIT 04
4.1 Wireless LANs(IEEE802.11)
Architecture
A wireless LAN (or WLAN, for wireless local area
network) is one in which a mobile user can connect to a
local area network (LAN) through a wireless (radio)
connection
The IEEE 802.11 group of standards specify the
technologies for wireless LANs. 802.11 standards use
the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance) for path
sharing and include an encryption method, the Wired
Equivalent Privacy algorithm.
Architectural Comparison
3. Connection to other network
Each computer, mobile, portable or fixed, is referred to as
a station in 802.11 [Wireless Local Area Networks].
When two or more stations come together to
communicate with each other, they form a Basic Service
Set (BSS). The minimum BSS consists of two stations.
802.11 LANs use the BSS as the standard building block.
A BSS that stands alone and is not connected to a base
is called an Independent Basic Service Set (IBSS) or is
referred to as an Ad-Hoc Network. An ad-hoc network
is a network where stations communicate only peer to
peer. There is no base and no one gives permission to
talk. Mostly these networks are spontaneous and can
be set up rapidly. Ad-Hoc or IBSS networks are
characteristically limited both temporally and spatially.
 Extend Service Set (ESS)
 an extended service set is created by joining two or more
basic service sets (BSS) having access points (APs).
 These extended networks are created by joining the access
points of basic services sets through a wired LAN known as
distribution system.
 There are two types of stations in ESS:
 (i) Mobile stations: These are normal stations inside a BSS.
 (ii) Stationary stations: These are AP stations that are part of
a wired LAN.
Extend Service Set (ESS)
IEEE 802.11 defines three types of stations on
the basis of their mobility in wireless LAN. These
are:
 1. No-transition Mobility: These types of stations are
either stationary i.e. immovable or move only inside a BSS.
 2. BSS-transition mobility: These types of stations can
move from one BSS to another but the movement is limited
inside an ESS.
 3. ESS-transition mobility: These types of stations can
move from one ESS to another. The communication mayor
may not be continuous when a station moves from one ESS
to another ESS.
MAC sublayer Functions
802.11 support two different modes of operations.
These are:
1. Distributed Coordination Function (DCF)
2. Point Coordination Function (PCF)

Distributed Coordination Function
The DCF is used in BSS having no access point.
DCF uses CSMA/CA protocol for transmission.
The following steps are followed in this method.
1When a station wants to transmit, it senses the channel to see
whether it is free or not.
2. If the channel is not free the station waits for back off time.
3. If the station finds a channel to be idle, the station waits for a
period of time called distributed inter frame space (DIFS).
4. The station then sends control frame called request to send
(RTS) as shown in figure.
5. The destination station receives the frame and waits for a short
period of time called short inter frame space (SIFS).
6. The destination station then sends a control frame called clear to
send (CTS) to the source station. This frame indicates that the
destination station is ready to receive data.
7. The sender then waits for SIFS time and sends data.
8. The destination waits for SIFS time and sends
acknowledgement for the received frame.
Collision avoidance
• 802.11 standard uses Network Allocation Vector (NAV)
for collision avoidance.
Point Coordination Function
 PCF method is used in infrastructure network. In this
Access point is used to control the network activity.
 It is implemented on top of the DCF and it is used for
time sensitive transmissions.
 PCF uses centralized, contention free polling access
method.
 The AP performs polling for stations that wants to
transmit data. The various stations are polled one after
the other.

Frame Format of 802.11
 Subtype: RTS, CTS, ACK
To: DS Frame is going to distributed system
D. It stands for duration and is of 2 bytes. This field defines the duration for
which the frame and its acknowledgement will occupy the channel. It is also
used to set the value of NA V for other stations.
3. Addresses. There are 4 address fields of 6 bytes length. These four
addresses represent source, destination, source base station and
destination base station.
4. Sequence Control (SC). This 2 byte field defines the sequence number
of frame to be used in flow control.
5. Frame body. This field can be between 0 and 2312 bytes. It contains the
information.
6. FCS. This field is 4 bytes long and contains 'cRC-32 error detection
sequence.
Physical layer functions
 • physical layer is responsible for converting data stream into
signals, the bits of 802.11 networks can be converted to radio
waves or infrared waves.
 • These are six different specifications of IEEE 802.11. These
implementations, except the first one, operate in industrial,
scientific and medical (ISM) band. These three bands are
unlicensed and their ranges are
 1.902-928 MHz
 2.2.400-4.835 GHz
 3.5.725-5.850 GHz
IEEE 802.11 FHSS
 IEEE 802.11 FHSS
 • IEEE 802.11 uses Frequency Hoping Spread Spectrum (FHSS)
method for signal generation.
 • This method uses 2.4 GHz ISM band. This band is divided into 79
subbands of 1MHz with some guard bands.
 The allowed data rates are 1 or 2 Mbps.
14.25
Figure 14.15 Physical layer of IEEE 802.11 FHSS
IEEE 802.11 DSSS
This method uses Direct Sequence Spread Spectrum
(DSSS) method for signal generation. Each bit is
transmitted as 11 chips using a Barker sequence.
• DSSS uses the 2.4-GHz ISM band.
• It also allows the data rates of 1 or 2 Mbps.
IEEE 802.11a OFDM
 • This method uses Orthogonal Frequency Division Multiplexing (OFDM) for
signal generation.
 • This method is capable of delivering data upto 18 or 54 Mbps.
 • In OFDM all the subbands are used by one source at a given time.
 • It uses 5 GHz ISM band.
 IEEE 802.11b HR-DSSS
 • It uses High Rate Direct Sequence Spread Spectrum method for signal
generation.
 • HR-DSSS is similar to DSSS except for encoding method.
 • Here, 4 or 8 bits are encoded into a special symbol called complementary
code key (CCK).
 • It uses 2.4 GHz ISM band.
 • It supports four data rates: 1,2,5.5 and 11 Mbps.
IEEE 802.11g OFDM
IEEE 802.11g OFDM
• It uses OFDM modulation technique.
• It uses 2.4 GHz ISM band.
• It supports the data rates of 22 or 54 Mbps.
• It is backward compatible with 802.11 b.
802.11n
802.11n operates on both the 2.4 GHz and the 5 GHz
bands.
Support for 5 GHz bands is optional. IEEE 802.11n builds
on
previous 802.11 standards by adding multiple-input
multiple output
(MIMO) and 40 MHz channels to the PHY layer,
 802.11ac with speed 6.93 Gbps
BLUETOOTH
 Bluetooth is a wireless LAN technology designed to connect
devices of different functions such as telephones, notebooks,
computers, cameras, printers, coffee makers, and so on. A
Bluetooth LAN is an ad hoc network, which means that the network
is formed spontaneously.
 IEEE 802.15 standard ( Wireless PAN)
 Operates in the unlicensed ISM band at 2.4 GHz
 Gross data rate is 1Mb/s
Architecture
 Defines two types of network : Piconet and Scatternet.
 When more than two Bluetooth devices communicate with
one another, this is called a PICONET. A Piconet can contain
up to seven slaves/ secondary clustered around a single
master. The device that initializes establishment of the Piconet
becomes the master. Or primary
Scatternet
 Scatternet
Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or
primary in other piconet.
Bluetooth layers and Protocol Stack
 Radio Layer
 • The Bluetooth radio layer corresponds to the physical layer
of OSI model.
 • It deals with ratio transmission and modulation.
 • The radio layer moves data from master to slave or vice
versa.
 • It is a low power system that uses 2.4 GHz ISM band in a
range of 10 meters.
 Bluetooth hops 1600 times per second, i.e. each device
changes its modulation frequency 1600 times per second.
Baseband Layer
 • Baseband layer is equivalent to the MAC sublayer in LANs.
 • Bluetooth uses a form of TDMA called TDD-TDMA (time
division duplex TDMA).
 • Master and slave stations communicate with each other
using time slots.
 in TDD- TDMA, communication is half duplex in which receiver
can send and receive data but not at the same time.
 • In the piconet the master uses even numbered slots (0, 2, 4, ...)
and the slave uses odd-numbered slots (1, 3, 5, .... ). Both master
and slave communicate in half duplex mode. In slot 0, master
sends & secondary receives; in slot 1, secondary sends and
primary receives.
In Baseband layer, two types of links can be created
between a master and slave. These are
 Asynchronous Connection-less (ACL)
 • It is used for packet switched data that is available at irregular intervals.
 • ACL delivers traffic on a best effort basis. Frames can be lost & may have to be
retransmitted.
 • A slave can have only one ACL link to its master.
 • Thus ACL link is used where correct delivery is preferred over fast delivery.
 • The ACL can achieve a maximum data rate of 721 kbps by using one, three or
more slots.
 ACL is multipoint connection between one master and many slaves.
Synchronous Connection Oriented (SCO)
 Synchronous Connection Oriented (SCO)
 SCO is Point to Point Connection between only one master and only one slave.
 sco is used for real time data such as sound. It is used where fast delivery is
preferred over accurate delivery.
 • In an sco link, a physical link is created between the master and slave by
reserving specific slots at regular intervals.
 • Damaged packet; are not retransmitted over sco links.
 • A slave can have three sco links with the master and can send data at 64 Kbps
Logical Link, Control Adaptation Protocol Layer
(L2CAP)
 • The logical unit link control adaptation protocol is equivalent to logical link control
sublayer of LAN.
 • The ACL link uses L2CAP for data exchange but sco channel does not use it.
 • The various function of L2CAP is:
 1. Segmentation and reassembly
 • L2CAP receives the packets of upto 64 KB from upper layers and divides them into
frames for transmission.
 • It adds extra information to define the location of frame in the original packet.
 • The L2CAP reassembles the frame into packets again at the destination.
 2. Multiplexing
 • L2CAP performs multiplexing at sender side and demultiplexing at receiver side.
 •
 At the sender site, it accepts data from one of the upper layer protocols
frames them and deliver them to the Baseband layer.
 • At the receiver site, it accepts a frame from the baseband layer, extracts
the data, and delivers them to the appropriate protocol1ayer
 Quality of Service (QOS)
 • L2CAP handles quality of service requirements, both when links are
established and during normal operation.
 • It also enables the devices to negotiate the maximum payload size
during connection establishment.
15.44
Figure 6.23: Frame format types
Access Code: It is 72 bit field that contains synchronization bits. It
identifies the master.
Header: This is 54-bit field. It contain 18 bit pattern that is repeated for
3 time.
The header field contains following subfields:
Address: This 3 bit field can define upto seven slaves (1 to 7). If the
address is zero, it is used for broadcast communication from primary to
all secondaries.
Type: This 4 bit field identifies the type of data coming from upper
layers.
F: This flow bit is used for flow control. When set to 1, it means the
device is unable to receive more frames.
A: This bit is used for acknowledgement.
.
S: This bit contains a sequence number of the frame
to detect retransmission. As stop and wait protocol
is used, one bit is sufficient
HEC: Header Error correction This 8 bit field
contains checksum to detect errors in header.
Data: This field can be 0 to 2744 bits long. It
contains data or control information coming from
upper layers
Payload : This subfields can be 0 to 2740 bits long.

Más contenido relacionado

La actualidad más candente (20)

WLAN
WLANWLAN
WLAN
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
WLAN
WLANWLAN
WLAN
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
INTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATIONINTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATION
 
Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)
 
GPRS
GPRSGPRS
GPRS
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 

Similar a Wireless LAN Standards (IEEE802.11) Architecture

813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Ashish Khare
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.pptrajucs
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 

Similar a Wireless LAN Standards (IEEE802.11) Architecture (20)

813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Wireless Local Area Network
Wireless Local Area NetworkWireless Local Area Network
Wireless Local Area Network
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.ppt
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Lecture6
Lecture6Lecture6
Lecture6
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
wi-fi definition
wi-fi definition wi-fi definition
wi-fi definition
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 

Más de Raj vardhan

Software Testing Life Cycle Unit-3
Software Testing Life Cycle Unit-3Software Testing Life Cycle Unit-3
Software Testing Life Cycle Unit-3Raj vardhan
 
Internet Basics Unit-7
Internet Basics  Unit-7Internet Basics  Unit-7
Internet Basics Unit-7Raj vardhan
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
UNIT 4-HEADER FILES IN C
UNIT 4-HEADER FILES IN CUNIT 4-HEADER FILES IN C
UNIT 4-HEADER FILES IN CRaj vardhan
 
UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices Raj vardhan
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 
Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Raj vardhan
 
Swachh Bharat Abhiyan - Project Report
Swachh Bharat Abhiyan - Project ReportSwachh Bharat Abhiyan - Project Report
Swachh Bharat Abhiyan - Project ReportRaj vardhan
 
Network Topology
Network TopologyNetwork Topology
Network TopologyRaj vardhan
 
Microsoft Office Word Introduction Complete
Microsoft Office Word  Introduction CompleteMicrosoft Office Word  Introduction Complete
Microsoft Office Word Introduction CompleteRaj vardhan
 
Digital money Revolution Introduction
Digital money Revolution IntroductionDigital money Revolution Introduction
Digital money Revolution IntroductionRaj vardhan
 
Definition of Business
Definition of BusinessDefinition of Business
Definition of BusinessRaj vardhan
 
Business Terms & Concepts
Business Terms & ConceptsBusiness Terms & Concepts
Business Terms & ConceptsRaj vardhan
 
Number System Conversion | BCA
Number System Conversion | BCANumber System Conversion | BCA
Number System Conversion | BCARaj vardhan
 
Interaction With Computers FIT
Interaction With Computers FITInteraction With Computers FIT
Interaction With Computers FITRaj vardhan
 
FIT-MS-WORD Lab | BCA
FIT-MS-WORD Lab | BCAFIT-MS-WORD Lab | BCA
FIT-MS-WORD Lab | BCARaj vardhan
 
Syllabus Front End Design Tool VB.NET | BCA-205
Syllabus Front End Design Tool VB.NET | BCA-205 Syllabus Front End Design Tool VB.NET | BCA-205
Syllabus Front End Design Tool VB.NET | BCA-205 Raj vardhan
 
UNIT-II VISUAL BASIC.NET | BCA
UNIT-II VISUAL BASIC.NET | BCAUNIT-II VISUAL BASIC.NET | BCA
UNIT-II VISUAL BASIC.NET | BCARaj vardhan
 

Más de Raj vardhan (20)

Software Testing Life Cycle Unit-3
Software Testing Life Cycle Unit-3Software Testing Life Cycle Unit-3
Software Testing Life Cycle Unit-3
 
Internet Basics Unit-7
Internet Basics  Unit-7Internet Basics  Unit-7
Internet Basics Unit-7
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
UNIT 4-HEADER FILES IN C
UNIT 4-HEADER FILES IN CUNIT 4-HEADER FILES IN C
UNIT 4-HEADER FILES IN C
 
UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2
 
Swachh Bharat Abhiyan - Project Report
Swachh Bharat Abhiyan - Project ReportSwachh Bharat Abhiyan - Project Report
Swachh Bharat Abhiyan - Project Report
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Microsoft Office Word Introduction Complete
Microsoft Office Word  Introduction CompleteMicrosoft Office Word  Introduction Complete
Microsoft Office Word Introduction Complete
 
Digital money Revolution Introduction
Digital money Revolution IntroductionDigital money Revolution Introduction
Digital money Revolution Introduction
 
C Programming
C ProgrammingC Programming
C Programming
 
Definition of Business
Definition of BusinessDefinition of Business
Definition of Business
 
Business Terms & Concepts
Business Terms & ConceptsBusiness Terms & Concepts
Business Terms & Concepts
 
Number System Conversion | BCA
Number System Conversion | BCANumber System Conversion | BCA
Number System Conversion | BCA
 
Interaction With Computers FIT
Interaction With Computers FITInteraction With Computers FIT
Interaction With Computers FIT
 
FIT-MS-WORD Lab | BCA
FIT-MS-WORD Lab | BCAFIT-MS-WORD Lab | BCA
FIT-MS-WORD Lab | BCA
 
Syllabus Front End Design Tool VB.NET | BCA-205
Syllabus Front End Design Tool VB.NET | BCA-205 Syllabus Front End Design Tool VB.NET | BCA-205
Syllabus Front End Design Tool VB.NET | BCA-205
 
UNIT-II VISUAL BASIC.NET | BCA
UNIT-II VISUAL BASIC.NET | BCAUNIT-II VISUAL BASIC.NET | BCA
UNIT-II VISUAL BASIC.NET | BCA
 

Último

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Último (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Wireless LAN Standards (IEEE802.11) Architecture

  • 1. UNIT 04 4.1 Wireless LANs(IEEE802.11) Architecture
  • 2. A wireless LAN (or WLAN, for wireless local area network) is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection The IEEE 802.11 group of standards specify the technologies for wireless LANs. 802.11 standards use the Ethernet protocol and CSMA/CA (carrier sense multiple access with collision avoidance) for path sharing and include an encryption method, the Wired Equivalent Privacy algorithm.
  • 4. 3. Connection to other network
  • 5. Each computer, mobile, portable or fixed, is referred to as a station in 802.11 [Wireless Local Area Networks]. When two or more stations come together to communicate with each other, they form a Basic Service Set (BSS). The minimum BSS consists of two stations. 802.11 LANs use the BSS as the standard building block.
  • 6. A BSS that stands alone and is not connected to a base is called an Independent Basic Service Set (IBSS) or is referred to as an Ad-Hoc Network. An ad-hoc network is a network where stations communicate only peer to peer. There is no base and no one gives permission to talk. Mostly these networks are spontaneous and can be set up rapidly. Ad-Hoc or IBSS networks are characteristically limited both temporally and spatially.
  • 7.
  • 8.  Extend Service Set (ESS)  an extended service set is created by joining two or more basic service sets (BSS) having access points (APs).  These extended networks are created by joining the access points of basic services sets through a wired LAN known as distribution system.  There are two types of stations in ESS:  (i) Mobile stations: These are normal stations inside a BSS.  (ii) Stationary stations: These are AP stations that are part of a wired LAN.
  • 10.
  • 11. IEEE 802.11 defines three types of stations on the basis of their mobility in wireless LAN. These are:  1. No-transition Mobility: These types of stations are either stationary i.e. immovable or move only inside a BSS.  2. BSS-transition mobility: These types of stations can move from one BSS to another but the movement is limited inside an ESS.  3. ESS-transition mobility: These types of stations can move from one ESS to another. The communication mayor may not be continuous when a station moves from one ESS to another ESS.
  • 12. MAC sublayer Functions 802.11 support two different modes of operations. These are: 1. Distributed Coordination Function (DCF) 2. Point Coordination Function (PCF) 
  • 13.
  • 14. Distributed Coordination Function The DCF is used in BSS having no access point. DCF uses CSMA/CA protocol for transmission. The following steps are followed in this method.
  • 15.
  • 16. 1When a station wants to transmit, it senses the channel to see whether it is free or not. 2. If the channel is not free the station waits for back off time. 3. If the station finds a channel to be idle, the station waits for a period of time called distributed inter frame space (DIFS). 4. The station then sends control frame called request to send (RTS) as shown in figure. 5. The destination station receives the frame and waits for a short period of time called short inter frame space (SIFS). 6. The destination station then sends a control frame called clear to send (CTS) to the source station. This frame indicates that the destination station is ready to receive data.
  • 17. 7. The sender then waits for SIFS time and sends data. 8. The destination waits for SIFS time and sends acknowledgement for the received frame. Collision avoidance • 802.11 standard uses Network Allocation Vector (NAV) for collision avoidance.
  • 18. Point Coordination Function  PCF method is used in infrastructure network. In this Access point is used to control the network activity.  It is implemented on top of the DCF and it is used for time sensitive transmissions.  PCF uses centralized, contention free polling access method.  The AP performs polling for stations that wants to transmit data. The various stations are polled one after the other. 
  • 19. Frame Format of 802.11
  • 20.  Subtype: RTS, CTS, ACK
  • 21. To: DS Frame is going to distributed system D. It stands for duration and is of 2 bytes. This field defines the duration for which the frame and its acknowledgement will occupy the channel. It is also used to set the value of NA V for other stations. 3. Addresses. There are 4 address fields of 6 bytes length. These four addresses represent source, destination, source base station and destination base station. 4. Sequence Control (SC). This 2 byte field defines the sequence number of frame to be used in flow control. 5. Frame body. This field can be between 0 and 2312 bytes. It contains the information. 6. FCS. This field is 4 bytes long and contains 'cRC-32 error detection sequence.
  • 22. Physical layer functions  • physical layer is responsible for converting data stream into signals, the bits of 802.11 networks can be converted to radio waves or infrared waves.  • These are six different specifications of IEEE 802.11. These implementations, except the first one, operate in industrial, scientific and medical (ISM) band. These three bands are unlicensed and their ranges are  1.902-928 MHz  2.2.400-4.835 GHz  3.5.725-5.850 GHz
  • 23.
  • 24. IEEE 802.11 FHSS  IEEE 802.11 FHSS  • IEEE 802.11 uses Frequency Hoping Spread Spectrum (FHSS) method for signal generation.  • This method uses 2.4 GHz ISM band. This band is divided into 79 subbands of 1MHz with some guard bands.  The allowed data rates are 1 or 2 Mbps.
  • 25. 14.25 Figure 14.15 Physical layer of IEEE 802.11 FHSS
  • 26. IEEE 802.11 DSSS This method uses Direct Sequence Spread Spectrum (DSSS) method for signal generation. Each bit is transmitted as 11 chips using a Barker sequence. • DSSS uses the 2.4-GHz ISM band. • It also allows the data rates of 1 or 2 Mbps.
  • 27. IEEE 802.11a OFDM  • This method uses Orthogonal Frequency Division Multiplexing (OFDM) for signal generation.  • This method is capable of delivering data upto 18 or 54 Mbps.  • In OFDM all the subbands are used by one source at a given time.  • It uses 5 GHz ISM band.  IEEE 802.11b HR-DSSS  • It uses High Rate Direct Sequence Spread Spectrum method for signal generation.  • HR-DSSS is similar to DSSS except for encoding method.  • Here, 4 or 8 bits are encoded into a special symbol called complementary code key (CCK).  • It uses 2.4 GHz ISM band.  • It supports four data rates: 1,2,5.5 and 11 Mbps.
  • 28. IEEE 802.11g OFDM IEEE 802.11g OFDM • It uses OFDM modulation technique. • It uses 2.4 GHz ISM band. • It supports the data rates of 22 or 54 Mbps. • It is backward compatible with 802.11 b.
  • 29. 802.11n 802.11n operates on both the 2.4 GHz and the 5 GHz bands. Support for 5 GHz bands is optional. IEEE 802.11n builds on previous 802.11 standards by adding multiple-input multiple output (MIMO) and 40 MHz channels to the PHY layer,  802.11ac with speed 6.93 Gbps
  • 30. BLUETOOTH  Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously.  IEEE 802.15 standard ( Wireless PAN)  Operates in the unlicensed ISM band at 2.4 GHz  Gross data rate is 1Mb/s
  • 31.
  • 32. Architecture  Defines two types of network : Piconet and Scatternet.  When more than two Bluetooth devices communicate with one another, this is called a PICONET. A Piconet can contain up to seven slaves/ secondary clustered around a single master. The device that initializes establishment of the Piconet becomes the master. Or primary
  • 33.
  • 34. Scatternet  Scatternet Scattemet is formed by combining various piconets. • A slave in one piconet can act as a master or primary in other piconet.
  • 35.
  • 36. Bluetooth layers and Protocol Stack
  • 37.  Radio Layer  • The Bluetooth radio layer corresponds to the physical layer of OSI model.  • It deals with ratio transmission and modulation.  • The radio layer moves data from master to slave or vice versa.  • It is a low power system that uses 2.4 GHz ISM band in a range of 10 meters.  Bluetooth hops 1600 times per second, i.e. each device changes its modulation frequency 1600 times per second.
  • 38. Baseband Layer  • Baseband layer is equivalent to the MAC sublayer in LANs.  • Bluetooth uses a form of TDMA called TDD-TDMA (time division duplex TDMA).  • Master and slave stations communicate with each other using time slots.
  • 39.  in TDD- TDMA, communication is half duplex in which receiver can send and receive data but not at the same time.  • In the piconet the master uses even numbered slots (0, 2, 4, ...) and the slave uses odd-numbered slots (1, 3, 5, .... ). Both master and slave communicate in half duplex mode. In slot 0, master sends & secondary receives; in slot 1, secondary sends and primary receives.
  • 40. In Baseband layer, two types of links can be created between a master and slave. These are  Asynchronous Connection-less (ACL)  • It is used for packet switched data that is available at irregular intervals.  • ACL delivers traffic on a best effort basis. Frames can be lost & may have to be retransmitted.  • A slave can have only one ACL link to its master.  • Thus ACL link is used where correct delivery is preferred over fast delivery.  • The ACL can achieve a maximum data rate of 721 kbps by using one, three or more slots.  ACL is multipoint connection between one master and many slaves.
  • 41. Synchronous Connection Oriented (SCO)  Synchronous Connection Oriented (SCO)  SCO is Point to Point Connection between only one master and only one slave.  sco is used for real time data such as sound. It is used where fast delivery is preferred over accurate delivery.  • In an sco link, a physical link is created between the master and slave by reserving specific slots at regular intervals.  • Damaged packet; are not retransmitted over sco links.  • A slave can have three sco links with the master and can send data at 64 Kbps
  • 42. Logical Link, Control Adaptation Protocol Layer (L2CAP)  • The logical unit link control adaptation protocol is equivalent to logical link control sublayer of LAN.  • The ACL link uses L2CAP for data exchange but sco channel does not use it.  • The various function of L2CAP is:  1. Segmentation and reassembly  • L2CAP receives the packets of upto 64 KB from upper layers and divides them into frames for transmission.  • It adds extra information to define the location of frame in the original packet.  • The L2CAP reassembles the frame into packets again at the destination.  2. Multiplexing  • L2CAP performs multiplexing at sender side and demultiplexing at receiver side.  •
  • 43.  At the sender site, it accepts data from one of the upper layer protocols frames them and deliver them to the Baseband layer.  • At the receiver site, it accepts a frame from the baseband layer, extracts the data, and delivers them to the appropriate protocol1ayer  Quality of Service (QOS)  • L2CAP handles quality of service requirements, both when links are established and during normal operation.  • It also enables the devices to negotiate the maximum payload size during connection establishment.
  • 44. 15.44 Figure 6.23: Frame format types
  • 45. Access Code: It is 72 bit field that contains synchronization bits. It identifies the master. Header: This is 54-bit field. It contain 18 bit pattern that is repeated for 3 time. The header field contains following subfields: Address: This 3 bit field can define upto seven slaves (1 to 7). If the address is zero, it is used for broadcast communication from primary to all secondaries. Type: This 4 bit field identifies the type of data coming from upper layers. F: This flow bit is used for flow control. When set to 1, it means the device is unable to receive more frames. A: This bit is used for acknowledgement. .
  • 46. S: This bit contains a sequence number of the frame to detect retransmission. As stop and wait protocol is used, one bit is sufficient HEC: Header Error correction This 8 bit field contains checksum to detect errors in header. Data: This field can be 0 to 2744 bits long. It contains data or control information coming from upper layers Payload : This subfields can be 0 to 2740 bits long.