SlideShare a Scribd company logo
1 of 1
   A service set is a set of all the devices joined or associated to a Wlan
   Independent Basic Service Set (Adhoc Mode)
    ◦ Clients connect directly to each other without an access point
   Basic Service Set BSS (Infrastructure Mode)
    ◦ A single access point which all wireless clients associate with
   Extended Service Set ESS(Infrastructure Mode)
    ◦ Two or more BSS that operate as a single service set and share a common
      SSID
    ◦ ESS extends the range of wireless coverage so that mobiles can roam.
      Roaming allows a mobile to associate with the access point with the
      strongest signal. When the mobile moves into the service area of another
      access points it reassociates with the nearest access point.
    ◦ ESS with more than 1 access point increases the capacity or throughput
      available to a many mobile devices. If there are 2 Access Points, half the
      devices will associate with 1 AP and the other devices will associate with
      the other AP and all will get a better data rate
   SSID is the Service Set Identifier;
    ◦ A name that is used to identify the service set - Case sensitive and up to 32
    ◦                                                             characters long

More Related Content

What's hot

ITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communicationITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communicationSneh Prabha
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting systemQuang Do
 
Communication hardware
Communication hardwareCommunication hardware
Communication hardwareHans Mallen
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Networks Lab Viva
Networks Lab VivaNetworks Lab Viva
Networks Lab Vivamrirphan
 
Bluetooth
BluetoothBluetooth
Bluetoothshwet28
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless CommunicationAyush Deval
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet deliveryrajisri2
 
Network examples and network software
Network examples and network softwareNetwork examples and network software
Network examples and network softwareHifza Javed
 
How networks communicate ?
How networks communicate ?How networks communicate ?
How networks communicate ?Shwe Yee
 

What's hot (16)

Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
 
Network devices
Network devicesNetwork devices
Network devices
 
ITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communicationITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communication
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting system
 
wi-fi definition
wi-fi definition wi-fi definition
wi-fi definition
 
R1x g12 wifi i
R1x g12 wifi iR1x g12 wifi i
R1x g12 wifi i
 
Communication hardware
Communication hardwareCommunication hardware
Communication hardware
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
Networks Lab Viva
Networks Lab VivaNetworks Lab Viva
Networks Lab Viva
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
 
Communication Network
Communication NetworkCommunication Network
Communication Network
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Network examples and network software
Network examples and network softwareNetwork examples and network software
Network examples and network software
 
How networks communicate ?
How networks communicate ?How networks communicate ?
How networks communicate ?
 

Similar to Service set

Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network ArchitecturePawandeep Singh
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Projectedwardlong
 
NC.pptx prepared for all students of higher education
NC.pptx  prepared for all students of higher educationNC.pptx  prepared for all students of higher education
NC.pptx prepared for all students of higher educationtalldesalegn
 
Wk 7 Assignment Mac Layer Presentation
Wk 7 Assignment   Mac Layer PresentationWk 7 Assignment   Mac Layer Presentation
Wk 7 Assignment Mac Layer PresentationOcy Onyemachi
 
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...redfoxtrapper
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptxNidhiChandra24
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingNoorNawaz12
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 

Similar to Service set (20)

Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Project
 
Wi fi[1]
Wi fi[1]Wi fi[1]
Wi fi[1]
 
NC.pptx prepared for all students of higher education
NC.pptx  prepared for all students of higher educationNC.pptx  prepared for all students of higher education
NC.pptx prepared for all students of higher education
 
802.11
802.11802.11
802.11
 
Wk 7 Assignment Mac Layer Presentation
Wk 7 Assignment   Mac Layer PresentationWk 7 Assignment   Mac Layer Presentation
Wk 7 Assignment Mac Layer Presentation
 
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
 
Wlan 2
Wlan 2Wlan 2
Wlan 2
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptx
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Wireless LAN Poster
Wireless LAN PosterWireless LAN Poster
Wireless LAN Poster
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Firewall
FirewallFirewall
Firewalllyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (17)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Security standard
Security standardSecurity standard
Security standard
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Service set

  • 1. A service set is a set of all the devices joined or associated to a Wlan  Independent Basic Service Set (Adhoc Mode) ◦ Clients connect directly to each other without an access point  Basic Service Set BSS (Infrastructure Mode) ◦ A single access point which all wireless clients associate with  Extended Service Set ESS(Infrastructure Mode) ◦ Two or more BSS that operate as a single service set and share a common SSID ◦ ESS extends the range of wireless coverage so that mobiles can roam. Roaming allows a mobile to associate with the access point with the strongest signal. When the mobile moves into the service area of another access points it reassociates with the nearest access point. ◦ ESS with more than 1 access point increases the capacity or throughput available to a many mobile devices. If there are 2 Access Points, half the devices will associate with 1 AP and the other devices will associate with the other AP and all will get a better data rate  SSID is the Service Set Identifier; ◦ A name that is used to identify the service set - Case sensitive and up to 32 ◦ characters long