SlideShare a Scribd company logo
1 of 27
CH-15
Wireless LANs
15.1 INTRODUCTION
15.1.1 Architectural Comparison
15.1.2 Characteristics
15.1.3 Access Control
15.2 IEEE 802.11 PROJECT
15.2.1 Architecture
15.2.2 MAC Sub layer
15.2.3 Addressing Mechanism
15.2.4 Physical Layer
15.3 BLUETOOTH
15.3.1 Architecture
15.3.2 Bluetooth Layers
2
 Wireless communication is one of the fastest-
growing technologies.
 The demand for connecting devices without
the use of cables is increasing everywhere.
 Wireless LANs can be found on college
campuses, in office buildings, and in many
public areas.
3
 Medium:
 The medium is air
 The signal is generally broadcast
 Communication is done using share medium
 Hosts
 A host is not physically connected to the network
 It can move freely and can use the services provided
by the network.
4
 Isolated LANs: It is called an ad hoc network, is a set of hosts that communicate
freely with each other.
 Connection to Other Networks: A wireless LAN may be connected to a wired
infrastructure network to a wireless infrastructure network
5
 WLANs can be classified into two types:
 Infrastructure networks contains access points(APs) and mobile
station(STAs).
 Ad hoc LANs do not need any fixed infrastructure.
 Infrastructure networks
 Provide access to other networks
 Include forwarding functions
 Medium access control
 Ad hoc network is a group of computers each with wireless
adapter, connected as an independent wireless LAN.
 Each node can communicate with other nodes
6
 Few Characteristics of wireless LANs:
 Attenuation
 The strength of electromagnetic signals decreases rapidly because the signal
disperses in all directions; only a small portion of it reaches the receiver.
 Interference
 Another issue is that a receiver may receive signals not only from the intended sender,
but also from other senders if they are using the same frequency band.
 Multipath Propagation
 A receiver may receive more than one signal from the same sender because
electromagnetic waves can be reflected back from obstacles such as walls, the ground,
or objects.
 This makes the signal less recognizable.
 Error
 Errors and error detection are more serious issues in a wireless network than in a wired
network. 7
 How a wireless host can get access to the shared medium (air).
 We discussed in Chapter 12 that the Standard Ethernet uses the
CSMA/CD algorithm
 In this method, each host contends to access the medium and sends its
frame if it finds the medium idle.
 If a collision occurs, it is detected and the frame is sent again. Collision
detection in CSMA/CD serves two purposes.
 If a collision is detected, it means that the frame has not been received
and needs to be resent.
 If a collision is not detected, it is a kind of acknowledgment that the
frame was received.
8
 The CSMA/CD algorithm does not work in wireless LANs for three reasons:
1. To detect a collision, a host needs to send and receive at the same time, which means
the host needs to work in a duplex mode.Wireless hosts do not have enough power to
do so (the power is supplied by batteries).They can only send or receive at one time.
2. Because of the hidden station problem, in which a station may not be aware of another
station’s transmission due to some obstacles or range problems, collision may occur but
not be detected.
3. The distance between stations can be great. Signal fading could prevent a station at
one end from hearing a collision at the other end.
 To overcome the above three problems, Carrier Sense MultipleAccess with Collision
Avoidance (CSMA/CA) was invented for wireless LANs 9
 IEEE has defined the specifications for a wireless LAN, called
IEEE 802.11, which covers the physical and data-link layers.
 It is sometimes called wireless Ethernet
 The public uses the term WiFi (short for wireless fidelity) as a
synonym for wireless LAN.
11
Wi-Fi Access points
Wi-Fi Router
 The standard defines two kinds of services
 Basic Service Set (BSS)
 Extended Service Set (ESS)
12
 Ad hoc architecture
 The BSS without an AP is a stand-alone network and cannot send data to
other BSSs..
 Infrastructure BSS
 A BSS with anAP is sometimes referred to as an infrastructure BSS.
13
(Ad hoc mode) (Infrastructure mode)
 An extended service set (ESS) is made up of two or more BSSs with APs.
 The BSSs are connected through a distribution system
 The extended service set uses two types of stations:
 Mobile Station: Normal stations inside a BSS
 Stationary Station : Are AP stations that are part of a wired LAN
14
 IEEE 802.11 defines three types of stations based on their
mobility in a wireless LAN:
 No-Transition
 BSS-Transition
 ESS-Transition Mobility
 A station with no-transition mobility is either stationary (not
moving) or moving only inside a BSS.
 A station with BSS-transition mobility can move from one
BSS to another, but the movement is confined inside one ESS.
 A station with ESS-transition mobility can move from one
ESS to another.
15
 IEEE 802.11 defines two MAC sub layers:
 Distributed coordination function (DCF)
 Point coordination function (PCF)
 Figure shows the relationship between the two MAC
sublayers, the LLC sublayer, and the physical layer.
16
 Distributed coordination function (DCF) is sublayer of MAC
 DCF uses CSMA/CA as the access method
 Problem in CSMA/CA
 Collision During
Handshaking
 Hidden-Station Problem
17
 The point coordination function (PCF) is an optional access method that can
be implemented in an infrastructure network.
 It is implemented on top of the DCF and is used mostly for time-sensitive
transmission.
 PCF has a centralized, contention-free polling access method
 The AP performs polling for stations that are capable of being polled.
 The stations are polled one after another, sending any data they have to the AP.
 PIFS is use to give priority to PCF over DCF, another interframe space.
 PIFS (PCF IFS) is shorter than DIFS.
 This means that if, at the same time, a station wants to use only DCF and an AP
wants to use PCF, the AP has priority.
18
 Priority of PCF over DCF, stations that only
use DCF may not gain access to the medium.
 To prevent this, a repetition interval has been
designed to cover both contention-free PCF
and contention-based DCF traffic.
 The repetition interval, which is repeated
continuously, starts with a special control
frame, called a beacon frame.
 When the stations hear the beacon frame,
they start their NAV for the duration of the
contention-free period of the repetition
interval.
 During the repetition interval, the PC (point
controller) can send a poll frame, receive data,
send an ACK, receive an ACK.
 At the end of the contention-free period,
the PC sends a CF end (contention-free
end) frame to allow the contention-based
stations to use the medium.
19
20
 Bluetooth is a wireless LAN technology
 Designed for connecting devices with different functionalities:
 Telephone, mouse, keyboard, camera, etc.
 Standard  IEEE 802.15.1
 The standard defines a wireless personal-area network (PAN)
operable in an area the size of a room or a hall.
21
 Bluetooth defines two types of networks:
 Piconet
 Scatternet.
22
 A piconet, or a small net, can
have up to eight stations.
 One station will be the primary;
the rest are called secondaries.
 All the secondary stations
synchronize their clocks and
hopping sequence with the
primary.
 The communication between
the primary and secondary
stations can be one-to-one or
one-to-many.
 additional secondaries can be in
the parked state
 For communication should
moved from the parked state
to the active state
 only eight stations can be
active in a piconet
23
 Piconets can be combined to form what is called a scatternet.
 A secondary station in one piconet can be the primary in another piconet.
 A station can be a member of two piconets.
24
 L2CAP:The Logical Link Control and Adaptation
Protocol, or L2CAP (L2 here means LL), is roughly
equivalent to the LLC sublayer in LANs.
 It is used for data exchange on an ACL link; SCO channels
do not use L2CAP
25
 The 16-bit length field defines the size of the
data, in bytes, coming from the upper layers.
 Data can be up to 65,535 bytes.
 The channel ID (CID) defines a unique identifier
for the virtual channel created at this level
26
 The L2CAP has specific duties:
 Multiplexing
 Segmentation and
 Reassembly
 Quality of service (QoS)
 Group Management
27

More Related Content

What's hot (20)

Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Unit II -Mobile telecommunication systems
Unit II -Mobile telecommunication systemsUnit II -Mobile telecommunication systems
Unit II -Mobile telecommunication systems
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Transmission media ppt
Transmission media pptTransmission media ppt
Transmission media ppt
 
IP classes
IP classesIP classes
IP classes
 
Handover management
Handover managementHandover management
Handover management
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
Classless inter domain routing
Classless inter domain routingClassless inter domain routing
Classless inter domain routing
 
Ethernet
EthernetEthernet
Ethernet
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Gsm presentation shaikot
Gsm presentation shaikotGsm presentation shaikot
Gsm presentation shaikot
 
DSL a Brief
DSL a BriefDSL a Brief
DSL a Brief
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
Ethernet
EthernetEthernet
Ethernet
 
CCNA Data Center Host to Host Communications
CCNA Data Center Host to Host CommunicationsCCNA Data Center Host to Host Communications
CCNA Data Center Host to Host Communications
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 

Similar to Wireless LANs

Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingNoorNawaz12
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocolumardanjumamaiwada
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfADARSHN40
 
computer network
computer networkcomputer network
computer networkRedHeart11
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Networkfherjaramillo
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)Siddique Ibrahim
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docDeepak John
 

Similar to Wireless LANs (20)

Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless Local Area Network
Wireless Local Area NetworkWireless Local Area Network
Wireless Local Area Network
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Lan wan
Lan wanLan wan
Lan wan
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
 
computer network
computer networkcomputer network
computer network
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
Hx2413921400
Hx2413921400Hx2413921400
Hx2413921400
 

More from Meenakshi Paul

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial IntelligencesMeenakshi Paul
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless NetworksMeenakshi Paul
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingMeenakshi Paul
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge ManagementMeenakshi Paul
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business ResearchMeenakshi Paul
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmissionMeenakshi Paul
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmissionMeenakshi Paul
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layerMeenakshi Paul
 

More from Meenakshi Paul (20)

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial Intelligences
 
Binary Arithmetic
Binary ArithmeticBinary Arithmetic
Binary Arithmetic
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless Networks
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
Codes
CodesCodes
Codes
 
Number System
Number SystemNumber System
Number System
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Switching
SwitchingSwitching
Switching
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Theory building
Theory buildingTheory building
Theory building
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business Research
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmission
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layer
 
02 network models
02  network models02  network models
02 network models
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Wireless LANs

  • 2. 15.1 INTRODUCTION 15.1.1 Architectural Comparison 15.1.2 Characteristics 15.1.3 Access Control 15.2 IEEE 802.11 PROJECT 15.2.1 Architecture 15.2.2 MAC Sub layer 15.2.3 Addressing Mechanism 15.2.4 Physical Layer 15.3 BLUETOOTH 15.3.1 Architecture 15.3.2 Bluetooth Layers 2
  • 3.  Wireless communication is one of the fastest- growing technologies.  The demand for connecting devices without the use of cables is increasing everywhere.  Wireless LANs can be found on college campuses, in office buildings, and in many public areas. 3
  • 4.  Medium:  The medium is air  The signal is generally broadcast  Communication is done using share medium  Hosts  A host is not physically connected to the network  It can move freely and can use the services provided by the network. 4
  • 5.  Isolated LANs: It is called an ad hoc network, is a set of hosts that communicate freely with each other.  Connection to Other Networks: A wireless LAN may be connected to a wired infrastructure network to a wireless infrastructure network 5
  • 6.  WLANs can be classified into two types:  Infrastructure networks contains access points(APs) and mobile station(STAs).  Ad hoc LANs do not need any fixed infrastructure.  Infrastructure networks  Provide access to other networks  Include forwarding functions  Medium access control  Ad hoc network is a group of computers each with wireless adapter, connected as an independent wireless LAN.  Each node can communicate with other nodes 6
  • 7.  Few Characteristics of wireless LANs:  Attenuation  The strength of electromagnetic signals decreases rapidly because the signal disperses in all directions; only a small portion of it reaches the receiver.  Interference  Another issue is that a receiver may receive signals not only from the intended sender, but also from other senders if they are using the same frequency band.  Multipath Propagation  A receiver may receive more than one signal from the same sender because electromagnetic waves can be reflected back from obstacles such as walls, the ground, or objects.  This makes the signal less recognizable.  Error  Errors and error detection are more serious issues in a wireless network than in a wired network. 7
  • 8.  How a wireless host can get access to the shared medium (air).  We discussed in Chapter 12 that the Standard Ethernet uses the CSMA/CD algorithm  In this method, each host contends to access the medium and sends its frame if it finds the medium idle.  If a collision occurs, it is detected and the frame is sent again. Collision detection in CSMA/CD serves two purposes.  If a collision is detected, it means that the frame has not been received and needs to be resent.  If a collision is not detected, it is a kind of acknowledgment that the frame was received. 8
  • 9.  The CSMA/CD algorithm does not work in wireless LANs for three reasons: 1. To detect a collision, a host needs to send and receive at the same time, which means the host needs to work in a duplex mode.Wireless hosts do not have enough power to do so (the power is supplied by batteries).They can only send or receive at one time. 2. Because of the hidden station problem, in which a station may not be aware of another station’s transmission due to some obstacles or range problems, collision may occur but not be detected. 3. The distance between stations can be great. Signal fading could prevent a station at one end from hearing a collision at the other end.  To overcome the above three problems, Carrier Sense MultipleAccess with Collision Avoidance (CSMA/CA) was invented for wireless LANs 9
  • 10.
  • 11.  IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data-link layers.  It is sometimes called wireless Ethernet  The public uses the term WiFi (short for wireless fidelity) as a synonym for wireless LAN. 11 Wi-Fi Access points Wi-Fi Router
  • 12.  The standard defines two kinds of services  Basic Service Set (BSS)  Extended Service Set (ESS) 12
  • 13.  Ad hoc architecture  The BSS without an AP is a stand-alone network and cannot send data to other BSSs..  Infrastructure BSS  A BSS with anAP is sometimes referred to as an infrastructure BSS. 13 (Ad hoc mode) (Infrastructure mode)
  • 14.  An extended service set (ESS) is made up of two or more BSSs with APs.  The BSSs are connected through a distribution system  The extended service set uses two types of stations:  Mobile Station: Normal stations inside a BSS  Stationary Station : Are AP stations that are part of a wired LAN 14
  • 15.  IEEE 802.11 defines three types of stations based on their mobility in a wireless LAN:  No-Transition  BSS-Transition  ESS-Transition Mobility  A station with no-transition mobility is either stationary (not moving) or moving only inside a BSS.  A station with BSS-transition mobility can move from one BSS to another, but the movement is confined inside one ESS.  A station with ESS-transition mobility can move from one ESS to another. 15
  • 16.  IEEE 802.11 defines two MAC sub layers:  Distributed coordination function (DCF)  Point coordination function (PCF)  Figure shows the relationship between the two MAC sublayers, the LLC sublayer, and the physical layer. 16
  • 17.  Distributed coordination function (DCF) is sublayer of MAC  DCF uses CSMA/CA as the access method  Problem in CSMA/CA  Collision During Handshaking  Hidden-Station Problem 17
  • 18.  The point coordination function (PCF) is an optional access method that can be implemented in an infrastructure network.  It is implemented on top of the DCF and is used mostly for time-sensitive transmission.  PCF has a centralized, contention-free polling access method  The AP performs polling for stations that are capable of being polled.  The stations are polled one after another, sending any data they have to the AP.  PIFS is use to give priority to PCF over DCF, another interframe space.  PIFS (PCF IFS) is shorter than DIFS.  This means that if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the AP has priority. 18
  • 19.  Priority of PCF over DCF, stations that only use DCF may not gain access to the medium.  To prevent this, a repetition interval has been designed to cover both contention-free PCF and contention-based DCF traffic.  The repetition interval, which is repeated continuously, starts with a special control frame, called a beacon frame.  When the stations hear the beacon frame, they start their NAV for the duration of the contention-free period of the repetition interval.  During the repetition interval, the PC (point controller) can send a poll frame, receive data, send an ACK, receive an ACK.  At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow the contention-based stations to use the medium. 19
  • 20. 20
  • 21.  Bluetooth is a wireless LAN technology  Designed for connecting devices with different functionalities:  Telephone, mouse, keyboard, camera, etc.  Standard  IEEE 802.15.1  The standard defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall. 21
  • 22.  Bluetooth defines two types of networks:  Piconet  Scatternet. 22
  • 23.  A piconet, or a small net, can have up to eight stations.  One station will be the primary; the rest are called secondaries.  All the secondary stations synchronize their clocks and hopping sequence with the primary.  The communication between the primary and secondary stations can be one-to-one or one-to-many.  additional secondaries can be in the parked state  For communication should moved from the parked state to the active state  only eight stations can be active in a piconet 23
  • 24.  Piconets can be combined to form what is called a scatternet.  A secondary station in one piconet can be the primary in another piconet.  A station can be a member of two piconets. 24
  • 25.  L2CAP:The Logical Link Control and Adaptation Protocol, or L2CAP (L2 here means LL), is roughly equivalent to the LLC sublayer in LANs.  It is used for data exchange on an ACL link; SCO channels do not use L2CAP 25
  • 26.  The 16-bit length field defines the size of the data, in bytes, coming from the upper layers.  Data can be up to 65,535 bytes.  The channel ID (CID) defines a unique identifier for the virtual channel created at this level 26
  • 27.  The L2CAP has specific duties:  Multiplexing  Segmentation and  Reassembly  Quality of service (QoS)  Group Management 27