SlideShare a Scribd company logo
1 of 37
Download to read offline
WLAN – IEEE 802.11
IEEE 802.11




802.11 standard only covers the physical layer PHY
and medium access layer MAC.
PHY divided into two sublayers :−
−





Physical layer convergence protocol (PLCP)
Physical medium dependent (PMD)

PLCP – it provides a carrier sense signal called
clear channel assessment (CCA), and provides a
common PHY service access point (SAP).
PMD – handles modulation and encoding
/decoding of signals.
Cont..


MAC – support the association and re-association
of a station to an access point and roaming between
different access point ,control
authentication,encryption, synchronization and
power management.
PHY Layer


802.11 supports three versions of PHY layer
−

FHSS – Frequency hopping spread spectrum

−

DSSS – Direct sequence spread spectrum

−

Infra red

[Spread Spectrum-techniques involve spreading the bandwidth
needed to transmit data.]
FHSS Frame Structure











Synchronization – 80 bit SYN (010101....), used to
SYN potential receiver.
Start frame delimiter (SFD) – indicate the start of
frame.
PLCP_PDU length word (PLW) – length of payload
PLCP Signalling field (PSF) – indicate data rate of
payload 0000 – 1Mbits/sec, granularity 500 Kbits/sec.
Header error check (HEC) – 16 bit checksum
DSSS Frame Structure


Self Study
MAC Layer


Three basic access mechanisms have been
defined for IEEE 802.11:(based on
CSMA/CA,RTS/CTS and polling) :−

First two method summarized as distributed
coordination function (DCF).


−

offers ASYN service and not require any access point
to control.

Third, point coordination function (PCF).


offers both ASYN and time-bounded service but need
an access point to control medium access.
Medium Access and Inter-frame Spacing







Short inter-frame spacing (SIFS) – shortest waiting
for medium access (highest priority) ex. Control msg.
PCF inter-frame spacing (PIFS) – used for time
bounded services.
DCF inter-frame spacing (DCF) – longest waiting
time and has the lowest priority for medium access.

[Contention – duration in which several nodes try to access
the medium]
Access Mechanism




DFWMAC-DCF using access mechanism
based on CSMA/CA.
Based on random access scheme with
carrier sense and collision avoidance
through random backoff.
Basic DFWMAC-DCF example
DFWMAC-DCF with RTS/CTS




In this,after waiting for DIFS + backoff time , the sender can issue a request
to send(RTS).
RTS will have same priority , it includes the recevier of the data transmission
and whole duration (data frame + ACK).



Other nodes receive this RTS will set its NAV(net allocation vector).



Receiver will answer RTS with CTS message after waiting for SIFS.



This CTS will also include duration of transmission
DFWMAC-PCF with polling



PCF- Point Coordination Function
It requires an access point that controls
medium access and polls the single nodes.
MAC frames



Frame control – serve
several purposes.











Duration/ID – indicating the
period of time in which the
medium is occupied, used to
set the NAV.
Address 1 to 4 – four
address fields contain
standard IEEE 802 MAC
addresses (48 bits each),
meaning of each address is
depend upon the DS bits.
Sequence control – seq.
no used to filter duplicates.











Protocol version – current protocol
version.
Type – function of frame : management
(00), control (01), or data (10) and value
(11) is reserved.
Subtype – subtype for management
frame: (0000) for association req. ,
(1000) beacon , RTS (1011), CTS
(1100).
More fragments – 1 more frag.
Present.
Retry – if retransmission set to 1.
Power Management – set to 1 then
power saver mode.
More data – indicate more data is
present between access point and
station nodes.
Interpretation of MAC addresses









Ad-hoc network – exchange of MAC frame between two
wireless nodes without a distribution system.
Infrastructure network(from AP) – frame physically
originates from an access point.
Infrastructure network (to AP) – station sends a packet to
another station via the access point.
Infrastructure network (within DS) – packet transmitted
between two access points.
BSSID – basic service set ID , DA – destination address , SA – source
address,RA – receiver address , TA – transmitter address.
MAC Management
Perform following tasks:







SYN – finding a wireless LAN, SYN of internal clock,
generation of becon signals.
Power Management – to control, transmitter activity
for power management (periodic sleep,buffering,
without missing a frame).
Roaming – joining a network,changing of access
points,scanning for access points.
Management information base(MIB) – parameters
representing the current state, can be accessed via
standardized protocol : simple network management
protocol (SNMP).
SYN










To SYN clocks of all nodes , timing
synchronization function (TSF).
Within a BSS, timing is conveyed by the
periodic transmissions of a beacon frame.
Beacon contains a timestamp and other
management information used for power
management and roaming.
Transmission of a beacon frame is not always
periodic as it deferred if the medium is busy.
In infra-based network , AP performs SYN by
transmitting the periodic beacon signal.
SYN example





Beacon intervals are not shifted if one beacon is
delayed.
Timestamp of beacon always reflects the real
transmit time, not the scheduled time.
Power Management






Wireless devices are battery powered , i.e power
saving mechanisms are crucial.
Basic idea of power management is to switch off the
transceiver whenever it is not needed.
PM is simple for sending device, but PM for receiver
can't known is advance.



Receiver “walk up” the transceiver periodically.



Power saving includes two states for a station:

Sleep and awake



Buffering of data in sender.
Power Management (Cont.)










Sender communicate with power saving station then
it has to buffer data.
If a station detects that it is a destination of a
buffered packet it has to stay awake until the
transmission takes place.
Walk up at right moment require the timing
synchronization function(TSF).
Power management in infra-based network is
simpler.
Beacon sent by the access point, a traffic indicating
map(TIM) is transmitted.
Power Management example

DTIM – delivery traffic indication map
Power Management in Ad-hoc
Self Study
Roaming


Moving between AP is called roaming.

Steps are as follows :

Check current link quality and scanning for another AP.



Scanning involves the active search for another BSS.
–

Passive scanning means listening into the medium to find
other n/w. i.e receiving beacon msg.

–

Active scanning means also sending a probe

–

and , beacon and prob responses used to join the new BSS



Select the best AP and send association request.



New BSS response the association request
IEEE 802.11b & 802.11a
Self Study
HIPERLAN






HIPERLAN – High Performance Local Area
Network
ETSI (European Telecommunication Standard
Institute) standardized HIPERLAN
HIPERLAN is a WLAN allowing for node
mobility and supporting ad-hoc and
infrastructure-based topologies.
Bluetooth


In 1998 five companies
(Ericsson,Intel,IBM,Nokia,Toshiba) founded
the Bluetooth consortium with the goal of
developing a single-chip,low-cost,radio-based
wireless network technology.
Bluetooth Architecture



Networking
Protocol Stack
Bluetooth Architecture (Networking)








It operate on 79 channels in the 2.4 GHz
band with 1 MHz carrier spacing.
Each device perform frequency hopping
with 1600 hops/s in a random fashion.
Piconet – it is a collection of Bluetooth device
which are SYN to the same hopping
sequence.
Piconet is a collection of devices with different
roles.
Cont.
















One device in piconet is master (M)
All other device connected to the
master are act as a slaves(S).
Two additional devices : parket
devices (P) and stand-by (SB)
P – known but they do not have
connection.
SB – do not participated in the
piconet.
M determine the hopping pattern in
the piconet
Slaves have to SYN to this pattern.
Each piconet has one master and
exctly 7 simultaneous slaves.
Formation of Piconet












As all devices use a same hopping
sequence they must be SYN.
Step 1 Master sending its clock
and device ID .
Step 2 hopping pattern is
determined by the device ID , a 48bit worldwide unique identifier.
Step 3 slaves adjust their internal
clock according to the master and
participated in the piconet.
All active devices are assigned a
3-bit active member address
(AMA).
All parket devices use an 8-bit
parket member address(PMA).
Formation of Scatternet






Groups of piconet called
scatternet.
Many piconet with
overlapping coverage can
form scatternet.
If a device wants to
participate in more then
one piconet, then it has to
SYN to the hopping seq. of
the piconet it wants to take
part in.
Bluetooth (Protocol Stack)


Protocol stack can be divided into two parts





Core specification
Profile specification

Core specification comprise following elements:

Radio



Baseband



Link Manager Protocol





Logical Link Control and adaptation
protocol (L2CAP)
Service discovery protocol
Bluetooth:Protocol
Stack:Core:Radio










It specifies the air interface i.e frequencies,
modulation and transmit power.
Bluetooth uses the license-free frequency
band at 2.4 GHz.
A frequency hopping/time-division duplex
scheme is used for transmission, with a fast
hopping rate of 1600 hops/sec.
A time interval between two hops is 625
mico sec.
Each slot uses different frequency
Bluetooth:Protocol
Stack:Core:Baseband



It manages frequncy hopping ,medium access and also defines the
packet format.



It defines 1-slot, 3-slot and 5 slot for higher data rates.



No frequency hopping is performed within packets.



In above example the master or one out of seven slaves may transmit data
in an alternative fashion.
Bluetooth:Protocol
Stack:Core:Baseband (Cont..)



Components of a bluetooth packet at baseband layer, packet
contains following three fields :





Access code– used for timing SYN and piconet
identification.
Packet header – used for addess, packet type , flow
and error control and checksum.The three bit active
member address (AMA) represent the active address
of the slave.
Payload – up to 343 bytes payload can be
transferred.
Bluetooth:Protocol
Stack:Core:Physical Link


It offers two different types of links:

Synchronous connection-oriented link(SCO)






For this master reserve two consecutive slots
(forward and return slots) at fixed intervals
Master can support upto three simultaneous
SCO links to the same slave or to different
slaves.

Asynchronous connectionless link(ACL)




Data applications , point-to-multipoint
transfer scenarios
Only one ACL links can exist between a master
and slave.
Bluetooth:Example data
transmission







Master always uses the even number of frequency slots ,
odds slots are for the slaves
Every sixth slot is used for an SCO link
ACL link use single or multiple slots providing asymmetric
bandwith
THANK YOU

More Related Content

What's hot

Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standardsM.k. Praveen
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 

What's hot (20)

Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
WLAN
WLANWLAN
WLAN
 
Ch3
Ch3Ch3
Ch3
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 

Viewers also liked

802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeEfiong Etuk
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 

Viewers also liked (13)

Lan architecture
Lan architectureLan architecture
Lan architecture
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your Life
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 

Similar to WLAN - IEEE 802.11

FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)Anup Bista
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Laniamtheone90
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
The osi model layers
The osi model layersThe osi model layers
The osi model layersINFitunes
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdfarkurkuri
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
Rk 4 signaling system
Rk 4 signaling systemRk 4 signaling system
Rk 4 signaling systemVishal Pandey
 

Similar to WLAN - IEEE 802.11 (20)

Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Mac 802.11
Mac 802.11Mac 802.11
Mac 802.11
 
RK-4 Signaling System.ppt
RK-4 Signaling System.pptRK-4 Signaling System.ppt
RK-4 Signaling System.ppt
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Rk 4 signaling system
Rk 4 signaling systemRk 4 signaling system
Rk 4 signaling system
 

More from Rahul Hada

Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical SystemRahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering IntroductionRahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using JavaRahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installationRahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud ComputingRahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell ProgrammingRahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobilityRahul Hada
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Quality planning
Quality planningQuality planning
Quality planningRahul Hada
 

More from Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

WLAN - IEEE 802.11

  • 1. WLAN – IEEE 802.11
  • 2. IEEE 802.11   802.11 standard only covers the physical layer PHY and medium access layer MAC. PHY divided into two sublayers :− −   Physical layer convergence protocol (PLCP) Physical medium dependent (PMD) PLCP – it provides a carrier sense signal called clear channel assessment (CCA), and provides a common PHY service access point (SAP). PMD – handles modulation and encoding /decoding of signals.
  • 3. Cont..  MAC – support the association and re-association of a station to an access point and roaming between different access point ,control authentication,encryption, synchronization and power management.
  • 4. PHY Layer  802.11 supports three versions of PHY layer − FHSS – Frequency hopping spread spectrum − DSSS – Direct sequence spread spectrum − Infra red [Spread Spectrum-techniques involve spreading the bandwidth needed to transmit data.]
  • 5. FHSS Frame Structure      Synchronization – 80 bit SYN (010101....), used to SYN potential receiver. Start frame delimiter (SFD) – indicate the start of frame. PLCP_PDU length word (PLW) – length of payload PLCP Signalling field (PSF) – indicate data rate of payload 0000 – 1Mbits/sec, granularity 500 Kbits/sec. Header error check (HEC) – 16 bit checksum
  • 7. MAC Layer  Three basic access mechanisms have been defined for IEEE 802.11:(based on CSMA/CA,RTS/CTS and polling) :− First two method summarized as distributed coordination function (DCF).  − offers ASYN service and not require any access point to control. Third, point coordination function (PCF).  offers both ASYN and time-bounded service but need an access point to control medium access.
  • 8. Medium Access and Inter-frame Spacing    Short inter-frame spacing (SIFS) – shortest waiting for medium access (highest priority) ex. Control msg. PCF inter-frame spacing (PIFS) – used for time bounded services. DCF inter-frame spacing (DCF) – longest waiting time and has the lowest priority for medium access. [Contention – duration in which several nodes try to access the medium]
  • 9. Access Mechanism   DFWMAC-DCF using access mechanism based on CSMA/CA. Based on random access scheme with carrier sense and collision avoidance through random backoff.
  • 11. DFWMAC-DCF with RTS/CTS   In this,after waiting for DIFS + backoff time , the sender can issue a request to send(RTS). RTS will have same priority , it includes the recevier of the data transmission and whole duration (data frame + ACK).  Other nodes receive this RTS will set its NAV(net allocation vector).  Receiver will answer RTS with CTS message after waiting for SIFS.  This CTS will also include duration of transmission
  • 12. DFWMAC-PCF with polling   PCF- Point Coordination Function It requires an access point that controls medium access and polls the single nodes.
  • 13. MAC frames  Frame control – serve several purposes.      Duration/ID – indicating the period of time in which the medium is occupied, used to set the NAV. Address 1 to 4 – four address fields contain standard IEEE 802 MAC addresses (48 bits each), meaning of each address is depend upon the DS bits. Sequence control – seq. no used to filter duplicates.      Protocol version – current protocol version. Type – function of frame : management (00), control (01), or data (10) and value (11) is reserved. Subtype – subtype for management frame: (0000) for association req. , (1000) beacon , RTS (1011), CTS (1100). More fragments – 1 more frag. Present. Retry – if retransmission set to 1. Power Management – set to 1 then power saver mode. More data – indicate more data is present between access point and station nodes.
  • 14. Interpretation of MAC addresses     Ad-hoc network – exchange of MAC frame between two wireless nodes without a distribution system. Infrastructure network(from AP) – frame physically originates from an access point. Infrastructure network (to AP) – station sends a packet to another station via the access point. Infrastructure network (within DS) – packet transmitted between two access points. BSSID – basic service set ID , DA – destination address , SA – source address,RA – receiver address , TA – transmitter address.
  • 15. MAC Management Perform following tasks:    SYN – finding a wireless LAN, SYN of internal clock, generation of becon signals. Power Management – to control, transmitter activity for power management (periodic sleep,buffering, without missing a frame). Roaming – joining a network,changing of access points,scanning for access points. Management information base(MIB) – parameters representing the current state, can be accessed via standardized protocol : simple network management protocol (SNMP).
  • 16. SYN      To SYN clocks of all nodes , timing synchronization function (TSF). Within a BSS, timing is conveyed by the periodic transmissions of a beacon frame. Beacon contains a timestamp and other management information used for power management and roaming. Transmission of a beacon frame is not always periodic as it deferred if the medium is busy. In infra-based network , AP performs SYN by transmitting the periodic beacon signal.
  • 17. SYN example   Beacon intervals are not shifted if one beacon is delayed. Timestamp of beacon always reflects the real transmit time, not the scheduled time.
  • 18. Power Management    Wireless devices are battery powered , i.e power saving mechanisms are crucial. Basic idea of power management is to switch off the transceiver whenever it is not needed. PM is simple for sending device, but PM for receiver can't known is advance.  Receiver “walk up” the transceiver periodically.  Power saving includes two states for a station: Sleep and awake  Buffering of data in sender.
  • 19. Power Management (Cont.)      Sender communicate with power saving station then it has to buffer data. If a station detects that it is a destination of a buffered packet it has to stay awake until the transmission takes place. Walk up at right moment require the timing synchronization function(TSF). Power management in infra-based network is simpler. Beacon sent by the access point, a traffic indicating map(TIM) is transmitted.
  • 20. Power Management example DTIM – delivery traffic indication map
  • 21. Power Management in Ad-hoc Self Study
  • 22. Roaming  Moving between AP is called roaming. Steps are as follows : Check current link quality and scanning for another AP.  Scanning involves the active search for another BSS. – Passive scanning means listening into the medium to find other n/w. i.e receiving beacon msg. – Active scanning means also sending a probe – and , beacon and prob responses used to join the new BSS  Select the best AP and send association request.  New BSS response the association request
  • 23. IEEE 802.11b & 802.11a Self Study
  • 24. HIPERLAN    HIPERLAN – High Performance Local Area Network ETSI (European Telecommunication Standard Institute) standardized HIPERLAN HIPERLAN is a WLAN allowing for node mobility and supporting ad-hoc and infrastructure-based topologies.
  • 25. Bluetooth  In 1998 five companies (Ericsson,Intel,IBM,Nokia,Toshiba) founded the Bluetooth consortium with the goal of developing a single-chip,low-cost,radio-based wireless network technology.
  • 27. Bluetooth Architecture (Networking)     It operate on 79 channels in the 2.4 GHz band with 1 MHz carrier spacing. Each device perform frequency hopping with 1600 hops/s in a random fashion. Piconet – it is a collection of Bluetooth device which are SYN to the same hopping sequence. Piconet is a collection of devices with different roles.
  • 28. Cont.         One device in piconet is master (M) All other device connected to the master are act as a slaves(S). Two additional devices : parket devices (P) and stand-by (SB) P – known but they do not have connection. SB – do not participated in the piconet. M determine the hopping pattern in the piconet Slaves have to SYN to this pattern. Each piconet has one master and exctly 7 simultaneous slaves.
  • 29. Formation of Piconet       As all devices use a same hopping sequence they must be SYN. Step 1 Master sending its clock and device ID . Step 2 hopping pattern is determined by the device ID , a 48bit worldwide unique identifier. Step 3 slaves adjust their internal clock according to the master and participated in the piconet. All active devices are assigned a 3-bit active member address (AMA). All parket devices use an 8-bit parket member address(PMA).
  • 30. Formation of Scatternet    Groups of piconet called scatternet. Many piconet with overlapping coverage can form scatternet. If a device wants to participate in more then one piconet, then it has to SYN to the hopping seq. of the piconet it wants to take part in.
  • 31. Bluetooth (Protocol Stack)  Protocol stack can be divided into two parts    Core specification Profile specification Core specification comprise following elements: Radio  Baseband  Link Manager Protocol   Logical Link Control and adaptation protocol (L2CAP) Service discovery protocol
  • 32. Bluetooth:Protocol Stack:Core:Radio      It specifies the air interface i.e frequencies, modulation and transmit power. Bluetooth uses the license-free frequency band at 2.4 GHz. A frequency hopping/time-division duplex scheme is used for transmission, with a fast hopping rate of 1600 hops/sec. A time interval between two hops is 625 mico sec. Each slot uses different frequency
  • 33. Bluetooth:Protocol Stack:Core:Baseband  It manages frequncy hopping ,medium access and also defines the packet format.  It defines 1-slot, 3-slot and 5 slot for higher data rates.  No frequency hopping is performed within packets.  In above example the master or one out of seven slaves may transmit data in an alternative fashion.
  • 34. Bluetooth:Protocol Stack:Core:Baseband (Cont..)  Components of a bluetooth packet at baseband layer, packet contains following three fields :   Access code– used for timing SYN and piconet identification. Packet header – used for addess, packet type , flow and error control and checksum.The three bit active member address (AMA) represent the active address of the slave. Payload – up to 343 bytes payload can be transferred.
  • 35. Bluetooth:Protocol Stack:Core:Physical Link  It offers two different types of links: Synchronous connection-oriented link(SCO)    For this master reserve two consecutive slots (forward and return slots) at fixed intervals Master can support upto three simultaneous SCO links to the same slave or to different slaves. Asynchronous connectionless link(ACL)   Data applications , point-to-multipoint transfer scenarios Only one ACL links can exist between a master and slave.
  • 36. Bluetooth:Example data transmission    Master always uses the even number of frequency slots , odds slots are for the slaves Every sixth slot is used for an SCO link ACL link use single or multiple slots providing asymmetric bandwith