SlideShare a Scribd company logo
1 of 9
Wireless Ethernet
802.11 Presentation 2




                        1
802.11 Physical Layer
   Frequency Allocation 802.11
   Direct-Sequence (DS) spread-spectrum radio
   Frequency-hopping(FH) spread-spectrum radio
   Infrared Light (IR)




Image acquired from
http://www.pulsewan.com/data101/802_11_b_basics.htm




                                                      2
Frequency-Hopping
 79 channels from 2.402 to 2.480 GHz with 1
  MHz channel space
 78 hopping sequences with minimum 6 MHz
  hopping space, each sequence uses every 79
  frequency elements once




                                               3
Direct Sequence Spread Spectrum
 Spreads signal by expanding the signal over a broad portion of the radio band.
 DBPSK Differential Binary Phase Shift Keying
 Ideal for high bandwidth apps.
 Uses higher power to transmit and more expensive to implement compared to FHSS.




Image acquired from http://www.wireless-telecom.com/images/dsss_pic.gif





                                                                                    4
Orthogonal Frequency Division
Multiplexing
 OFDM – Uses all 48 channels.
 Each Parallel bit stream is modulated differently; BPSK QPSK
  or QAM.
 Multipath propagation environment.




mage acquired from http://iaf-bs.de/img/con/projects/3glte-mimo-ofdm-testbed/3GLTE_Testbed_fading_adapt.jpg




                                                                                                              5
MAC Access Modes
 DCF – Distributed coordination function.
 PCF – Point coordination function.




   Image acquired from www.cisco.com/.../ 119001-120000/119161.jpg
   www.cisco.com/.../ 119001-120000/119161.jpg



                                                                      rich phelps 802.11 framing   6
Data Link Layer 802.11
   Two sub layers: Logical Link Control (LLC), Media Access Control (MAC)
   Same 802.2 LLC and 48-bit MAC addressing as for all other 802 LANs
   MAC layer similar but different to Ethernet 802.3
   Similarities: Contention-based
     ◦ Medium is free for all
     ◦ A node senses the free medium and occupies it as long as data packet
       requires it
   Differences: CSMA/CD vs CSMA/CA, CRC, packet fragmentation
   Ethernet 802.3 - CSMA/CD (Carrier Sense Multiple Access / Collision Detect)
     ◦ Collision detection possible because can send/receive simultaneously
   Ethernet 802.11 - CSMA/CA (Carrier Sense Multiple Access / Collision
    Avoidance)
     ◦ Collision detection not possible because of near/far problem for radios
     ◦ Steps: sense the air, wait, send, wait for ACK, retransmit if needed
     ◦ Optional RTS/CTS feature to solve “hidden node” problem
         “Hidden node”: where two stations on either side of an AP can’t hear each
          other broadcast.
   CRC – error checking at layer 2 (Ethernet assumes this is layer 3 task)
   Packet fragmentation: breaking large packets into smaller ones at MAC layer
   Overhead of MAC layer reduces throughput by 40-50%


                                                                                      7
802.11 MAC Frame
    NOTE: This frame structure is common for all data sent by a 802.11 station

      control info (WEP, data type as management, control, data ...)
                                               frame ordering
             next frame duration               info for RX

                   -Basic service identification            frame specific,
                   -source/destination address              variable length
                   -transmitting station
                   -receiving station




                                                                         frame check
                                                                         sequence
                                                                         (CRC)



                                                                                       8
Wired Equivalent Privacy
   Implemented at the MAC layer.
   RC4 Stream Cipher
   Provides encryption to data frames only




http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif
http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif




                                                                            9

More Related Content

What's hot

Spannig tree
Spannig treeSpannig tree
Spannig tree1 2d
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolRafat Khandaker
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteActionPacked Networks
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolArash Foroughi
 
Ucs security part2
Ucs security part2Ucs security part2
Ucs security part2Krunal Shah
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12CYBERINTELLIGENTS
 
DMA Controller Modes Of Operation
DMA Controller Modes Of OperationDMA Controller Modes Of Operation
DMA Controller Modes Of OperationNoor Nabi
 
Controller area network
Controller area networkController area network
Controller area networksanaz nouri
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answerNarayana Samy
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)swayambhoo
 

What's hot (20)

Spannig tree
Spannig treeSpannig tree
Spannig tree
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat SheetSpanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application Note
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Ucs security part2
Ucs security part2Ucs security part2
Ucs security part2
 
Managing Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN RoutingManaging Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN Routing
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
 
DMA Controller Modes Of Operation
DMA Controller Modes Of OperationDMA Controller Modes Of Operation
DMA Controller Modes Of Operation
 
Controller area network
Controller area networkController area network
Controller area network
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
Raj
RajRaj
Raj
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Switching
SwitchingSwitching
Switching
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 

Similar to 802 11 2

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.pptDigiPlexus
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless NetworksNapier University
 
sub.net substation monitor
sub.net substation monitorsub.net substation monitor
sub.net substation monitorrk_at_emsni
 
Manual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apManual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apCentro de Mídia
 
Data communication part2
Data communication part2Data communication part2
Data communication part2Melvin Cabatuan
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
 
NST Product Catalog
NST Product CatalogNST Product Catalog
NST Product Catalogmoonhyo
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 

Similar to 802 11 2 (20)

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
 
sub.net substation monitor
sub.net substation monitorsub.net substation monitor
sub.net substation monitor
 
Manual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apManual Air Live Wl 5460 ap
Manual Air Live Wl 5460 ap
 
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
2_wpan.ppt
2_wpan.ppt2_wpan.ppt
2_wpan.ppt
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
NST Product Catalog
NST Product CatalogNST Product Catalog
NST Product Catalog
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 

More from rphelps

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Eventrphelps
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connectrphelps
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staffrphelps
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencingrphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 

More from rphelps (6)

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Event
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connect
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staff
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencing
 
802 11 2
802 11 2802 11 2
802 11 2
 
802 11 3
802 11 3802 11 3
802 11 3
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

802 11 2

  • 2. 802.11 Physical Layer  Frequency Allocation 802.11  Direct-Sequence (DS) spread-spectrum radio  Frequency-hopping(FH) spread-spectrum radio  Infrared Light (IR) Image acquired from http://www.pulsewan.com/data101/802_11_b_basics.htm 2
  • 3. Frequency-Hopping  79 channels from 2.402 to 2.480 GHz with 1 MHz channel space  78 hopping sequences with minimum 6 MHz hopping space, each sequence uses every 79 frequency elements once 3
  • 4. Direct Sequence Spread Spectrum  Spreads signal by expanding the signal over a broad portion of the radio band.  DBPSK Differential Binary Phase Shift Keying  Ideal for high bandwidth apps.  Uses higher power to transmit and more expensive to implement compared to FHSS. Image acquired from http://www.wireless-telecom.com/images/dsss_pic.gif  4
  • 5. Orthogonal Frequency Division Multiplexing  OFDM – Uses all 48 channels.  Each Parallel bit stream is modulated differently; BPSK QPSK or QAM.  Multipath propagation environment. mage acquired from http://iaf-bs.de/img/con/projects/3glte-mimo-ofdm-testbed/3GLTE_Testbed_fading_adapt.jpg 5
  • 6. MAC Access Modes  DCF – Distributed coordination function.  PCF – Point coordination function.  Image acquired from www.cisco.com/.../ 119001-120000/119161.jpg  www.cisco.com/.../ 119001-120000/119161.jpg rich phelps 802.11 framing 6
  • 7. Data Link Layer 802.11  Two sub layers: Logical Link Control (LLC), Media Access Control (MAC)  Same 802.2 LLC and 48-bit MAC addressing as for all other 802 LANs  MAC layer similar but different to Ethernet 802.3  Similarities: Contention-based ◦ Medium is free for all ◦ A node senses the free medium and occupies it as long as data packet requires it  Differences: CSMA/CD vs CSMA/CA, CRC, packet fragmentation  Ethernet 802.3 - CSMA/CD (Carrier Sense Multiple Access / Collision Detect) ◦ Collision detection possible because can send/receive simultaneously  Ethernet 802.11 - CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) ◦ Collision detection not possible because of near/far problem for radios ◦ Steps: sense the air, wait, send, wait for ACK, retransmit if needed ◦ Optional RTS/CTS feature to solve “hidden node” problem  “Hidden node”: where two stations on either side of an AP can’t hear each other broadcast.  CRC – error checking at layer 2 (Ethernet assumes this is layer 3 task)  Packet fragmentation: breaking large packets into smaller ones at MAC layer  Overhead of MAC layer reduces throughput by 40-50% 7
  • 8. 802.11 MAC Frame  NOTE: This frame structure is common for all data sent by a 802.11 station control info (WEP, data type as management, control, data ...) frame ordering next frame duration info for RX -Basic service identification frame specific, -source/destination address variable length -transmitting station -receiving station frame check sequence (CRC) 8
  • 9. Wired Equivalent Privacy  Implemented at the MAC layer.  RC4 Stream Cipher  Provides encryption to data frames only http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif 9