SlideShare a Scribd company logo
REDES INALÁMBRICAS
                          Programación de dispositivos móviles.
                                 Prof. Joel Ruiz Ibarra.
                                   CESUES-UABJ.
                                     Agosto/2011




Friday, August 19, 2011
WHY WIRELESS?
                          This simple example ignores the challenges of scale.
                          Naturally, if the new users will overload the existing
                          infrastructure, the infrastructure itself will need to be
                          beefed up. Infrastructure expansion can be expensive
                          and time- consuming, especially if it involves legal and
                          regulatory approval. However, my basic point holds:
                          adding a user to a wireless network can often be
                          reduced to a matter of configuration (moving or
                          changing bits) while adding a user to a fixed network
                          requires making physical connections (moving atoms),
                          and moving bits is easier than moving atoms.

Friday, August 19, 2011
WHY WIRELESS?
                          Flexibility may be particularly important in older buildings because it reduces the
                          need for constructions.

                          Once a building is declared historical, remodeling can be particularly difficult.

                          In addition to meeting owner requirements, historical preservation agencies must
                          be satisfied that new construction is not desecrating the past.

                          Wireless networks can be deployed extremely rapidly in such environments
                          because there is only a small wired network to install.




Friday, August 19, 2011
WIRELESS DRAWBACK.

                          Although wireless LANs have somewhat limited
                          bandwidth, the limiting factor in networking a small
                          hot spot is likely to be the cost of WAN bandwidth to
                          the supporting infrastructure.




Friday, August 19, 2011
WIRELESS DRAWBACK.




Friday, August 19, 2011
THE LIMITS.
                          Wireless networks do not replace fixed networks.
                          The main advantage of mobility is that the network
                          user is moving.




Friday, August 19, 2011
THE LIMITS.
                          Servers and other data center equipment must access
                          data, but the physical location of the server is
                          irrelevant.
                          As long as the servers do not move, they may as well
                          be connected to wires that do not move.




Friday, August 19, 2011
802.11 were initially released in 1997. 802.11 included an infrared (IR) layer that was
                          never widely deployed, as well as two spread-spectrum radio layers: frequency hopping
                          (FH) and direct sequence (DS). (The differences between these two radio layers is
                          described in Chapter 10.) Initial 802.11 products were limited to 2 Mbps, which is quite


                             THE EVOLUTION.
                          slow by modern network standards. The IEEE 802.11 working group quickly began
                          working on faster radio layers and standardized both 802.11a and 802.11b in 1999.
                          Products based on 802.11b were released in 1999 and can operate at speeds of up to 11
                          Mbps. 802.11a uses a third radio technique called orthogonal frequency division
                          multiplexing (OFDM). 802.11a operates in a different frequency band entirely and
                          currently has regulatory approval only in the United States. As you can see from the
                          table, 802.11 already provides speeds faster than 10BASE-T Ethernet and is reasonably
                          competitive with Fast Ethernet.

                                           Table 1-2. Comparison of 802.11 standards
                             IEEE              Frequency
                                      Speed                                      Notes
                           standard               band
                                    1 Mbps               First standard (1997). Featured both frequency-
                          802.11             2.4 GHz     hopping and direct-sequence modulation
                                    2 Mbps               techniques.
                                    up to 54             Second standard (1999), but products not released
                          802.11a            5 GHz
                                    Mbps                 until late 2000.
                                    5.5 Mbps             Third standard, but second wave of products. The
                          802.11b            2.4 GHz     most common 802.11 equipment as this book was
                                    11 Mbps              written.
                                    up to 54
                          802.11g            2.4 GHz     Not yet standardized.
                                    Mbps




Friday, August 19, 2011
Chapter 3. The 802.11 MAC
                This chapter begins our exploration of the 802.11 standard in depth. Chapter 2 provided a
                high-level overview of the standard and discussed some of its fundamental attributes.
                           MEDIUM ACCESS CONTROL
                You are now at a fork in the book. Straight ahead lies a great deal of information on the
                802.11 specifications. It is possible, however, to build a wired network without a
                thorough and detailed understanding of the protocols, and the same is true for wireless
                networks. However, there are a number of situations in which you may need a deeper
                knowledge of the machinery under the hood:

                      •   Although 802.11 has been widely and rapidly adopted, security issues have
                          continued to grab headlines. Network managers will undoubtedly be asked to
                          comment on security issues, especially in any wireless LAN proposals. To
                          understand and participate in these discussions, read Chapter 5. As I write this,
                          WEP has been fully broken and the IEEE is forging a successor to it based on
                          802.1x. [1] Though the final form of the new and improved security framework has
                          not yet become apparent, it will almost surely be based on 802.1x, which is
                          described in Chapter 6.
                                 [1]
                                       And as we go to press, 802.1x has reportedly been broken.

                      •   Troubleshooting wireless networks is similar to troubleshooting wired networks
                          but can be much more complex. As always, a trusty packet sniffer can be an
                          invaluable aid. To take full advantage of a packet sniffer, though, you need to
                          understand what the packets mean to interpret your network's behavior.
                      •   Tuning a wireless network is tied intimately to a number of parameters in the
                          specification. To understand the behavior of your network and what effect the
                          optimizations will have requires a knowledge of what those parameters really do.
                      •   Device drivers may expose low-level knobs and dials for you to play with. Most
Friday, August 19, 2011   drivers provide good defaults for all of the parameters, but some give you
•   Although 802.11 has been widely and rapidly adopted, security issues have
                                  continued to grab headlines. Network managers will undoubtedly be asked to
                                  comment on security issues, especially in any wireless LAN proposals. To
                                  understand and participate in these discussions, read Chapter 5. As I write this,
                              MEDIUM ACCESS CONTROL
                                  WEP has been fully broken and the IEEE is forging a successor to it based on
                                  802.1x. [1] Though the final form of the new and improved security framework has
                                  not yet become apparent, it will almost surely be based on 802.1x, which is
                                  described in Chapter 6.
                                          [1]
                                                And as we go to press, 802.1x has reportedly been broken.

                              •   Troubleshooting wireless networks is similar to troubleshooting wired networks
                                  but can be much more complex. As always, a trusty packet sniffer can be an
                                  invaluable aid. To take full advantage of a packet sniffer, though, you need to
                                  understand what the packets mean to interpret your network's behavior.
                              •   Tuning a wireless network is tied intimately to a number of parameters in the
                                  specification. To understand the behavior of your network and what effect the
                                  optimizations will have requires a knowledge of what those parameters really do.
                              •   Device drivers may expose low-level knobs and dials for you to play with. Most
                                  drivers provide good defaults for all of the parameters, but some give you
                                  freedom to experiment. Open source software users have the source code and are
                                  free to experiment with any and all settings.
                              •   A number of interesting features of the standard have not been implemented by
                                  the current products, but they may be implemented later. As these features are
                                  rolled out, you may need to know what they are and how to use them.

                          As with many other things in life, the more you know, the better off you are. Ethernet is
                          usually trouble-free, but serious network administrators have long known that when you
                          do run into trouble, there is no substitute for thorough knowledge of how the network is
                          working. To some extent, 802.11 networks have had a "free ride" the past few years.
Friday, August 19, 2011
                          Because they were cool, users were forgiving when they failed; wireless connectivity was
drivers provide good defaults for all of the parameters, but some give you
                                  freedom to experiment. Open source software users have the source code and are
                                  free to experiment with any and all settings.
                              •   A number of interesting features of the standard have not been implemented by
                                  the current products, but they may be implemented later. As these features are

                            MEDIUM ACCESS CONTROL
                                  rolled out, you may need to know what they are and how to use them.

                          As with many other things in life, the more you know, the better off you are. Ethernet is
                          usually trouble-free, but serious network administrators have long known that when you
                          do run into trouble, there is no substitute for thorough knowledge of how the network is
                          working. To some extent, 802.11 networks have had a "free ride" the past few years.
                          Because they were cool, users were forgiving when they failed; wireless connectivity was
                          a privilege, not a right. And since there were relatively few networks and relatively few
                          users on those networks, the networks were rarely subjected to severe stresses. An
                          Ethernet that has only a half dozen nodes is not likely to be a source of problems;
                          problems occur when you add a few high-capacity servers, a few hundred users, and the
                          associated bridges and routers to glue everything together. There is no reason to believe




                          that wireless will be any different. A couple of access points serving a half dozen users
                          will not reveal any problems. But when the user community grows to a few dozen, and
                          you have several overlapping wireless networks, each with its own set of access points,
                          you can expect to see the effects of stress.

                          That is why you should read this chapter. Now on to the details.

                          The key to the 802.11 specification is the MAC. It rides on every physical layer and
                          controls the transmission of user data into the air. It provides the core framing operations
                          and the interaction with a wired network backbone. Different physical layers may provide
                          different transmission speeds, all of which are supposed to interoperate.
Friday, August 19, 2011
MEDIUM ACCESS CONTROL
               that wireless will be any different. A couple of access points serving a half dozen users
               will not reveal any problems. But when the user community grows to a few dozen, and
               you have several overlapping wireless networks, each with its own set of access points,
               you can expect to see the effects of stress.

               That is why you should read this chapter. Now on to the details.

               The key to the 802.11 specification is the MAC. It rides on every physical layer and
               controls the transmission of user data into the air. It provides the core framing operations
               and the interaction with a wired network backbone. Different physical layers may provide
               different transmission speeds, all of which are supposed to interoperate.

               802.11 does not depart from the previous IEEE 802 standards in any radical way. The
               standard successfully adapts Ethernet-style networking to radio links. Like Ethernet,
               802.11 uses a carrier sense multiple access (CSMA) scheme to control access to the
               transmission medium. However, collisions waste valuable transmission capacity, so
               rather than the collision detection (CSMA/CD) employed by Ethernet, 802.11 uses
               collision avoidance (CSMA/CA). Also like Ethernet, 802.11 uses a distributed access
               scheme with no centralized controller. Each 802.11 station uses the same method to gain
               access to the medium. The major differences between 802.11 and Ethernet stem from the
               differences in the underlying medium.

               This chapter provides some insight into the motivations of the MAC designers by
               describing some challenges they needed to overcome and describes the rules used for
Friday, August 19, 2011
that wireless will be any different. A couple of access points serving a half dozen users
             will not reveal any problems. But when the user community grows to a few dozen, and
             you have several overlapping wireless networks, each with its own set of access points,
             you can expect to see the effects of stress.
                      MEDIUM chapter. Now on to theCONTROL
             That is why you should read this
                                              ACCESS details.
             The key to the 802.11 specification is the MAC. It rides on every physical layer and
             controls the transmission of user data into the air. It provides the core framing operations
             and the interaction with a wired network backbone. Different physical layers may provide
             different transmission speeds, all of which are supposed to interoperate.

             802.11 does not depart from the previous IEEE 802 standards in any radical way. The
             standard successfully adapts Ethernet-style networking to radio links. Like Ethernet,
             802.11 uses a carrier sense multiple access (CSMA) scheme to control access to the
             transmission medium. However, collisions waste valuable transmission capacity, so
             rather than the collision detection (CSMA/CD) employed by Ethernet, 802.11 uses
             collision avoidance (CSMA/CA). Also like Ethernet, 802.11 uses a distributed access
             scheme with no centralized controller. Each 802.11 station uses the same method to gain
             access to the medium. The major differences between 802.11 and Ethernet stem from the
             differences in the underlying medium.

                    This chapter provides some insight into the motivations of the MAC designers by
                    describing some challenges they needed to overcome and describes the rules used for
                    access to the medium, as well as the basic frame structure. If you simply want to
                    understand the basic frame sequences that you will see on an 802.11 network, skip ahead
                    to the end of this chapter. For further information on the MAC, consult its formal
                    specification in Clause 9 of the 802.11 standard; detailed MAC state diagrams are in
                    Annex C.
Friday, August 19, 2011
REFERENCES.



                          802.11 Wireless Networks - Definitive guide. Mattew
                          Gast. Editorial O’reilly. (2002).




Friday, August 19, 2011

More Related Content

What's hot

Igal Rotem Invent Or Die
Igal Rotem  Invent Or DieIgal Rotem  Invent Or Die
Igal Rotem Invent Or Die
MIT Forum of Israel
 
An Overview of IEEE 802.16m Radio Access Technology Globecom 2010
An Overview of IEEE 802.16m Radio Access Technology Globecom 2010An Overview of IEEE 802.16m Radio Access Technology Globecom 2010
An Overview of IEEE 802.16m Radio Access Technology Globecom 2010Sassan Ahmadi
 
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGYON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ijmnct
 
AzteQ Laser Links
AzteQ Laser LinksAzteQ Laser Links
AzteQ Laser Links
gcsmith007
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
Wail Hassan
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Cisco Mobility
 
peer division multiplexing
peer division multiplexingpeer division multiplexing
peer division multiplexingajayj251
 
Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...
Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...
Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...
IEEE Standards Association (IEEE SA)
 
Intel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV PerformanceIntel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV Performance
Dhiman Chowdhury
 
AP6522 Specification Sheet
AP6522 Specification SheetAP6522 Specification Sheet
AP6522 Specification Sheet
Advantec Distribution
 
Tns data center presentation
Tns data center presentationTns data center presentation
Tns data center presentation
Sanjeev Jain
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputer
Agus Kurniawan
 

What's hot (18)

Ap5131 ss 0409
Ap5131 ss 0409Ap5131 ss 0409
Ap5131 ss 0409
 
Igal Rotem Invent Or Die
Igal Rotem  Invent Or DieIgal Rotem  Invent Or Die
Igal Rotem Invent Or Die
 
An Overview of IEEE 802.16m Radio Access Technology Globecom 2010
An Overview of IEEE 802.16m Radio Access Technology Globecom 2010An Overview of IEEE 802.16m Radio Access Technology Globecom 2010
An Overview of IEEE 802.16m Radio Access Technology Globecom 2010
 
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGYON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
 
CISCO
CISCOCISCO
CISCO
 
Lecture 1 4
Lecture 1 4Lecture 1 4
Lecture 1 4
 
AzteQ Laser Links
AzteQ Laser LinksAzteQ Laser Links
AzteQ Laser Links
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
 
peer division multiplexing
peer division multiplexingpeer division multiplexing
peer division multiplexing
 
Ap 622 ss 0112_chv4
Ap 622 ss 0112_chv4Ap 622 ss 0112_chv4
Ap 622 ss 0112_chv4
 
Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...
Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...
Ethernet: A look at the Ubiquitous Wired Networking Technology and Why it Mak...
 
Intel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV PerformanceIntel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV Performance
 
AP6522 Specification Sheet
AP6522 Specification SheetAP6522 Specification Sheet
AP6522 Specification Sheet
 
Networks
NetworksNetworks
Networks
 
Tns data center presentation
Tns data center presentationTns data center presentation
Tns data center presentation
 
Tutorial Jaringan komputer
Tutorial Jaringan komputerTutorial Jaringan komputer
Tutorial Jaringan komputer
 
Ap7161 spec sheet
Ap7161 spec sheetAp7161 spec sheet
Ap7161 spec sheet
 

Viewers also liked

Sesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipalSesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipalAlexander Puertas
 
Cara Set Up FTP server di ubuntu
Cara Set Up FTP server di ubuntuCara Set Up FTP server di ubuntu
Cara Set Up FTP server di ubuntu
Robby Firmansyah
 
Managing Apache Project Brands
Managing Apache Project BrandsManaging Apache Project Brands
Managing Apache Project Brands
Shane Curcuru
 
Confessions & Lessons
Confessions & LessonsConfessions & Lessons
Confessions & Lessons
Sarah Prevette
 
Вернадский и Тамбовский край
Вернадский и Тамбовский крайВернадский и Тамбовский край
Вернадский и Тамбовский край
ninaviktor
 
Joy z liu_visual_resume_2013
Joy z liu_visual_resume_2013Joy z liu_visual_resume_2013
Joy z liu_visual_resume_2013Joy Liu
 
Pengembangan dan Aplikasi K3 dalam Perusahaan
Pengembangan dan Aplikasi K3 dalam PerusahaanPengembangan dan Aplikasi K3 dalam Perusahaan
Pengembangan dan Aplikasi K3 dalam Perusahaan
Robby Firmansyah
 
wewalkthetalk - EFA Final
wewalkthetalk - EFA Finalwewalkthetalk - EFA Final
wewalkthetalk - EFA FinalAngad Singh
 
SafePeak - How to manually configure SafePeak Cluster
SafePeak - How to manually configure SafePeak ClusterSafePeak - How to manually configure SafePeak Cluster
SafePeak - How to manually configure SafePeak Cluster
Vladi Vexler
 
Kudavi 1.30.2016
Kudavi 1.30.2016Kudavi 1.30.2016
Kudavi 1.30.2016
Tom Currier
 
Upload.ppt
Upload.pptUpload.ppt
Upload.pptMay Mei
 
Panduan si harka_sebagai_pegawai
Panduan si harka_sebagai_pegawaiPanduan si harka_sebagai_pegawai
Panduan si harka_sebagai_pegawai
Wenni Meliana
 
7 причин, почему Ваш сайт не продает
7 причин, почему Ваш сайт не продает7 причин, почему Ваш сайт не продает
7 причин, почему Ваш сайт не продаетValeria Gurianova
 
Ppt moodle sip
Ppt moodle sipPpt moodle sip
Ppt moodle sip
Robby Firmansyah
 
Impatto di internet su associazionismo
Impatto di internet su associazionismoImpatto di internet su associazionismo
Impatto di internet su associazionismo
valeria baudo
 
Proses dan Manajemen Proses di Linux
Proses dan Manajemen Proses di LinuxProses dan Manajemen Proses di Linux
Proses dan Manajemen Proses di Linux
Robby Firmansyah
 
Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)MaVis Tseng
 
HTML an introduction
HTML an introductionHTML an introduction
HTML an introductionNiamh Foley
 

Viewers also liked (20)

Sesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipalSesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipal
 
Cara Set Up FTP server di ubuntu
Cara Set Up FTP server di ubuntuCara Set Up FTP server di ubuntu
Cara Set Up FTP server di ubuntu
 
Managing Apache Project Brands
Managing Apache Project BrandsManaging Apache Project Brands
Managing Apache Project Brands
 
Confessions & Lessons
Confessions & LessonsConfessions & Lessons
Confessions & Lessons
 
Вернадский и Тамбовский край
Вернадский и Тамбовский крайВернадский и Тамбовский край
Вернадский и Тамбовский край
 
Joy z liu_visual_resume_2013
Joy z liu_visual_resume_2013Joy z liu_visual_resume_2013
Joy z liu_visual_resume_2013
 
Pengembangan dan Aplikasi K3 dalam Perusahaan
Pengembangan dan Aplikasi K3 dalam PerusahaanPengembangan dan Aplikasi K3 dalam Perusahaan
Pengembangan dan Aplikasi K3 dalam Perusahaan
 
wewalkthetalk - EFA Final
wewalkthetalk - EFA Finalwewalkthetalk - EFA Final
wewalkthetalk - EFA Final
 
Cv
CvCv
Cv
 
SafePeak - How to manually configure SafePeak Cluster
SafePeak - How to manually configure SafePeak ClusterSafePeak - How to manually configure SafePeak Cluster
SafePeak - How to manually configure SafePeak Cluster
 
Kudavi 1.30.2016
Kudavi 1.30.2016Kudavi 1.30.2016
Kudavi 1.30.2016
 
Upload.ppt
Upload.pptUpload.ppt
Upload.ppt
 
Panduan si harka_sebagai_pegawai
Panduan si harka_sebagai_pegawaiPanduan si harka_sebagai_pegawai
Panduan si harka_sebagai_pegawai
 
7 причин, почему Ваш сайт не продает
7 причин, почему Ваш сайт не продает7 причин, почему Ваш сайт не продает
7 причин, почему Ваш сайт не продает
 
Unit 57 terminology becky doyle
Unit 57 terminology becky doyleUnit 57 terminology becky doyle
Unit 57 terminology becky doyle
 
Ppt moodle sip
Ppt moodle sipPpt moodle sip
Ppt moodle sip
 
Impatto di internet su associazionismo
Impatto di internet su associazionismoImpatto di internet su associazionismo
Impatto di internet su associazionismo
 
Proses dan Manajemen Proses di Linux
Proses dan Manajemen Proses di LinuxProses dan Manajemen Proses di Linux
Proses dan Manajemen Proses di Linux
 
Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)
 
HTML an introduction
HTML an introductionHTML an introduction
HTML an introduction
 

Similar to 2 wireless

802.11 Wireless Networks The Definitive Guide
802.11  Wireless Networks  The Definitive Guide802.11  Wireless Networks  The Definitive Guide
802.11 Wireless Networks The Definitive Guide
Alicia Edwards
 
802.11 wireless networks the definitive guide.pdf
802.11 wireless networks  the definitive guide.pdf802.11 wireless networks  the definitive guide.pdf
802.11 wireless networks the definitive guide.pdf
Christine Williams
 
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricComparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
IRJET Journal
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
SURESHA V
 
802.11ac whitepaper
802.11ac whitepaper802.11ac whitepaper
802.11ac whitepaper
Michal Jarski
 
Wireless E Councill
Wireless E CouncillWireless E Councill
Wireless E Councillguest70c61b
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
AssocaKazama
 
Wimax Whitepaper
Wimax  WhitepaperWimax  Whitepaper
Wimax WhitepaperAmal Shah
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
Adeel Mirza
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
Savvius, Inc
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
AbhradipChatterjee2
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
abenimelos
 

Similar to 2 wireless (20)

802.11 Wireless Networks The Definitive Guide
802.11  Wireless Networks  The Definitive Guide802.11  Wireless Networks  The Definitive Guide
802.11 Wireless Networks The Definitive Guide
 
802.11 wireless networks the definitive guide.pdf
802.11 wireless networks  the definitive guide.pdf802.11 wireless networks  the definitive guide.pdf
802.11 wireless networks the definitive guide.pdf
 
11ac the next evolution of wi fi
11ac the next evolution of wi fi11ac the next evolution of wi fi
11ac the next evolution of wi fi
 
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricComparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Capitulo 5
Capitulo 5Capitulo 5
Capitulo 5
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
802.11ac whitepaper
802.11ac whitepaper802.11ac whitepaper
802.11ac whitepaper
 
Wireless E Councill
Wireless E CouncillWireless E Councill
Wireless E Councill
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
 
Wimax Whitepaper
Wimax  WhitepaperWimax  Whitepaper
Wimax Whitepaper
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
ieee 802.11n
ieee 802.11nieee 802.11n
ieee 802.11n
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
 
Ig3115521556
Ig3115521556Ig3115521556
Ig3115521556
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

2 wireless

  • 1. REDES INALÁMBRICAS Programación de dispositivos móviles. Prof. Joel Ruiz Ibarra. CESUES-UABJ. Agosto/2011 Friday, August 19, 2011
  • 2. WHY WIRELESS? This simple example ignores the challenges of scale. Naturally, if the new users will overload the existing infrastructure, the infrastructure itself will need to be beefed up. Infrastructure expansion can be expensive and time- consuming, especially if it involves legal and regulatory approval. However, my basic point holds: adding a user to a wireless network can often be reduced to a matter of configuration (moving or changing bits) while adding a user to a fixed network requires making physical connections (moving atoms), and moving bits is easier than moving atoms. Friday, August 19, 2011
  • 3. WHY WIRELESS? Flexibility may be particularly important in older buildings because it reduces the need for constructions. Once a building is declared historical, remodeling can be particularly difficult. In addition to meeting owner requirements, historical preservation agencies must be satisfied that new construction is not desecrating the past. Wireless networks can be deployed extremely rapidly in such environments because there is only a small wired network to install. Friday, August 19, 2011
  • 4. WIRELESS DRAWBACK. Although wireless LANs have somewhat limited bandwidth, the limiting factor in networking a small hot spot is likely to be the cost of WAN bandwidth to the supporting infrastructure. Friday, August 19, 2011
  • 6. THE LIMITS. Wireless networks do not replace fixed networks. The main advantage of mobility is that the network user is moving. Friday, August 19, 2011
  • 7. THE LIMITS. Servers and other data center equipment must access data, but the physical location of the server is irrelevant. As long as the servers do not move, they may as well be connected to wires that do not move. Friday, August 19, 2011
  • 8. 802.11 were initially released in 1997. 802.11 included an infrared (IR) layer that was never widely deployed, as well as two spread-spectrum radio layers: frequency hopping (FH) and direct sequence (DS). (The differences between these two radio layers is described in Chapter 10.) Initial 802.11 products were limited to 2 Mbps, which is quite THE EVOLUTION. slow by modern network standards. The IEEE 802.11 working group quickly began working on faster radio layers and standardized both 802.11a and 802.11b in 1999. Products based on 802.11b were released in 1999 and can operate at speeds of up to 11 Mbps. 802.11a uses a third radio technique called orthogonal frequency division multiplexing (OFDM). 802.11a operates in a different frequency band entirely and currently has regulatory approval only in the United States. As you can see from the table, 802.11 already provides speeds faster than 10BASE-T Ethernet and is reasonably competitive with Fast Ethernet. Table 1-2. Comparison of 802.11 standards IEEE Frequency Speed Notes standard band 1 Mbps First standard (1997). Featured both frequency- 802.11 2.4 GHz hopping and direct-sequence modulation 2 Mbps techniques. up to 54 Second standard (1999), but products not released 802.11a 5 GHz Mbps until late 2000. 5.5 Mbps Third standard, but second wave of products. The 802.11b 2.4 GHz most common 802.11 equipment as this book was 11 Mbps written. up to 54 802.11g 2.4 GHz Not yet standardized. Mbps Friday, August 19, 2011
  • 9. Chapter 3. The 802.11 MAC This chapter begins our exploration of the 802.11 standard in depth. Chapter 2 provided a high-level overview of the standard and discussed some of its fundamental attributes. MEDIUM ACCESS CONTROL You are now at a fork in the book. Straight ahead lies a great deal of information on the 802.11 specifications. It is possible, however, to build a wired network without a thorough and detailed understanding of the protocols, and the same is true for wireless networks. However, there are a number of situations in which you may need a deeper knowledge of the machinery under the hood: • Although 802.11 has been widely and rapidly adopted, security issues have continued to grab headlines. Network managers will undoubtedly be asked to comment on security issues, especially in any wireless LAN proposals. To understand and participate in these discussions, read Chapter 5. As I write this, WEP has been fully broken and the IEEE is forging a successor to it based on 802.1x. [1] Though the final form of the new and improved security framework has not yet become apparent, it will almost surely be based on 802.1x, which is described in Chapter 6. [1] And as we go to press, 802.1x has reportedly been broken. • Troubleshooting wireless networks is similar to troubleshooting wired networks but can be much more complex. As always, a trusty packet sniffer can be an invaluable aid. To take full advantage of a packet sniffer, though, you need to understand what the packets mean to interpret your network's behavior. • Tuning a wireless network is tied intimately to a number of parameters in the specification. To understand the behavior of your network and what effect the optimizations will have requires a knowledge of what those parameters really do. • Device drivers may expose low-level knobs and dials for you to play with. Most Friday, August 19, 2011 drivers provide good defaults for all of the parameters, but some give you
  • 10. Although 802.11 has been widely and rapidly adopted, security issues have continued to grab headlines. Network managers will undoubtedly be asked to comment on security issues, especially in any wireless LAN proposals. To understand and participate in these discussions, read Chapter 5. As I write this, MEDIUM ACCESS CONTROL WEP has been fully broken and the IEEE is forging a successor to it based on 802.1x. [1] Though the final form of the new and improved security framework has not yet become apparent, it will almost surely be based on 802.1x, which is described in Chapter 6. [1] And as we go to press, 802.1x has reportedly been broken. • Troubleshooting wireless networks is similar to troubleshooting wired networks but can be much more complex. As always, a trusty packet sniffer can be an invaluable aid. To take full advantage of a packet sniffer, though, you need to understand what the packets mean to interpret your network's behavior. • Tuning a wireless network is tied intimately to a number of parameters in the specification. To understand the behavior of your network and what effect the optimizations will have requires a knowledge of what those parameters really do. • Device drivers may expose low-level knobs and dials for you to play with. Most drivers provide good defaults for all of the parameters, but some give you freedom to experiment. Open source software users have the source code and are free to experiment with any and all settings. • A number of interesting features of the standard have not been implemented by the current products, but they may be implemented later. As these features are rolled out, you may need to know what they are and how to use them. As with many other things in life, the more you know, the better off you are. Ethernet is usually trouble-free, but serious network administrators have long known that when you do run into trouble, there is no substitute for thorough knowledge of how the network is working. To some extent, 802.11 networks have had a "free ride" the past few years. Friday, August 19, 2011 Because they were cool, users were forgiving when they failed; wireless connectivity was
  • 11. drivers provide good defaults for all of the parameters, but some give you freedom to experiment. Open source software users have the source code and are free to experiment with any and all settings. • A number of interesting features of the standard have not been implemented by the current products, but they may be implemented later. As these features are MEDIUM ACCESS CONTROL rolled out, you may need to know what they are and how to use them. As with many other things in life, the more you know, the better off you are. Ethernet is usually trouble-free, but serious network administrators have long known that when you do run into trouble, there is no substitute for thorough knowledge of how the network is working. To some extent, 802.11 networks have had a "free ride" the past few years. Because they were cool, users were forgiving when they failed; wireless connectivity was a privilege, not a right. And since there were relatively few networks and relatively few users on those networks, the networks were rarely subjected to severe stresses. An Ethernet that has only a half dozen nodes is not likely to be a source of problems; problems occur when you add a few high-capacity servers, a few hundred users, and the associated bridges and routers to glue everything together. There is no reason to believe that wireless will be any different. A couple of access points serving a half dozen users will not reveal any problems. But when the user community grows to a few dozen, and you have several overlapping wireless networks, each with its own set of access points, you can expect to see the effects of stress. That is why you should read this chapter. Now on to the details. The key to the 802.11 specification is the MAC. It rides on every physical layer and controls the transmission of user data into the air. It provides the core framing operations and the interaction with a wired network backbone. Different physical layers may provide different transmission speeds, all of which are supposed to interoperate. Friday, August 19, 2011
  • 12. MEDIUM ACCESS CONTROL that wireless will be any different. A couple of access points serving a half dozen users will not reveal any problems. But when the user community grows to a few dozen, and you have several overlapping wireless networks, each with its own set of access points, you can expect to see the effects of stress. That is why you should read this chapter. Now on to the details. The key to the 802.11 specification is the MAC. It rides on every physical layer and controls the transmission of user data into the air. It provides the core framing operations and the interaction with a wired network backbone. Different physical layers may provide different transmission speeds, all of which are supposed to interoperate. 802.11 does not depart from the previous IEEE 802 standards in any radical way. The standard successfully adapts Ethernet-style networking to radio links. Like Ethernet, 802.11 uses a carrier sense multiple access (CSMA) scheme to control access to the transmission medium. However, collisions waste valuable transmission capacity, so rather than the collision detection (CSMA/CD) employed by Ethernet, 802.11 uses collision avoidance (CSMA/CA). Also like Ethernet, 802.11 uses a distributed access scheme with no centralized controller. Each 802.11 station uses the same method to gain access to the medium. The major differences between 802.11 and Ethernet stem from the differences in the underlying medium. This chapter provides some insight into the motivations of the MAC designers by describing some challenges they needed to overcome and describes the rules used for Friday, August 19, 2011
  • 13. that wireless will be any different. A couple of access points serving a half dozen users will not reveal any problems. But when the user community grows to a few dozen, and you have several overlapping wireless networks, each with its own set of access points, you can expect to see the effects of stress. MEDIUM chapter. Now on to theCONTROL That is why you should read this ACCESS details. The key to the 802.11 specification is the MAC. It rides on every physical layer and controls the transmission of user data into the air. It provides the core framing operations and the interaction with a wired network backbone. Different physical layers may provide different transmission speeds, all of which are supposed to interoperate. 802.11 does not depart from the previous IEEE 802 standards in any radical way. The standard successfully adapts Ethernet-style networking to radio links. Like Ethernet, 802.11 uses a carrier sense multiple access (CSMA) scheme to control access to the transmission medium. However, collisions waste valuable transmission capacity, so rather than the collision detection (CSMA/CD) employed by Ethernet, 802.11 uses collision avoidance (CSMA/CA). Also like Ethernet, 802.11 uses a distributed access scheme with no centralized controller. Each 802.11 station uses the same method to gain access to the medium. The major differences between 802.11 and Ethernet stem from the differences in the underlying medium. This chapter provides some insight into the motivations of the MAC designers by describing some challenges they needed to overcome and describes the rules used for access to the medium, as well as the basic frame structure. If you simply want to understand the basic frame sequences that you will see on an 802.11 network, skip ahead to the end of this chapter. For further information on the MAC, consult its formal specification in Clause 9 of the 802.11 standard; detailed MAC state diagrams are in Annex C. Friday, August 19, 2011
  • 14. REFERENCES. 802.11 Wireless Networks - Definitive guide. Mattew Gast. Editorial O’reilly. (2002). Friday, August 19, 2011