SlideShare a Scribd company logo
Communication
Networks
Wireless LAN
– IEEE 802.11
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
In this session:
ARCHITECTURAL
COMPARISON
PROBLEMS IN
WLANs
ADDRESSING
MODES
ACCESS
METHOD
MAC LAYERS OF
WLAN
FRAME
FORMAT
ARCHITECTURE OF
WLAN
Visit www.youtube.com/GURUKULA for Lecture Videos
Architectural Comparison
• Obviously, its wired.
• Hosts are always connected
to the network
• Lack of mobility
• Point to point
communication
• Obviously, its wire free.
• Hosts need not be always
connected to the network
• High mobility
• Broad cast
communication
Similarities and connection to other NWs
Similarities:
Both uses PHYSICAL Addressing modes
Connecting to other NWs:
In wireless cases only the internal or limited area is wireless.
Example, The connection between your laptop and the
modem in your home is wireless. But still the connections
behind the modem are wired. (Remember ISP’s and Back
Bone Networks)
Problems in Wireless LANs (WLAN)
Unpredictable
Environment Reliability of message as
we cannot send it for
intended user
Power Requirements
for transmitting and
receiving
There are lots of chances
for Eavesdropping
➢ All these issues are common problems that arises
when we migrate from wired to wireless mode of
communication.
➢ As a communication engineer , we should
incorporate required mechanisms to overcome
these challengesVisit www.youtube.com/GURUKULA for Lecture Videos
Lets discuss in Engineering Perspective
Attenuation:
➢ The strength of electromagnetic signals decreases rapidly because
the signal disperses in all directions;
➢ The situation becomes worse with mobile senders that operate on
batteries and normally have small power supplies.
Interference:
➢ Another issue is that a receiver may receive signals not only from
the intended sender, but also from other senders if they are using
the same frequency band.
Multipath Propagation:
➢ A receiver may receive more than one signal from the
same sender because electromagnetic waves can be
reflected back from obstacles such as walls, the
ground, or objects. The result is that the receiver
receives some signals at different phases (because
they travel different paths). This makes the signal less
recognizable.
Access Control
Mechanism –
CSMA CA
Visit www.youtube.com/GURUKULA for Lecture Videos
Why not CSMA – CD in WLANs ?
1. Need for Full Duplex
To detect a collision, a host needs to send and receive at the same time, which means the host needs to work in a
duplex mode. Wireless hosts do not have enough power to do so. They can only send or receive at one time.
2. Hidden Node Problem:
• Any node present in their respective region can hear all of its respective
transmission
• From figure station C is outside the coverage of station A
• Station A is outside the coverage of station C
• Station B is covered by both A and C. Hence it can hear all communications
from A and C as well.
• A sends data to B. after some time C sends data to B. this leads in collision. (C
does not know that A is transmitting the data to B)
• In this case A and C are hidden Nodes to each other.
• This problem is overcome by using handshaking signals before transmission
3. Signal Fading
Due to large distance between the stations fading occurs. This prevents the station at one end from hearing
a collision at other end. Visit www.youtube.com/GURUKULA for Lecture Videos
Architecture of 802.11
• IEEE 802.11 standard defines 2 types of services they are
• Basic Service Set – BSS
• Extended Service Set – ESS
Visit www.youtube.com/GURUKULA for Lecture Videos
Basic Service Set (BSS)
• BSS is made up of stationary or
mobile stations and an optional
central base station known as Access
Point (AP)
• BSS without AP is called as Ad hoc
Networks
• BSS with AP is called as
Infrastructure Network
Visit www.youtube.com/GURUKULA for Lecture Videos
Extended Service Set
•ESS is made up of more BSS and
are connected to a “Distributed
Systems”
•The Distributed systems
connects the AP’s in the BSS
•There are 2 types of stations
➢Mobile Stations
➢Stationary Stations
Visit www.youtube.com/GURUKULA for Lecture Videos
Frame Format of IEEE 802.11 [WLANs]
• The MAC layer frame contains 9 fields.
Visit www.youtube.com/GURUKULA for Lecture Videos
Type of Frames
• There are 3 types of Frames
• Management Frame:
• These frames are used for initial communications between the
stations and access points
• Control Frame:
• These frames are used for accessing the channel and
acknowledging the frames.
• It can be an RTS frame, CTS Frame or ACK Frame
• Data Frames:
• These frames are used for carrying the data and control
information
Frame Control (FC) :
• Defines the type of the frame and some other
control information.
• It has 11 sub fields.
Protocol Version :
• It defines the version of the protocol.
Type :
• It defines the type of information.
• 00 – management frame
• 01 – control frame
• 10 – data frame
Sub Type :
• It defines the sub type of each frame.
• 1011 – RTS Frame
• 1100 – CTS Frame
• 1101 - Acknowledgement
More Flag :
• When this bit is “1” it indicated more fragments are to
be received
Retry :
• When this bit is “1” it indicates the retransmitted
frame
Pwr Mgt (Power Management) :
• When this bit is “1” it indicates station is in
power management Mode
More Data:
• When this bit is “1” it indicates station has more
data to send
WEP (Wired Equivalent Privacy):
• When this bit is “1” it indicates encryption is
implemented
RSVD (Reserved):
• This is reserved for future use
D (Duration):
• This field defines the duration of the
transmission used to set the NAV timers
• This is used as the ID for control frames
Addresses:
• There are 4 address fields
• The values in the address fields depends on the
values of “to DS” and “From DS” sub fields
SC (Sequence Control):
• This field defines the sequence number of the
frames for flow control.
Frame Body :
• This field can be between 0 bytes to 2312 bytes.
• This field contains the actual information based
on the values of the sub fields
FCS (Frame control Sequence):
• This field carries the 32 bit CRC for error
detection and Correction.
Visitwww.youtube.com/GURUKULAfor
LectureVideos
Addressing Mechanisms / Modes
• The values of the 4 Address fields will be decided based
on the values of “To DS” and “From DS”
Address 1:
• This field is always the address of next device
Address 2:
• This field is always the address of previous device
Address 3:
• This field is always the address of final destination if
it is not defined by address 1
Address 4:
• This field is always the address of Original Source if
it is not defined by address 2
ADDRESS REPRESENTS
1 Address of Next Device
2 Address of Previous device
3 Address of Final Destination
4 Address of Original Source
Understanding Addressing
1 2 3
Visit www.youtube.com/GURUKULA for Lecture Videos
Case 1
• In this case the frame is not
going to DS (To DS =0) also
not coming from DS (From
DS =0)
• The frame is moving from
one station to another
station of same BSS without
passing through DS
Visit www.youtube.com/GURUKULA for Lecture Videos
Case 2
• In this case the frame is not
coming from DS (From DS
=0) and the frame is going
to DS (To DS =1)
• The frame comes from a
station and going to the AP
Visit www.youtube.com/GURUKULA for Lecture Videos
Case 3
• In this case the frame is
coming from DS (From DS
=1) and the frame is going to
DS (To DS =1)
• The frame comes from AP
of one BSS and going to the
AP of another BSS
Visit www.youtube.com/GURUKULA for Lecture Videos
Case 4
• In this case the frame is
coming from a DS (From
DS =1) and the frame is not
going to DS (To DS =0)
• The frame comes from AP
and going to the station
Visit www.youtube.com/GURUKULA for Lecture Videos
MAC Layers of 802.11
• The MAC sublayer contains 2 protocols
• Distributed Coordination Function – DCF
• Point Coordination Function – PCF
• These 2 protocols are related with the access methods of the standard
Distributed Coordination Function
Point Coordination Function
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
ARCHITECTURAL
COMPARISON
PROBLEMS IN
WLANs
ADDRESSING
MODES
ACCESS
METHOD
MAC LAYERS OF
WLAN
FRAME
FORMAT
ARCHITECTURE OF
WLAN
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
Pnkj_Sharma
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
SANJUU7
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
SPREAD SPECTRUM
SPREAD SPECTRUMSPREAD SPECTRUM
WLAN
WLANWLAN
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
IPv4
IPv4IPv4
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Switching
SwitchingSwitching
Switching
sheekha_11
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 

What's hot (20)

wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
SPREAD SPECTRUM
SPREAD SPECTRUMSPREAD SPECTRUM
SPREAD SPECTRUM
 
WLAN
WLANWLAN
WLAN
 
Dqdb
DqdbDqdb
Dqdb
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
IPv4
IPv4IPv4
IPv4
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Switching
SwitchingSwitching
Switching
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 

Similar to 2.7 wlan ieee 802.11

2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
JAIGANESH SEKAR
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
HODElex
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
chali100
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
065JEEVASREEMCSE
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
waqas232871
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
Syaiful Ahdan
 
lecture06-link-layer.pdf
lecture06-link-layer.pdflecture06-link-layer.pdf
lecture06-link-layer.pdf
Enics
 
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdfBasic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Course11
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
itwkd
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
MekiPetitSeg
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
SmitNiks
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
ssuser2cc0d4
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
VimalMallick
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi
 
26 Collision & Broadcast Domain.pptx
26 Collision & Broadcast Domain.pptx26 Collision & Broadcast Domain.pptx
26 Collision & Broadcast Domain.pptx
EnumulaBhargava1
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
HODElex
 

Similar to 2.7 wlan ieee 802.11 (20)

2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
CCNA- part 8 switch
CCNA- part 8 switchCCNA- part 8 switch
CCNA- part 8 switch
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
lecture06-link-layer.pdf
lecture06-link-layer.pdflecture06-link-layer.pdf
lecture06-link-layer.pdf
 
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdfBasic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdf
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
26 Collision & Broadcast Domain.pptx
26 Collision & Broadcast Domain.pptx26 Collision & Broadcast Domain.pptx
26 Collision & Broadcast Domain.pptx
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
JAIGANESH SEKAR
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
JAIGANESH SEKAR
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
JAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
JAIGANESH SEKAR
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
JAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 

Recently uploaded

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

2.7 wlan ieee 802.11

  • 2. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. In this session: ARCHITECTURAL COMPARISON PROBLEMS IN WLANs ADDRESSING MODES ACCESS METHOD MAC LAYERS OF WLAN FRAME FORMAT ARCHITECTURE OF WLAN Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. Architectural Comparison • Obviously, its wired. • Hosts are always connected to the network • Lack of mobility • Point to point communication • Obviously, its wire free. • Hosts need not be always connected to the network • High mobility • Broad cast communication Similarities and connection to other NWs Similarities: Both uses PHYSICAL Addressing modes Connecting to other NWs: In wireless cases only the internal or limited area is wireless. Example, The connection between your laptop and the modem in your home is wireless. But still the connections behind the modem are wired. (Remember ISP’s and Back Bone Networks)
  • 5. Problems in Wireless LANs (WLAN) Unpredictable Environment Reliability of message as we cannot send it for intended user Power Requirements for transmitting and receiving There are lots of chances for Eavesdropping ➢ All these issues are common problems that arises when we migrate from wired to wireless mode of communication. ➢ As a communication engineer , we should incorporate required mechanisms to overcome these challengesVisit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Lets discuss in Engineering Perspective Attenuation: ➢ The strength of electromagnetic signals decreases rapidly because the signal disperses in all directions; ➢ The situation becomes worse with mobile senders that operate on batteries and normally have small power supplies. Interference: ➢ Another issue is that a receiver may receive signals not only from the intended sender, but also from other senders if they are using the same frequency band. Multipath Propagation: ➢ A receiver may receive more than one signal from the same sender because electromagnetic waves can be reflected back from obstacles such as walls, the ground, or objects. The result is that the receiver receives some signals at different phases (because they travel different paths). This makes the signal less recognizable.
  • 7. Access Control Mechanism – CSMA CA Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8. Why not CSMA – CD in WLANs ? 1. Need for Full Duplex To detect a collision, a host needs to send and receive at the same time, which means the host needs to work in a duplex mode. Wireless hosts do not have enough power to do so. They can only send or receive at one time. 2. Hidden Node Problem: • Any node present in their respective region can hear all of its respective transmission • From figure station C is outside the coverage of station A • Station A is outside the coverage of station C • Station B is covered by both A and C. Hence it can hear all communications from A and C as well. • A sends data to B. after some time C sends data to B. this leads in collision. (C does not know that A is transmitting the data to B) • In this case A and C are hidden Nodes to each other. • This problem is overcome by using handshaking signals before transmission 3. Signal Fading Due to large distance between the stations fading occurs. This prevents the station at one end from hearing a collision at other end. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 9. Architecture of 802.11 • IEEE 802.11 standard defines 2 types of services they are • Basic Service Set – BSS • Extended Service Set – ESS Visit www.youtube.com/GURUKULA for Lecture Videos
  • 10. Basic Service Set (BSS) • BSS is made up of stationary or mobile stations and an optional central base station known as Access Point (AP) • BSS without AP is called as Ad hoc Networks • BSS with AP is called as Infrastructure Network Visit www.youtube.com/GURUKULA for Lecture Videos
  • 11. Extended Service Set •ESS is made up of more BSS and are connected to a “Distributed Systems” •The Distributed systems connects the AP’s in the BSS •There are 2 types of stations ➢Mobile Stations ➢Stationary Stations Visit www.youtube.com/GURUKULA for Lecture Videos
  • 12. Frame Format of IEEE 802.11 [WLANs] • The MAC layer frame contains 9 fields. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. Type of Frames • There are 3 types of Frames • Management Frame: • These frames are used for initial communications between the stations and access points • Control Frame: • These frames are used for accessing the channel and acknowledging the frames. • It can be an RTS frame, CTS Frame or ACK Frame • Data Frames: • These frames are used for carrying the data and control information
  • 14. Frame Control (FC) : • Defines the type of the frame and some other control information. • It has 11 sub fields. Protocol Version : • It defines the version of the protocol. Type : • It defines the type of information. • 00 – management frame • 01 – control frame • 10 – data frame Sub Type : • It defines the sub type of each frame. • 1011 – RTS Frame • 1100 – CTS Frame • 1101 - Acknowledgement More Flag : • When this bit is “1” it indicated more fragments are to be received Retry : • When this bit is “1” it indicates the retransmitted frame Pwr Mgt (Power Management) : • When this bit is “1” it indicates station is in power management Mode More Data: • When this bit is “1” it indicates station has more data to send WEP (Wired Equivalent Privacy): • When this bit is “1” it indicates encryption is implemented RSVD (Reserved): • This is reserved for future use D (Duration): • This field defines the duration of the transmission used to set the NAV timers • This is used as the ID for control frames Addresses: • There are 4 address fields • The values in the address fields depends on the values of “to DS” and “From DS” sub fields SC (Sequence Control): • This field defines the sequence number of the frames for flow control. Frame Body : • This field can be between 0 bytes to 2312 bytes. • This field contains the actual information based on the values of the sub fields FCS (Frame control Sequence): • This field carries the 32 bit CRC for error detection and Correction. Visitwww.youtube.com/GURUKULAfor LectureVideos
  • 15. Addressing Mechanisms / Modes • The values of the 4 Address fields will be decided based on the values of “To DS” and “From DS” Address 1: • This field is always the address of next device Address 2: • This field is always the address of previous device Address 3: • This field is always the address of final destination if it is not defined by address 1 Address 4: • This field is always the address of Original Source if it is not defined by address 2 ADDRESS REPRESENTS 1 Address of Next Device 2 Address of Previous device 3 Address of Final Destination 4 Address of Original Source
  • 16. Understanding Addressing 1 2 3 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 17. Case 1 • In this case the frame is not going to DS (To DS =0) also not coming from DS (From DS =0) • The frame is moving from one station to another station of same BSS without passing through DS Visit www.youtube.com/GURUKULA for Lecture Videos
  • 18. Case 2 • In this case the frame is not coming from DS (From DS =0) and the frame is going to DS (To DS =1) • The frame comes from a station and going to the AP Visit www.youtube.com/GURUKULA for Lecture Videos
  • 19. Case 3 • In this case the frame is coming from DS (From DS =1) and the frame is going to DS (To DS =1) • The frame comes from AP of one BSS and going to the AP of another BSS Visit www.youtube.com/GURUKULA for Lecture Videos
  • 20. Case 4 • In this case the frame is coming from a DS (From DS =1) and the frame is not going to DS (To DS =0) • The frame comes from AP and going to the station Visit www.youtube.com/GURUKULA for Lecture Videos
  • 21. MAC Layers of 802.11 • The MAC sublayer contains 2 protocols • Distributed Coordination Function – DCF • Point Coordination Function – PCF • These 2 protocols are related with the access methods of the standard
  • 23. Point Coordination Function Visit www.youtube.com/GURUKULA for Lecture Videos
  • 24. Session Summary ARCHITECTURAL COMPARISON PROBLEMS IN WLANs ADDRESSING MODES ACCESS METHOD MAC LAYERS OF WLAN FRAME FORMAT ARCHITECTURE OF WLAN Visit www.youtube.com/GURUKULA for Lecture Videos
  • 25. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…