SlideShare a Scribd company logo
Wireless Ethernet
802.11 Presentation 2




                        1
802.11 Physical Layer
   Frequency Allocation 802.11
   Direct-Sequence (DS) spread-spectrum radio
   Frequency-hopping(FH) spread-spectrum radio
   Infrared Light (IR)




Image acquired from
http://www.pulsewan.com/data101/802_11_b_basics.htm




                                                      2
Frequency-Hopping
 79 channels from 2.402 to 2.480 GHz with 1
  MHz channel space
 78 hopping sequences with minimum 6 MHz
  hopping space, each sequence uses every 79
  frequency elements once




                                               3
Direct Sequence Spread Spectrum
 Spreads signal by expanding the signal over a broad portion of the radio band.
 DBPSK Differential Binary Phase Shift Keying
 Ideal for high bandwidth apps.
 Uses higher power to transmit and more expensive to implement compared to FHSS.




Image acquired from http://www.wireless-telecom.com/images/dsss_pic.gif





                                                                                    4
Orthogonal Frequency Division
Multiplexing
 OFDM – Uses all 48 channels.
 Each Parallel bit stream is modulated differently; BPSK QPSK
  or QAM.
 Multipath propagation environment.




mage acquired from http://iaf-bs.de/img/con/projects/3glte-mimo-ofdm-testbed/3GLTE_Testbed_fading_adapt.jpg




                                                                                                              5
MAC Access Modes
 DCF – Distributed coordination function.
 PCF – Point coordination function.




   Image acquired from www.cisco.com/.../ 119001-120000/119161.jpg
   www.cisco.com/.../ 119001-120000/119161.jpg



                                                                      rich phelps 802.11 framing   6
Data Link Layer 802.11
   Two sub layers: Logical Link Control (LLC), Media Access Control (MAC)
   Same 802.2 LLC and 48-bit MAC addressing as for all other 802 LANs
   MAC layer similar but different to Ethernet 802.3
   Similarities: Contention-based
     ◦ Medium is free for all
     ◦ A node senses the free medium and occupies it as long as data packet
       requires it
   Differences: CSMA/CD vs CSMA/CA, CRC, packet fragmentation
   Ethernet 802.3 - CSMA/CD (Carrier Sense Multiple Access / Collision Detect)
     ◦ Collision detection possible because can send/receive simultaneously
   Ethernet 802.11 - CSMA/CA (Carrier Sense Multiple Access / Collision
    Avoidance)
     ◦ Collision detection not possible because of near/far problem for radios
     ◦ Steps: sense the air, wait, send, wait for ACK, retransmit if needed
     ◦ Optional RTS/CTS feature to solve “hidden node” problem
         “Hidden node”: where two stations on either side of an AP can’t hear each
          other broadcast.
   CRC – error checking at layer 2 (Ethernet assumes this is layer 3 task)
   Packet fragmentation: breaking large packets into smaller ones at MAC layer
   Overhead of MAC layer reduces throughput by 40-50%


                                                                                      7
802.11 MAC Frame
    NOTE: This frame structure is common for all data sent by a 802.11 station

      control info (WEP, data type as management, control, data ...)
                                               frame ordering
             next frame duration               info for RX

                   -Basic service identification            frame specific,
                   -source/destination address              variable length
                   -transmitting station
                   -receiving station




                                                                         frame check
                                                                         sequence
                                                                         (CRC)



                                                                                       8
Wired Equivalent Privacy
   Implemented at the MAC layer.
   RC4 Stream Cipher
   Provides encryption to data frames only




http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif
http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif




                                                                            9

More Related Content

What's hot

Spannig tree
Spannig treeSpannig tree
Spannig tree1 2d
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
kazim Hussain
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
Rafat Khandaker
 
Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat SheetSpanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
Prasanna Shanmugasundaram
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application Note
ActionPacked Networks
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
Arash Foroughi
 
Ucs security part2
Ucs security part2Ucs security part2
Ucs security part2
Krunal Shah
 
Managing Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN RoutingManaging Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN Routing
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
CYBERINTELLIGENTS
 
DMA Controller Modes Of Operation
DMA Controller Modes Of OperationDMA Controller Modes Of Operation
DMA Controller Modes Of Operation
Noor Nabi
 
Controller area network
Controller area networkController area network
Controller area network
sanaz nouri
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
Narayana Samy
 
Raj
RajRaj
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
Sushant Kushwaha
 
Switching
SwitchingSwitching
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
swayambhoo
 

What's hot (20)

Spannig tree
Spannig treeSpannig tree
Spannig tree
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat SheetSpanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application Note
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Ucs security part2
Ucs security part2Ucs security part2
Ucs security part2
 
Managing Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN RoutingManaging Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN Routing
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
 
DMA Controller Modes Of Operation
DMA Controller Modes Of OperationDMA Controller Modes Of Operation
DMA Controller Modes Of Operation
 
Controller area network
Controller area networkController area network
Controller area network
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
Raj
RajRaj
Raj
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Switching
SwitchingSwitching
Switching
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 

Similar to 802 11 2

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
pkaviya
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
ssuser35e92d
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
DigiPlexus
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
Napier University
 
sub.net substation monitor
sub.net substation monitorsub.net substation monitor
sub.net substation monitor
rk_at_emsni
 
Manual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apManual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apCentro de Mídia
 
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
Pavithra525349
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
Melvin Cabatuan
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
Salah Amean
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
nandhakumar421744
 
NST Product Catalog
NST Product CatalogNST Product Catalog
NST Product Catalog
moonhyo
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Networking basics
Networking basicsNetworking basics
Networking basics
Sridhar Baithi
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
techbed
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
Stephen Hemminger
 

Similar to 802 11 2 (20)

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
 
sub.net substation monitor
sub.net substation monitorsub.net substation monitor
sub.net substation monitor
 
Manual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apManual Air Live Wl 5460 ap
Manual Air Live Wl 5460 ap
 
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
2_wpan.ppt
2_wpan.ppt2_wpan.ppt
2_wpan.ppt
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
NST Product Catalog
NST Product CatalogNST Product Catalog
NST Product Catalog
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 

More from rphelps

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Eventrphelps
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connectrphelps
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staffrphelps
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencingrphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 

More from rphelps (6)

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Event
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connect
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staff
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencing
 
802 11 2
802 11 2802 11 2
802 11 2
 
802 11 3
802 11 3802 11 3
802 11 3
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

802 11 2

  • 2. 802.11 Physical Layer  Frequency Allocation 802.11  Direct-Sequence (DS) spread-spectrum radio  Frequency-hopping(FH) spread-spectrum radio  Infrared Light (IR) Image acquired from http://www.pulsewan.com/data101/802_11_b_basics.htm 2
  • 3. Frequency-Hopping  79 channels from 2.402 to 2.480 GHz with 1 MHz channel space  78 hopping sequences with minimum 6 MHz hopping space, each sequence uses every 79 frequency elements once 3
  • 4. Direct Sequence Spread Spectrum  Spreads signal by expanding the signal over a broad portion of the radio band.  DBPSK Differential Binary Phase Shift Keying  Ideal for high bandwidth apps.  Uses higher power to transmit and more expensive to implement compared to FHSS. Image acquired from http://www.wireless-telecom.com/images/dsss_pic.gif  4
  • 5. Orthogonal Frequency Division Multiplexing  OFDM – Uses all 48 channels.  Each Parallel bit stream is modulated differently; BPSK QPSK or QAM.  Multipath propagation environment. mage acquired from http://iaf-bs.de/img/con/projects/3glte-mimo-ofdm-testbed/3GLTE_Testbed_fading_adapt.jpg 5
  • 6. MAC Access Modes  DCF – Distributed coordination function.  PCF – Point coordination function.  Image acquired from www.cisco.com/.../ 119001-120000/119161.jpg  www.cisco.com/.../ 119001-120000/119161.jpg rich phelps 802.11 framing 6
  • 7. Data Link Layer 802.11  Two sub layers: Logical Link Control (LLC), Media Access Control (MAC)  Same 802.2 LLC and 48-bit MAC addressing as for all other 802 LANs  MAC layer similar but different to Ethernet 802.3  Similarities: Contention-based ◦ Medium is free for all ◦ A node senses the free medium and occupies it as long as data packet requires it  Differences: CSMA/CD vs CSMA/CA, CRC, packet fragmentation  Ethernet 802.3 - CSMA/CD (Carrier Sense Multiple Access / Collision Detect) ◦ Collision detection possible because can send/receive simultaneously  Ethernet 802.11 - CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) ◦ Collision detection not possible because of near/far problem for radios ◦ Steps: sense the air, wait, send, wait for ACK, retransmit if needed ◦ Optional RTS/CTS feature to solve “hidden node” problem  “Hidden node”: where two stations on either side of an AP can’t hear each other broadcast.  CRC – error checking at layer 2 (Ethernet assumes this is layer 3 task)  Packet fragmentation: breaking large packets into smaller ones at MAC layer  Overhead of MAC layer reduces throughput by 40-50% 7
  • 8. 802.11 MAC Frame  NOTE: This frame structure is common for all data sent by a 802.11 station control info (WEP, data type as management, control, data ...) frame ordering next frame duration info for RX -Basic service identification frame specific, -source/destination address variable length -transmitting station -receiving station frame check sequence (CRC) 8
  • 9. Wired Equivalent Privacy  Implemented at the MAC layer.  RC4 Stream Cipher  Provides encryption to data frames only http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif 9