SlideShare a Scribd company logo
802.11 specifications 
overview
802.11 Specifications 
Applications 
LLC 
WEP 
MAC 
MIB 
Control 
PHY 
MAC 
Mgmt 
DSSS FH IR OFDM 
 Specification of layers below LLC 
 Associated management/control interfaces
802.11 Specifications 
LLC MAC 
Service 
Interface 
MAC 
sublayer 
PHY Service 
Interface 
PLCP Sublayer 
MAC Mgmt 
Service 
Interface 
MAC Layer 
Management 
PHY Mgmt Service 
Interface 
PHY layer 
PMD Sublayer Management 
LLC 
MIB 
WEP MAC 
MAC 
PHY 
Mgmt 
DSSS FH IR OFDM
802.11 Specifications 
LLC 
MAC Service 
Interface 
(clause 6) 
MAC sublayer MAC Management 
MAC framing (clause 7) 
MAC operation (clause 9) 
WEP (clause 8) 
State Machines (Annex C) 
PHY Service 
Interface (clause 12) 
Protocols (clause 11) 
State Machines (Annex C) 
MIBs (Annex D) 
PHY Mgmt Service 
Interface (clause 13) 
PHY Layer PHY Management 
FH (clause 14) 
DSSS (clause 15) 
Infrared (clause 16) 
OFDM (clause 17) 
High rate DSSS (clause 18) 
MAC Mgmt Service 
Interface (clause 10) 
MIBs (Annex D)
802.11 System Architecture 
Basic Service Set (BSS): a set of stations which communicate 
with one another 
Independent Basic Service 
Set (IBSS) 
• only direct communication 
possible 
• no relay function 
Infrastructure Basic Service 
Set (BSS) 
• AP provides 
• connection to wired network 
• relay function 
• stations not allowed to 
communicate directly
Extended Service Set 
ESS: a set of BSSs interconnected by a distribution system (DS) 
• ESS and all of its stations appear to be a single MAC layer 
• AP communicate among themselves to forward traffic 
• Station mobility within an ESS is invisible to the higher layers
802.11 PHY 
MIB 
Control 
Applications 
LLC 
WEP 
MAC 
PHY 
MAC 
Mgmt 
DSSS FH IR OFDM
802.11 PHY 
Sender Receiver 
MAC Protcol Data 
Unit (MPDU) 
MAC 
PHY 
PLCP 
MAC Protcol Data 
header MAC Protcol Data 
Unit (MPDU) 
Unit (MPDU) 
PLCP 
header 
MAC Protcol Data 
Unit (MPDU) 
Physical Media 
Dependent (PMD) layer PMD layer 
Direct Sequence Spread 
Spectrum (DSSS) PHY 
1,2 Mbps 
High rate (DSSS) PHY 
11, 5.5 Mbps 
802.11b 
Frequency Hopping Spread 
Spectrum (FHSS) PHY 
1, 2 Mbps 
Infrared (IR) PHY 
1,2 Mbps 
Higher rate (DSSS) PHY 
20+ Mbps 
802.11g 
2.4 GHz 
Orthogonal Frequency Division 
Multiplexing (OFDM) PHY 
6,9,12,18,24,36,48,54 Mbps 
802.11a 
5.7 GHz
DSSS PHY 
Preamble Header MPDU 
1 Mbps 1, 2 Mbps 
DPSK 
modulation 
Transmitter 
baseband signal 
Preamble Header MPDU 
1 Mbps 1, 2 Mbps 
Received signal after 
despreading 
 Baseband signal is spread using Barker word (10 dB processing gain) 
 Spread signal occupies approximately 22 Mhz bandwidth 
 Receiver recovers the signal by applying the same Barker word 
 DSSS provides good immunity against narrowband interferer 
 CDMA (multiple access) capability is not possible 
DPSK 
Spread the signal using Barker word (11 bits) de-modulation 
+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 
Transmitted signal after spreading
DSSS PHY 
Ch 1 Ch 6 Ch 11 
22 Mhz 
 Direct sequence spread spectrum 
 Each channel is 22 Mhz wide 
 Symbol rate 
 1 Mb/s with DBPSK modulatio 
 2 Mbps with DQPSK modulation 
 11, 5.5 Mb/ps with CCK modulation 
 Max transmit power 
 100 Mw 
83.5 Mhz
802.11 MAC 
MIB 
Control 
Applications 
LLC 
WEP 
MAC 
PHY 
MAC 
Mgmt 
DSSS FH IR OFDM
802.11 MAC 
 Carrier sensing (CSMA) 
Rules: 
carrier ==> do not transmit 
no carrier ==> OK to transmit 
But the above rules do not always apply to wireless. 
Solution: RTS/CTS 
 Collision detection (CD) 
Does not work over wireless 
Therefore, use collision avoidance (CA) 
random backoff 
priority ack protocol
802.11 MAC protocol: CSMA/CA 
Busy medium 
DIFS 
Defer access 
contention 
window 
Next Frame 
slot time 
 Use CSMA with collision Avoidance 
 Based on carrier sense function in PHY called Clear Channel Assessment 
(CCA) 
 Reduce collision probability where mostly needed 
 Efficient backoff algorithm stable at high loads 
 Possible to implement different fixed priority levels
802.11 MAC : Contention window 
63 
127 
255 
511 
1023 
CW max 
CW min 
Fifth retransmission 
Fourth retransmission 
Second retransmission 
First retransmission 
Initial attempt 
Third retransmission 
31 
For DSSS PHY 
Slot time = 20 ms

More Related Content

What's hot

Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
sivakumar D
 
3g umts-originating-call Call Flow
3g umts-originating-call Call Flow3g umts-originating-call Call Flow
3g umts-originating-call Call Flow
Eduard Lucena
 
Analysis of LTE physical channels overhead
Analysis of LTE physical channels overheadAnalysis of LTE physical channels overhead
Analysis of LTE physical channels overhead
TELKOMNIKA JOURNAL
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
Ericsson Saudi
 
Modul 2 gsm air interface
Modul 2   gsm air interfaceModul 2   gsm air interface
Modul 2 gsm air interface
Wijaya Kusuma
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
Yubraj C.
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
daniel ayalew
 
WCDMA OverView
WCDMA OverViewWCDMA OverView
WCDMA OverView
Md Joynal Abaden
 
Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01
Abiy Almaw
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
Mohd Nazir Shakeel
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
daniel ayalew
 
atm
atmatm
Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10
daniel ayalew
 
Cmm4 cambium 111611
Cmm4 cambium 111611Cmm4 cambium 111611
Cmm4 cambium 111611
Advantec Distribution
 
Ch3 air interface
Ch3 air interfaceCh3 air interface
Ch3 air interface
Mohamed Shaaban
 
Csfb
CsfbCsfb
Ripv2
Ripv2Ripv2
Umts interview questions
Umts interview questionsUmts interview questions
Umts interview questions
Karan Singh
 
3 gpp lte radio layer 2
3 gpp lte radio layer 23 gpp lte radio layer 2
3 gpp lte radio layer 2
المهندس عمران
 
GSM Idle Mode Behavior
GSM Idle Mode BehaviorGSM Idle Mode Behavior
GSM Idle Mode Behavior
Md Mustafizur Rahman
 

What's hot (20)

Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
 
3g umts-originating-call Call Flow
3g umts-originating-call Call Flow3g umts-originating-call Call Flow
3g umts-originating-call Call Flow
 
Analysis of LTE physical channels overhead
Analysis of LTE physical channels overheadAnalysis of LTE physical channels overhead
Analysis of LTE physical channels overhead
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
Modul 2 gsm air interface
Modul 2   gsm air interfaceModul 2   gsm air interface
Modul 2 gsm air interface
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
WCDMA OverView
WCDMA OverViewWCDMA OverView
WCDMA OverView
 
Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
 
atm
atmatm
atm
 
Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10
 
Cmm4 cambium 111611
Cmm4 cambium 111611Cmm4 cambium 111611
Cmm4 cambium 111611
 
Ch3 air interface
Ch3 air interfaceCh3 air interface
Ch3 air interface
 
Csfb
CsfbCsfb
Csfb
 
Ripv2
Ripv2Ripv2
Ripv2
 
Umts interview questions
Umts interview questionsUmts interview questions
Umts interview questions
 
3 gpp lte radio layer 2
3 gpp lte radio layer 23 gpp lte radio layer 2
3 gpp lte radio layer 2
 
GSM Idle Mode Behavior
GSM Idle Mode BehaviorGSM Idle Mode Behavior
GSM Idle Mode Behavior
 

Similar to 802.11

Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
80211
8021180211
80211
Võ Nhựt
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
Kuncoro Wastuwibowo
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
Siva Cool
 
wimaxME.ppt
wimaxME.pptwimaxME.ppt
wimaxME.ppt
Madhumitha Jayaram
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
Joe Christensen
 
Wi max
Wi maxWi max
Wi max
jagadesh k
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless access
Nikhil Jagnade
 
Presentation
PresentationPresentation
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
Pavithra525349
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
Mohammed Hussein
 
Intelligent transportation systems
Intelligent transportation systemsIntelligent transportation systems
Intelligent transportation systems
Engin Karabulut
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter Green
Engineers Australia
 
gsm.pdf
gsm.pdfgsm.pdf
gsm.pdf
Mohammed Amer
 
3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt
Kp Sharma
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt
Kp Sharma
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
RMK ENGINEERING COLLEGE, CHENNAI
 
Wireless networking
Wireless networkingWireless networking
Wlan 1 intro
Wlan 1 introWlan 1 intro
Wlan 1 intro
trimba
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
sunil kumar
 

Similar to 802.11 (20)

Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
80211
8021180211
80211
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
wimaxME.ppt
wimaxME.pptwimaxME.ppt
wimaxME.ppt
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Wi max
Wi maxWi max
Wi max
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless access
 
Presentation
PresentationPresentation
Presentation
 
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 
Intelligent transportation systems
Intelligent transportation systemsIntelligent transportation systems
Intelligent transportation systems
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter Green
 
gsm.pdf
gsm.pdfgsm.pdf
gsm.pdf
 
3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wlan 1 intro
Wlan 1 introWlan 1 intro
Wlan 1 intro
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 

More from Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
Sajan Sahu
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
Sajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
Sajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
Sajan Sahu
 
Data compretion
Data compretionData compretion
Data compretion
Sajan Sahu
 
Deadlock
DeadlockDeadlock
Deadlock
Sajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
Sajan Sahu
 
Information system
Information systemInformation system
Information system
Sajan Sahu
 
Dna computing
Dna computingDna computing
Dna computing
Sajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
Sajan Sahu
 
Database system
Database systemDatabase system
Database system
Sajan Sahu
 
GPRS
GPRSGPRS
Bios
BiosBios
Bluetooth
Bluetooth Bluetooth
Bluetooth
Sajan Sahu
 
Erp
ErpErp
Internet telephony
Internet telephonyInternet telephony
Internet telephony
Sajan Sahu
 
Wcdma
WcdmaWcdma
Wcdma
Sajan Sahu
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
Sajan Sahu
 

More from Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Dna computing
Dna computingDna computing
Dna computing
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

802.11

  • 2. 802.11 Specifications Applications LLC WEP MAC MIB Control PHY MAC Mgmt DSSS FH IR OFDM  Specification of layers below LLC  Associated management/control interfaces
  • 3. 802.11 Specifications LLC MAC Service Interface MAC sublayer PHY Service Interface PLCP Sublayer MAC Mgmt Service Interface MAC Layer Management PHY Mgmt Service Interface PHY layer PMD Sublayer Management LLC MIB WEP MAC MAC PHY Mgmt DSSS FH IR OFDM
  • 4. 802.11 Specifications LLC MAC Service Interface (clause 6) MAC sublayer MAC Management MAC framing (clause 7) MAC operation (clause 9) WEP (clause 8) State Machines (Annex C) PHY Service Interface (clause 12) Protocols (clause 11) State Machines (Annex C) MIBs (Annex D) PHY Mgmt Service Interface (clause 13) PHY Layer PHY Management FH (clause 14) DSSS (clause 15) Infrared (clause 16) OFDM (clause 17) High rate DSSS (clause 18) MAC Mgmt Service Interface (clause 10) MIBs (Annex D)
  • 5. 802.11 System Architecture Basic Service Set (BSS): a set of stations which communicate with one another Independent Basic Service Set (IBSS) • only direct communication possible • no relay function Infrastructure Basic Service Set (BSS) • AP provides • connection to wired network • relay function • stations not allowed to communicate directly
  • 6. Extended Service Set ESS: a set of BSSs interconnected by a distribution system (DS) • ESS and all of its stations appear to be a single MAC layer • AP communicate among themselves to forward traffic • Station mobility within an ESS is invisible to the higher layers
  • 7. 802.11 PHY MIB Control Applications LLC WEP MAC PHY MAC Mgmt DSSS FH IR OFDM
  • 8. 802.11 PHY Sender Receiver MAC Protcol Data Unit (MPDU) MAC PHY PLCP MAC Protcol Data header MAC Protcol Data Unit (MPDU) Unit (MPDU) PLCP header MAC Protcol Data Unit (MPDU) Physical Media Dependent (PMD) layer PMD layer Direct Sequence Spread Spectrum (DSSS) PHY 1,2 Mbps High rate (DSSS) PHY 11, 5.5 Mbps 802.11b Frequency Hopping Spread Spectrum (FHSS) PHY 1, 2 Mbps Infrared (IR) PHY 1,2 Mbps Higher rate (DSSS) PHY 20+ Mbps 802.11g 2.4 GHz Orthogonal Frequency Division Multiplexing (OFDM) PHY 6,9,12,18,24,36,48,54 Mbps 802.11a 5.7 GHz
  • 9. DSSS PHY Preamble Header MPDU 1 Mbps 1, 2 Mbps DPSK modulation Transmitter baseband signal Preamble Header MPDU 1 Mbps 1, 2 Mbps Received signal after despreading  Baseband signal is spread using Barker word (10 dB processing gain)  Spread signal occupies approximately 22 Mhz bandwidth  Receiver recovers the signal by applying the same Barker word  DSSS provides good immunity against narrowband interferer  CDMA (multiple access) capability is not possible DPSK Spread the signal using Barker word (11 bits) de-modulation +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 Transmitted signal after spreading
  • 10. DSSS PHY Ch 1 Ch 6 Ch 11 22 Mhz  Direct sequence spread spectrum  Each channel is 22 Mhz wide  Symbol rate  1 Mb/s with DBPSK modulatio  2 Mbps with DQPSK modulation  11, 5.5 Mb/ps with CCK modulation  Max transmit power  100 Mw 83.5 Mhz
  • 11. 802.11 MAC MIB Control Applications LLC WEP MAC PHY MAC Mgmt DSSS FH IR OFDM
  • 12. 802.11 MAC  Carrier sensing (CSMA) Rules: carrier ==> do not transmit no carrier ==> OK to transmit But the above rules do not always apply to wireless. Solution: RTS/CTS  Collision detection (CD) Does not work over wireless Therefore, use collision avoidance (CA) random backoff priority ack protocol
  • 13. 802.11 MAC protocol: CSMA/CA Busy medium DIFS Defer access contention window Next Frame slot time  Use CSMA with collision Avoidance  Based on carrier sense function in PHY called Clear Channel Assessment (CCA)  Reduce collision probability where mostly needed  Efficient backoff algorithm stable at high loads  Possible to implement different fixed priority levels
  • 14. 802.11 MAC : Contention window 63 127 255 511 1023 CW max CW min Fifth retransmission Fourth retransmission Second retransmission First retransmission Initial attempt Third retransmission 31 For DSSS PHY Slot time = 20 ms

Editor's Notes

  1. Mention that over SCO link you cannot carry any other real-time traffic. There is no protocol-id field in the SCO header/payload. Is this really true?
  2. Mention that over SCO link you cannot carry any other real-time traffic. There is no protocol-id field in the SCO header/payload. Is this really true?