SlideShare a Scribd company logo
802.11
WLAN
Group 6
Priyanshu Agrawal
Tushar Choudhary
Aditya Singh
Agenda
802.11
Architecture
and Protocol
Stack
01
802.11
Physical
Layer
02
802.11
MAC
Sublayer
03
802.11
Frame
Structure
04
802.11
Services
05
802.11
Architecture and
Protocol Stack
1
TYPES OF ARCHITECTURE
1. AD HOC NETWORK
2. INFRASTRUCTURE NETWORK
Ad Hoc Network
• This mode is a collection of
computers that are
associated so that they
can directly send frames
to each other.
• There is no access point.
Infrastructure Network
• Each client is associated with
an Access Point that is in turn
connected to the other
network.
• The client sends and receives
its packets via the AP.
WHAT IS ACCESS POINT ?
Protocols
Data Link
Layer
MAC Sublayer
In 802.11, the MAC (Medium Access Control) sublayer determines
how the channel is allocated, that is, who gets to transmit next.
Logical Link Layer
Above it is the LLC (Logical Link Control) sublayer, whose job it is to
hide the differences between the different 802 variants and make
them indistinguishable as far as the network layer is concerned.
802.11 Physical
Layer
2
Microwave Oven
Garage Door Openers
Cordless Phones
Baby Monitors
802.11 Physical Layer
Radio Spectrum
2.4
GHz
5
GHz
ISM
802.11 Physical Layer
802.11b
• upto 11 Mbps
• Similar to CDMA
• 2.4 GHz
• Barker sequence is the spreading sequence used.
802.11 Physical Layer
802.11a
• upto 54 Mbps
• OFDM (Orthogonal Frequency Division Multiplexing)
• 5 GHz
• Formed first but was approved later than 802.11b.
802.11 Physical Layer
802.11
g
• upto 54 Mbps
• OFDM (Orthogonal Frequency Division Multiplexing)
• 2.4 GHz
802.11 Physical Layer
802.11n
• upto 600 Mbps
• OFDM (Orthogonal Frequency Division Multiplexing)
• 2.4 GHz and 5 GHz
• MIMO (Multiple Input Multiple Output)
• Doubled channels from 20MHz to 40 MHz
802.11 Physical Layer
802.11ac
• upto 6.8 Gbps
• OFDM (Orthogonal Frequency Division Multiplexing)
• 5 GHz
• Downlink MU-MIMO (Multi User - Multiple Input
Multiple Output)
• upto 10 Gbps
• OFDMA (Orthogonal frequency-division multiple
access)
• 2.4 GHz and 5 GHz
• Downlink and Uplink MU-MIMO (Multi User -
Multiple Input Multiple Output)
802.11 Physical Layer
802.11ax
802.11 MAC
Sublayer
3
• IEEE 802.11 defines two MAC sublayers: 1) Distributed coordination function (DCF)
2) Point coordination function (PCF)
• 802.11 tries to avoid collisions with a protocol called CSMA/CA (CSMA with Collision Avoidance).
• This mode of operation is called DCF (Distributed Coordination Function) because each station
acts independently, without any kind of central control.
• Initially before sending station senses whether
channel is free or not.
• Otherwise, the station chooses a random backoff
value using binary exponential backoff.
• When the counter reaches zero the station transmits
the entire frame and then waits for an
acknowledgment.
• If an acknowledgment is received, the transmitting
station knows that its frame has been correctly
received at the destination station.
• If the acknowledgment isn’t received, the transmitting
station reenters the backoff phase in step 2, with the
random value chosen from a larger interval.
• PCF (Point Coordination Function) in which the access point controls all activity in its cell, just
like a cellular base station. However, PCF is not used in practice because there is normally no
way to prevent stations in another nearby network from transmitting competing traffic.
• There are two main reasons why 802.11 MAC does not implement collision detection:
⚬ Station must be able to send data and receive collision signals at the same time.
⚬ Hidden terminal problem
• From the perspective of node 1, node 2 is a
"hidden" node. If a simple transmit-and-pray
protocol was used, it would be easy for node 1
and node 3 to transmit simultaneously, thus
rendering AP unable to make sense of anything.
• An optional RTS/CTS mechanism uses the NAV to
prevent terminals from sending frames at the
same time as hidden terminals.
Hidden Terminal Problem
Img source:
• The network allocation vector is a virtual carrier-sensing mechanism used with wireless
network.
• While RTS/CTS sounds good in theory, it is one of those designs that has proved to be of little
value in practice.
• CSMA/CA with physical and virtual sensing is the core of the 802.11 protocol.
802.11 Frame
Structure
4
802.11 Frame Structure
802.11 Frame Structure
802.11 Frame Structure
802.11 Frame Structure
802.11 Frame Structure
802.11
Services
5
• Association
• Re association
• Dissociation
• Authentication
• Distribution
• Integration
• Data Delivery
• Privacy
• QOS traffic scheduling
• Transmit power control
• Dynamic Frequency Selection
802.11 Services
Future Prospects & Conclusion
• IEEE 802.11ax™, or Wi-Fi 6, is the most recent standard in the
series, published in 2021.
• Next to take center stage will be Wi-Fi 7.
• Wi-Fi 7 is based on features defined in the IEEE P802.11be™
draft amendment.
• The evolution of IEEE 802.11-based Wi-Fi standards continues
today, providing much faster data transmission rates, longer
ranges, and more reliable and secure connections.
References
• 802.11 Wireles Networks The Definitive Guide; Matthew S. Gast;
ISBN:0-596-00183-5
• Tanenbaum, Andrew S., 1944-Computer networks / Andrew S.
Tanenbaum, David J. Wetherall. ISBN-13: 978-0-13-212695-3
(alk. paper)
• Computer networking: a top-down approach / James F. Kurose,
University of Massachusetts, Amherst, Keith W. Ross, NYU and
NYU Shanghai. ISBN 9780133594140
• Forouzan, Behrouz A. Data communications and networking I
Behrouz A Forouzan. ISBN 978-0-07-296775-3
Thank You

More Related Content

Similar to 802.11 Computer Networks

Wlan systems
Wlan systemsWlan systems
Wlan systems
DAVID RAUDALES
 
Group A IEEE_802.15.4
Group A IEEE_802.15.4Group A IEEE_802.15.4
Group A IEEE_802.15.4
EdlynEstavillo
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
HODElex
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Yaser Rahmati
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
Raj vardhan
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
Panth Shah
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Data link layer
Data link layerData link layer
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
sdb2002
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
Anuj Gupta
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
ambitlick
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
Deepak John
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
MeenaAnusha1
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Csmaca
CsmacaCsmaca
Csmaca
Oka Danil
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
Deepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
Deepak John
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
stephen972973
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
nandhakumar421744
 

Similar to 802.11 Computer Networks (20)

Wlan systems
Wlan systemsWlan systems
Wlan systems
 
Group A IEEE_802.15.4
Group A IEEE_802.15.4Group A IEEE_802.15.4
Group A IEEE_802.15.4
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Data link layer
Data link layerData link layer
Data link layer
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Csmaca
CsmacaCsmaca
Csmaca
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 

802.11 Computer Networks

  • 4. TYPES OF ARCHITECTURE 1. AD HOC NETWORK 2. INFRASTRUCTURE NETWORK
  • 5. Ad Hoc Network • This mode is a collection of computers that are associated so that they can directly send frames to each other. • There is no access point.
  • 6. Infrastructure Network • Each client is associated with an Access Point that is in turn connected to the other network. • The client sends and receives its packets via the AP. WHAT IS ACCESS POINT ?
  • 8. Data Link Layer MAC Sublayer In 802.11, the MAC (Medium Access Control) sublayer determines how the channel is allocated, that is, who gets to transmit next. Logical Link Layer Above it is the LLC (Logical Link Control) sublayer, whose job it is to hide the differences between the different 802 variants and make them indistinguishable as far as the network layer is concerned.
  • 10. Microwave Oven Garage Door Openers Cordless Phones Baby Monitors 802.11 Physical Layer Radio Spectrum 2.4 GHz 5 GHz ISM
  • 11. 802.11 Physical Layer 802.11b • upto 11 Mbps • Similar to CDMA • 2.4 GHz • Barker sequence is the spreading sequence used.
  • 12. 802.11 Physical Layer 802.11a • upto 54 Mbps • OFDM (Orthogonal Frequency Division Multiplexing) • 5 GHz • Formed first but was approved later than 802.11b.
  • 13. 802.11 Physical Layer 802.11 g • upto 54 Mbps • OFDM (Orthogonal Frequency Division Multiplexing) • 2.4 GHz
  • 14. 802.11 Physical Layer 802.11n • upto 600 Mbps • OFDM (Orthogonal Frequency Division Multiplexing) • 2.4 GHz and 5 GHz • MIMO (Multiple Input Multiple Output) • Doubled channels from 20MHz to 40 MHz
  • 15. 802.11 Physical Layer 802.11ac • upto 6.8 Gbps • OFDM (Orthogonal Frequency Division Multiplexing) • 5 GHz • Downlink MU-MIMO (Multi User - Multiple Input Multiple Output)
  • 16. • upto 10 Gbps • OFDMA (Orthogonal frequency-division multiple access) • 2.4 GHz and 5 GHz • Downlink and Uplink MU-MIMO (Multi User - Multiple Input Multiple Output) 802.11 Physical Layer 802.11ax
  • 18. • IEEE 802.11 defines two MAC sublayers: 1) Distributed coordination function (DCF) 2) Point coordination function (PCF) • 802.11 tries to avoid collisions with a protocol called CSMA/CA (CSMA with Collision Avoidance). • This mode of operation is called DCF (Distributed Coordination Function) because each station acts independently, without any kind of central control.
  • 19. • Initially before sending station senses whether channel is free or not. • Otherwise, the station chooses a random backoff value using binary exponential backoff. • When the counter reaches zero the station transmits the entire frame and then waits for an acknowledgment. • If an acknowledgment is received, the transmitting station knows that its frame has been correctly received at the destination station. • If the acknowledgment isn’t received, the transmitting station reenters the backoff phase in step 2, with the random value chosen from a larger interval.
  • 20. • PCF (Point Coordination Function) in which the access point controls all activity in its cell, just like a cellular base station. However, PCF is not used in practice because there is normally no way to prevent stations in another nearby network from transmitting competing traffic. • There are two main reasons why 802.11 MAC does not implement collision detection: ⚬ Station must be able to send data and receive collision signals at the same time. ⚬ Hidden terminal problem
  • 21. • From the perspective of node 1, node 2 is a "hidden" node. If a simple transmit-and-pray protocol was used, it would be easy for node 1 and node 3 to transmit simultaneously, thus rendering AP unable to make sense of anything. • An optional RTS/CTS mechanism uses the NAV to prevent terminals from sending frames at the same time as hidden terminals. Hidden Terminal Problem Img source:
  • 22. • The network allocation vector is a virtual carrier-sensing mechanism used with wireless network. • While RTS/CTS sounds good in theory, it is one of those designs that has proved to be of little value in practice. • CSMA/CA with physical and virtual sensing is the core of the 802.11 protocol.
  • 30. • Association • Re association • Dissociation • Authentication • Distribution • Integration • Data Delivery • Privacy • QOS traffic scheduling • Transmit power control • Dynamic Frequency Selection 802.11 Services
  • 31. Future Prospects & Conclusion • IEEE 802.11ax™, or Wi-Fi 6, is the most recent standard in the series, published in 2021. • Next to take center stage will be Wi-Fi 7. • Wi-Fi 7 is based on features defined in the IEEE P802.11be™ draft amendment. • The evolution of IEEE 802.11-based Wi-Fi standards continues today, providing much faster data transmission rates, longer ranges, and more reliable and secure connections.
  • 32. References • 802.11 Wireles Networks The Definitive Guide; Matthew S. Gast; ISBN:0-596-00183-5 • Tanenbaum, Andrew S., 1944-Computer networks / Andrew S. Tanenbaum, David J. Wetherall. ISBN-13: 978-0-13-212695-3 (alk. paper) • Computer networking: a top-down approach / James F. Kurose, University of Massachusetts, Amherst, Keith W. Ross, NYU and NYU Shanghai. ISBN 9780133594140 • Forouzan, Behrouz A. Data communications and networking I Behrouz A Forouzan. ISBN 978-0-07-296775-3

Editor's Notes

  1. 1.7.2013
  2. 1.7.2013
  3. 1.7.2013
  4. 1.7.2013
  5. 1.7.2013
  6. 1.7.2013
  7. 1.7.2013
  8. 1.7.2013
  9. 1.7.2013
  10. 1.7.2013
  11. 1.7.2013
  12. 1.7.2013
  13. 1.7.2013
  14. 1.7.2013
  15. 1.7.2013
  16. 1.7.2013
  17. 1.7.2013
  18. 1.7.2013
  19. 1.7.2013
  20. 1.7.2013
  21. 1.7.2013