The document provides an overview of the IEEE 802.11 MAC protocol through a presentation. It discusses topics such as IEEE 802.11 layers, channels, infrastructure networks, ad hoc networks, joining a network, synchronization, communication approaches, MAC functionality including PCF and DCF, encryption, fragmentation, management functions, and MAC frame formats. The presentation was given on May 9th, 2001 by Mahdi Ahmed Jama to provide an introduction to the IEEE 802.11a MAC protocol.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
X.25 is a packet-switched network, developed by ITU-T as an interface between data terminal equipment DTE and data circuit-terminating equipment DCE for terminal operation in packet mode on public data network. It is an end-to-end protocol, but actual movement of packet through the network is invisible to the user.The user sees the network as a cloud through which each packet passes on its way to the receiving DTE.
It defines how a packet-mode terminal can be connected to a packet network for exchange of data. It describes procedures necessary for establishing, maintaining and terminating connections. It uses virtual network approach to packet switching, SVC and PVC and uses asynchronous TDM to multiplex data...
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
X.25 is a packet-switched network, developed by ITU-T as an interface between data terminal equipment DTE and data circuit-terminating equipment DCE for terminal operation in packet mode on public data network. It is an end-to-end protocol, but actual movement of packet through the network is invisible to the user.The user sees the network as a cloud through which each packet passes on its way to the receiving DTE.
It defines how a packet-mode terminal can be connected to a packet network for exchange of data. It describes procedures necessary for establishing, maintaining and terminating connections. It uses virtual network approach to packet switching, SVC and PVC and uses asynchronous TDM to multiplex data...
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
WSN protocol 802.15.4 together with cc2420 seminars . It is based on the standand of ieee802.15.4 and data sheet of the radio transceiver cc2420.
Note that some slides are borrowed.
In this talk, we will explain the functioning of Wireless LANs in theory and in practice.
We will present the IEEE 802.11 standard in general and MAC protocols in particular, by discussing the functions of MAC sublayer management entity and the MAC layer frames in detail.
We will discuss the changes in the states of a WiFi client as it goes through the process of WiFi communication.
Towards the end, we will briefly talk about various vantage points ( at the client side as well as in the air ) that allow us to capture network traffic.
This Technical Note describes the Message formats used in PathMATE Multi-Process
deployments when communicating between any two process instances.
Section 2 provides an overview of the different message protocol layers involved during
transmission defining basic terminology and the basic concepts.
Section 3 describes in the detail the PathMATE Application Messaging Protocol and all supported message formats, as defined for the CPP Transformation Maps in 8.2.0 software releases.
Appendix A lists sources for referenced information for Ethernet and TCPIP protocols.
Similar to Presentation of the IEEE 802.11a MAC Layer (20)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
3. SHINE
3
IEEE 802.11 MAC Overview
Introduction
Layers description
Sublayers description
IEEE 802.11a Channels
Infrastructure
Ad hoc Network
Communication Approach
MAC Functionality
MAC Frame Formats
Conclusion
4. SHINE
4
IEEE 802.11 Layers Description
802.2 Logical Link ControlData
Link
Layer
MAC 802.11
802.11
e
Prcl 802.11 std 802.11b 802.11a
Tech IR FHSS DSSS DSSS OFDM
Band ~350 103
GHz
2.4GHz Band 5GHz
Band
PHY
Layer
Data
Rate 1 and 2 Mbps
1, 2,
5.5, 11
Mbps
6*,9,12*,
18, 24*,
36, 48 or
54 Mbps
Same
PHY
as
802.11
MAC
*Mandatory
6. SHINE
6
IEEE 802.11a Channels
Channel Center Frequency (CCF) at every 5 MHz
between 5GHz and 6GHz
CCF = 5000 + 5*NCH (MHz)
NCH = 1, 2 …. 200
Only some channels are available according to
the Country regulation
7. SHINE
7
Example: US (FCC regulation)
Band (GHz) Ch. Number Ch. Center
freq. (MHz)
Lower band
5.15- 5.25
36
40
44
48
5180
5200
5220
5240
Middel band
5.25- 5.35
52
56
60
64
5260
5280
5300
5320
Upper Band
5.725- 5.825
149
153
157
161
5745
5765
5785
5805
10. SHINE
10
IEEE 802.11 MAC Overview
Introduction
Communication Approach
Joining a BSS
Synchronization
Communication scheme
Hidden Node Problem
MAC Functionality
MAC Frame Formats
Conclusion
11. SHINE
11
Joining a BSS
STA (Station) performs scanning function:
Passive scanning: listen for AP’s Beacons
Active scanning: send a Probe-Request on each
channel en wait for a Probe-Response
If AP found
STA and AP perform Authentication function
If authentication succeeds
STA and AP perform Association function
12. SHINE
12
Synchronization
A TSF (Timing Synchronization Function) timer
with modulus 264
is used
TSF timer increments in μsec.
AP is the timing master
AP sends periodically a copy of its TSF in a
Beacon Frame
All STA’ s synchronize their local TSF by
listening to Beacons
15. SHINE
15
IEEE 802.11 MAC Overview
Introduction
Communication Approach
MAC Functionality
Point Coordination Function (PCF) -Optional
Distributed Coordination Function (DCF)
Encryption/ Decryption (WEP)
Fragmentation
Management
MAC Frame Formats
Conclusion
16. SHINE
16
IEEE 802.11 MAC Functionality
Point Coordination Function (PCF) -Optional
Distributed Coordination Function (DCF)
CSMACA +ACK
Combination of DCF and PCF
Encryption/ Decryption (WEP)
Fragmentation/ Defragmentation
Management
Roaming (Mobility)
Power management
17. SHINE
17
Point Coordination Function (PCF)
Optional
QOS Support (not efficiently)
Based on centralised Control (AP polling, no IBSS
configuration)
Overlap restrictions
PCF provides contention-free transfer
The PC resides in AP
AP informs STA’ s the beginning of a CFP via a
Beacon
19. SHINE
19
Distributed Coordination Function
Efficient medium sharing without overlap
restrictions.
Use CSMA/CA +ACK (Unicast frames) based on
Carrier Sense function in PHY called Clear
Channel Assessment (CCA)
CSMA/(CA) (Broadcast frames and small packets)
No QOS Support
20. SHINE
20
CSMA/CA +ACK 1
Sense medium:
check state of NAV (Network Allocation Vector),
a Virtual Carrier Sense
use CCA (Clear Channel Assessment) function
of the PHY
If medium is free and remains idle for a DIFS
period time, send a RTS
If CTS send data, expect ACK after SIFS time
22. SHINE
22
RTS/CTS with fragmented MSDU
RTS
CTS
Frag. 0 Frag. 1 Frag. 2
ACK0 ACK1 ACK2
SRC
Dest
Others NAV (RTS)
NAV (CTS)
NAV (frag.0)
NAV (ACK0)
NAV (frag.1)
NAV (ACK1)
SIFS
SIFS SIFS
SIFS SIFS SIFS SIFS DIFS
NAV update
23. SHINE
23
Backoff Procedure
Backoff procedure resolves the medium
contention conflicts
It is invoked if the medium is busy or a
transmission failed
Procedure is base on a Backoff algorithm: all
Sta’s defer the access to the medium according
to this algorithm
24. SHINE
24
Backoff Algorithm
Backoff Time= Random() * aSlotTime
aSlotTime= 9µs
Random()= Pseudorandom integer drawn from a
uniform distribution over the interval [0,CW]
(CW=Contention Window)
CWmin <= CW <= Cwmax (CWmin = 15 and Cwmax= 1023)
CW= 2(4+ n)
-1 {thus CW[15, 31, 63, 128, 255, 512, 1023]}
n= number of retransmission given by the Retry
Counter (see next slide)
25. SHINE
25
Retry Counters
All Sta’s maintain a Short Retry Count and a Long
Retry Count for the transmission of an MPDU
A Short Retry Counter (SRC) counts the number of
retransmission of a short MAC frame (i.e. MAC frame
sent without RTS/CTS)
A Long Retry Counter (LRC) counts the number of
retransmission of a long MAC frame (i.e. MAC frame
sent with RTS/CTS)
SRC (resp. LRC) shall be incremented every time
transmission of a short (resp. long) MAC frame fails
27. SHINE
27
Encryption (WEP)
Based on a WEP (wired Equivalent Privacy)
algorithm - optional
Implementation in Hardware OR Software
Uses RC4 PRN algorithm based on:
a 40-bit key
and a 24bit Initialization Vector (IV, send with data)
includes an Integrity Check Value (ICV) to allow integrity
check
Only Data Frame Body (Payload) is encrypted
35. SHINE
35
Roaming2
Quality of the link with current AP is bad
Use scanning function to find an AP with better
link quality (or information from previous scans):
Passive scanning: listen for AP’s Beacons
Active scanning: send a Probe Request on each
channel en wait for a Probe Response
Send Reassociation Request to new AP
36. SHINE
36
Roaming3
New AP sends Reassociation Response and
indicates the Reassociation to Distributed
System
Update of Distributed System information
Disassociation old AP
37. SHINE
37
Power management
In Power Save mode idle STA’s go to sleep and
wake up periodically to listen for Beacons
TSF (Timing Synch. Funct.) keeps running and
assures synchronization with AP
AP buffers packets for STA’s in PS mode
AP sends with Beacon the Traffic Indication Map
(TIM) and announces which STA’s have frames
buffered
38. SHINE
38
IEEE 802.11 MAC Overview
Introduction
Communication Approach
MAC Functionality
MAC Frame Formats
General and Data MAC frame Format
Control Frame Formats
Management Frame Format
Conclusion
39. SHINE
39
General and Data MAC Frame
Formats
Length of Frame body (=Payload) is variable
FCS= Frame Check Sequence containing a 32-bit CRC
Frame
Control
Durati
on/ ID
Frame Body
Sequence
Control
Addr
ess 1
Addr
ess 2
Addr
ess 4
Addr
ess 3
FCS
Bytes:
2 2 6 6 6 2 6 0- 2312 4
M A C H e a d e r
41. SHINE
41
Types and Subtypes
Data frames: Data, Data+ACK
Control frames: RTS, CTS, ACK, PowerSave-Poll
Management frames: Beacons, Association
(Request and Response), Disassociation,
Reassociation (Request and Response),
Authentication, De-authentication, Probe (Request
and Response), Announcement Traffic Indication
Message (ATIM)
42. SHINE
42
Address Field Contents
To DS
From
DS
Addr. 1 Addr. 2 Addr. 3 Addr. 4
0 0 DA SA BSSID N/A
0 1 DA BSSID SA N/A
1 0 BSSID SA DA N/A
1 1 RA TA DA SA
BSSID= Basic Service Set Identifier DA= Destination Address
DS= Distributed System SA= Source Address
RA= Receiver Address TA= Transmitter Address
43. SHINE
43
Address Field Contents in detail
To DS=0 From DS=0
ad1=DA Ad2=SA Ad3=BSSID ad4=N/A BSS
BSS
To DS=0 From DS=1
ad1=DA Ad2=BSSID Ad3=SA Ad4=N/A
To DS=1 From DS=0
ad1= BSSID Ad2=SA Ad3=DA Ad4=N/A
BSSTo DS=1 From DS=1
ad1=RA Ad2=TA Ad3=DA Ad4=SA
45. SHINE
45
Fragment number
A fragment number for each fragment of an MPDU
or MMPDU.
0 for single or 1st
fragment and increase by 1 for next
fragment
The number remains constant for retransmission.
46. SHINE
46
Sequence number
A Sequence number for every MPDU or MMPDU
Numbers are assigned from a single modulo 4096
counter, starting at 0 and increase by 1 for next
MPDU
The number remains constant for retransmission.
47. SHINE
47
Control Frame Formats
Bytes:
Frame Control Duration RA FCS
2 2 6 4
RTS Frame
Bytes
: Frame Control Duration RA FCS
2 2 6 4
Frame Cntrl Duration RA TA FCS
Bytes: 2 2 6 6 4
MAC Header
CTS Frame
ACK Frame
PowerSave- Poll
Frame
Frame Cntrl AID BSS ID TA FCS
2 2 6 6 4
48. SHINE
48
Management Frame Format
Frame
Control
Durati
on
Frame Body
Sequence
Control
DA SA
BSS
ID
FCS
Bytes:
2 2 6 6 6 2 0- 2312 4
M A C H e a d e r
The frame body contains the management information
that has to be sent, like Challenge text (e.g.
Authentication frame) or Time Indication Message and
PHY parameters (Beacon frame).
49. SHINE
49
IEEE 802.11 MAC Overview
Introduction
Communication Approach
MAC Functionality
MAC Frame Formats
Conclusion
50. SHINE
50
Conclusion
IEEE 802.11a uses the same MAC as IEEE 802.11
and the same PHY as Hiperlan2
Main MAC functions are: DCF, PCF, WEP
encryption, fragmentation, roaming and power
management
MAC frame has a variable length and consists of a
MAC header(max 30 bytes), a frame body (max
2312 bytes) and a 32-bit CRC
51. SHINE
51
Conclusion 2
Advantage:
High speed wirelessLAN
Good access scheme for medium sharing (DCF)
Disadvantage:
No QOS support (DCF)
WEP protocol is “easy to crack”
Solution: IEEE 802.11e (MAC and security
enhancement)