SlideShare a Scribd company logo
PRESENTATION
ON
IEEE 802.11
Prepared By:
Shreejan Acharya
BEX 68114
Slides Includes
Introduction
Physical Layer
Architecture
Frame format
Different Protocols
Media Access Control (MAC)
Introduction
 Created and maintained by IEEE
 Set of media control(MAC) and physical layer
 Used to implement wireless local area
network(WLAN)
 In the frequency band 2.4,3.6,5 and 60 GHz
 Wi-fi refers to the IEEE 802.11 communication for
WLAN
The Linksys WRT54G contains a router with an
802.11b/g radio and two antennas
Introduction cntd.
Adopted in 1997
Family of 802
Origins in a 1985 ruling by the U.S. Federal
Communications commission
Consist of series of half duplex over the air
modulation
Uses same basic protocols
It uses two spread spectrum technology
Frequency Hopping Spread Spectrum (FHSS)
 Direct Sequence Spread Spectrum (DSSS)
802.11 Physical Layer (PHY)
The 802.11 physical layer (PHY) is the interface
between the MAC and the wireless media where
frames are transmitted and received.
 The PHY provides three functions.
 First, the PHY provides an interface to exchange
frames with the upper MAC layer for transmission and
reception of data.
Secondly, the PHY uses signal carrier and spread
spectrum modulation to transmit data frames over
the media.
 Thirdly, the PHY provides a carrier sense indication
back to the MAC to verify activity on the media.
Architectures
Station (STA) Architecture:
 It contains IEEE 802.11
conformant MAC and PHY
interface to the wireless
medium, but does not
provide access to a
distribution system
Access-Point Architecture:
 Device that contains
IEEE802.11 conformant
MAC and PHY interface to
the wireless medium, and
provide access to a
distribution system for
associated stations
 Implemented in infra-
structure products that
connect to wired backbones
General terminologies
BSS (basic service set):
Group of stations that communicate each other
IBSS(independent basic service set):
It is a BSS without access point
Extended Service Set (ESS):
A set of one or more Basic Service Sets inter
connected by a distribution System (DS)
BSS IBSS
General terminologies cntd
Service Set Identifier (SSID):
It is network name similar to domain id
One network (ESS or IBSS) has one SSID
Basic Service Set Identifier (BSSID)
It is cell identifier and is 6 octets long
Similar to NW ID in pre-IEEE Wave LAN systems
Frame format
Bytes 2 22 6 6
6
66 2 6 0-
2312
4
Frame control Durati
on ID
A1 A2 A3 seq.ctr
l
A4 Frame
body
CRC
802.11 MAC header
Bits :2
2 2 4 1 1 1 1 1 1 1
Protocol
version
type Sub
type
To DS From
DS
More
flag
Retry Pwr
Mgt
More
data
wep rsvd
Frame control Field
protocols
802.11 legacy
Release in Jun 1997
Original version of 802.11
Specifies two net bit rate 1or 2 mbits per sec
It has forward error correction code
Three alternatives physical layer
Diffuse infrared
Frequency hopping spread spectrum
Direct sequence spread spectrum
802.11a(ofdm waveform)
Release in sep 1999
Data rates 1.5 to 54 mbit/s
First widely accepted 802 family
Operates at 5GHz frequency band
Less range
802.11b
Release on the market in 2000
Maximum raw data rate of 11mbit/s
High throughput
Low cost
Interference problem
802.11g
Release on june 2003
Operates in the 2.4 GHz band
Uses OFDM based transmission scheme
Operates at the average bit rate of 22 Mbit/s or
maximum 54 Mbit/s
Its hardware are full back compatible with
802.11b hardware
802.11n
Release on October 2009
It is the improvement over previous 802.11
standard
It has MIMO antennas
Operates at the 2.4 GHz or less than 5GHz
bands
Data rates from 54 Mbit/s to 600 Mbit/s
802.11ac
Release in December 2013
It is an amendment to IEEE 802.11
It has wider channels(80 or 160 MHz)
Operates at 5GHz band
It supports multi-user MIMO
Data rates up to 1300 Mbit/s
802.11ad
Release in Dec 2012
It defines new physical layer for 802.11 n/w
Operates in the 60GHz millimeter wave
spectrum
Product implementing this standard are being
brought under the name of wigig brand
Peak transmission rate 7 Gbit/s
Other Protocols
802.11 AH
Estimated to release 2016
Bandwidth 900MHz
802.11 AJ
 Estimated to release 2016
Bandwidth 24/60
802.11 AX
Estimated to release 2019
Bandwidth 2.4/5
802.11 Media Access Control
 The 802.11 MAC layer provides functionality to allow reliable data
delivery for the upper layers over the wireless PHY media.
 The data delivery itself is based on an asynchronous, best-effort,
connectionless delivery of MAC layer data.
 There is no guarantee that the frames will be delivered successfully.
 The 802.11 MAC provides a controlled access method to the shared
wireless media called Carrier-Sense Multiple Access with Collision
Avoidance (CSMA/CA).
 CSMA/CA is similar to the collision detection access method
deployed by 802.3 Ethernet LANs.
802.11 Media Access Control cntd
Another function of the 802.11 MAC is to
protect the data being delivered by providing
security and privacy services.
 Security is provided by the authentication
services and by Wireless Equivalent Privacy
(WEP), which is an encryption service for data
delivered on the WLAN.
Security
For security 802.11 specifies two
Authentication modes:
OSA(Opens Systems Authentication)
• Device that request to access the network is granted
without any security check
Shared Key Authentication
• Device that request to access the network is granted
with security check
• WEP: wired equivalent privacy
ESSID offers casual separation of traffic
THANK YOU

More Related Content

What's hot

TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
Md. Saddam Hossain Noyon
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
SANJUU7
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
Saikiran Panjala
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 

What's hot (20)

WCDMA
WCDMAWCDMA
WCDMA
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 

Viewers also liked

Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning tree
oneous
 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional wavesRick Turner
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
Anuj Rajput
 
Wap ppt
Wap pptWap ppt
Wap ppt
Abhijit Nath
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
WLAN
WLANWLAN
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
Pradeep Kumar TS
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Nijo Job
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Chapter#14
Chapter#14Chapter#14
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
Narendar Bogala
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
Abhishek G
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
SUBBIAH SURESH
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
Arkaprava Sadhu
 

Viewers also liked (20)

Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning tree
 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional waves
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
WLAN
WLANWLAN
WLAN
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 

Similar to wireless network IEEE 802.11

Seminar
SeminarSeminar
Seminar
cnnithin
 
802 standerd
802 standerd802 standerd
802 standerd
sandeshkumar91
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
802.11 mac
802.11 mac802.11 mac
802.11 mac
Parthipan Parthi
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Eric Vanderburg
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
dxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Lect4
Lect4Lect4
Lect4
Lect4Lect4
Lecture 14
Lecture 14Lecture 14
Lecture 14
Joe Christensen
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
SMC Networks Europe
 
Darsh
DarshDarsh
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
Makarand Badgujar
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
Siva Cool
 
Wi fi
Wi fiWi fi

Similar to wireless network IEEE 802.11 (20)

Seminar
SeminarSeminar
Seminar
 
802 standerd
802 standerd802 standerd
802 standerd
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 
wifi network
wifi networkwifi network
wifi network
 
802.11 mac
802.11 mac802.11 mac
802.11 mac
 
8 wlans
8 wlans8 wlans
8 wlans
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Lect4
Lect4Lect4
Lect4
 
Lect4
Lect4Lect4
Lect4
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Darsh
DarshDarsh
Darsh
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Wi fi
Wi fiWi fi
Wi fi
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

wireless network IEEE 802.11

  • 2. Slides Includes Introduction Physical Layer Architecture Frame format Different Protocols Media Access Control (MAC)
  • 3. Introduction  Created and maintained by IEEE  Set of media control(MAC) and physical layer  Used to implement wireless local area network(WLAN)  In the frequency band 2.4,3.6,5 and 60 GHz  Wi-fi refers to the IEEE 802.11 communication for WLAN The Linksys WRT54G contains a router with an 802.11b/g radio and two antennas
  • 4. Introduction cntd. Adopted in 1997 Family of 802 Origins in a 1985 ruling by the U.S. Federal Communications commission Consist of series of half duplex over the air modulation Uses same basic protocols It uses two spread spectrum technology Frequency Hopping Spread Spectrum (FHSS)  Direct Sequence Spread Spectrum (DSSS)
  • 5. 802.11 Physical Layer (PHY) The 802.11 physical layer (PHY) is the interface between the MAC and the wireless media where frames are transmitted and received.  The PHY provides three functions.  First, the PHY provides an interface to exchange frames with the upper MAC layer for transmission and reception of data. Secondly, the PHY uses signal carrier and spread spectrum modulation to transmit data frames over the media.  Thirdly, the PHY provides a carrier sense indication back to the MAC to verify activity on the media.
  • 6. Architectures Station (STA) Architecture:  It contains IEEE 802.11 conformant MAC and PHY interface to the wireless medium, but does not provide access to a distribution system Access-Point Architecture:  Device that contains IEEE802.11 conformant MAC and PHY interface to the wireless medium, and provide access to a distribution system for associated stations  Implemented in infra- structure products that connect to wired backbones
  • 7. General terminologies BSS (basic service set): Group of stations that communicate each other IBSS(independent basic service set): It is a BSS without access point Extended Service Set (ESS): A set of one or more Basic Service Sets inter connected by a distribution System (DS)
  • 9. General terminologies cntd Service Set Identifier (SSID): It is network name similar to domain id One network (ESS or IBSS) has one SSID Basic Service Set Identifier (BSSID) It is cell identifier and is 6 octets long Similar to NW ID in pre-IEEE Wave LAN systems
  • 10. Frame format Bytes 2 22 6 6 6 66 2 6 0- 2312 4 Frame control Durati on ID A1 A2 A3 seq.ctr l A4 Frame body CRC 802.11 MAC header Bits :2 2 2 4 1 1 1 1 1 1 1 Protocol version type Sub type To DS From DS More flag Retry Pwr Mgt More data wep rsvd Frame control Field
  • 11. protocols 802.11 legacy Release in Jun 1997 Original version of 802.11 Specifies two net bit rate 1or 2 mbits per sec It has forward error correction code Three alternatives physical layer Diffuse infrared Frequency hopping spread spectrum Direct sequence spread spectrum
  • 12. 802.11a(ofdm waveform) Release in sep 1999 Data rates 1.5 to 54 mbit/s First widely accepted 802 family Operates at 5GHz frequency band Less range
  • 13. 802.11b Release on the market in 2000 Maximum raw data rate of 11mbit/s High throughput Low cost Interference problem
  • 14. 802.11g Release on june 2003 Operates in the 2.4 GHz band Uses OFDM based transmission scheme Operates at the average bit rate of 22 Mbit/s or maximum 54 Mbit/s Its hardware are full back compatible with 802.11b hardware
  • 15. 802.11n Release on October 2009 It is the improvement over previous 802.11 standard It has MIMO antennas Operates at the 2.4 GHz or less than 5GHz bands Data rates from 54 Mbit/s to 600 Mbit/s
  • 16. 802.11ac Release in December 2013 It is an amendment to IEEE 802.11 It has wider channels(80 or 160 MHz) Operates at 5GHz band It supports multi-user MIMO Data rates up to 1300 Mbit/s
  • 17. 802.11ad Release in Dec 2012 It defines new physical layer for 802.11 n/w Operates in the 60GHz millimeter wave spectrum Product implementing this standard are being brought under the name of wigig brand Peak transmission rate 7 Gbit/s
  • 18. Other Protocols 802.11 AH Estimated to release 2016 Bandwidth 900MHz 802.11 AJ  Estimated to release 2016 Bandwidth 24/60 802.11 AX Estimated to release 2019 Bandwidth 2.4/5
  • 19. 802.11 Media Access Control  The 802.11 MAC layer provides functionality to allow reliable data delivery for the upper layers over the wireless PHY media.  The data delivery itself is based on an asynchronous, best-effort, connectionless delivery of MAC layer data.  There is no guarantee that the frames will be delivered successfully.  The 802.11 MAC provides a controlled access method to the shared wireless media called Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA).  CSMA/CA is similar to the collision detection access method deployed by 802.3 Ethernet LANs.
  • 20. 802.11 Media Access Control cntd Another function of the 802.11 MAC is to protect the data being delivered by providing security and privacy services.  Security is provided by the authentication services and by Wireless Equivalent Privacy (WEP), which is an encryption service for data delivered on the WLAN.
  • 21. Security For security 802.11 specifies two Authentication modes: OSA(Opens Systems Authentication) • Device that request to access the network is granted without any security check Shared Key Authentication • Device that request to access the network is granted with security check • WEP: wired equivalent privacy ESSID offers casual separation of traffic