This document discusses the IEEE 802.11 MAC architecture. It describes the frame types, authentication and association processes, and power management techniques in wireless networks. Management frames like beacons are used to broadcast network information during scanning. Authentication establishes the identity of stations, while association allows stations to use network resources. Control frames provide functions like acknowledging frames and protecting transmissions. Power management helps conserve battery life for mobile devices.
Chapter 5: Objectives
-----------------------------------------------------------
Upon completion of this chapter, you will be able to:
Describe the operation of the Ethernet sublayers.
Identify the major fields of the Ethernet frame.
Describe the purpose and characteristics of the Ethernet MAC address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.
Explain basic switching concepts.
Compare fixed configuration and modular switches.
Configure a Layer 3 switch.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Upon completion of this chapter, you will be able to:
1) Describe the operation of the Ethernet sublayers.
2) Identify the major fields of the Ethernet frame.
3) Describe the purpose and characteristics of the Ethernet MAC address.
4) Describe the purpose of ARP.
5) Explain how ARP requests impact network and host performance.
6) Explain basic switching concepts.
7) Compare fixed configuration and modular switches.
8) Configure a Layer 3 switch.
Chapter 5: Objectives
-----------------------------------------------------------
Upon completion of this chapter, you will be able to:
Describe the operation of the Ethernet sublayers.
Identify the major fields of the Ethernet frame.
Describe the purpose and characteristics of the Ethernet MAC address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.
Explain basic switching concepts.
Compare fixed configuration and modular switches.
Configure a Layer 3 switch.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Upon completion of this chapter, you will be able to:
1) Describe the operation of the Ethernet sublayers.
2) Identify the major fields of the Ethernet frame.
3) Describe the purpose and characteristics of the Ethernet MAC address.
4) Describe the purpose of ARP.
5) Explain how ARP requests impact network and host performance.
6) Explain basic switching concepts.
7) Compare fixed configuration and modular switches.
8) Configure a Layer 3 switch.
A LAN or Local Area Network is a computer network (or data communications network) which is confined in a limited geographical location. A Virtual (or logical) LAN is a local area network with a definition that maps workstations/PCs on some other basis than geographic location (for example, by department, type of user or primary application)
This paper discuss various wireless networks and their security, for each type, structure and related threats are described and how different techniques are applied to achieve security goals starting by general case
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar on January 30th 2020, covering the basics of industrial networking. https://www.westermo.com/news-and-events/webinars/learn-the-basics-of-industrial-ethernet-communications
The webinar, including this presentation, aimed to teach the basics of industrial ethernet communications and computer networking. Starting from the ground up, it covered the basics of how network connections work, and how one computer talks to another.
Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of
the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital
Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well.
Frame relay is a type of WAN connection use to connect one site to many remote sites through a single
physical circuit; this operation makes it easy to construct reliable and inexpensive networks.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
More Related Content
Similar to TELE25892-4.3 802.11 MAC Architecture.pptx
A LAN or Local Area Network is a computer network (or data communications network) which is confined in a limited geographical location. A Virtual (or logical) LAN is a local area network with a definition that maps workstations/PCs on some other basis than geographic location (for example, by department, type of user or primary application)
This paper discuss various wireless networks and their security, for each type, structure and related threats are described and how different techniques are applied to achieve security goals starting by general case
This presentation by Westermo’s Technical Lead Engineers Dakota Diehl and Benjamin Campbell, is an integral part of the Westermo webinar on January 30th 2020, covering the basics of industrial networking. https://www.westermo.com/news-and-events/webinars/learn-the-basics-of-industrial-ethernet-communications
The webinar, including this presentation, aimed to teach the basics of industrial ethernet communications and computer networking. Starting from the ground up, it covered the basics of how network connections work, and how one computer talks to another.
Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of
the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital
Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well.
Frame relay is a type of WAN connection use to connect one site to many remote sites through a single
physical circuit; this operation makes it easy to construct reliable and inexpensive networks.
Similar to TELE25892-4.3 802.11 MAC Architecture.pptx (20)
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2. Agenda
IEEE 802.11 MAC Architecture Elements
Fames types
Frame subtypes
Protection mechanism
Power management
TELE_25892_Princuples of Wreless Networking
2
3. Reference/Reading
Reading:
Ch 10 [COL3]
Reference:
Most of the slides are taken from the text book
Web reference:
See inline
TELE_25892_Princuples of Wreless Networking
3
4. Learning Objectives
Explain encapsulation of IEEE 802.11 frames
Explain the phases of Wireless connection formation
Name and describe various types of roaming
TELE_25892_Princuples of Wreless Networking
4
5. IEEE 802.11 MAC Architecture Elements
Packets, Frames, and Bits
Physical Layer
Data Link Layer
802.11 and 802.3 Interoperability
Three 802.11 Frame Types
Beacon Management Frame (Beacon)
Passive Scanning
Active Scanning
Authentication
Authentication and Association States
Basic and Supported Rates
TELE_25892_Princuples of Wreless Networking
5
6. IEEE 802.11 MAC Architecture Elements
Roaming
Reassociation
Disassociation
Deauthentication
ACK Frame
Fragmentation
Protection Mechanism
RTS/CTS
CTS-to-Self
Data Frames
Power Management
TELE_25892_Princuples of Wreless Networking
6
7. Packets, Frames, and Bits
Packets
Data Units at the Network Layer
Frames
Data Units at the Data Link Layer
Bits
Binary Digits
TELE_25892_Princuples of Wreless Networking
7
8. Data Link Layer
Data Link Layer (DLL) has two sublayers
Logical Link Control (LLC)
Establishes Flow control
Maintains Flow Control
Media Access Control (MAC)
802.11 Specified Operations
Where the MAC address resides
MAC Service Data Unit (MSDU)
Data portion of MAC coming from LLC
MAC Protocol Data Unit (MPDU)
After encapsulation in MAC frame
TELE_25892_Princuples of Wreless Networking
8
9. MAC Service Data Unit (MSDU)
Contains Data From Layers 3-7 and the LLC
The Data Payload
Only Data Frames Carry the MSDU
Maximum Size of 2,304 bytes
TELE_25892_Princuples of Wreless Networking
9
10. MAC Protocol Data Unit (MPDU)
Encapsulates the MSDU
Is an 802.11 Frame
TELE_25892_Princuples of Wreless Networking
10
11. Physical Layer
Has two Sub-Layers
Physical Layer Convergence Protocol (PLCP)
Physical Media Dependent (PMD)
PLCP Services Data Unit (PSDU)
PLCP Protocol Data Unit (PPDU)
TELE_25892_Princuples of Wreless Networking
11
12. PLCP Data Units
PLCP Services Data Unit (PSDU)
The Same Frame as the MPDU
PLCP Protocol Data Unit (PPDU)
Adds Preamble and PHY Header
TELE_25892_Princuples of Wreless Networking
12
13. Data Link Layer and Physical Layer
Expanded
TELE_25892_Princuples of Wreless Networking
13
14. 802.11 and 802.3 Interoperability
802.3 Frames are encapsulated within 802.11 frames for Transmission
802.3 standard frame Max. Size = 1,518 bytes
802.11 standard frame Max. Size = 2,347 bytes
802.11 has four address field in header
Possible addresses are
Receiver Address (RA)
Transmitter Address (TA)
Basic Service Set Identifier (BSSID)
Destination Address (DA),
Source address (SA)
TELE_25892_Princuples of Wreless Networking
14
802.11 MAC header
15. 802.11 Frames
Frame Types
Management Frame
Control Frame
Data Frame
All have many Sub-Types
All are Identified by Frame Control Field of the Frame Header
TELE_25892_Princuples of Wreless Networking
15
16. Management Frames
Association request, and response
Reassociation request and response
Probe request, and response
Beacon
Announcement Traffic Indication Message (ATIM)
Disassociation
Authentication, and Deauthentication
Action
Action No ACK
Timing advertisement
TELE_25892_Princuples of Wreless Networking
16
17. Beacon Frame
Beacon Frame content
Time Stamp
Parameter Sets
Channel Information
Data Rates
BSS Capabilities
SSID
TIM and DTIM
QoS Capabilities
Security Capabilities
Vendor Proprietary Information
TELE_25892_Princuples of Wreless Networking
17
19. Passive and Active Scanning
Passive Scanning Stations Listen for Beacon Frames
Active Scanning Stations Use Probe Request and Response Frames
TELE_25892_Princuples of Wreless Networking
19
20. Authentication
Stations Must Authenticate to Begin Connection with an AP
Failed Authentication is the #1 Cause of Failed Association
Many Authentication Methods Exist
Open (no credentials required)
Shared key (uses WEP key)
TELE_25892_Princuples of Wreless Networking
20
22. Association
Occurs AFTER Authentication
Requires Mutually Supported Functions
Once Associated, Stations can Contend for the Medium and Pass Data
onto the Network
TELE_25892_Princuples of Wreless Networking
22
26. Basic and Supported Data Rates
Basic Rates are the MANDITORY Data Rates of the BSS
Supported Rates are the OPTIONAL Data Rates of the BSS
Information is Found in the Beacon Management Frame
TELE_25892_Princuples of Wreless Networking
26
27. Control Frame
Power Save Poll (PS-Poll)
Request to send (RTS)
Clear to send (CTS)
Acknowledgment (ACK)
Contention Free-End (CF-End)
CF-End + CF-ACK
Block ACK Request (BlockAckReq)
Block ACK (BlockAck)
Control wrapper
TELE_25892_Princuples of Wreless Networking
30
28. Acknowledgement Frame (ACK)
Every Unicast Frame by the Standard Should be Acknowledged
Used due to Inability to Detect Collisions
Provide Delivery Verification
TELE_25892_Princuples of Wreless Networking
31
29. Protection Mechanisms
Request to Send / Clear to Send (RTS/CTS)
Clear to Send to Self (CTS-to-Self)
Help Combat Hidden Node Issues
Allows Mixed Mode Operations
Creates Additional Overhead
Frames Sent at Lowest Basic Rate
TELE_25892_Princuples of Wreless Networking
32
30. RTS and CTS Frames
TELE_25892_Princuples of Wreless Networking
33
31. Timing Diagram of RTS/CTS
TELE_25892_Princuples of Wreless Networking
34
32. Request to Send / Clear to Send
(RTS/CTS)
TELE_25892_Princuples of Wreless Networking
35
33. Clear to Send to Self (CTS-to-Self)
Less Overhead than RTS/CTS
From the Station to Itself
Used in Mixed Mode BSS Operations
Creates Additional Overhead
Frames Sent at Lowest Basic Rate
TELE_25892_Princuples of Wreless Networking
36
34. Data Frames
Can be Pure Data
Can be Null Data
Can be Combined with other Functions
Contains the MSDU
TELE_25892_Princuples of Wreless Networking
37
35. Power Management
Conserves Battery Life
Require use of TIM (Traffic Indication Map), DTIM or ATIM
Two Modes Used
Active Mode (Always On)
Power Save Mode (On and Off)
Legacy Power Save Still used
WMM-PS Used on Newer Devices
TELE_25892_Princuples of Wreless Networking
38
37. Summary
In this lesson we reviewed the concept of encapsulation and decapsulation
We studied the fields of MPDU and relationship between MPDU and PPDU
We studied the IEEE 802.11 frame types
We studied the different types of management frames used in IEEE 802.11
standard
We studied how authentication and Association are performed in IEEE
802.11
We studied how roaming takes place
We studied where fragmentation can be useful and where it add overhead
We studied various types of control frames and the use of
acknowledgement as well as RTS-CTS and CTS-to- self messages
We studied power management features of IEEE 802.11 and how
interoperability can be achieved while power saving mode is being used by
the clients
TELE_25892_Princuples of Wreless Networking
41
39. Some Sample Questions
Describe the main functions of the sublayers in data link layer and
physical layer of 802.11 MAC architecture.
What are the four addresses in 802.11 MAC frames?
With a flow diagram, mention the states of authentication and
association in 802.11.
What are the three types of frames in 802.11? Briefly describe the
functions/purpose of each. Give some examples of each.
List some important information you find in a beacon frame.
What is the difference between active scanning and passive scanning?
Explain why every unicast frame in 802.1 1 requires
acknowledgement.
With a diagram, explain why and how RTS/CTS mechanism is used in
802.11.
TELE_25892_Princuples of Wreless Networking
43