SlideShare a Scribd company logo
1 of 27
CH-15
Wireless LANs
15.1 INTRODUCTION
15.1.1 Architectural Comparison
15.1.2 Characteristics
15.1.3 Access Control
15.2 IEEE 802.11 PROJECT
15.2.1 Architecture
15.2.2 MAC Sub layer
15.2.3 Addressing Mechanism
15.2.4 Physical Layer
15.3 BLUETOOTH
15.3.1 Architecture
15.3.2 Bluetooth Layers
2
 Wireless communication is one of the fastest-
growing technologies.
 The demand for connecting devices without
the use of cables is increasing everywhere.
 Wireless LANs can be found on college
campuses, in office buildings, and in many
public areas.
3
 Medium:
 The medium is air
 The signal is generally broadcast
 Communication is done using share medium
 Hosts
 A host is not physically connected to the network
 It can move freely and can use the services provided
by the network.
4
 Isolated LANs: It is called an ad hoc network, is a set of hosts that communicate
freely with each other.
 Connection to Other Networks: A wireless LAN may be connected to a wired
infrastructure network to a wireless infrastructure network
5
 WLANs can be classified into two types:
 Infrastructure networks contains access points(APs) and mobile
station(STAs).
 Ad hoc LANs do not need any fixed infrastructure.
 Infrastructure networks
 Provide access to other networks
 Include forwarding functions
 Medium access control
 Ad hoc network is a group of computers each with wireless
adapter, connected as an independent wireless LAN.
 Each node can communicate with other nodes
6
 Few Characteristics of wireless LANs:
 Attenuation
 The strength of electromagnetic signals decreases rapidly because the signal
disperses in all directions; only a small portion of it reaches the receiver.
 Interference
 Another issue is that a receiver may receive signals not only from the intended sender,
but also from other senders if they are using the same frequency band.
 Multipath Propagation
 A receiver may receive more than one signal from the same sender because
electromagnetic waves can be reflected back from obstacles such as walls, the ground,
or objects.
 This makes the signal less recognizable.
 Error
 Errors and error detection are more serious issues in a wireless network than in a wired
network. 7
 How a wireless host can get access to the shared medium (air).
 We discussed in Chapter 12 that the Standard Ethernet uses the
CSMA/CD algorithm
 In this method, each host contends to access the medium and sends its
frame if it finds the medium idle.
 If a collision occurs, it is detected and the frame is sent again. Collision
detection in CSMA/CD serves two purposes.
 If a collision is detected, it means that the frame has not been received
and needs to be resent.
 If a collision is not detected, it is a kind of acknowledgment that the
frame was received.
8
 The CSMA/CD algorithm does not work in wireless LANs for three reasons:
1. To detect a collision, a host needs to send and receive at the same time, which means
the host needs to work in a duplex mode.Wireless hosts do not have enough power to
do so (the power is supplied by batteries).They can only send or receive at one time.
2. Because of the hidden station problem, in which a station may not be aware of another
station’s transmission due to some obstacles or range problems, collision may occur but
not be detected.
3. The distance between stations can be great. Signal fading could prevent a station at
one end from hearing a collision at the other end.
 To overcome the above three problems, Carrier Sense MultipleAccess with Collision
Avoidance (CSMA/CA) was invented for wireless LANs 9
 IEEE has defined the specifications for a wireless LAN, called
IEEE 802.11, which covers the physical and data-link layers.
 It is sometimes called wireless Ethernet
 The public uses the term WiFi (short for wireless fidelity) as a
synonym for wireless LAN.
11
Wi-Fi Access points
Wi-Fi Router
 The standard defines two kinds of services
 Basic Service Set (BSS)
 Extended Service Set (ESS)
12
 Ad hoc architecture
 The BSS without an AP is a stand-alone network and cannot send data to
other BSSs..
 Infrastructure BSS
 A BSS with anAP is sometimes referred to as an infrastructure BSS.
13
(Ad hoc mode) (Infrastructure mode)
 An extended service set (ESS) is made up of two or more BSSs with APs.
 The BSSs are connected through a distribution system
 The extended service set uses two types of stations:
 Mobile Station: Normal stations inside a BSS
 Stationary Station : Are AP stations that are part of a wired LAN
14
 IEEE 802.11 defines three types of stations based on their
mobility in a wireless LAN:
 No-Transition
 BSS-Transition
 ESS-Transition Mobility
 A station with no-transition mobility is either stationary (not
moving) or moving only inside a BSS.
 A station with BSS-transition mobility can move from one
BSS to another, but the movement is confined inside one ESS.
 A station with ESS-transition mobility can move from one
ESS to another.
15
 IEEE 802.11 defines two MAC sub layers:
 Distributed coordination function (DCF)
 Point coordination function (PCF)
 Figure shows the relationship between the two MAC
sublayers, the LLC sublayer, and the physical layer.
16
 Distributed coordination function (DCF) is sublayer of MAC
 DCF uses CSMA/CA as the access method
 Problem in CSMA/CA
 Collision During
Handshaking
 Hidden-Station Problem
17
 The point coordination function (PCF) is an optional access method that can
be implemented in an infrastructure network.
 It is implemented on top of the DCF and is used mostly for time-sensitive
transmission.
 PCF has a centralized, contention-free polling access method
 The AP performs polling for stations that are capable of being polled.
 The stations are polled one after another, sending any data they have to the AP.
 PIFS is use to give priority to PCF over DCF, another interframe space.
 PIFS (PCF IFS) is shorter than DIFS.
 This means that if, at the same time, a station wants to use only DCF and an AP
wants to use PCF, the AP has priority.
18
 Priority of PCF over DCF, stations that only
use DCF may not gain access to the medium.
 To prevent this, a repetition interval has been
designed to cover both contention-free PCF
and contention-based DCF traffic.
 The repetition interval, which is repeated
continuously, starts with a special control
frame, called a beacon frame.
 When the stations hear the beacon frame,
they start their NAV for the duration of the
contention-free period of the repetition
interval.
 During the repetition interval, the PC (point
controller) can send a poll frame, receive data,
send an ACK, receive an ACK.
 At the end of the contention-free period,
the PC sends a CF end (contention-free
end) frame to allow the contention-based
stations to use the medium.
19
20
 Bluetooth is a wireless LAN technology
 Designed for connecting devices with different functionalities:
 Telephone, mouse, keyboard, camera, etc.
 Standard  IEEE 802.15.1
 The standard defines a wireless personal-area network (PAN)
operable in an area the size of a room or a hall.
21
 Bluetooth defines two types of networks:
 Piconet
 Scatternet.
22
 A piconet, or a small net, can
have up to eight stations.
 One station will be the primary;
the rest are called secondaries.
 All the secondary stations
synchronize their clocks and
hopping sequence with the
primary.
 The communication between
the primary and secondary
stations can be one-to-one or
one-to-many.
 additional secondaries can be in
the parked state
 For communication should
moved from the parked state
to the active state
 only eight stations can be
active in a piconet
23
 Piconets can be combined to form what is called a scatternet.
 A secondary station in one piconet can be the primary in another piconet.
 A station can be a member of two piconets.
24
 L2CAP:The Logical Link Control and Adaptation
Protocol, or L2CAP (L2 here means LL), is roughly
equivalent to the LLC sublayer in LANs.
 It is used for data exchange on an ACL link; SCO channels
do not use L2CAP
25
 The 16-bit length field defines the size of the
data, in bytes, coming from the upper layers.
 Data can be up to 65,535 bytes.
 The channel ID (CID) defines a unique identifier
for the virtual channel created at this level
26
 The L2CAP has specific duties:
 Multiplexing
 Segmentation and
 Reassembly
 Quality of service (QoS)
 Group Management
27

More Related Content

What's hot

Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
 
I2C And SPI Part-23
I2C And  SPI Part-23I2C And  SPI Part-23
I2C And SPI Part-23Techvilla
 
Lecture11 combinational logic dynamics
Lecture11 combinational logic dynamicsLecture11 combinational logic dynamics
Lecture11 combinational logic dynamicsvidhya DS
 
NETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingNETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingPankaj Debbarma
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13daniel ayalew
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer NetworksJanki Shah
 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxDESTROYER39
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless NetworksMeenakshi Paul
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilogSrinivas Naidu
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter PartPerformance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Partcriterion123
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Data Communication & Computer network: Bipolar codes
Data Communication & Computer network: Bipolar codesData Communication & Computer network: Bipolar codes
Data Communication & Computer network: Bipolar codesDr Rajiv Srivastava
 

What's hot (20)

Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Ipv4
Ipv4Ipv4
Ipv4
 
I2C And SPI Part-23
I2C And  SPI Part-23I2C And  SPI Part-23
I2C And SPI Part-23
 
Lecture11 combinational logic dynamics
Lecture11 combinational logic dynamicsLecture11 combinational logic dynamics
Lecture11 combinational logic dynamics
 
Ethernet
EthernetEthernet
Ethernet
 
Fpga
FpgaFpga
Fpga
 
NETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingNETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical Addressing
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13
 
Switching
SwitchingSwitching
Switching
 
Subnetting
SubnettingSubnetting
Subnetting
 
5 linear block codes
5 linear block codes5 linear block codes
5 linear block codes
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptx
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless Networks
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter PartPerformance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Data Communication & Computer network: Bipolar codes
Data Communication & Computer network: Bipolar codesData Communication & Computer network: Bipolar codes
Data Communication & Computer network: Bipolar codes
 

Similar to Wireless LANs

Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingNoorNawaz12
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocolumardanjumamaiwada
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfADARSHN40
 
computer network
computer networkcomputer network
computer networkRedHeart11
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Networkfherjaramillo
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)Siddique Ibrahim
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docDeepak John
 

Similar to Wireless LANs (20)

Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless Local Area Network
Wireless Local Area NetworkWireless Local Area Network
Wireless Local Area Network
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Lan wan
Lan wanLan wan
Lan wan
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
 
computer network
computer networkcomputer network
computer network
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
Hx2413921400
Hx2413921400Hx2413921400
Hx2413921400
 

More from Meenakshi Paul

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial IntelligencesMeenakshi Paul
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingMeenakshi Paul
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge ManagementMeenakshi Paul
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business ResearchMeenakshi Paul
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmissionMeenakshi Paul
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmissionMeenakshi Paul
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layerMeenakshi Paul
 
01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking01 Overview of Data Communication and Networking
01 Overview of Data Communication and NetworkingMeenakshi Paul
 
Computer Network Syllabus
Computer Network SyllabusComputer Network Syllabus
Computer Network SyllabusMeenakshi Paul
 

More from Meenakshi Paul (20)

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial Intelligences
 
Binary Arithmetic
Binary ArithmeticBinary Arithmetic
Binary Arithmetic
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
Codes
CodesCodes
Codes
 
Number System
Number SystemNumber System
Number System
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Switching
SwitchingSwitching
Switching
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Theory building
Theory buildingTheory building
Theory building
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business Research
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmission
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layer
 
02 network models
02  network models02  network models
02 network models
 
01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking
 
Computer Network Syllabus
Computer Network SyllabusComputer Network Syllabus
Computer Network Syllabus
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Wireless LANs

  • 2. 15.1 INTRODUCTION 15.1.1 Architectural Comparison 15.1.2 Characteristics 15.1.3 Access Control 15.2 IEEE 802.11 PROJECT 15.2.1 Architecture 15.2.2 MAC Sub layer 15.2.3 Addressing Mechanism 15.2.4 Physical Layer 15.3 BLUETOOTH 15.3.1 Architecture 15.3.2 Bluetooth Layers 2
  • 3.  Wireless communication is one of the fastest- growing technologies.  The demand for connecting devices without the use of cables is increasing everywhere.  Wireless LANs can be found on college campuses, in office buildings, and in many public areas. 3
  • 4.  Medium:  The medium is air  The signal is generally broadcast  Communication is done using share medium  Hosts  A host is not physically connected to the network  It can move freely and can use the services provided by the network. 4
  • 5.  Isolated LANs: It is called an ad hoc network, is a set of hosts that communicate freely with each other.  Connection to Other Networks: A wireless LAN may be connected to a wired infrastructure network to a wireless infrastructure network 5
  • 6.  WLANs can be classified into two types:  Infrastructure networks contains access points(APs) and mobile station(STAs).  Ad hoc LANs do not need any fixed infrastructure.  Infrastructure networks  Provide access to other networks  Include forwarding functions  Medium access control  Ad hoc network is a group of computers each with wireless adapter, connected as an independent wireless LAN.  Each node can communicate with other nodes 6
  • 7.  Few Characteristics of wireless LANs:  Attenuation  The strength of electromagnetic signals decreases rapidly because the signal disperses in all directions; only a small portion of it reaches the receiver.  Interference  Another issue is that a receiver may receive signals not only from the intended sender, but also from other senders if they are using the same frequency band.  Multipath Propagation  A receiver may receive more than one signal from the same sender because electromagnetic waves can be reflected back from obstacles such as walls, the ground, or objects.  This makes the signal less recognizable.  Error  Errors and error detection are more serious issues in a wireless network than in a wired network. 7
  • 8.  How a wireless host can get access to the shared medium (air).  We discussed in Chapter 12 that the Standard Ethernet uses the CSMA/CD algorithm  In this method, each host contends to access the medium and sends its frame if it finds the medium idle.  If a collision occurs, it is detected and the frame is sent again. Collision detection in CSMA/CD serves two purposes.  If a collision is detected, it means that the frame has not been received and needs to be resent.  If a collision is not detected, it is a kind of acknowledgment that the frame was received. 8
  • 9.  The CSMA/CD algorithm does not work in wireless LANs for three reasons: 1. To detect a collision, a host needs to send and receive at the same time, which means the host needs to work in a duplex mode.Wireless hosts do not have enough power to do so (the power is supplied by batteries).They can only send or receive at one time. 2. Because of the hidden station problem, in which a station may not be aware of another station’s transmission due to some obstacles or range problems, collision may occur but not be detected. 3. The distance between stations can be great. Signal fading could prevent a station at one end from hearing a collision at the other end.  To overcome the above three problems, Carrier Sense MultipleAccess with Collision Avoidance (CSMA/CA) was invented for wireless LANs 9
  • 10.
  • 11.  IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data-link layers.  It is sometimes called wireless Ethernet  The public uses the term WiFi (short for wireless fidelity) as a synonym for wireless LAN. 11 Wi-Fi Access points Wi-Fi Router
  • 12.  The standard defines two kinds of services  Basic Service Set (BSS)  Extended Service Set (ESS) 12
  • 13.  Ad hoc architecture  The BSS without an AP is a stand-alone network and cannot send data to other BSSs..  Infrastructure BSS  A BSS with anAP is sometimes referred to as an infrastructure BSS. 13 (Ad hoc mode) (Infrastructure mode)
  • 14.  An extended service set (ESS) is made up of two or more BSSs with APs.  The BSSs are connected through a distribution system  The extended service set uses two types of stations:  Mobile Station: Normal stations inside a BSS  Stationary Station : Are AP stations that are part of a wired LAN 14
  • 15.  IEEE 802.11 defines three types of stations based on their mobility in a wireless LAN:  No-Transition  BSS-Transition  ESS-Transition Mobility  A station with no-transition mobility is either stationary (not moving) or moving only inside a BSS.  A station with BSS-transition mobility can move from one BSS to another, but the movement is confined inside one ESS.  A station with ESS-transition mobility can move from one ESS to another. 15
  • 16.  IEEE 802.11 defines two MAC sub layers:  Distributed coordination function (DCF)  Point coordination function (PCF)  Figure shows the relationship between the two MAC sublayers, the LLC sublayer, and the physical layer. 16
  • 17.  Distributed coordination function (DCF) is sublayer of MAC  DCF uses CSMA/CA as the access method  Problem in CSMA/CA  Collision During Handshaking  Hidden-Station Problem 17
  • 18.  The point coordination function (PCF) is an optional access method that can be implemented in an infrastructure network.  It is implemented on top of the DCF and is used mostly for time-sensitive transmission.  PCF has a centralized, contention-free polling access method  The AP performs polling for stations that are capable of being polled.  The stations are polled one after another, sending any data they have to the AP.  PIFS is use to give priority to PCF over DCF, another interframe space.  PIFS (PCF IFS) is shorter than DIFS.  This means that if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the AP has priority. 18
  • 19.  Priority of PCF over DCF, stations that only use DCF may not gain access to the medium.  To prevent this, a repetition interval has been designed to cover both contention-free PCF and contention-based DCF traffic.  The repetition interval, which is repeated continuously, starts with a special control frame, called a beacon frame.  When the stations hear the beacon frame, they start their NAV for the duration of the contention-free period of the repetition interval.  During the repetition interval, the PC (point controller) can send a poll frame, receive data, send an ACK, receive an ACK.  At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow the contention-based stations to use the medium. 19
  • 20. 20
  • 21.  Bluetooth is a wireless LAN technology  Designed for connecting devices with different functionalities:  Telephone, mouse, keyboard, camera, etc.  Standard  IEEE 802.15.1  The standard defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall. 21
  • 22.  Bluetooth defines two types of networks:  Piconet  Scatternet. 22
  • 23.  A piconet, or a small net, can have up to eight stations.  One station will be the primary; the rest are called secondaries.  All the secondary stations synchronize their clocks and hopping sequence with the primary.  The communication between the primary and secondary stations can be one-to-one or one-to-many.  additional secondaries can be in the parked state  For communication should moved from the parked state to the active state  only eight stations can be active in a piconet 23
  • 24.  Piconets can be combined to form what is called a scatternet.  A secondary station in one piconet can be the primary in another piconet.  A station can be a member of two piconets. 24
  • 25.  L2CAP:The Logical Link Control and Adaptation Protocol, or L2CAP (L2 here means LL), is roughly equivalent to the LLC sublayer in LANs.  It is used for data exchange on an ACL link; SCO channels do not use L2CAP 25
  • 26.  The 16-bit length field defines the size of the data, in bytes, coming from the upper layers.  Data can be up to 65,535 bytes.  The channel ID (CID) defines a unique identifier for the virtual channel created at this level 26
  • 27.  The L2CAP has specific duties:  Multiplexing  Segmentation and  Reassembly  Quality of service (QoS)  Group Management 27