SlideShare a Scribd company logo
1 of 27
IEEE 802.11
Wireless LAN
Tanmay Kumar Pradhan
V V Raja Rao
V Sreenivasulu
Wireless LANs: Characteristics
• Types
– Infrastructure based
– Ad-hoc
• Advantages
– Flexible deployment
– Minimal wiring difficulties
– More robust against disasters (earthquake etc)
– Historic buildings, conferences, trade shows,…
• Disadvantages
– Low bandwidth compared to wired networks (1-10 Mbit/s)
– Proprietary solutions
– Need to follow wireless spectrum regulations
Components/Architecture
• Station (STA) - Mobile node
• Access Point (AP) - Stations are connected to
access points.
• Basic Service Set (BSS) - Stations and the AP
with in the same radio coverage form a BSS.
• Extended Service Set (ESS) - Several BSSs
connected through APs form an ESS.
infrastructure
network
ad-hoc network
AP
AP
AP
wired network
AP: Access Point
Source: Schiller
Protocol Architecture
MAC sublayer
MAC layer
management
PLCP sublayer
PMD sublayer
Physical layer
management
Wireless LAN: Motivation
• Can we apply media access methods from
fixed networks?
• Example CSMA/CD
– Carrier Sense Multiple Access with Collision
Detection
– send as soon as the medium is free, listen into
the medium if a collision occurs (original
method in IEEE 802.3)
• Medium access problems in wireless
networks
– signal strength decreases proportional to the
square of the distance
– sender would apply CS and CD, but the
collisions happen at the receiver
– sender may not “hear” the collision, i.e., CD
does not work
– CS might not work, e.g. if a terminal is “hidden”
Difference Between Wired and
Wireless
• If both A and C sense the channel to be idle at the
same time, they send at the same time.
• Collision can be detected at sender in Ethernet.
• Half-duplex radios in wireless cannot detect
collision at sender.
A B C
A
B
C
Ethernet LAN Wireless LAN
• Hidden terminals
– A and C cannot hear each other.
– A sends to B, C cannot receive A.
– C wants to send to B, C senses a “free” medium (CS fails)
– Collision occurs at B.
– A cannot receive the collision (CD fails).
– A is “hidden” for C.
• Solution?
– Hidden terminal is peculiar to wireless (not found in wired)
– Need to sense carrier at receiver, not sender!
– “virtual carrier sensing”: Sender “asks” receiver whether it
can hear something. If so, behave as if channel busy.
Hidden Terminal Problem
BA C
Medium access control layer
• Asynchronous data service (DCF)
- CSMA/CA
- RTS/CTS
• Time bounded service (PCF)
- Polling
• Inter-frame spacing (IFS)
- DIFS
- PIFS
- SIFS
CSMA/CA
station1
station2
station3
station4
station5
t
DIFS DIFS DIFS DIFS
busy backoff Residual backoff
• 802.11 avoids the problem of hidden terminals
– A and C want to send to B
– A sends RTS to B
– B sends CTS to A
– C “overhears” CTS from B
– C waits for duration of A’s transmission
RTS/CTS
A B C
RTS
CTSCTS
RTS/CTS
RTS
sender
receiver
Other
stations
t
DIFS SIFS
DIFS
CTS
Data
SIFS
ACK
SIFS
NAV (RTS)
NAV (CTS)
bo Data
Fragmentation
• Wireless LANs have high bit error rates.
• The probability of erroneous frame is much
higher for wireless links
• 802.11 uses fragmentation to reduce the
frame error rate.
Fragmentation
RTS
sender
receiver
Other
stations
t
DIFS SIFS SIFS
CTS
frag1
SIFS
ACK
SIFS
NAV (RTS)
NAV (CTS)
frag2
SIFS
ACK
NAV(frag1)
NAV(ACK)
PCF with Polling
• To provide time bounded service.
• Requires an access point.
• Access point polls each station during
contention free period.
• Becomes an overhead during light load
PCF with polling
D1
AP
station2
station3
t
PIFS SIFS SIFS
U1
D2
SIFS
U2
SIFS
NAV (RTS)
MAC management
• Synchronization
- finding and staying with a WLAN
- synchronization functions
• Power Management
- sleeping without missing any messages
- power management functions
• Roaming
- functions for joining a network
- changing access points
- scanning for access points
• Management information base
Synchronization
• Timing synchronization function (TSF)
• Used for power management
- beacons sent at well known intervals
- all station timers in BSS are
synchronized
Synchronization
B
busy busy
B B
busy busy
B
B beacon Value of time stamp
Access
point
medium
Beacon interval
B
t
Power Management
• Mobile devices are battery powered
- power management is important for
mobility
• 802.11 power management protocol
- allows transceiver to be off as much as
possible
- is transparent to existing protocols
Power management approach
• Allow idle stations to go to sleep
- station’s power save mode stored in
AP
• APs buffer packets for sleeping stations
- AP announces which stations have
frames buffered
- traffic indication map (TIM) sent with
every beacon
• Power saving stations wake up periodically
Power management
busybusy busybusy
p PS poll
Data transmission
to/from the station
Access
point
station
TIM interval
Broadcast/
multicast
D
B
B T T
medium
t
p
d
d
DTIM interval
d
Roaming
• Mobile stations may move
- beyond the coverage area of their AP
- but within range of another AP
• Re association allows station to continue
operation.
Roaming approach
• Station decides that link to its current AP is poor.
• Station uses scanning function to find another AP
• Station sends Re-association Request to new AP
• If Re-association Response is successful
- then station has roamed to the new AP
- else station scans for another AP
• If AP accepts Re-association Request
- AP indicates Re-association to the
distributed system
- Distributed system information is
updated
Scanning
• Scanning is required for many functions
- finding and joining a network
- finding a new access point during
roaming
• Passive scanning
- find networks simply by listening for
beacons
• Active scanning
- on each channel send a probe and wait
for probe response
References
• Brian P Crow, Indra Widjaja, J G Kim,
Prescott T Sakai. IEEE 802.11 Wireless
Local Area Networks. IEEE
Communications Magazine
• www.breezecom.com
• Jochen H. Schiller, Mobile
Communications

More Related Content

What's hot

Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Laniamtheone90
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
 
12 multiple access
12 multiple access12 multiple access
12 multiple accessbheemsain
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecno80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecnoErcan Yılmaz
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 

What's hot (19)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
12 multiple access
12 multiple access12 multiple access
12 multiple access
 
Mac
MacMac
Mac
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
9 lan
9 lan9 lan
9 lan
 
80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecno80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecno
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 

Viewers also liked (17)

Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
Changes in the standard ppt
Changes in the standard pptChanges in the standard ppt
Changes in the standard ppt
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Lans ethernet
Lans ethernetLans ethernet
Lans ethernet
 
CCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukarCCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukar
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
LAN.
LAN.LAN.
LAN.
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Wlan
WlanWlan
Wlan
 
wired lans
wired lanswired lans
wired lans
 
Ethernet
EthernetEthernet
Ethernet
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
Ch 15
Ch 15Ch 15
Ch 15
 
Networking
NetworkingNetworking
Networking
 

Similar to 802.11[1]

Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
 
Mediumaccesscontrol
MediumaccesscontrolMediumaccesscontrol
MediumaccesscontrolVk Sreedhar
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
 
Mobile Computing_PPT.ppt
Mobile Computing_PPT.pptMobile Computing_PPT.ppt
Mobile Computing_PPT.pptMALATHYANANDAN
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011kongara
 

Similar to 802.11[1] (20)

Manet
ManetManet
Manet
 
manet.ppt
manet.pptmanet.ppt
manet.ppt
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
 
Mediumaccesscontrol
MediumaccesscontrolMediumaccesscontrol
Mediumaccesscontrol
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
 
Mobile Computing_PPT.ppt
Mobile Computing_PPT.pptMobile Computing_PPT.ppt
Mobile Computing_PPT.ppt
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
3_pstn2.ppt
3_pstn2.ppt3_pstn2.ppt
3_pstn2.ppt
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
 
CAN.ppt
CAN.pptCAN.ppt
CAN.ppt
 
WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.ppt
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

802.11[1]

  • 1. IEEE 802.11 Wireless LAN Tanmay Kumar Pradhan V V Raja Rao V Sreenivasulu
  • 2. Wireless LANs: Characteristics • Types – Infrastructure based – Ad-hoc • Advantages – Flexible deployment – Minimal wiring difficulties – More robust against disasters (earthquake etc) – Historic buildings, conferences, trade shows,… • Disadvantages – Low bandwidth compared to wired networks (1-10 Mbit/s) – Proprietary solutions – Need to follow wireless spectrum regulations
  • 3. Components/Architecture • Station (STA) - Mobile node • Access Point (AP) - Stations are connected to access points. • Basic Service Set (BSS) - Stations and the AP with in the same radio coverage form a BSS. • Extended Service Set (ESS) - Several BSSs connected through APs form an ESS.
  • 5. Protocol Architecture MAC sublayer MAC layer management PLCP sublayer PMD sublayer Physical layer management
  • 6. Wireless LAN: Motivation • Can we apply media access methods from fixed networks? • Example CSMA/CD – Carrier Sense Multiple Access with Collision Detection – send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3)
  • 7. • Medium access problems in wireless networks – signal strength decreases proportional to the square of the distance – sender would apply CS and CD, but the collisions happen at the receiver – sender may not “hear” the collision, i.e., CD does not work – CS might not work, e.g. if a terminal is “hidden”
  • 8. Difference Between Wired and Wireless • If both A and C sense the channel to be idle at the same time, they send at the same time. • Collision can be detected at sender in Ethernet. • Half-duplex radios in wireless cannot detect collision at sender. A B C A B C Ethernet LAN Wireless LAN
  • 9. • Hidden terminals – A and C cannot hear each other. – A sends to B, C cannot receive A. – C wants to send to B, C senses a “free” medium (CS fails) – Collision occurs at B. – A cannot receive the collision (CD fails). – A is “hidden” for C. • Solution? – Hidden terminal is peculiar to wireless (not found in wired) – Need to sense carrier at receiver, not sender! – “virtual carrier sensing”: Sender “asks” receiver whether it can hear something. If so, behave as if channel busy. Hidden Terminal Problem BA C
  • 10. Medium access control layer • Asynchronous data service (DCF) - CSMA/CA - RTS/CTS • Time bounded service (PCF) - Polling • Inter-frame spacing (IFS) - DIFS - PIFS - SIFS
  • 12. • 802.11 avoids the problem of hidden terminals – A and C want to send to B – A sends RTS to B – B sends CTS to A – C “overhears” CTS from B – C waits for duration of A’s transmission RTS/CTS A B C RTS CTSCTS
  • 14. Fragmentation • Wireless LANs have high bit error rates. • The probability of erroneous frame is much higher for wireless links • 802.11 uses fragmentation to reduce the frame error rate.
  • 16. PCF with Polling • To provide time bounded service. • Requires an access point. • Access point polls each station during contention free period. • Becomes an overhead during light load
  • 17. PCF with polling D1 AP station2 station3 t PIFS SIFS SIFS U1 D2 SIFS U2 SIFS NAV (RTS)
  • 18. MAC management • Synchronization - finding and staying with a WLAN - synchronization functions • Power Management - sleeping without missing any messages - power management functions • Roaming - functions for joining a network - changing access points - scanning for access points • Management information base
  • 19. Synchronization • Timing synchronization function (TSF) • Used for power management - beacons sent at well known intervals - all station timers in BSS are synchronized
  • 20. Synchronization B busy busy B B busy busy B B beacon Value of time stamp Access point medium Beacon interval B t
  • 21. Power Management • Mobile devices are battery powered - power management is important for mobility • 802.11 power management protocol - allows transceiver to be off as much as possible - is transparent to existing protocols
  • 22. Power management approach • Allow idle stations to go to sleep - station’s power save mode stored in AP • APs buffer packets for sleeping stations - AP announces which stations have frames buffered - traffic indication map (TIM) sent with every beacon • Power saving stations wake up periodically
  • 23. Power management busybusy busybusy p PS poll Data transmission to/from the station Access point station TIM interval Broadcast/ multicast D B B T T medium t p d d DTIM interval d
  • 24. Roaming • Mobile stations may move - beyond the coverage area of their AP - but within range of another AP • Re association allows station to continue operation.
  • 25. Roaming approach • Station decides that link to its current AP is poor. • Station uses scanning function to find another AP • Station sends Re-association Request to new AP • If Re-association Response is successful - then station has roamed to the new AP - else station scans for another AP • If AP accepts Re-association Request - AP indicates Re-association to the distributed system - Distributed system information is updated
  • 26. Scanning • Scanning is required for many functions - finding and joining a network - finding a new access point during roaming • Passive scanning - find networks simply by listening for beacons • Active scanning - on each channel send a probe and wait for probe response
  • 27. References • Brian P Crow, Indra Widjaja, J G Kim, Prescott T Sakai. IEEE 802.11 Wireless Local Area Networks. IEEE Communications Magazine • www.breezecom.com • Jochen H. Schiller, Mobile Communications