SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
IEEE 802.X
Keshav Maheshwari(15csu092)
Kritika Singh(15csu093)
Kshitij Sharma(15csu094)
Kuldeep Goel(15csu095)
Project 802
This are the standards for enabling
intercommunication among equipment from a
variety of manufacturers.
IEEE 802.3(Ethernet)
Ethernet
Ethernet is a family of computer networking technologies for local
area networks (LANs) and metropolitan area networks (MANs). It was
commercially introduced in 1980 and first standardized in 1983 as IEEE
802.3, [1] and has since been refined to support higher bit rates and longer
link distances.
Over time, Ethernet has largely replaced competing wired LAN
technologies such as token ring, FDDI, and ARCNET
MAC Sublayer :
In standard Ethernet , the MAC
sublayer ,governs
the operation of the access method .
And it also frames data received
from the upper layer and passes
them to the physical layer.
FRAME FORMAT
The Ethernet frames contains
seven fields : preamble ,SFD ,DA
,SA ,length or type of protocol data
unit(PDU),upper-layer data ,the
CRC . Ethernet does not provide
any mechanism for acknowledging
received frames , making it what is
known as an unreliable medium .
FRAME LENGTH : Ethernet has imposed restriction on both the minimum and
maximum lengths of a frame , as shown below.
Minimum frame length :512bits or 64 bytes
Maximum frame length:12,144bits/1518 bytes
REQUIREMENT OF MIN/MAX LENGTH:
● The minimum length is required for the correct operation of CSMA/CD.
● The maximum length is used to reduce the size of the buffer.
● It also prevents one station from monopolizing the shared medium .
ADDRESSING : Each station on a Ethernet network(such as PC ,workstation
or printer) has its own network interface card(NIC).The NIC fits inside the station
and provides the station with a 6-byte physical address . The Ethernet address is
6bytes(48 bits)written in hexadecimal notation , with a colon between the bytes.
Example: 06:01:02:01:2C:4B
UNICAST AND MULTICAST ADDRESSES
-> The least significant bit of the first byte defines the type of address . If the bit is 0 ,the
address is unicast ; otherwise , it is multicast.
-> A unicast address defines only one recipient ; the relationship between the sender and
the receiver is one-to-one.
-> A multicast address defines a group of addresses ; the relationship between the sender
and the receiver is one-to-many.
-> The broadcast destination address is a special case of the multicast address in which all
bits are 1s.
ACCESS METHOD:CSMA/CD
Standard Ethernet uses 1-persistent CSMA/CD
SLOT TIME:
Slot time=round-trip time + time required to send the jam sequence
RELATIONSHIP BETWEEN SLOT TIME AND MAXIMUM
NETWORK LENGTH:
Max Length=(Propagation speed ×slot time)/2
10Base5: Thick Internet
The name 10BASE5 is derived from
several characteristics of the physical
medium. The 10 refers to its
transmission speed of 10 Mbit/s. The
BASE is short for baseband signaling
as opposed to broadband, and the 5
stands for the maximum segment
length of 500 meters (1,600 ft.). It
was the first Ethernet specification to
use a bus topology with a external
transceiver connected via a tap to a
thick coaxial cable.
10base2:Thin Internet
● The second implementation is
called 10Base2,thin Ethernet ,
cheaper net .
● The cable is thinner and more
flexible.
● The transceiver is a part of NIC ,
which is installed inside the station.
● The implementation is most cost
effective than 10Base5as thin
coaxial cable is less expensive
than thick coaxial cable and the tee
connection are much cheaper than
taps.
10Base-T:Twister Pair Ethernet
● The third implementation is called
10Base-T or Twisted Pair Ethernet.
● It uses star topology and the
station are connected via two pairs
of twisted cable(one fro sending
and one for receiving)between the
station and the hub.
● The maximum length of the twisted
cable here is defined as 100m,to
minimize the effect of attenuation
in the twisted cable.
10Base-F:Fiber Ethernet
● Although there are several types of
optical fiber 10Mbps Ethernet, the
most common is called 10Base-F.
● 10Base-F uses a star topology to
connect stations to a hub.
● The stations are connected to a
hub using two-optic cables.
Fast Ethernet
Although there are several types of optical fiber 10Mbps Ethernet, the most
common is called 10Base-F. 10Base-F uses a star topology to connect stations to
a hub. The stations are connected to a hub using two-optic cables.
UPGRADE TO FAST ETHERNET:
Upgrade the data rate to 100Mbps. Make it compatible with standard Ethernet.
Keep the same 48 bit-address. Keep the same frame format.Keep the same
minimum and maximum frame lengths .
Autonegotiation:
It is a new feature is added to the Fast Ethernet . It allows a station or a hub a
range of capabilities .
It was designed for the following purposes:
● To allow incompatible devices to connect to one another.
● To allow on devices to have multiple capabilities.
● To allow a station to check a hub’s capabilities .
Fast Ethernet implementation:
Gigabit Ethernet
● In computer networking, Gigabit Ethernet (Gb E or 1 GigE) is a term
describing various technologies for transmitting Ethernet frames at a rate of a
gigabit per second (1,000,000,000 bits per second), as defined by the IEEE
802.3-2008 standard.
● Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s).
Gigabit Ethernet was the next iteration, increasing the speed to 1000 Mbit/s.
The initial standard for Gigabit Ethernet was produced by the IEEE in June
1998 as IEEE 802.3z, and required optical fiber. 802.3z is commonly referred
to as 1000BASE-X, where -X refers to either -CX, -SX, -LX, or (non-standard)
-ZX. For the history behind the "X" see Fast Ethernet.
Targets of Gigabit Ethernet:
● Upgrade the data rate to 1Gbps.
● Make it compatible with standard or fast Ethernet.
● Use the same address ,frame format.
● Keep the same minimum and maximum frame length.
● To support auto negotiation as defined in Fast Ethernet.
1000BASE-SX
● 1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over
multi-mode fiber using a 770 to 860 nanometer, near infrared (NIR) light
wavelength.
● The standard specifies a distance capability between 220 meters (62.5/125
μm fiber with low modal bandwidth) and 550 meters (50/125 μm fiber with
high modal bandwidth).
1000BASE-CX
● 1000BASE-CX is an initial standard for Gigabit Ethernet connection with
maximum distances of 25 meters using balanced shielded twisted pair and
either DE-9 or 8P8C connector (with a pinout different from 1000BASE-T).
The short segment length is due to very high signal transmission rate.
1000BASE-T
● 1000BASE-T (also known as IEEE 802.3ab) is a standard for Gigabit Ethernet
over copper wiring. Each 1000BASE-T network segment can be a maximum
length of 100 meters (330 feet), and must use Category 5 cable or better
(including Cat 5e and Cat 6).
1000BASE-LX
● 1000BASE-LX is a fiber optic Gigabit Ethernet standard specified in IEEE
802.3 Clause 38 which uses a long wavelength laser (1,270–1,355 nm), and a
maximum RMS spectral width of 4 nm.
● 1000BASE-LX is specified to work over a distance of up to 5 km over 10 μm
single-mode fiber.
IEEE 802.11
Introduction
● Created and maintained by IEEE
● Set of media control(MAC) and physical layer
● Used to implement wireless local area network(WLAN)
● In the frequency band 2.4,3.6,5 and 60 GHz
● In the frequency band 2.4,3.6,5 and 60 GHz WLAN
Introduction cntd.
● Adopted in 1997
● Family of 802
● Origins in a 1985 ruling by the U.S. Federal Communications commission.
● Consist of series of half duplex over the air modulation.
● Uses same basic protocols
● It uses two spread spectrum technology
● Frequency Hopping Spread Spectrum (FHSS)
● Direct Sequence Spread Spectrum (DSSS)
General terminologies:
● BSS (basic service set):
○ Group of stations that communicate each other
○ IBSS(independent basic service set):
○ It is a BSS without access point
● Extended Service Set (ESS):
○ A set of one or more Basic Service Sets inter connected by a distribution System (DS).
BSS IBSS
General terminologies cntd:
● Service Set Identifier (SSID):
○ It is network name similar to domain id
○ One network (ESS or IBSS) has one SSID
○ Basic Service Set Identifier (BSSID)
○ It is cell identifier and is 6 octets long
○ Similar to NW ID in pre-IEEE Wave LAN systems
Frame format
The 802.11 Protocol Stack:
802.11 Physical Layer (PHY)
● The 802.11 physical layer (PHY) is the interface between the MAC and the
wireless media where frames are transmitted and received.
● The PHY provides three functions.
○ First, the PHY provides an interface to exchange frames with the upper MAC layer for
transmission and reception of data.
○ Secondly, the PHY uses signal carrier and spread spectrum modulation to transmit data
frames over the media.
○ Thirdly, the PHY provides a carrier sense indication back to the MAC to verify activity on the
media.
Wireless Physical Layer:
● 802.11 Infrared
○ Two capacities 1 Mbps or 2 Mbps.
○ Range is 10 to 20 meters and cannot penetrate walls.
○ Does not work outdoors.
● 802.11 FHSS (Frequence Hopping Spread Spectrum)
○ The main issue is multipath fading.
○ 79 non-overlapping channels, each 1 Mhz wide at low end of 2.4 GHz ISM band.
○ Same pseudo-random number generator used by all stations. Dwell time: min. time on
channel before hopping(400msec).
Wireless Physical Layer:
● 802.11 DSSS (Direct Sequence Spread Spectrum)
○ Spreads signal over entire spectrum using pseudo-random sequence (similar to CDMA see
Tanenbaum sec. 2.6.2).
○ Each bit transmitted using an 11 chips Barker sequence, PSK
○ 1Mbaud.1 or 2 Mbps.
● 802.11a OFDM (Orthogonal Frequency Divisional Multiplexing)
○ Compatible with European HiperLan2.
○ 54Mbps in wider 5.5 GHz band transmission range is limited.
○ Uses 52 FDM channels (48 for data; 4 for synchronization).
○ Encoding is complex ( PSM up to 18 Mbps and QAM above this capacity).
○ E.g., at 54Mbps 216 data bits encoded into into 288-bit symbols. More difficulty penetrating
walls.
Wireless Physical Layer:
● 802.11b HR-DSSS (High Rate Direct Sequence Spread Spectrum)
○ 11a and 11b shows a split in the standards committee.
○ 11b approved and hit the market before 11a.
○ Up to 11 Mbps in 2.4 GHz band using 11 million chips/sec.
○ Note in this bandwidth all these protocols have to with interference from microwave ovens,
cordless phones and garage door openers.
○ Range is 7 times greater than 11a.
○ 11b and 11a are incompatible!!
Wireless Physical Layer
● 802.11g OFDM(Orthogonal Frequency Division Multiplexing)
○ An attempt to combine the best of both 802.11a and 802.11b.
○ Supports bandwidths up to 54 Mbps.
○ Uses 2.4 GHz frequency for greater range.
○ Is backward compatible with 802.11b.
802.11 Mac Sublayer Protocol:
● In 802.11 wireless LANs, “seizing channel” not exist as in 802.3 wired
Ethernet.
● Two additional problems:
○ Hidden Terminal Problem
○ Exposed Station Problem
● To deal with these two problems 802.11 supports two modes of operation
DCF (Distributed Coordination Function) and (Point Coordination Function).
● All implementations must support DCF, PCF is optional.
.(a)The hidden station problem. (b) The exposed station problem.
Wireless Lan Protocols:
● MACA protocol solved hidden, exposed terminal:
○ Send Ready-to-Send (RTS) and Clear-to-Send (CTS) first
○ RTS, CTS helps determine who else is in range busy (Collision avoidance).
○ Can a collision still occur?
Wireless LAN Protocols:
● MACAW added ACKs and CSMA (no RTS at same time).
(a) A sending an RTS to B. (b) B responding with a CTS to A.
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
What is Ethernet
What is EthernetWhat is Ethernet
What is EthernetSimplilearn
 

Was ist angesagt? (20)

ETHERNET
ETHERNETETHERNET
ETHERNET
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Ethernet
EthernetEthernet
Ethernet
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 

Ähnlich wie IEEE standards 802.3.&802.11 (20)

IEEE standard
IEEE standardIEEE standard
IEEE standard
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 
Netwok techonologies
Netwok techonologiesNetwok techonologies
Netwok techonologies
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
Mod9
Mod9Mod9
Mod9
 
Network engg
Network enggNetwork engg
Network engg
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit Ethernet
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 
networking
networkingnetworking
networking
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Lan basic
Lan basicLan basic
Lan basic
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

IEEE standards 802.3.&802.11

  • 1. IEEE 802.X Keshav Maheshwari(15csu092) Kritika Singh(15csu093) Kshitij Sharma(15csu094) Kuldeep Goel(15csu095)
  • 2. Project 802 This are the standards for enabling intercommunication among equipment from a variety of manufacturers. IEEE 802.3(Ethernet)
  • 3.
  • 4. Ethernet Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, [1] and has since been refined to support higher bit rates and longer link distances. Over time, Ethernet has largely replaced competing wired LAN technologies such as token ring, FDDI, and ARCNET
  • 5.
  • 6. MAC Sublayer : In standard Ethernet , the MAC sublayer ,governs the operation of the access method . And it also frames data received from the upper layer and passes them to the physical layer. FRAME FORMAT The Ethernet frames contains seven fields : preamble ,SFD ,DA ,SA ,length or type of protocol data unit(PDU),upper-layer data ,the CRC . Ethernet does not provide any mechanism for acknowledging received frames , making it what is known as an unreliable medium .
  • 7. FRAME LENGTH : Ethernet has imposed restriction on both the minimum and maximum lengths of a frame , as shown below. Minimum frame length :512bits or 64 bytes Maximum frame length:12,144bits/1518 bytes
  • 8. REQUIREMENT OF MIN/MAX LENGTH: ● The minimum length is required for the correct operation of CSMA/CD. ● The maximum length is used to reduce the size of the buffer. ● It also prevents one station from monopolizing the shared medium .
  • 9. ADDRESSING : Each station on a Ethernet network(such as PC ,workstation or printer) has its own network interface card(NIC).The NIC fits inside the station and provides the station with a 6-byte physical address . The Ethernet address is 6bytes(48 bits)written in hexadecimal notation , with a colon between the bytes. Example: 06:01:02:01:2C:4B UNICAST AND MULTICAST ADDRESSES -> The least significant bit of the first byte defines the type of address . If the bit is 0 ,the address is unicast ; otherwise , it is multicast. -> A unicast address defines only one recipient ; the relationship between the sender and the receiver is one-to-one. -> A multicast address defines a group of addresses ; the relationship between the sender and the receiver is one-to-many. -> The broadcast destination address is a special case of the multicast address in which all bits are 1s.
  • 10. ACCESS METHOD:CSMA/CD Standard Ethernet uses 1-persistent CSMA/CD SLOT TIME: Slot time=round-trip time + time required to send the jam sequence RELATIONSHIP BETWEEN SLOT TIME AND MAXIMUM NETWORK LENGTH: Max Length=(Propagation speed ×slot time)/2
  • 11.
  • 12. 10Base5: Thick Internet The name 10BASE5 is derived from several characteristics of the physical medium. The 10 refers to its transmission speed of 10 Mbit/s. The BASE is short for baseband signaling as opposed to broadband, and the 5 stands for the maximum segment length of 500 meters (1,600 ft.). It was the first Ethernet specification to use a bus topology with a external transceiver connected via a tap to a thick coaxial cable.
  • 13. 10base2:Thin Internet ● The second implementation is called 10Base2,thin Ethernet , cheaper net . ● The cable is thinner and more flexible. ● The transceiver is a part of NIC , which is installed inside the station. ● The implementation is most cost effective than 10Base5as thin coaxial cable is less expensive than thick coaxial cable and the tee connection are much cheaper than taps.
  • 14. 10Base-T:Twister Pair Ethernet ● The third implementation is called 10Base-T or Twisted Pair Ethernet. ● It uses star topology and the station are connected via two pairs of twisted cable(one fro sending and one for receiving)between the station and the hub. ● The maximum length of the twisted cable here is defined as 100m,to minimize the effect of attenuation in the twisted cable.
  • 15. 10Base-F:Fiber Ethernet ● Although there are several types of optical fiber 10Mbps Ethernet, the most common is called 10Base-F. ● 10Base-F uses a star topology to connect stations to a hub. ● The stations are connected to a hub using two-optic cables.
  • 16. Fast Ethernet Although there are several types of optical fiber 10Mbps Ethernet, the most common is called 10Base-F. 10Base-F uses a star topology to connect stations to a hub. The stations are connected to a hub using two-optic cables. UPGRADE TO FAST ETHERNET: Upgrade the data rate to 100Mbps. Make it compatible with standard Ethernet. Keep the same 48 bit-address. Keep the same frame format.Keep the same minimum and maximum frame lengths .
  • 17. Autonegotiation: It is a new feature is added to the Fast Ethernet . It allows a station or a hub a range of capabilities . It was designed for the following purposes: ● To allow incompatible devices to connect to one another. ● To allow on devices to have multiple capabilities. ● To allow a station to check a hub’s capabilities .
  • 19. Gigabit Ethernet ● In computer networking, Gigabit Ethernet (Gb E or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. ● Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing the speed to 1000 Mbit/s. The initial standard for Gigabit Ethernet was produced by the IEEE in June 1998 as IEEE 802.3z, and required optical fiber. 802.3z is commonly referred to as 1000BASE-X, where -X refers to either -CX, -SX, -LX, or (non-standard) -ZX. For the history behind the "X" see Fast Ethernet.
  • 20. Targets of Gigabit Ethernet: ● Upgrade the data rate to 1Gbps. ● Make it compatible with standard or fast Ethernet. ● Use the same address ,frame format. ● Keep the same minimum and maximum frame length. ● To support auto negotiation as defined in Fast Ethernet.
  • 21.
  • 22. 1000BASE-SX ● 1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber using a 770 to 860 nanometer, near infrared (NIR) light wavelength. ● The standard specifies a distance capability between 220 meters (62.5/125 μm fiber with low modal bandwidth) and 550 meters (50/125 μm fiber with high modal bandwidth).
  • 23. 1000BASE-CX ● 1000BASE-CX is an initial standard for Gigabit Ethernet connection with maximum distances of 25 meters using balanced shielded twisted pair and either DE-9 or 8P8C connector (with a pinout different from 1000BASE-T). The short segment length is due to very high signal transmission rate. 1000BASE-T ● 1000BASE-T (also known as IEEE 802.3ab) is a standard for Gigabit Ethernet over copper wiring. Each 1000BASE-T network segment can be a maximum length of 100 meters (330 feet), and must use Category 5 cable or better (including Cat 5e and Cat 6).
  • 24. 1000BASE-LX ● 1000BASE-LX is a fiber optic Gigabit Ethernet standard specified in IEEE 802.3 Clause 38 which uses a long wavelength laser (1,270–1,355 nm), and a maximum RMS spectral width of 4 nm. ● 1000BASE-LX is specified to work over a distance of up to 5 km over 10 μm single-mode fiber.
  • 25.
  • 27. Introduction ● Created and maintained by IEEE ● Set of media control(MAC) and physical layer ● Used to implement wireless local area network(WLAN) ● In the frequency band 2.4,3.6,5 and 60 GHz ● In the frequency band 2.4,3.6,5 and 60 GHz WLAN
  • 28. Introduction cntd. ● Adopted in 1997 ● Family of 802 ● Origins in a 1985 ruling by the U.S. Federal Communications commission. ● Consist of series of half duplex over the air modulation. ● Uses same basic protocols ● It uses two spread spectrum technology ● Frequency Hopping Spread Spectrum (FHSS) ● Direct Sequence Spread Spectrum (DSSS)
  • 29. General terminologies: ● BSS (basic service set): ○ Group of stations that communicate each other ○ IBSS(independent basic service set): ○ It is a BSS without access point ● Extended Service Set (ESS): ○ A set of one or more Basic Service Sets inter connected by a distribution System (DS).
  • 31. General terminologies cntd: ● Service Set Identifier (SSID): ○ It is network name similar to domain id ○ One network (ESS or IBSS) has one SSID ○ Basic Service Set Identifier (BSSID) ○ It is cell identifier and is 6 octets long ○ Similar to NW ID in pre-IEEE Wave LAN systems
  • 34. 802.11 Physical Layer (PHY) ● The 802.11 physical layer (PHY) is the interface between the MAC and the wireless media where frames are transmitted and received. ● The PHY provides three functions. ○ First, the PHY provides an interface to exchange frames with the upper MAC layer for transmission and reception of data. ○ Secondly, the PHY uses signal carrier and spread spectrum modulation to transmit data frames over the media. ○ Thirdly, the PHY provides a carrier sense indication back to the MAC to verify activity on the media.
  • 35. Wireless Physical Layer: ● 802.11 Infrared ○ Two capacities 1 Mbps or 2 Mbps. ○ Range is 10 to 20 meters and cannot penetrate walls. ○ Does not work outdoors. ● 802.11 FHSS (Frequence Hopping Spread Spectrum) ○ The main issue is multipath fading. ○ 79 non-overlapping channels, each 1 Mhz wide at low end of 2.4 GHz ISM band. ○ Same pseudo-random number generator used by all stations. Dwell time: min. time on channel before hopping(400msec).
  • 36. Wireless Physical Layer: ● 802.11 DSSS (Direct Sequence Spread Spectrum) ○ Spreads signal over entire spectrum using pseudo-random sequence (similar to CDMA see Tanenbaum sec. 2.6.2). ○ Each bit transmitted using an 11 chips Barker sequence, PSK ○ 1Mbaud.1 or 2 Mbps. ● 802.11a OFDM (Orthogonal Frequency Divisional Multiplexing) ○ Compatible with European HiperLan2. ○ 54Mbps in wider 5.5 GHz band transmission range is limited. ○ Uses 52 FDM channels (48 for data; 4 for synchronization). ○ Encoding is complex ( PSM up to 18 Mbps and QAM above this capacity). ○ E.g., at 54Mbps 216 data bits encoded into into 288-bit symbols. More difficulty penetrating walls.
  • 37. Wireless Physical Layer: ● 802.11b HR-DSSS (High Rate Direct Sequence Spread Spectrum) ○ 11a and 11b shows a split in the standards committee. ○ 11b approved and hit the market before 11a. ○ Up to 11 Mbps in 2.4 GHz band using 11 million chips/sec. ○ Note in this bandwidth all these protocols have to with interference from microwave ovens, cordless phones and garage door openers. ○ Range is 7 times greater than 11a. ○ 11b and 11a are incompatible!!
  • 38. Wireless Physical Layer ● 802.11g OFDM(Orthogonal Frequency Division Multiplexing) ○ An attempt to combine the best of both 802.11a and 802.11b. ○ Supports bandwidths up to 54 Mbps. ○ Uses 2.4 GHz frequency for greater range. ○ Is backward compatible with 802.11b.
  • 39. 802.11 Mac Sublayer Protocol: ● In 802.11 wireless LANs, “seizing channel” not exist as in 802.3 wired Ethernet. ● Two additional problems: ○ Hidden Terminal Problem ○ Exposed Station Problem ● To deal with these two problems 802.11 supports two modes of operation DCF (Distributed Coordination Function) and (Point Coordination Function). ● All implementations must support DCF, PCF is optional.
  • 40. .(a)The hidden station problem. (b) The exposed station problem.
  • 41. Wireless Lan Protocols: ● MACA protocol solved hidden, exposed terminal: ○ Send Ready-to-Send (RTS) and Clear-to-Send (CTS) first ○ RTS, CTS helps determine who else is in range busy (Collision avoidance). ○ Can a collision still occur?
  • 42. Wireless LAN Protocols: ● MACAW added ACKs and CSMA (no RTS at same time). (a) A sending an RTS to B. (b) B responding with a CTS to A.