SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Wireless Ethernet
802.11 Presentation 2




                        1
802.11 Physical Layer
   Frequency Allocation 802.11
   Direct-Sequence (DS) spread-spectrum radio
   Frequency-hopping(FH) spread-spectrum radio
   Infrared Light (IR)




Image acquired from
http://www.pulsewan.com/data101/802_11_b_basics.htm




                                                      2
Frequency-Hopping
 79 channels from 2.402 to 2.480 GHz with 1
  MHz channel space
 78 hopping sequences with minimum 6 MHz
  hopping space, each sequence uses every 79
  frequency elements once




                                               3
Direct Sequence Spread Spectrum
 Spreads signal by expanding the signal over a broad portion of the radio band.
 DBPSK Differential Binary Phase Shift Keying
 Ideal for high bandwidth apps.
 Uses higher power to transmit and more expensive to implement compared to FHSS.




Image acquired from http://www.wireless-telecom.com/images/dsss_pic.gif





                                                                                    4
Orthogonal Frequency Division
Multiplexing
 OFDM – Uses all 48 channels.
 Each Parallel bit stream is modulated differently; BPSK QPSK
  or QAM.
 Multipath propagation environment.




mage acquired from http://iaf-bs.de/img/con/projects/3glte-mimo-ofdm-testbed/3GLTE_Testbed_fading_adapt.jpg




                                                                                                              5
MAC Access Modes
 DCF – Distributed coordination function.
 PCF – Point coordination function.




   Image acquired from www.cisco.com/.../ 119001-120000/119161.jpg
   www.cisco.com/.../ 119001-120000/119161.jpg



                                                                      rich phelps 802.11 framing   6
Data Link Layer 802.11
   Two sub layers: Logical Link Control (LLC), Media Access Control (MAC)
   Same 802.2 LLC and 48-bit MAC addressing as for all other 802 LANs
   MAC layer similar but different to Ethernet 802.3
   Similarities: Contention-based
     ◦ Medium is free for all
     ◦ A node senses the free medium and occupies it as long as data packet
       requires it
   Differences: CSMA/CD vs CSMA/CA, CRC, packet fragmentation
   Ethernet 802.3 - CSMA/CD (Carrier Sense Multiple Access / Collision Detect)
     ◦ Collision detection possible because can send/receive simultaneously
   Ethernet 802.11 - CSMA/CA (Carrier Sense Multiple Access / Collision
    Avoidance)
     ◦ Collision detection not possible because of near/far problem for radios
     ◦ Steps: sense the air, wait, send, wait for ACK, retransmit if needed
     ◦ Optional RTS/CTS feature to solve “hidden node” problem
         “Hidden node”: where two stations on either side of an AP can’t hear each
          other broadcast.
   CRC – error checking at layer 2 (Ethernet assumes this is layer 3 task)
   Packet fragmentation: breaking large packets into smaller ones at MAC layer
   Overhead of MAC layer reduces throughput by 40-50%


                                                                                      7
802.11 MAC Frame
    NOTE: This frame structure is common for all data sent by a 802.11 station

      control info (WEP, data type as management, control, data ...)
                                               frame ordering
             next frame duration               info for RX

                   -Basic service identification            frame specific,
                   -source/destination address              variable length
                   -transmitting station
                   -receiving station




                                                                         frame check
                                                                         sequence
                                                                         (CRC)



                                                                                       8
Wired Equivalent Privacy
   Implemented at the MAC layer.
   RC4 Stream Cipher
   Provides encryption to data frames only




http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif
http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif




                                                                            9

Weitere ähnliche Inhalte

Was ist angesagt?

Spannig tree
Spannig treeSpannig tree
Spannig tree1 2d
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolRafat Khandaker
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteActionPacked Networks
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolArash Foroughi
 
Ucs security part2
Ucs security part2Ucs security part2
Ucs security part2Krunal Shah
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12CYBERINTELLIGENTS
 
DMA Controller Modes Of Operation
DMA Controller Modes Of OperationDMA Controller Modes Of Operation
DMA Controller Modes Of OperationNoor Nabi
 
Controller area network
Controller area networkController area network
Controller area networksanaz nouri
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answerNarayana Samy
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)swayambhoo
 

Was ist angesagt? (20)

Spannig tree
Spannig treeSpannig tree
Spannig tree
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat SheetSpanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application Note
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Ucs security part2
Ucs security part2Ucs security part2
Ucs security part2
 
Managing Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN RoutingManaging Redundant Links & Inter-VLAN Routing
Managing Redundant Links & Inter-VLAN Routing
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
 
DMA Controller Modes Of Operation
DMA Controller Modes Of OperationDMA Controller Modes Of Operation
DMA Controller Modes Of Operation
 
Controller area network
Controller area networkController area network
Controller area network
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
Raj
RajRaj
Raj
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Switching
SwitchingSwitching
Switching
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 

Ähnlich wie 802 11 2

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.pptDigiPlexus
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless NetworksNapier University
 
sub.net substation monitor
sub.net substation monitorsub.net substation monitor
sub.net substation monitorrk_at_emsni
 
Manual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apManual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apCentro de Mídia
 
Data communication part2
Data communication part2Data communication part2
Data communication part2Melvin Cabatuan
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
 
NST Product Catalog
NST Product CatalogNST Product Catalog
NST Product Catalogmoonhyo
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 

Ähnlich wie 802 11 2 (20)

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
 
sub.net substation monitor
sub.net substation monitorsub.net substation monitor
sub.net substation monitor
 
Manual Air Live Wl 5460 ap
Manual Air Live Wl 5460 apManual Air Live Wl 5460 ap
Manual Air Live Wl 5460 ap
 
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
2_wpan.ppt
2_wpan.ppt2_wpan.ppt
2_wpan.ppt
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
NST Product Catalog
NST Product CatalogNST Product Catalog
NST Product Catalog
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 

Mehr von rphelps

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Eventrphelps
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connectrphelps
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staffrphelps
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencingrphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 

Mehr von rphelps (6)

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Event
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connect
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staff
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencing
 
802 11 2
802 11 2802 11 2
802 11 2
 
802 11 3
802 11 3802 11 3
802 11 3
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

802 11 2

  • 2. 802.11 Physical Layer  Frequency Allocation 802.11  Direct-Sequence (DS) spread-spectrum radio  Frequency-hopping(FH) spread-spectrum radio  Infrared Light (IR) Image acquired from http://www.pulsewan.com/data101/802_11_b_basics.htm 2
  • 3. Frequency-Hopping  79 channels from 2.402 to 2.480 GHz with 1 MHz channel space  78 hopping sequences with minimum 6 MHz hopping space, each sequence uses every 79 frequency elements once 3
  • 4. Direct Sequence Spread Spectrum  Spreads signal by expanding the signal over a broad portion of the radio band.  DBPSK Differential Binary Phase Shift Keying  Ideal for high bandwidth apps.  Uses higher power to transmit and more expensive to implement compared to FHSS. Image acquired from http://www.wireless-telecom.com/images/dsss_pic.gif  4
  • 5. Orthogonal Frequency Division Multiplexing  OFDM – Uses all 48 channels.  Each Parallel bit stream is modulated differently; BPSK QPSK or QAM.  Multipath propagation environment. mage acquired from http://iaf-bs.de/img/con/projects/3glte-mimo-ofdm-testbed/3GLTE_Testbed_fading_adapt.jpg 5
  • 6. MAC Access Modes  DCF – Distributed coordination function.  PCF – Point coordination function.  Image acquired from www.cisco.com/.../ 119001-120000/119161.jpg  www.cisco.com/.../ 119001-120000/119161.jpg rich phelps 802.11 framing 6
  • 7. Data Link Layer 802.11  Two sub layers: Logical Link Control (LLC), Media Access Control (MAC)  Same 802.2 LLC and 48-bit MAC addressing as for all other 802 LANs  MAC layer similar but different to Ethernet 802.3  Similarities: Contention-based ◦ Medium is free for all ◦ A node senses the free medium and occupies it as long as data packet requires it  Differences: CSMA/CD vs CSMA/CA, CRC, packet fragmentation  Ethernet 802.3 - CSMA/CD (Carrier Sense Multiple Access / Collision Detect) ◦ Collision detection possible because can send/receive simultaneously  Ethernet 802.11 - CSMA/CA (Carrier Sense Multiple Access / Collision Avoidance) ◦ Collision detection not possible because of near/far problem for radios ◦ Steps: sense the air, wait, send, wait for ACK, retransmit if needed ◦ Optional RTS/CTS feature to solve “hidden node” problem  “Hidden node”: where two stations on either side of an AP can’t hear each other broadcast.  CRC – error checking at layer 2 (Ethernet assumes this is layer 3 task)  Packet fragmentation: breaking large packets into smaller ones at MAC layer  Overhead of MAC layer reduces throughput by 40-50% 7
  • 8. 802.11 MAC Frame  NOTE: This frame structure is common for all data sent by a 802.11 station control info (WEP, data type as management, control, data ...) frame ordering next frame duration info for RX -Basic service identification frame specific, -source/destination address variable length -transmitting station -receiving station frame check sequence (CRC) 8
  • 9. Wired Equivalent Privacy  Implemented at the MAC layer.  RC4 Stream Cipher  Provides encryption to data frames only http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif 9