SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Wi fi 802.11
Wi-fi
• IEEE 802.11 – Wi-Fi
Wi-Fi
– Owned by a group called Wi-Fi alliances.
– Signals are propagating through space.
Physical Properties:
– Runs over six physical layer standards.
802.11 physical standards
Spread Spectrum based Diffused Infrared based
Original 802.11 with frequency hopping
Original 802.11 with Direct sequence
802.11b
802.11a
802.11g
• Original 802.11 with frequency hopping
 Over 79, 1 MHz wide frequency bandwidths.
 Provide up to 2Mbps.
 Runs at 2.4GHz frequency band of electromagnetic spectrum.
• Original 802.11 with Direct Sequence
 11 – bit chipping sequence is used.
 Provide up to 2Mbps.
 Runs at 2.4 GHz frequency band of electromagnetic spectrum
• 802.11b
 Variant of direct sequence spread spectrum provides up to 11Mbps.
 Runs at 2.4 GHz frequency band of electromagnetic spectrum.
• 802.11a
 Orthogonal frequency division multiplexing (OFDM) is used.
 Delivers up to 54Mbps.
 Runs in 5GHz band.
 In 5GHZ band, interference is less, but absorption is more and it is limited to line of sight communication.
• 802.11g
 Backward compatible with 802.11b.
 Uses OFDM and delivers up to 54Mbps.
 Runs in 2.4GHz band.
Collision Avoidance
Hidden node Problem
 Here A and C are both with in the range of B but not each other.
 Suppose both A and C want to communicate with B and so they each send it a
frame.
• A and C are unaware of each other since their signals do not carry that far
• These two frames collide with each other at B
– But unlike an Ethernet, neither A nor C is aware of this collision
• A and C are said to hidden nodes with respect to each other.
Exposed Node Problem
 Here B can exchange frames with A & C, but it cannot reach D and C can reach B &
D but not A.
 Suppose B is sending to A. Node C is aware of this communication because it hears
B’s transmission. It would be a mistake for C to conclude that it cannot transmit to
anyone just because it can hear B’s transmission.
 Suppose C wants to transmit to node D. This is not a problem since C’s transmission
to D will not interfere with A’s ability to receive from B.
 This problem is called exposed node problem.
Multiple Access with Collision Avoidance (MACA)
 To address the hidden node and exposed node problem 802.11 uses MACA.
 Here sender and receiver exchange control information before transmission of data.
 This exchange informs all nearby nodes that a transmission is about to begin
 Sender transmits a Request to Send (RTS) frame to the receiver.
• The RTS frame includes a field that indicates how long the sender wants to hold the medium
• Length of the data frame to be transmitted.
 Receiver replies with a Clear to Send (CTS) frame
• This frame echoes this length field back to the sender.
 Any node that sees the CTS frame knows that, it is close to the receiver, therefore it
cannot transmit for the period of time it takes to send a frame of the specified length.
 Any node that sees the RTS frame but not the CTS frame is not close enough to the
receiver to interfere with it, and so is free to transmit.
 Receiver sends an ACK to the sender after successfully receiving a frame
 All nodes must wait for this ACK before trying to transmit
 If two or more nodes detect an idle link and try to transmit an RTS frame at the same
time, their RTS frame will collide with each other.
 But 802.11 does not support collision detection
• So the senders realize the collision has happened when they do not receive the CTS frame after a period of
time
• In this case, they each wait a random amount of time before trying again.
• The amount of time a given node delays is defined by the same exponential backoff algorithm used on the
Ethernet.
Distribution System
 Base station based topology.
 Here some nodes are allowed to roam and some nodes are connected to wired
infrastructure called base stations or Access points (AP) and they are connected to each
other. This network is called as distribution system.
 Distribution network could be a Ethernet or token ring and distribution network runs at
layer 2of ISO architecture.
 Two nodes can communicate each other, if they are in the within reach of each other.
 Each node is associated with one access point.
Communication from A to E
 Node A sends frame to its Access point (AP - 1)
 AP-1 forwards the frame across the distribution system to AP-3, which finally transmits the
frame to E.
Scanning
– Technique for selecting AP is called scanning.
Steps,
 The node sends a Probe frame.
 All APs with in the reach reply with a Probe Response frame.
 The node selects one of the access points, and sends that AP an Association Request frame.
 The AP replies with an Association Response frame.
– A node engages this step whenever it joins the network as well as when it need a new
AP.
– Whenever the node acquires a new AP, the new AP notifies the old AP of the change
through distribution system.
Types,
 Active scanning
 Passive scanning
Active scanning
• Whenever a node moves from the cell serviced by one AP (AP-1) to the cell serviced by the
another AP (AP-2),
 It sends Probe frames;
 AP-2 give a response by Probe response frames and the node associates with that
access point.
figure. Node Mobility
Passive scanning
• APs periodically send a Beacon frame – that advertises the capability of the AP (transmission
rate supported by the AP)
• A node can change to the AP based on the Beacon frame simply by sending an Association
Request frame back to the AP.
Frame Format
 Control
- Contains three sub fields.
Type (6 bit) – indicates whether the frame carries data , is an RTS frame or CTS frame, or is used by scanning
algorithm
ToDS (1 bit), FromDS (1 bit)
– Both bits are 0, one node is sending directly to another.
– Both bits are 1, message went from the wireless node onto the distribution system and
then from the distribution system to another wireless node.
 Addr1, Addr2, Addr3, Addr4
– If both DS bits are 0,
Addr1 – target node
Addr2 – Source node
– If both DS bits are 1,
Addr1 – Ultimate destination
Addr2 – Immediate sender
Addr3 – Intermediate destination
Addr4 – Original Source

Weitere ähnliche Inhalte

Was ist angesagt?

IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame formatmyrajendra
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 
Handoff in cellular systems
Handoff in cellular systemsHandoff in cellular systems
Handoff in cellular systemsRaviteja437
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 

Was ist angesagt? (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
Ethernet
EthernetEthernet
Ethernet
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Handoff in cellular systems
Handoff in cellular systemsHandoff in cellular systems
Handoff in cellular systems
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Ethernet
EthernetEthernet
Ethernet
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
WirelessHART
WirelessHARTWirelessHART
WirelessHART
 

Ähnlich wie WiFi 802.11

wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.pptrajucs
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Ashish Khare
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 
Wireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterWireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterannymogalai14
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 

Ähnlich wie WiFi 802.11 (20)

wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.ppt
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
WLAN
WLANWLAN
WLAN
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
Wireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterWireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapter
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Lecture6
Lecture6Lecture6
Lecture6
 

Mehr von selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 

Kürzlich hochgeladen

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 

Kürzlich hochgeladen (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

WiFi 802.11

  • 2. Wi-fi • IEEE 802.11 – Wi-Fi Wi-Fi – Owned by a group called Wi-Fi alliances. – Signals are propagating through space. Physical Properties: – Runs over six physical layer standards. 802.11 physical standards Spread Spectrum based Diffused Infrared based Original 802.11 with frequency hopping Original 802.11 with Direct sequence 802.11b 802.11a 802.11g
  • 3. • Original 802.11 with frequency hopping  Over 79, 1 MHz wide frequency bandwidths.  Provide up to 2Mbps.  Runs at 2.4GHz frequency band of electromagnetic spectrum. • Original 802.11 with Direct Sequence  11 – bit chipping sequence is used.  Provide up to 2Mbps.  Runs at 2.4 GHz frequency band of electromagnetic spectrum • 802.11b  Variant of direct sequence spread spectrum provides up to 11Mbps.  Runs at 2.4 GHz frequency band of electromagnetic spectrum. • 802.11a  Orthogonal frequency division multiplexing (OFDM) is used.  Delivers up to 54Mbps.  Runs in 5GHz band.  In 5GHZ band, interference is less, but absorption is more and it is limited to line of sight communication. • 802.11g  Backward compatible with 802.11b.  Uses OFDM and delivers up to 54Mbps.  Runs in 2.4GHz band.
  • 4. Collision Avoidance Hidden node Problem  Here A and C are both with in the range of B but not each other.  Suppose both A and C want to communicate with B and so they each send it a frame. • A and C are unaware of each other since their signals do not carry that far • These two frames collide with each other at B – But unlike an Ethernet, neither A nor C is aware of this collision • A and C are said to hidden nodes with respect to each other.
  • 5. Exposed Node Problem  Here B can exchange frames with A & C, but it cannot reach D and C can reach B & D but not A.  Suppose B is sending to A. Node C is aware of this communication because it hears B’s transmission. It would be a mistake for C to conclude that it cannot transmit to anyone just because it can hear B’s transmission.  Suppose C wants to transmit to node D. This is not a problem since C’s transmission to D will not interfere with A’s ability to receive from B.  This problem is called exposed node problem.
  • 6. Multiple Access with Collision Avoidance (MACA)  To address the hidden node and exposed node problem 802.11 uses MACA.  Here sender and receiver exchange control information before transmission of data.  This exchange informs all nearby nodes that a transmission is about to begin  Sender transmits a Request to Send (RTS) frame to the receiver. • The RTS frame includes a field that indicates how long the sender wants to hold the medium • Length of the data frame to be transmitted.  Receiver replies with a Clear to Send (CTS) frame • This frame echoes this length field back to the sender.  Any node that sees the CTS frame knows that, it is close to the receiver, therefore it cannot transmit for the period of time it takes to send a frame of the specified length.  Any node that sees the RTS frame but not the CTS frame is not close enough to the receiver to interfere with it, and so is free to transmit.  Receiver sends an ACK to the sender after successfully receiving a frame  All nodes must wait for this ACK before trying to transmit  If two or more nodes detect an idle link and try to transmit an RTS frame at the same time, their RTS frame will collide with each other.  But 802.11 does not support collision detection • So the senders realize the collision has happened when they do not receive the CTS frame after a period of time • In this case, they each wait a random amount of time before trying again. • The amount of time a given node delays is defined by the same exponential backoff algorithm used on the Ethernet.
  • 7. Distribution System  Base station based topology.  Here some nodes are allowed to roam and some nodes are connected to wired infrastructure called base stations or Access points (AP) and they are connected to each other. This network is called as distribution system.  Distribution network could be a Ethernet or token ring and distribution network runs at layer 2of ISO architecture.  Two nodes can communicate each other, if they are in the within reach of each other.  Each node is associated with one access point.
  • 8. Communication from A to E  Node A sends frame to its Access point (AP - 1)  AP-1 forwards the frame across the distribution system to AP-3, which finally transmits the frame to E. Scanning – Technique for selecting AP is called scanning. Steps,  The node sends a Probe frame.  All APs with in the reach reply with a Probe Response frame.  The node selects one of the access points, and sends that AP an Association Request frame.  The AP replies with an Association Response frame. – A node engages this step whenever it joins the network as well as when it need a new AP. – Whenever the node acquires a new AP, the new AP notifies the old AP of the change through distribution system. Types,  Active scanning  Passive scanning
  • 9. Active scanning • Whenever a node moves from the cell serviced by one AP (AP-1) to the cell serviced by the another AP (AP-2),  It sends Probe frames;  AP-2 give a response by Probe response frames and the node associates with that access point. figure. Node Mobility Passive scanning • APs periodically send a Beacon frame – that advertises the capability of the AP (transmission rate supported by the AP) • A node can change to the AP based on the Beacon frame simply by sending an Association Request frame back to the AP.
  • 10. Frame Format  Control - Contains three sub fields. Type (6 bit) – indicates whether the frame carries data , is an RTS frame or CTS frame, or is used by scanning algorithm ToDS (1 bit), FromDS (1 bit) – Both bits are 0, one node is sending directly to another. – Both bits are 1, message went from the wireless node onto the distribution system and then from the distribution system to another wireless node.  Addr1, Addr2, Addr3, Addr4 – If both DS bits are 0, Addr1 – target node Addr2 – Source node – If both DS bits are 1, Addr1 – Ultimate destination Addr2 – Immediate sender Addr3 – Intermediate destination Addr4 – Original Source