SlideShare a Scribd company logo
1 of 27
IEEE 802.11
Wireless LAN
Tanmay Kumar Pradhan
V V Raja Rao
V Sreenivasulu
Wireless LANs: Characteristics
ā€¢ Types
ā€“ Infrastructure based
ā€“ Ad-hoc
ā€¢ Advantages
ā€“ Flexible deployment
ā€“ Minimal wiring difficulties
ā€“ More robust against disasters (earthquake etc)
ā€“ Historic buildings, conferences, trade shows,ā€¦
ā€¢ Disadvantages
ā€“ Low bandwidth compared to wired networks (1-10 Mbit/s)
ā€“ Proprietary solutions
ā€“ Need to follow wireless spectrum regulations
Components/Architecture
ā€¢ Station (STA) - Mobile node
ā€¢ Access Point (AP) - Stations are connected to
access points.
ā€¢ Basic Service Set (BSS) - Stations and the AP
with in the same radio coverage form a BSS.
ā€¢ Extended Service Set (ESS) - Several BSSs
connected through APs form an ESS.
infrastructure
network
ad-hoc network
AP
AP
AP
wired network
AP: Access Point
Source: Schiller
Protocol Architecture
MAC sublayer
MAC layer
management
PLCP sublayer
PMD sublayer
Physical layer
management
Wireless LAN: Motivation
ā€¢ Can we apply media access methods from
fixed networks?
ā€¢ Example CSMA/CD
ā€“ Carrier Sense Multiple Access with Collision
Detection
ā€“ send as soon as the medium is free, listen into
the medium if a collision occurs (original
method in IEEE 802.3)
ā€¢ Medium access problems in wireless
networks
ā€“ signal strength decreases proportional to the
square of the distance
ā€“ sender would apply CS and CD, but the
collisions happen at the receiver
ā€“ sender may not ā€œhearā€ the collision, i.e., CD
does not work
ā€“ CS might not work, e.g. if a terminal is ā€œhiddenā€
Difference Between Wired and
Wireless
ā€¢ If both A and C sense the channel to be idle at the
same time, they send at the same time.
ā€¢ Collision can be detected at sender in Ethernet.
ā€¢ Half-duplex radios in wireless cannot detect
collision at sender.
A B C
A
B
C
Ethernet LAN Wireless LAN
ā€¢ Hidden terminals
ā€“ A and C cannot hear each other.
ā€“ A sends to B, C cannot receive A.
ā€“ C wants to send to B, C senses a ā€œfreeā€ medium (CS fails)
ā€“ Collision occurs at B.
ā€“ A cannot receive the collision (CD fails).
ā€“ A is ā€œhiddenā€ for C.
ā€¢ Solution?
ā€“ Hidden terminal is peculiar to wireless (not found in wired)
ā€“ Need to sense carrier at receiver, not sender!
ā€“ ā€œvirtual carrier sensingā€: Sender ā€œasksā€ receiver whether it
can hear something. If so, behave as if channel busy.
Hidden Terminal Problem
BA C
Medium access control layer
ā€¢ Asynchronous data service (DCF)
- CSMA/CA
- RTS/CTS
ā€¢ Time bounded service (PCF)
- Polling
ā€¢ Inter-frame spacing (IFS)
- DIFS
- PIFS
- SIFS
CSMA/CA
station1
station2
station3
station4
station5
t
DIFS DIFS DIFS DIFS
busy backoff Residual backoff
ā€¢ 802.11 avoids the problem of hidden terminals
ā€“ A and C want to send to B
ā€“ A sends RTS to B
ā€“ B sends CTS to A
ā€“ C ā€œoverhearsā€ CTS from B
ā€“ C waits for duration of Aā€™s transmission
RTS/CTS
A B C
RTS
CTSCTS
RTS/CTS
RTS
sender
receiver
Other
stations
t
DIFS SIFS
DIFS
CTS
Data
SIFS
ACK
SIFS
NAV (RTS)
NAV (CTS)
bo Data
Fragmentation
ā€¢ Wireless LANs have high bit error rates.
ā€¢ The probability of erroneous frame is much
higher for wireless links
ā€¢ 802.11 uses fragmentation to reduce the
frame error rate.
Fragmentation
RTS
sender
receiver
Other
stations
t
DIFS SIFS SIFS
CTS
frag1
SIFS
ACK
SIFS
NAV (RTS)
NAV (CTS)
frag2
SIFS
ACK
NAV(frag1)
NAV(ACK)
PCF with Polling
ā€¢ To provide time bounded service.
ā€¢ Requires an access point.
ā€¢ Access point polls each station during
contention free period.
ā€¢ Becomes an overhead during light load
PCF with polling
D1
AP
station2
station3
t
PIFS SIFS SIFS
U1
D2
SIFS
U2
SIFS
NAV (RTS)
MAC management
ā€¢ Synchronization
- finding and staying with a WLAN
- synchronization functions
ā€¢ Power Management
- sleeping without missing any messages
- power management functions
ā€¢ Roaming
- functions for joining a network
- changing access points
- scanning for access points
ā€¢ Management information base
Synchronization
ā€¢ Timing synchronization function (TSF)
ā€¢ Used for power management
- beacons sent at well known intervals
- all station timers in BSS are
synchronized
Synchronization
B
busy busy
B B
busy busy
B
B beacon Value of time stamp
Access
point
medium
Beacon interval
B
t
Power Management
ā€¢ Mobile devices are battery powered
- power management is important for
mobility
ā€¢ 802.11 power management protocol
- allows transceiver to be off as much as
possible
- is transparent to existing protocols
Power management approach
ā€¢ Allow idle stations to go to sleep
- stationā€™s power save mode stored in
AP
ā€¢ APs buffer packets for sleeping stations
- AP announces which stations have
frames buffered
- traffic indication map (TIM) sent with
every beacon
ā€¢ Power saving stations wake up periodically
Power management
busybusy busybusy
p PS poll
Data transmission
to/from the station
Access
point
station
TIM interval
Broadcast/
multicast
D
B
B T T
medium
t
p
d
d
DTIM interval
d
Roaming
ā€¢ Mobile stations may move
- beyond the coverage area of their AP
- but within range of another AP
ā€¢ Re association allows station to continue
operation.
Roaming approach
ā€¢ Station decides that link to its current AP is poor.
ā€¢ Station uses scanning function to find another AP
ā€¢ Station sends Re-association Request to new AP
ā€¢ If Re-association Response is successful
- then station has roamed to the new AP
- else station scans for another AP
ā€¢ If AP accepts Re-association Request
- AP indicates Re-association to the
distributed system
- Distributed system information is
updated
Scanning
ā€¢ Scanning is required for many functions
- finding and joining a network
- finding a new access point during
roaming
ā€¢ Passive scanning
- find networks simply by listening for
beacons
ā€¢ Active scanning
- on each channel send a probe and wait
for probe response
References
ā€¢ Brian P Crow, Indra Widjaja, J G Kim,
Prescott T Sakai. IEEE 802.11 Wireless
Local Area Networks. IEEE
Communications Magazine
ā€¢ www.breezecom.com
ā€¢ Jochen H. Schiller, Mobile
Communications

More Related Content

What's hot

Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
Ā 
Rake Receiver
Rake ReceiverRake Receiver
Rake ReceiverJavid Ullah
Ā 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
Ā 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
Ā 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Laniamtheone90
Ā 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
Ā 
12 multiple access
12 multiple access12 multiple access
12 multiple accessbheemsain
Ā 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
Ā 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
Ā 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
Ā 
80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecno80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecnoErcan Yılmaz
Ā 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlVijayaLakshmi514
Ā 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
Ā 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
Ā 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
Ā 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
Ā 

What's hot (19)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
Ā 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
Ā 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
Ā 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
Ā 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
Ā 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Ā 
MAC seminar
MAC seminarMAC seminar
MAC seminar
Ā 
12 multiple access
12 multiple access12 multiple access
12 multiple access
Ā 
Mac
MacMac
Mac
Ā 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Ā 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
Ā 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Ā 
9 lan
9 lan9 lan
9 lan
Ā 
80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecno80066469 hsdpa-cqi-and-ecno
80066469 hsdpa-cqi-and-ecno
Ā 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
Ā 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
Ā 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
Ā 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
Ā 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
Ā 

Viewers also liked

Viewers also liked (17)

Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
Ā 
Changes in the standard ppt
Changes in the standard pptChanges in the standard ppt
Changes in the standard ppt
Ā 
Chapter 05
Chapter 05Chapter 05
Chapter 05
Ā 
Lans ethernet
Lans ethernetLans ethernet
Lans ethernet
Ā 
CCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukarCCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukar
Ā 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Ā 
LAN.
LAN.LAN.
LAN.
Ā 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
Ā 
Chapter 14
Chapter 14Chapter 14
Chapter 14
Ā 
Wlan
WlanWlan
Wlan
Ā 
wired lans
wired lanswired lans
wired lans
Ā 
Ethernet
EthernetEthernet
Ethernet
Ā 
Ieee standards
Ieee standardsIeee standards
Ieee standards
Ā 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
Ā 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
Ā 
Ch 15
Ch 15Ch 15
Ch 15
Ā 
Networking
NetworkingNetworking
Networking
Ā 

Similar to 802.11[1]

manet.ppt
manet.pptmanet.ppt
manet.pptjatinder42
Ā 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
Ā 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
Ā 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
Ā 
Mediumaccesscontrol
MediumaccesscontrolMediumaccesscontrol
MediumaccesscontrolVk Sreedhar
Ā 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
Ā 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
Ā 
Mobile Computing_PPT.ppt
Mobile Computing_PPT.pptMobile Computing_PPT.ppt
Mobile Computing_PPT.pptMALATHYANANDAN
Ā 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
Ā 
3_pstn2.ppt
3_pstn2.ppt3_pstn2.ppt
3_pstn2.pptusmanEhsan8
Ā 
WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.pptBushraBush2
Ā 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
Ā 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.pptdineshroy21
Ā 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.pptjordan307266
Ā 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011kongara
Ā 

Similar to 802.11[1] (20)

Manet
ManetManet
Manet
Ā 
manet.ppt
manet.pptmanet.ppt
manet.ppt
Ā 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
Ā 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
Ā 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
Ā 
Mediumaccesscontrol
MediumaccesscontrolMediumaccesscontrol
Mediumaccesscontrol
Ā 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ā 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
Ā 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
Ā 
Mobile Computing_PPT.ppt
Mobile Computing_PPT.pptMobile Computing_PPT.ppt
Mobile Computing_PPT.ppt
Ā 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
Ā 
3_pstn2.ppt
3_pstn2.ppt3_pstn2.ppt
3_pstn2.ppt
Ā 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
Ā 
CAN.ppt
CAN.pptCAN.ppt
CAN.ppt
Ā 
WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.ppt
Ā 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
Ā 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
Ā 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
Ā 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
Ā 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
Ā 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationRadu Cotescu
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organization
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 

802.11[1]

  • 1. IEEE 802.11 Wireless LAN Tanmay Kumar Pradhan V V Raja Rao V Sreenivasulu
  • 2. Wireless LANs: Characteristics ā€¢ Types ā€“ Infrastructure based ā€“ Ad-hoc ā€¢ Advantages ā€“ Flexible deployment ā€“ Minimal wiring difficulties ā€“ More robust against disasters (earthquake etc) ā€“ Historic buildings, conferences, trade shows,ā€¦ ā€¢ Disadvantages ā€“ Low bandwidth compared to wired networks (1-10 Mbit/s) ā€“ Proprietary solutions ā€“ Need to follow wireless spectrum regulations
  • 3. Components/Architecture ā€¢ Station (STA) - Mobile node ā€¢ Access Point (AP) - Stations are connected to access points. ā€¢ Basic Service Set (BSS) - Stations and the AP with in the same radio coverage form a BSS. ā€¢ Extended Service Set (ESS) - Several BSSs connected through APs form an ESS.
  • 5. Protocol Architecture MAC sublayer MAC layer management PLCP sublayer PMD sublayer Physical layer management
  • 6. Wireless LAN: Motivation ā€¢ Can we apply media access methods from fixed networks? ā€¢ Example CSMA/CD ā€“ Carrier Sense Multiple Access with Collision Detection ā€“ send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3)
  • 7. ā€¢ Medium access problems in wireless networks ā€“ signal strength decreases proportional to the square of the distance ā€“ sender would apply CS and CD, but the collisions happen at the receiver ā€“ sender may not ā€œhearā€ the collision, i.e., CD does not work ā€“ CS might not work, e.g. if a terminal is ā€œhiddenā€
  • 8. Difference Between Wired and Wireless ā€¢ If both A and C sense the channel to be idle at the same time, they send at the same time. ā€¢ Collision can be detected at sender in Ethernet. ā€¢ Half-duplex radios in wireless cannot detect collision at sender. A B C A B C Ethernet LAN Wireless LAN
  • 9. ā€¢ Hidden terminals ā€“ A and C cannot hear each other. ā€“ A sends to B, C cannot receive A. ā€“ C wants to send to B, C senses a ā€œfreeā€ medium (CS fails) ā€“ Collision occurs at B. ā€“ A cannot receive the collision (CD fails). ā€“ A is ā€œhiddenā€ for C. ā€¢ Solution? ā€“ Hidden terminal is peculiar to wireless (not found in wired) ā€“ Need to sense carrier at receiver, not sender! ā€“ ā€œvirtual carrier sensingā€: Sender ā€œasksā€ receiver whether it can hear something. If so, behave as if channel busy. Hidden Terminal Problem BA C
  • 10. Medium access control layer ā€¢ Asynchronous data service (DCF) - CSMA/CA - RTS/CTS ā€¢ Time bounded service (PCF) - Polling ā€¢ Inter-frame spacing (IFS) - DIFS - PIFS - SIFS
  • 12. ā€¢ 802.11 avoids the problem of hidden terminals ā€“ A and C want to send to B ā€“ A sends RTS to B ā€“ B sends CTS to A ā€“ C ā€œoverhearsā€ CTS from B ā€“ C waits for duration of Aā€™s transmission RTS/CTS A B C RTS CTSCTS
  • 14. Fragmentation ā€¢ Wireless LANs have high bit error rates. ā€¢ The probability of erroneous frame is much higher for wireless links ā€¢ 802.11 uses fragmentation to reduce the frame error rate.
  • 16. PCF with Polling ā€¢ To provide time bounded service. ā€¢ Requires an access point. ā€¢ Access point polls each station during contention free period. ā€¢ Becomes an overhead during light load
  • 17. PCF with polling D1 AP station2 station3 t PIFS SIFS SIFS U1 D2 SIFS U2 SIFS NAV (RTS)
  • 18. MAC management ā€¢ Synchronization - finding and staying with a WLAN - synchronization functions ā€¢ Power Management - sleeping without missing any messages - power management functions ā€¢ Roaming - functions for joining a network - changing access points - scanning for access points ā€¢ Management information base
  • 19. Synchronization ā€¢ Timing synchronization function (TSF) ā€¢ Used for power management - beacons sent at well known intervals - all station timers in BSS are synchronized
  • 20. Synchronization B busy busy B B busy busy B B beacon Value of time stamp Access point medium Beacon interval B t
  • 21. Power Management ā€¢ Mobile devices are battery powered - power management is important for mobility ā€¢ 802.11 power management protocol - allows transceiver to be off as much as possible - is transparent to existing protocols
  • 22. Power management approach ā€¢ Allow idle stations to go to sleep - stationā€™s power save mode stored in AP ā€¢ APs buffer packets for sleeping stations - AP announces which stations have frames buffered - traffic indication map (TIM) sent with every beacon ā€¢ Power saving stations wake up periodically
  • 23. Power management busybusy busybusy p PS poll Data transmission to/from the station Access point station TIM interval Broadcast/ multicast D B B T T medium t p d d DTIM interval d
  • 24. Roaming ā€¢ Mobile stations may move - beyond the coverage area of their AP - but within range of another AP ā€¢ Re association allows station to continue operation.
  • 25. Roaming approach ā€¢ Station decides that link to its current AP is poor. ā€¢ Station uses scanning function to find another AP ā€¢ Station sends Re-association Request to new AP ā€¢ If Re-association Response is successful - then station has roamed to the new AP - else station scans for another AP ā€¢ If AP accepts Re-association Request - AP indicates Re-association to the distributed system - Distributed system information is updated
  • 26. Scanning ā€¢ Scanning is required for many functions - finding and joining a network - finding a new access point during roaming ā€¢ Passive scanning - find networks simply by listening for beacons ā€¢ Active scanning - on each channel send a probe and wait for probe response
  • 27. References ā€¢ Brian P Crow, Indra Widjaja, J G Kim, Prescott T Sakai. IEEE 802.11 Wireless Local Area Networks. IEEE Communications Magazine ā€¢ www.breezecom.com ā€¢ Jochen H. Schiller, Mobile Communications