SlideShare une entreprise Scribd logo
1  sur  10
Wi fi 802.11
Wi-fi
• IEEE 802.11 – Wi-Fi
Wi-Fi
– Owned by a group called Wi-Fi alliances.
– Signals are propagating through space.
Physical Properties:
– Runs over six physical layer standards.
802.11 physical standards
Spread Spectrum based Diffused Infrared based
Original 802.11 with frequency hopping
Original 802.11 with Direct sequence
802.11b
802.11a
802.11g
• Original 802.11 with frequency hopping
 Over 79, 1 MHz wide frequency bandwidths.
 Provide up to 2Mbps.
 Runs at 2.4GHz frequency band of electromagnetic spectrum.
• Original 802.11 with Direct Sequence
 11 – bit chipping sequence is used.
 Provide up to 2Mbps.
 Runs at 2.4 GHz frequency band of electromagnetic spectrum
• 802.11b
 Variant of direct sequence spread spectrum provides up to 11Mbps.
 Runs at 2.4 GHz frequency band of electromagnetic spectrum.
• 802.11a
 Orthogonal frequency division multiplexing (OFDM) is used.
 Delivers up to 54Mbps.
 Runs in 5GHz band.
 In 5GHZ band, interference is less, but absorption is more and it is limited to line of sight communication.
• 802.11g
 Backward compatible with 802.11b.
 Uses OFDM and delivers up to 54Mbps.
 Runs in 2.4GHz band.
Collision Avoidance
Hidden node Problem
 Here A and C are both with in the range of B but not each other.
 Suppose both A and C want to communicate with B and so they each send it a
frame.
• A and C are unaware of each other since their signals do not carry that far
• These two frames collide with each other at B
– But unlike an Ethernet, neither A nor C is aware of this collision
• A and C are said to hidden nodes with respect to each other.
Exposed Node Problem
 Here B can exchange frames with A & C, but it cannot reach D and C can reach B &
D but not A.
 Suppose B is sending to A. Node C is aware of this communication because it hears
B’s transmission. It would be a mistake for C to conclude that it cannot transmit to
anyone just because it can hear B’s transmission.
 Suppose C wants to transmit to node D. This is not a problem since C’s transmission
to D will not interfere with A’s ability to receive from B.
 This problem is called exposed node problem.
Multiple Access with Collision Avoidance (MACA)
 To address the hidden node and exposed node problem 802.11 uses MACA.
 Here sender and receiver exchange control information before transmission of data.
 This exchange informs all nearby nodes that a transmission is about to begin
 Sender transmits a Request to Send (RTS) frame to the receiver.
• The RTS frame includes a field that indicates how long the sender wants to hold the medium
• Length of the data frame to be transmitted.
 Receiver replies with a Clear to Send (CTS) frame
• This frame echoes this length field back to the sender.
 Any node that sees the CTS frame knows that, it is close to the receiver, therefore it
cannot transmit for the period of time it takes to send a frame of the specified length.
 Any node that sees the RTS frame but not the CTS frame is not close enough to the
receiver to interfere with it, and so is free to transmit.
 Receiver sends an ACK to the sender after successfully receiving a frame
 All nodes must wait for this ACK before trying to transmit
 If two or more nodes detect an idle link and try to transmit an RTS frame at the same
time, their RTS frame will collide with each other.
 But 802.11 does not support collision detection
• So the senders realize the collision has happened when they do not receive the CTS frame after a period of
time
• In this case, they each wait a random amount of time before trying again.
• The amount of time a given node delays is defined by the same exponential backoff algorithm used on the
Ethernet.
Distribution System
 Base station based topology.
 Here some nodes are allowed to roam and some nodes are connected to wired
infrastructure called base stations or Access points (AP) and they are connected to each
other. This network is called as distribution system.
 Distribution network could be a Ethernet or token ring and distribution network runs at
layer 2of ISO architecture.
 Two nodes can communicate each other, if they are in the within reach of each other.
 Each node is associated with one access point.
Communication from A to E
 Node A sends frame to its Access point (AP - 1)
 AP-1 forwards the frame across the distribution system to AP-3, which finally transmits the
frame to E.
Scanning
– Technique for selecting AP is called scanning.
Steps,
 The node sends a Probe frame.
 All APs with in the reach reply with a Probe Response frame.
 The node selects one of the access points, and sends that AP an Association Request frame.
 The AP replies with an Association Response frame.
– A node engages this step whenever it joins the network as well as when it need a new
AP.
– Whenever the node acquires a new AP, the new AP notifies the old AP of the change
through distribution system.
Types,
 Active scanning
 Passive scanning
Active scanning
• Whenever a node moves from the cell serviced by one AP (AP-1) to the cell serviced by the
another AP (AP-2),
 It sends Probe frames;
 AP-2 give a response by Probe response frames and the node associates with that
access point.
figure. Node Mobility
Passive scanning
• APs periodically send a Beacon frame – that advertises the capability of the AP (transmission
rate supported by the AP)
• A node can change to the AP based on the Beacon frame simply by sending an Association
Request frame back to the AP.
Frame Format
 Control
- Contains three sub fields.
Type (6 bit) – indicates whether the frame carries data , is an RTS frame or CTS frame, or is used by scanning
algorithm
ToDS (1 bit), FromDS (1 bit)
– Both bits are 0, one node is sending directly to another.
– Both bits are 1, message went from the wireless node onto the distribution system and
then from the distribution system to another wireless node.
 Addr1, Addr2, Addr3, Addr4
– If both DS bits are 0,
Addr1 – target node
Addr2 – Source node
– If both DS bits are 1,
Addr1 – Ultimate destination
Addr2 – Immediate sender
Addr3 – Intermediate destination
Addr4 – Original Source

Contenu connexe

Tendances (20)

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Dsdv
DsdvDsdv
Dsdv
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Comparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP ModelComparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP Model
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
Ethernet
EthernetEthernet
Ethernet
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Free Space Optics (FSO)
Free Space Optics (FSO)Free Space Optics (FSO)
Free Space Optics (FSO)
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
WLAN
WLANWLAN
WLAN
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 

Similaire à WiFi 802.11

wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.pptrajucs
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Ashish Khare
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 
Wireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterWireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterannymogalai14
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 

Similaire à WiFi 802.11 (20)

wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.ppt
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
Wireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterWireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapter
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Lecture6
Lecture6Lecture6
Lecture6
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 

Plus de selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 

Dernier

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Dernier (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

WiFi 802.11

  • 2. Wi-fi • IEEE 802.11 – Wi-Fi Wi-Fi – Owned by a group called Wi-Fi alliances. – Signals are propagating through space. Physical Properties: – Runs over six physical layer standards. 802.11 physical standards Spread Spectrum based Diffused Infrared based Original 802.11 with frequency hopping Original 802.11 with Direct sequence 802.11b 802.11a 802.11g
  • 3. • Original 802.11 with frequency hopping  Over 79, 1 MHz wide frequency bandwidths.  Provide up to 2Mbps.  Runs at 2.4GHz frequency band of electromagnetic spectrum. • Original 802.11 with Direct Sequence  11 – bit chipping sequence is used.  Provide up to 2Mbps.  Runs at 2.4 GHz frequency band of electromagnetic spectrum • 802.11b  Variant of direct sequence spread spectrum provides up to 11Mbps.  Runs at 2.4 GHz frequency band of electromagnetic spectrum. • 802.11a  Orthogonal frequency division multiplexing (OFDM) is used.  Delivers up to 54Mbps.  Runs in 5GHz band.  In 5GHZ band, interference is less, but absorption is more and it is limited to line of sight communication. • 802.11g  Backward compatible with 802.11b.  Uses OFDM and delivers up to 54Mbps.  Runs in 2.4GHz band.
  • 4. Collision Avoidance Hidden node Problem  Here A and C are both with in the range of B but not each other.  Suppose both A and C want to communicate with B and so they each send it a frame. • A and C are unaware of each other since their signals do not carry that far • These two frames collide with each other at B – But unlike an Ethernet, neither A nor C is aware of this collision • A and C are said to hidden nodes with respect to each other.
  • 5. Exposed Node Problem  Here B can exchange frames with A & C, but it cannot reach D and C can reach B & D but not A.  Suppose B is sending to A. Node C is aware of this communication because it hears B’s transmission. It would be a mistake for C to conclude that it cannot transmit to anyone just because it can hear B’s transmission.  Suppose C wants to transmit to node D. This is not a problem since C’s transmission to D will not interfere with A’s ability to receive from B.  This problem is called exposed node problem.
  • 6. Multiple Access with Collision Avoidance (MACA)  To address the hidden node and exposed node problem 802.11 uses MACA.  Here sender and receiver exchange control information before transmission of data.  This exchange informs all nearby nodes that a transmission is about to begin  Sender transmits a Request to Send (RTS) frame to the receiver. • The RTS frame includes a field that indicates how long the sender wants to hold the medium • Length of the data frame to be transmitted.  Receiver replies with a Clear to Send (CTS) frame • This frame echoes this length field back to the sender.  Any node that sees the CTS frame knows that, it is close to the receiver, therefore it cannot transmit for the period of time it takes to send a frame of the specified length.  Any node that sees the RTS frame but not the CTS frame is not close enough to the receiver to interfere with it, and so is free to transmit.  Receiver sends an ACK to the sender after successfully receiving a frame  All nodes must wait for this ACK before trying to transmit  If two or more nodes detect an idle link and try to transmit an RTS frame at the same time, their RTS frame will collide with each other.  But 802.11 does not support collision detection • So the senders realize the collision has happened when they do not receive the CTS frame after a period of time • In this case, they each wait a random amount of time before trying again. • The amount of time a given node delays is defined by the same exponential backoff algorithm used on the Ethernet.
  • 7. Distribution System  Base station based topology.  Here some nodes are allowed to roam and some nodes are connected to wired infrastructure called base stations or Access points (AP) and they are connected to each other. This network is called as distribution system.  Distribution network could be a Ethernet or token ring and distribution network runs at layer 2of ISO architecture.  Two nodes can communicate each other, if they are in the within reach of each other.  Each node is associated with one access point.
  • 8. Communication from A to E  Node A sends frame to its Access point (AP - 1)  AP-1 forwards the frame across the distribution system to AP-3, which finally transmits the frame to E. Scanning – Technique for selecting AP is called scanning. Steps,  The node sends a Probe frame.  All APs with in the reach reply with a Probe Response frame.  The node selects one of the access points, and sends that AP an Association Request frame.  The AP replies with an Association Response frame. – A node engages this step whenever it joins the network as well as when it need a new AP. – Whenever the node acquires a new AP, the new AP notifies the old AP of the change through distribution system. Types,  Active scanning  Passive scanning
  • 9. Active scanning • Whenever a node moves from the cell serviced by one AP (AP-1) to the cell serviced by the another AP (AP-2),  It sends Probe frames;  AP-2 give a response by Probe response frames and the node associates with that access point. figure. Node Mobility Passive scanning • APs periodically send a Beacon frame – that advertises the capability of the AP (transmission rate supported by the AP) • A node can change to the AP based on the Beacon frame simply by sending an Association Request frame back to the AP.
  • 10. Frame Format  Control - Contains three sub fields. Type (6 bit) – indicates whether the frame carries data , is an RTS frame or CTS frame, or is used by scanning algorithm ToDS (1 bit), FromDS (1 bit) – Both bits are 0, one node is sending directly to another. – Both bits are 1, message went from the wireless node onto the distribution system and then from the distribution system to another wireless node.  Addr1, Addr2, Addr3, Addr4 – If both DS bits are 0, Addr1 – target node Addr2 – Source node – If both DS bits are 1, Addr1 – Ultimate destination Addr2 – Immediate sender Addr3 – Intermediate destination Addr4 – Original Source