SlideShare une entreprise Scribd logo
1  sur  22
PRESENTATION
ON
IEEE 802.11
Prepared By:
Shreejan Acharya
BEX 68114
Slides Includes
Introduction
Physical Layer
Architecture
Frame format
Different Protocols
Media Access Control (MAC)
Introduction
 Created and maintained by IEEE
 Set of media control(MAC) and physical layer
 Used to implement wireless local area
network(WLAN)
 In the frequency band 2.4,3.6,5 and 60 GHz
 Wi-fi refers to the IEEE 802.11 communication for
WLAN
The Linksys WRT54G contains a router with an
802.11b/g radio and two antennas
Introduction cntd.
Adopted in 1997
Family of 802
Origins in a 1985 ruling by the U.S. Federal
Communications commission
Consist of series of half duplex over the air
modulation
Uses same basic protocols
It uses two spread spectrum technology
Frequency Hopping Spread Spectrum (FHSS)
 Direct Sequence Spread Spectrum (DSSS)
802.11 Physical Layer (PHY)
The 802.11 physical layer (PHY) is the interface
between the MAC and the wireless media where
frames are transmitted and received.
 The PHY provides three functions.
 First, the PHY provides an interface to exchange
frames with the upper MAC layer for transmission and
reception of data.
Secondly, the PHY uses signal carrier and spread
spectrum modulation to transmit data frames over
the media.
 Thirdly, the PHY provides a carrier sense indication
back to the MAC to verify activity on the media.
Architectures
Station (STA) Architecture:
 It contains IEEE 802.11
conformant MAC and PHY
interface to the wireless
medium, but does not
provide access to a
distribution system
Access-Point Architecture:
 Device that contains
IEEE802.11 conformant
MAC and PHY interface to
the wireless medium, and
provide access to a
distribution system for
associated stations
 Implemented in infra-
structure products that
connect to wired backbones
General terminologies
BSS (basic service set):
Group of stations that communicate each other
IBSS(independent basic service set):
It is a BSS without access point
Extended Service Set (ESS):
A set of one or more Basic Service Sets inter
connected by a distribution System (DS)
BSS IBSS
General terminologies cntd
Service Set Identifier (SSID):
It is network name similar to domain id
One network (ESS or IBSS) has one SSID
Basic Service Set Identifier (BSSID)
It is cell identifier and is 6 octets long
Similar to NW ID in pre-IEEE Wave LAN systems
Frame format
Bytes 2 22 6 6
6
66 2 6 0-
2312
4
Frame control Durati
on ID
A1 A2 A3 seq.ctr
l
A4 Frame
body
CRC
802.11 MAC header
Bits :2
2 2 4 1 1 1 1 1 1 1
Protocol
version
type Sub
type
To DS From
DS
More
flag
Retry Pwr
Mgt
More
data
wep rsvd
Frame control Field
protocols
802.11 legacy
Release in Jun 1997
Original version of 802.11
Specifies two net bit rate 1or 2 mbits per sec
It has forward error correction code
Three alternatives physical layer
Diffuse infrared
Frequency hopping spread spectrum
Direct sequence spread spectrum
802.11a(ofdm waveform)
Release in sep 1999
Data rates 1.5 to 54 mbit/s
First widely accepted 802 family
Operates at 5GHz frequency band
Less range
802.11b
Release on the market in 2000
Maximum raw data rate of 11mbit/s
High throughput
Low cost
Interference problem
802.11g
Release on june 2003
Operates in the 2.4 GHz band
Uses OFDM based transmission scheme
Operates at the average bit rate of 22 Mbit/s or
maximum 54 Mbit/s
Its hardware are full back compatible with
802.11b hardware
802.11n
Release on October 2009
It is the improvement over previous 802.11
standard
It has MIMO antennas
Operates at the 2.4 GHz or less than 5GHz
bands
Data rates from 54 Mbit/s to 600 Mbit/s
802.11ac
Release in December 2013
It is an amendment to IEEE 802.11
It has wider channels(80 or 160 MHz)
Operates at 5GHz band
It supports multi-user MIMO
Data rates up to 1300 Mbit/s
802.11ad
Release in Dec 2012
It defines new physical layer for 802.11 n/w
Operates in the 60GHz millimeter wave
spectrum
Product implementing this standard are being
brought under the name of wigig brand
Peak transmission rate 7 Gbit/s
Other Protocols
802.11 AH
Estimated to release 2016
Bandwidth 900MHz
802.11 AJ
 Estimated to release 2016
Bandwidth 24/60
802.11 AX
Estimated to release 2019
Bandwidth 2.4/5
802.11 Media Access Control
 The 802.11 MAC layer provides functionality to allow reliable data
delivery for the upper layers over the wireless PHY media.
 The data delivery itself is based on an asynchronous, best-effort,
connectionless delivery of MAC layer data.
 There is no guarantee that the frames will be delivered successfully.
 The 802.11 MAC provides a controlled access method to the shared
wireless media called Carrier-Sense Multiple Access with Collision
Avoidance (CSMA/CA).
 CSMA/CA is similar to the collision detection access method
deployed by 802.3 Ethernet LANs.
802.11 Media Access Control cntd
Another function of the 802.11 MAC is to
protect the data being delivered by providing
security and privacy services.
 Security is provided by the authentication
services and by Wireless Equivalent Privacy
(WEP), which is an encryption service for data
delivered on the WLAN.
Security
For security 802.11 specifies two
Authentication modes:
OSA(Opens Systems Authentication)
• Device that request to access the network is granted
without any security check
Shared Key Authentication
• Device that request to access the network is granted
with security check
• WEP: wired equivalent privacy
ESSID offers casual separation of traffic
THANK YOU

Contenu connexe

Tendances

Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologiesbalasubramani p
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computingMadhuri Badgujar
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 

Tendances (20)

Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Data link layer
Data link layer Data link layer
Data link layer
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 

En vedette

Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treeoneous
 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional wavesRick Turner
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmissionAnuj Rajput
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 

En vedette (20)

Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning tree
 
Types of waves with compressional waves
Types of waves with compressional wavesTypes of waves with compressional waves
Types of waves with compressional waves
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
WLAN
WLANWLAN
WLAN
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 

Similaire à wireless network IEEE 802.11 (20)

Seminar
SeminarSeminar
Seminar
 
802 standerd
802 standerd802 standerd
802 standerd
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
wifi network
wifi networkwifi network
wifi network
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 
802.11 mac
802.11 mac802.11 mac
802.11 mac
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
8 wlans
8 wlans8 wlans
8 wlans
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Lect4
Lect4Lect4
Lect4
 
Lect4
Lect4Lect4
Lect4
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Darsh
DarshDarsh
Darsh
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 

Dernier

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 

Dernier (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 

wireless network IEEE 802.11

  • 2. Slides Includes Introduction Physical Layer Architecture Frame format Different Protocols Media Access Control (MAC)
  • 3. Introduction  Created and maintained by IEEE  Set of media control(MAC) and physical layer  Used to implement wireless local area network(WLAN)  In the frequency band 2.4,3.6,5 and 60 GHz  Wi-fi refers to the IEEE 802.11 communication for WLAN The Linksys WRT54G contains a router with an 802.11b/g radio and two antennas
  • 4. Introduction cntd. Adopted in 1997 Family of 802 Origins in a 1985 ruling by the U.S. Federal Communications commission Consist of series of half duplex over the air modulation Uses same basic protocols It uses two spread spectrum technology Frequency Hopping Spread Spectrum (FHSS)  Direct Sequence Spread Spectrum (DSSS)
  • 5. 802.11 Physical Layer (PHY) The 802.11 physical layer (PHY) is the interface between the MAC and the wireless media where frames are transmitted and received.  The PHY provides three functions.  First, the PHY provides an interface to exchange frames with the upper MAC layer for transmission and reception of data. Secondly, the PHY uses signal carrier and spread spectrum modulation to transmit data frames over the media.  Thirdly, the PHY provides a carrier sense indication back to the MAC to verify activity on the media.
  • 6. Architectures Station (STA) Architecture:  It contains IEEE 802.11 conformant MAC and PHY interface to the wireless medium, but does not provide access to a distribution system Access-Point Architecture:  Device that contains IEEE802.11 conformant MAC and PHY interface to the wireless medium, and provide access to a distribution system for associated stations  Implemented in infra- structure products that connect to wired backbones
  • 7. General terminologies BSS (basic service set): Group of stations that communicate each other IBSS(independent basic service set): It is a BSS without access point Extended Service Set (ESS): A set of one or more Basic Service Sets inter connected by a distribution System (DS)
  • 9. General terminologies cntd Service Set Identifier (SSID): It is network name similar to domain id One network (ESS or IBSS) has one SSID Basic Service Set Identifier (BSSID) It is cell identifier and is 6 octets long Similar to NW ID in pre-IEEE Wave LAN systems
  • 10. Frame format Bytes 2 22 6 6 6 66 2 6 0- 2312 4 Frame control Durati on ID A1 A2 A3 seq.ctr l A4 Frame body CRC 802.11 MAC header Bits :2 2 2 4 1 1 1 1 1 1 1 Protocol version type Sub type To DS From DS More flag Retry Pwr Mgt More data wep rsvd Frame control Field
  • 11. protocols 802.11 legacy Release in Jun 1997 Original version of 802.11 Specifies two net bit rate 1or 2 mbits per sec It has forward error correction code Three alternatives physical layer Diffuse infrared Frequency hopping spread spectrum Direct sequence spread spectrum
  • 12. 802.11a(ofdm waveform) Release in sep 1999 Data rates 1.5 to 54 mbit/s First widely accepted 802 family Operates at 5GHz frequency band Less range
  • 13. 802.11b Release on the market in 2000 Maximum raw data rate of 11mbit/s High throughput Low cost Interference problem
  • 14. 802.11g Release on june 2003 Operates in the 2.4 GHz band Uses OFDM based transmission scheme Operates at the average bit rate of 22 Mbit/s or maximum 54 Mbit/s Its hardware are full back compatible with 802.11b hardware
  • 15. 802.11n Release on October 2009 It is the improvement over previous 802.11 standard It has MIMO antennas Operates at the 2.4 GHz or less than 5GHz bands Data rates from 54 Mbit/s to 600 Mbit/s
  • 16. 802.11ac Release in December 2013 It is an amendment to IEEE 802.11 It has wider channels(80 or 160 MHz) Operates at 5GHz band It supports multi-user MIMO Data rates up to 1300 Mbit/s
  • 17. 802.11ad Release in Dec 2012 It defines new physical layer for 802.11 n/w Operates in the 60GHz millimeter wave spectrum Product implementing this standard are being brought under the name of wigig brand Peak transmission rate 7 Gbit/s
  • 18. Other Protocols 802.11 AH Estimated to release 2016 Bandwidth 900MHz 802.11 AJ  Estimated to release 2016 Bandwidth 24/60 802.11 AX Estimated to release 2019 Bandwidth 2.4/5
  • 19. 802.11 Media Access Control  The 802.11 MAC layer provides functionality to allow reliable data delivery for the upper layers over the wireless PHY media.  The data delivery itself is based on an asynchronous, best-effort, connectionless delivery of MAC layer data.  There is no guarantee that the frames will be delivered successfully.  The 802.11 MAC provides a controlled access method to the shared wireless media called Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA).  CSMA/CA is similar to the collision detection access method deployed by 802.3 Ethernet LANs.
  • 20. 802.11 Media Access Control cntd Another function of the 802.11 MAC is to protect the data being delivered by providing security and privacy services.  Security is provided by the authentication services and by Wireless Equivalent Privacy (WEP), which is an encryption service for data delivered on the WLAN.
  • 21. Security For security 802.11 specifies two Authentication modes: OSA(Opens Systems Authentication) • Device that request to access the network is granted without any security check Shared Key Authentication • Device that request to access the network is granted with security check • WEP: wired equivalent privacy ESSID offers casual separation of traffic