SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Wi fi 802.11
Wi-fi
• IEEE 802.11 – Wi-Fi
Wi-Fi
– Owned by a group called Wi-Fi alliances.
– Signals are propagating through space.
Physical Properties:
– Runs over six physical layer standards.
802.11 physical standards
Spread Spectrum based Diffused Infrared based
Original 802.11 with frequency hopping
Original 802.11 with Direct sequence
802.11b
802.11a
802.11g
• Original 802.11 with frequency hopping
 Over 79, 1 MHz wide frequency bandwidths.
 Provide up to 2Mbps.
 Runs at 2.4GHz frequency band of electromagnetic spectrum.
• Original 802.11 with Direct Sequence
 11 – bit chipping sequence is used.
 Provide up to 2Mbps.
 Runs at 2.4 GHz frequency band of electromagnetic spectrum
• 802.11b
 Variant of direct sequence spread spectrum provides up to 11Mbps.
 Runs at 2.4 GHz frequency band of electromagnetic spectrum.
• 802.11a
 Orthogonal frequency division multiplexing (OFDM) is used.
 Delivers up to 54Mbps.
 Runs in 5GHz band.
 In 5GHZ band, interference is less, but absorption is more and it is limited to line of sight communication.
• 802.11g
 Backward compatible with 802.11b.
 Uses OFDM and delivers up to 54Mbps.
 Runs in 2.4GHz band.
Collision Avoidance
Hidden node Problem
 Here A and C are both with in the range of B but not each other.
 Suppose both A and C want to communicate with B and so they each send it a
frame.
• A and C are unaware of each other since their signals do not carry that far
• These two frames collide with each other at B
– But unlike an Ethernet, neither A nor C is aware of this collision
• A and C are said to hidden nodes with respect to each other.
Exposed Node Problem
 Here B can exchange frames with A & C, but it cannot reach D and C can reach B &
D but not A.
 Suppose B is sending to A. Node C is aware of this communication because it hears
B’s transmission. It would be a mistake for C to conclude that it cannot transmit to
anyone just because it can hear B’s transmission.
 Suppose C wants to transmit to node D. This is not a problem since C’s transmission
to D will not interfere with A’s ability to receive from B.
 This problem is called exposed node problem.
Multiple Access with Collision Avoidance (MACA)
 To address the hidden node and exposed node problem 802.11 uses MACA.
 Here sender and receiver exchange control information before transmission of data.
 This exchange informs all nearby nodes that a transmission is about to begin
 Sender transmits a Request to Send (RTS) frame to the receiver.
• The RTS frame includes a field that indicates how long the sender wants to hold the medium
• Length of the data frame to be transmitted.
 Receiver replies with a Clear to Send (CTS) frame
• This frame echoes this length field back to the sender.
 Any node that sees the CTS frame knows that, it is close to the receiver, therefore it
cannot transmit for the period of time it takes to send a frame of the specified length.
 Any node that sees the RTS frame but not the CTS frame is not close enough to the
receiver to interfere with it, and so is free to transmit.
 Receiver sends an ACK to the sender after successfully receiving a frame
 All nodes must wait for this ACK before trying to transmit
 If two or more nodes detect an idle link and try to transmit an RTS frame at the same
time, their RTS frame will collide with each other.
 But 802.11 does not support collision detection
• So the senders realize the collision has happened when they do not receive the CTS frame after a period of
time
• In this case, they each wait a random amount of time before trying again.
• The amount of time a given node delays is defined by the same exponential backoff algorithm used on the
Ethernet.
Distribution System
 Base station based topology.
 Here some nodes are allowed to roam and some nodes are connected to wired
infrastructure called base stations or Access points (AP) and they are connected to each
other. This network is called as distribution system.
 Distribution network could be a Ethernet or token ring and distribution network runs at
layer 2of ISO architecture.
 Two nodes can communicate each other, if they are in the within reach of each other.
 Each node is associated with one access point.
Communication from A to E
 Node A sends frame to its Access point (AP - 1)
 AP-1 forwards the frame across the distribution system to AP-3, which finally transmits the
frame to E.
Scanning
– Technique for selecting AP is called scanning.
Steps,
 The node sends a Probe frame.
 All APs with in the reach reply with a Probe Response frame.
 The node selects one of the access points, and sends that AP an Association Request frame.
 The AP replies with an Association Response frame.
– A node engages this step whenever it joins the network as well as when it need a new
AP.
– Whenever the node acquires a new AP, the new AP notifies the old AP of the change
through distribution system.
Types,
 Active scanning
 Passive scanning
Active scanning
• Whenever a node moves from the cell serviced by one AP (AP-1) to the cell serviced by the
another AP (AP-2),
 It sends Probe frames;
 AP-2 give a response by Probe response frames and the node associates with that
access point.
figure. Node Mobility
Passive scanning
• APs periodically send a Beacon frame – that advertises the capability of the AP (transmission
rate supported by the AP)
• A node can change to the AP based on the Beacon frame simply by sending an Association
Request frame back to the AP.
Frame Format
 Control
- Contains three sub fields.
Type (6 bit) – indicates whether the frame carries data , is an RTS frame or CTS frame, or is used by scanning
algorithm
ToDS (1 bit), FromDS (1 bit)
– Both bits are 0, one node is sending directly to another.
– Both bits are 1, message went from the wireless node onto the distribution system and
then from the distribution system to another wireless node.
 Addr1, Addr2, Addr3, Addr4
– If both DS bits are 0,
Addr1 – target node
Addr2 – Source node
– If both DS bits are 1,
Addr1 – Ultimate destination
Addr2 – Immediate sender
Addr3 – Intermediate destination
Addr4 – Original Source

Weitere ähnliche Inhalte

Was ist angesagt?

5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standardsRodgers Moonde
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)Sri Safrina
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesManusha Dilan
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture pptArpita Sanghani
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energySaptadeep Pal
 
Wsn 08
Wsn 08Wsn 08
Wsn 08hinalala
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocolMerlin Florrence
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide showNavleshKumar singh
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 

Was ist angesagt? (20)

5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Ethernet
EthernetEthernet
Ethernet
 

Ähnlich wie WiFi 802.11

wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.pptLautaroRondan
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.pptrajucs
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Ashish Khare
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manetsangusajjan
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 

Ähnlich wie WiFi 802.11 (20)

wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.ppt
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Lecture6
Lecture6Lecture6
Lecture6
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 

Mehr von selvakumar_b1985

Mehr von selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 

KĂźrzlich hochgeladen

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

KĂźrzlich hochgeladen (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

WiFi 802.11

  • 2. Wi-fi • IEEE 802.11 – Wi-Fi Wi-Fi – Owned by a group called Wi-Fi alliances. – Signals are propagating through space. Physical Properties: – Runs over six physical layer standards. 802.11 physical standards Spread Spectrum based Diffused Infrared based Original 802.11 with frequency hopping Original 802.11 with Direct sequence 802.11b 802.11a 802.11g
  • 3. • Original 802.11 with frequency hopping  Over 79, 1 MHz wide frequency bandwidths.  Provide up to 2Mbps.  Runs at 2.4GHz frequency band of electromagnetic spectrum. • Original 802.11 with Direct Sequence  11 – bit chipping sequence is used.  Provide up to 2Mbps.  Runs at 2.4 GHz frequency band of electromagnetic spectrum • 802.11b  Variant of direct sequence spread spectrum provides up to 11Mbps.  Runs at 2.4 GHz frequency band of electromagnetic spectrum. • 802.11a  Orthogonal frequency division multiplexing (OFDM) is used.  Delivers up to 54Mbps.  Runs in 5GHz band.  In 5GHZ band, interference is less, but absorption is more and it is limited to line of sight communication. • 802.11g  Backward compatible with 802.11b.  Uses OFDM and delivers up to 54Mbps.  Runs in 2.4GHz band.
  • 4. Collision Avoidance Hidden node Problem  Here A and C are both with in the range of B but not each other.  Suppose both A and C want to communicate with B and so they each send it a frame. • A and C are unaware of each other since their signals do not carry that far • These two frames collide with each other at B – But unlike an Ethernet, neither A nor C is aware of this collision • A and C are said to hidden nodes with respect to each other.
  • 5. Exposed Node Problem  Here B can exchange frames with A & C, but it cannot reach D and C can reach B & D but not A.  Suppose B is sending to A. Node C is aware of this communication because it hears B’s transmission. It would be a mistake for C to conclude that it cannot transmit to anyone just because it can hear B’s transmission.  Suppose C wants to transmit to node D. This is not a problem since C’s transmission to D will not interfere with A’s ability to receive from B.  This problem is called exposed node problem.
  • 6. Multiple Access with Collision Avoidance (MACA)  To address the hidden node and exposed node problem 802.11 uses MACA.  Here sender and receiver exchange control information before transmission of data.  This exchange informs all nearby nodes that a transmission is about to begin  Sender transmits a Request to Send (RTS) frame to the receiver. • The RTS frame includes a field that indicates how long the sender wants to hold the medium • Length of the data frame to be transmitted.  Receiver replies with a Clear to Send (CTS) frame • This frame echoes this length field back to the sender.  Any node that sees the CTS frame knows that, it is close to the receiver, therefore it cannot transmit for the period of time it takes to send a frame of the specified length.  Any node that sees the RTS frame but not the CTS frame is not close enough to the receiver to interfere with it, and so is free to transmit.  Receiver sends an ACK to the sender after successfully receiving a frame  All nodes must wait for this ACK before trying to transmit  If two or more nodes detect an idle link and try to transmit an RTS frame at the same time, their RTS frame will collide with each other.  But 802.11 does not support collision detection • So the senders realize the collision has happened when they do not receive the CTS frame after a period of time • In this case, they each wait a random amount of time before trying again. • The amount of time a given node delays is defined by the same exponential backoff algorithm used on the Ethernet.
  • 7. Distribution System  Base station based topology.  Here some nodes are allowed to roam and some nodes are connected to wired infrastructure called base stations or Access points (AP) and they are connected to each other. This network is called as distribution system.  Distribution network could be a Ethernet or token ring and distribution network runs at layer 2of ISO architecture.  Two nodes can communicate each other, if they are in the within reach of each other.  Each node is associated with one access point.
  • 8. Communication from A to E  Node A sends frame to its Access point (AP - 1)  AP-1 forwards the frame across the distribution system to AP-3, which finally transmits the frame to E. Scanning – Technique for selecting AP is called scanning. Steps,  The node sends a Probe frame.  All APs with in the reach reply with a Probe Response frame.  The node selects one of the access points, and sends that AP an Association Request frame.  The AP replies with an Association Response frame. – A node engages this step whenever it joins the network as well as when it need a new AP. – Whenever the node acquires a new AP, the new AP notifies the old AP of the change through distribution system. Types,  Active scanning  Passive scanning
  • 9. Active scanning • Whenever a node moves from the cell serviced by one AP (AP-1) to the cell serviced by the another AP (AP-2),  It sends Probe frames;  AP-2 give a response by Probe response frames and the node associates with that access point. figure. Node Mobility Passive scanning • APs periodically send a Beacon frame – that advertises the capability of the AP (transmission rate supported by the AP) • A node can change to the AP based on the Beacon frame simply by sending an Association Request frame back to the AP.
  • 10. Frame Format  Control - Contains three sub fields. Type (6 bit) – indicates whether the frame carries data , is an RTS frame or CTS frame, or is used by scanning algorithm ToDS (1 bit), FromDS (1 bit) – Both bits are 0, one node is sending directly to another. – Both bits are 1, message went from the wireless node onto the distribution system and then from the distribution system to another wireless node.  Addr1, Addr2, Addr3, Addr4 – If both DS bits are 0, Addr1 – target node Addr2 – Source node – If both DS bits are 1, Addr1 – Ultimate destination Addr2 – Immediate sender Addr3 – Intermediate destination Addr4 – Original Source