SlideShare uma empresa Scribd logo
1 de 42
IEEE 802.11 Overview Mustafa Ergen [email_address] UC Berkeley
Wireless Market Segments
Standardization of Wireless Networks ,[object Object],[object Object],Application Presentation Session Transport Network Data Link Physical ISO OSI 7-layer model Logical Link Control Medium Access (MAC) Physical (PHY) IEEE 802 standards
IEEE 802.11 Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ex.
Medium Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DCF Operation
PCF Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Frame Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FC Duration /ID Address  1 Address  2 Address  3 Sequence Control Address 4 DATA FCS 2 2 6 6 6 2 6 0-2312 4   bytes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Frame Subtypes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CONTROL DATA MANAGEMENT
Other MAC Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Association ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Address Filtering ,[object Object],[object Object],[object Object],Privacy MAC Function ,[object Object]
Power Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Synchronization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scanning & Joining ,[object Object],[object Object],[object Object],[object Object],[object Object]
Comb ining Management Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Physical Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.11E ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.11E
IEEE 802.11E Backoff
IEEE 802.11 Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
APPENDIX
The Basics of WLANs
WLAN Pending Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Deployment Issues ,[object Object],[object Object],[object Object]
Frequency Bands-  ISM ,[object Object],[object Object],Extremely Low Very Low Low Medium High Very High Ultra High Super High Infrared Visible Light Ultra- violet X-Rays Audio AM Broadcast Short Wave Radio FM Broadcast Television Infrared wireless LAN 902 - 928 MHz 26 MHz Cellular (840MHz) NPCS (1.9GHz) 2.4 - 2.4835 GHz 83.5 MHz (IEEE 802.11) 5 GHz (IEEE 802.11) HyperLAN HyperLAN2
IEEE 802.11i  Enhanced Security Agere/Microsoft/Agere/Cisco/Atheros/Intel/3Com/Intersil/Symbol/Certicom/RSA/Funk Key players Enhanced encryption software will replace WEP software; This is on a recommended best practice /voluntary basis; development in TgI: first draft Mar 2001; next draft due Mar 2002; stable draft: July 2002; final standard: Jan 2003 Status + Roadmap Mode of AES to use for encryption (CTR/CBC [CBC MIC] or OCB [MIC and Encryption function]) Key issues Actively proposing WEP improvement methods ,  participating in all official/interim meetings Agere’s activity Client and AP cards (Controller chip, Firmware, Driver) AP kernel, RG kernel, BG kernel Products affected This applies to 802.11b, 802.11a and 802.11g systems. 802.1x is key reference for  upper layer  authentication  Related standards High: weakness of WEP encryption is damaging the 802.11 standard perception in the market Importance Enhancements to the 802.11 MAC standard to increase the security; addresses new encryption methods and upper layer authentication Description
IEEE 802.1 X - Port Based Control Microsoft/Cisco/Certicom/RSA/Funk Key players Standard available – Spring 2001 Status + Roadmap Home in IETF for EAP method discussions Key issues Adding EAP auth types to products Agere’s activity Supported in AP-2000, AP-1000/500, Clients (MS drivers for XP/2000 beta) Products affected This applies to 802.11b, 802.11a and 802.11g systems Related standards High:  forms a key part of the important 802.11i proposals for enhanced security Importance A framework for regulating access control of client stations to a network via the use of extensible authentication methods Description
IEEE 802.1 p  -  Traffic Class N/A Key players Final standard; incorporated in 1998 edition of 802.1d (annex H) Status + Roadmap N/A Key issues Investigating implementation options Agere’s activity Client and AP cards (Driver ) ; AP kernel, RG kernel, BG kernel Products affected This applies to 802.11b, 802.11a and 802.11g systems; i s an addition to the 802.1d Bridge standard (annex H). Related standards Medium :  forms a key part of the 802.11e proposals for QoS at the MAC level Importance A method to differentiate traffic streams in priotity classes in support of quality of service offering Description IEEE 802.1 p  ( Traffic Class and Dynamic Multicast Filtering ) Reference
Glossary of 802.11 Wireless Terms, cont. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overview, 802.11 Architecture STA STA STA STA STA STA STA STA AP AP ESS BSS BSS BSS BSS Existing Wired LAN Infrastructure Network Ad Hoc Network Ad Hoc Network
Frequency Hopping and Direct Sequence Spread Spectrum Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802.11 Physical Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802.11 Physical Layer, cont.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Performance, Theoretical Maximum Throughput ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mineRoshni Ayappan
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityHughes Systique Corporation
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GPrateek Aloni
 
IEEE 802.11 wifi
IEEE 802.11 wifiIEEE 802.11 wifi
IEEE 802.11 wifiParnal Vast
 
Lte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsLte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsSaurabh Verma
 
Wireless network
Wireless networkWireless network
Wireless networkmattglover0
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 

Mais procurados (20)

W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 
Cellular system
Cellular system Cellular system
Cellular system
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation Connectivity
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
IEEE 802.11 wifi
IEEE 802.11 wifiIEEE 802.11 wifi
IEEE 802.11 wifi
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Lte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsLte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basics
 
Wireless network
Wireless networkWireless network
Wireless network
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Wi-Fi 6.pptx
Wi-Fi 6.pptxWi-Fi 6.pptx
Wi-Fi 6.pptx
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 

Destaque

IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Introduction to Communication Systems
Introduction to Communication SystemsIntroduction to Communication Systems
Introduction to Communication SystemsDr. Ghanshyam Singh
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction Pradeep Singh
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)Rasan Samarasinghe
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Power Line Communication
Power Line CommunicationPower Line Communication
Power Line CommunicationPiyush Chand
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular NetworksYoram Orzach
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 

Destaque (20)

IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Mc wireless lan
Mc wireless lanMc wireless lan
Mc wireless lan
 
Lect3
Lect3Lect3
Lect3
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Introduction to Communication Systems
Introduction to Communication SystemsIntroduction to Communication Systems
Introduction to Communication Systems
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
Estandar 802.3
Estandar 802.3Estandar 802.3
Estandar 802.3
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Power Line Communication
Power Line CommunicationPower Line Communication
Power Line Communication
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 

Semelhante a Ieee 802.11overview

Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATIONDaisyWatson5
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Maxsai srikar
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)Azad Kaki
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless NetworksNapier University
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless accessNikhil Jagnade
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)Jeff Green
 

Semelhante a Ieee 802.11overview (20)

Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
80211
8021180211
80211
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 
Unit 1-converted.pptx
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 
Wi Max
Wi MaxWi Max
Wi Max
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Max
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless access
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
 
Lecture24
Lecture24Lecture24
Lecture24
 

Mais de Object-Frontier Software Pvt. Ltd (9)

Chap9
Chap9Chap9
Chap9
 
Wsh96 Wilkinson
Wsh96 WilkinsonWsh96 Wilkinson
Wsh96 Wilkinson
 
Dc 11 Brucepotter
Dc 11 BrucepotterDc 11 Brucepotter
Dc 11 Brucepotter
 
Presentation
PresentationPresentation
Presentation
 
Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
GPRS
GPRSGPRS
GPRS
 
CORBA
CORBACORBA
CORBA
 
Rmi
RmiRmi
Rmi
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Ieee 802.11overview

  • 1. IEEE 802.11 Overview Mustafa Ergen [email_address] UC Berkeley
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Ex.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 28.
  • 30. The Basics of WLANs
  • 31.
  • 32.
  • 33.
  • 34. IEEE 802.11i Enhanced Security Agere/Microsoft/Agere/Cisco/Atheros/Intel/3Com/Intersil/Symbol/Certicom/RSA/Funk Key players Enhanced encryption software will replace WEP software; This is on a recommended best practice /voluntary basis; development in TgI: first draft Mar 2001; next draft due Mar 2002; stable draft: July 2002; final standard: Jan 2003 Status + Roadmap Mode of AES to use for encryption (CTR/CBC [CBC MIC] or OCB [MIC and Encryption function]) Key issues Actively proposing WEP improvement methods , participating in all official/interim meetings Agere’s activity Client and AP cards (Controller chip, Firmware, Driver) AP kernel, RG kernel, BG kernel Products affected This applies to 802.11b, 802.11a and 802.11g systems. 802.1x is key reference for upper layer authentication Related standards High: weakness of WEP encryption is damaging the 802.11 standard perception in the market Importance Enhancements to the 802.11 MAC standard to increase the security; addresses new encryption methods and upper layer authentication Description
  • 35. IEEE 802.1 X - Port Based Control Microsoft/Cisco/Certicom/RSA/Funk Key players Standard available – Spring 2001 Status + Roadmap Home in IETF for EAP method discussions Key issues Adding EAP auth types to products Agere’s activity Supported in AP-2000, AP-1000/500, Clients (MS drivers for XP/2000 beta) Products affected This applies to 802.11b, 802.11a and 802.11g systems Related standards High: forms a key part of the important 802.11i proposals for enhanced security Importance A framework for regulating access control of client stations to a network via the use of extensible authentication methods Description
  • 36. IEEE 802.1 p - Traffic Class N/A Key players Final standard; incorporated in 1998 edition of 802.1d (annex H) Status + Roadmap N/A Key issues Investigating implementation options Agere’s activity Client and AP cards (Driver ) ; AP kernel, RG kernel, BG kernel Products affected This applies to 802.11b, 802.11a and 802.11g systems; i s an addition to the 802.1d Bridge standard (annex H). Related standards Medium : forms a key part of the 802.11e proposals for QoS at the MAC level Importance A method to differentiate traffic streams in priotity classes in support of quality of service offering Description IEEE 802.1 p ( Traffic Class and Dynamic Multicast Filtering ) Reference
  • 37.
  • 38. Overview, 802.11 Architecture STA STA STA STA STA STA STA STA AP AP ESS BSS BSS BSS BSS Existing Wired LAN Infrastructure Network Ad Hoc Network Ad Hoc Network
  • 39.
  • 40.
  • 41.
  • 42.

Notas do Editor

  1. Same organization that came up with IEEE 802.3 Ethernet, which is responsible for success of Internet