SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
IEEE 802.11
Wireless LAN
Standard
Chapter 14
IEEE 802 Protocol Layers
Protocol Architecture
 Functions of physical layer:
 Encoding/decoding of signals
 Preamble generation/removal (for synchronization)
 Bit transmission/reception
 Includes specification of the transmission medium
Protocol Architecture
 Functions of medium access control (MAC)
layer:
 On transmission, assemble data into a frame with
address and error detection fields
 On reception, disassemble frame and perform
address recognition and error detection
 Govern access to the LAN transmission medium
 Functions of logical link control (LLC) Layer:
 Provide an interface to higher layers and perform
flow and error control
Separation of LLC and MAC
 The logic required to manage access to a shared-access
medium not found in traditional layer 2 data link control
 For the same LLC, several MAC options may be provided
MAC Frame Format
 MAC control
 Contains Mac protocol information
 Destination MAC address
 Destination physical attachment point
 Source MAC address
 Source physical attachment point
 CRC
 Cyclic redundancy check
Logical Link Control
 Characteristics of LLC not shared by other control protocols:
 Must support multiaccess, shared-medium nature of the link
 Relieved of some details of link access by MAC layer
LLC Services
 Unacknowledged connectionless service
 No flow- and error-control mechanisms
 Data delivery not guaranteed
 Connection-mode service
 Logical connection set up between two users
 Flow- and error-control provided
 Acknowledged connectionless service
 Cross between previous two
 Datagrams acknowledged
 No prior logical setup
Differences between LLC and
HDLC
 LLC uses asynchronous balanced mode of operation of HDLC
(type 2 operation)
 LLC supports unacknowledged connectionless service (type 1
operation)
 LLC supports acknowledged connectionless service (type 3
operation)
 LLC permits multiplexing by the use of LLC service access
points (LSAPs)
IEEE 802.11 Architecture
 Distribution system (DS)
 Access point (AP)
 Basic service set (BSS)
 Stations competing for access to shared wireless
medium
 Isolated or connected to backbone DS through
AP
 Extended service set (ESS)
 Two or more basic service sets interconnected
by DS
IEEE 802.11 Services
Distribution of Messages Within
a DS
 Distribution service
 Used to exchange MAC frames from station in one BSS to station
in another BSS
 Integration service
 Transfer of data between station on IEEE 802.11 LAN and station
on integrated IEEE 802.x LAN
Transition Types Based On
Mobility
 No transition
 Stationary or moves only within BSS
 BSS transition
 Station moving from one BSS to another BSS in same ESS
 ESS transition
 Station moving from BSS in one ESS to BSS within another ESS
Association-Related Services
 Association
 Establishes initial association between station
and AP
 Reassociation
 Enables transfer of association from one AP to
another, allowing station to move from one BSS
to another
 Disassociation
 Association termination notice from station or
AP
Access and Privacy Services
 Authentication
 Establishes identity of stations to each other
 Deathentication
 Invoked when existing authentication is terminated
 Privacy
 Prevents message contents from being read by unintended
recipient
IEEE 802.11 Medium Access
Control
 MAC layer covers three functional areas:
 Reliable data delivery
 Access control
 Security
Reliable Data Delivery
 More efficient to deal with errors at the MAC
level than higher layer (such as TCP)
 Frame exchange protocol
 Source station transmits data
 Destination responds with acknowledgment (ACK)
 If source doesn’t receive ACK, it retransmits frame
 Four frame exchange
 Source issues request to send (RTS)
 Destination responds with clear to send (CTS)
 Source transmits data
 Destination responds with ACK
Access Control
Medium Access Control Logic
Interframe Space (IFS) Values
 Short IFS (SIFS)
 Shortest IFS
 Used for immediate response actions
 Point coordination function IFS (PIFS)
 Midlength IFS
 Used by centralized controller in PCF scheme when
using polls
 Distributed coordination function IFS (DIFS)
 Longest IFS
 Used as minimum delay of asynchronous frames
contending for access
IFS Usage
 SIFS
 Acknowledgment (ACK)
 Clear to send (CTS)
 Poll response
 PIFS
 Used by centralized controller in issuing
polls
 Takes precedence over normal contention
traffic
 DIFS
MAC Frame Format
MAC Frame Fields
 Frame Control – frame type, control
information
 Duration/connection ID – channel
allocation time
 Addresses – context dependant, types
include source and destination
 Sequence control – numbering and
reassembly
 Frame body – MSDU or fragment of
Frame Control Fields
 Protocol version – 802.11 version
 Type – control, management, or data
 Subtype – identifies function of frame
 To DS – 1 if destined for DS
 From DS – 1 if leaving DS
 More fragments – 1 if fragments follow
 Retry – 1 if retransmission of previous
frame
Frame Control Fields
 Power management – 1 if transmitting
station is in sleep mode
 More data – Indicates that station has
more data to send
 WEP – 1 if wired equivalent protocol is
implemented
 Order – 1 if any data frame is sent using
the Strictly Ordered service
Control Frame Subtypes
 Power save – poll (PS-Poll)
 Request to send (RTS)
 Clear to send (CTS)
 Acknowledgment
 Contention-free (CF)-end
 CF-end + CF-ack
Data Frame Subtypes
 Data-carrying frames
 Data
 Data + CF-Ack
 Data + CF-Poll
 Data + CF-Ack + CF-Poll
 Other subtypes (don’t carry user data)
 Null Function
 CF-Ack
 CF-Poll
 CF-Ack + CF-Poll
Management Frame Subtypes
 Association request
 Association response
 Reassociation request
 Reassociation response
 Probe request
 Probe response
 Beacon
Management Frame Subtypes
 Announcement traffic indication message
 Dissociation
 Authentication
 Deauthentication
Wired Equivalent Privacy
Authentication
 Open system authentication
 Exchange of identities, no security benefits
 Shared Key authentication
 Shared Key assures authentication
Physical Media Defined by
Original 802.11 Standard
 Direct-sequence spread spectrum
 Operating in 2.4 GHz ISM band
 Data rates of 1 and 2 Mbps
 Frequency-hopping spread spectrum
 Operating in 2.4 GHz ISM band
 Data rates of 1 and 2 Mbps
 Infrared
 1 and 2 Mbps
 Wavelength between 850 and 950 nm
IEEE 802.11a and IEEE 802.11b
 IEEE 802.11a
 Makes use of 5-GHz band
 Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54
Mbps
 Uses orthogonal frequency division
multiplexing (OFDM)
 Subcarrier modulated using BPSK, QPSK,
16-QAM or 64-QAM
 IEEE 802.11b
 Provides data rates of 5.5 and 11 Mbps
 Complementary code keying (CCK)

Mais conteúdo relacionado

Mais procurados (20)

Generic framing procedure
Generic framing procedureGeneric framing procedure
Generic framing procedure
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
IEEE 80211 ah
IEEE 80211 ahIEEE 80211 ah
IEEE 80211 ah
 
Getting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
WIRELESS GIGABIT TECHNOLOGY
WIRELESS GIGABIT TECHNOLOGYWIRELESS GIGABIT TECHNOLOGY
WIRELESS GIGABIT TECHNOLOGY
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11be
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Wi-Fi 6E.pptx
Wi-Fi 6E.pptxWi-Fi 6E.pptx
Wi-Fi 6E.pptx
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
 
Designing the 5G Unified Air Interface
Designing the 5G Unified Air InterfaceDesigning the 5G Unified Air Interface
Designing the 5G Unified Air Interface
 
Wi-Fi 6.pptx
Wi-Fi 6.pptxWi-Fi 6.pptx
Wi-Fi 6.pptx
 
6lowpan
6lowpan6lowpan
6lowpan
 

Destaque

802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeEfiong Etuk
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 

Destaque (10)

802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your Life
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 

Semelhante a Chapter#14

group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
komdat1
komdat1komdat1
komdat1pasca
 
komdat1
komdat1komdat1
komdat1pasca
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
The osi model layers
The osi model layersThe osi model layers
The osi model layersINFitunes
 
Wlan 1 intro
Wlan 1 introWlan 1 intro
Wlan 1 introtrimba
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4Alaa2
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overviewAsif
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overviewAsif
 

Semelhante a Chapter#14 (20)

group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
komdat1
komdat1komdat1
komdat1
 
komdat1
komdat1komdat1
komdat1
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
WLAN
WLANWLAN
WLAN
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Wlan 1 intro
Wlan 1 introWlan 1 intro
Wlan 1 intro
 
Mac
MacMac
Mac
 
frame relay
frame relayframe relay
frame relay
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overview
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overview
 

Mais de Syed Muhammad ALi Shah (20)

Chapter # 7
Chapter # 7Chapter # 7
Chapter # 7
 
Chapter # 9
Chapter # 9Chapter # 9
Chapter # 9
 
Chapter # 6
Chapter # 6Chapter # 6
Chapter # 6
 
Chapter # 5
Chapter # 5Chapter # 5
Chapter # 5
 
Chapter # 8
Chapter # 8Chapter # 8
Chapter # 8
 
Chapter # 4
Chapter # 4Chapter # 4
Chapter # 4
 
Chapter # 10
Chapter # 10Chapter # 10
Chapter # 10
 
Chapter # 3
Chapter # 3Chapter # 3
Chapter # 3
 
Chapter # 2
Chapter # 2Chapter # 2
Chapter # 2
 
Chapter # 1
Chapter # 1Chapter # 1
Chapter # 1
 
Chapter#18
Chapter#18Chapter#18
Chapter#18
 
Chapter#17
Chapter#17Chapter#17
Chapter#17
 
Chapter#16
Chapter#16Chapter#16
Chapter#16
 
Chapter#15
Chapter#15Chapter#15
Chapter#15
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Chapter#13
Chapter#13Chapter#13
Chapter#13
 
Chapter#9
Chapter#9Chapter#9
Chapter#9
 
Chapter#13
Chapter#13Chapter#13
Chapter#13
 
Chapter#12
Chapter#12Chapter#12
Chapter#12
 
Chapter#11
Chapter#11Chapter#11
Chapter#11
 

Último

Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Amil baba
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
tourism-management-srs_compress-software-engineering.pdf
tourism-management-srs_compress-software-engineering.pdftourism-management-srs_compress-software-engineering.pdf
tourism-management-srs_compress-software-engineering.pdfchess188chess188
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 

Último (20)

Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
tourism-management-srs_compress-software-engineering.pdf
tourism-management-srs_compress-software-engineering.pdftourism-management-srs_compress-software-engineering.pdf
tourism-management-srs_compress-software-engineering.pdf
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 

Chapter#14

  • 3. Protocol Architecture  Functions of physical layer:  Encoding/decoding of signals  Preamble generation/removal (for synchronization)  Bit transmission/reception  Includes specification of the transmission medium
  • 4. Protocol Architecture  Functions of medium access control (MAC) layer:  On transmission, assemble data into a frame with address and error detection fields  On reception, disassemble frame and perform address recognition and error detection  Govern access to the LAN transmission medium  Functions of logical link control (LLC) Layer:  Provide an interface to higher layers and perform flow and error control
  • 5. Separation of LLC and MAC  The logic required to manage access to a shared-access medium not found in traditional layer 2 data link control  For the same LLC, several MAC options may be provided
  • 6. MAC Frame Format  MAC control  Contains Mac protocol information  Destination MAC address  Destination physical attachment point  Source MAC address  Source physical attachment point  CRC  Cyclic redundancy check
  • 7. Logical Link Control  Characteristics of LLC not shared by other control protocols:  Must support multiaccess, shared-medium nature of the link  Relieved of some details of link access by MAC layer
  • 8. LLC Services  Unacknowledged connectionless service  No flow- and error-control mechanisms  Data delivery not guaranteed  Connection-mode service  Logical connection set up between two users  Flow- and error-control provided  Acknowledged connectionless service  Cross between previous two  Datagrams acknowledged  No prior logical setup
  • 9. Differences between LLC and HDLC  LLC uses asynchronous balanced mode of operation of HDLC (type 2 operation)  LLC supports unacknowledged connectionless service (type 1 operation)  LLC supports acknowledged connectionless service (type 3 operation)  LLC permits multiplexing by the use of LLC service access points (LSAPs)
  • 10. IEEE 802.11 Architecture  Distribution system (DS)  Access point (AP)  Basic service set (BSS)  Stations competing for access to shared wireless medium  Isolated or connected to backbone DS through AP  Extended service set (ESS)  Two or more basic service sets interconnected by DS
  • 12. Distribution of Messages Within a DS  Distribution service  Used to exchange MAC frames from station in one BSS to station in another BSS  Integration service  Transfer of data between station on IEEE 802.11 LAN and station on integrated IEEE 802.x LAN
  • 13. Transition Types Based On Mobility  No transition  Stationary or moves only within BSS  BSS transition  Station moving from one BSS to another BSS in same ESS  ESS transition  Station moving from BSS in one ESS to BSS within another ESS
  • 14. Association-Related Services  Association  Establishes initial association between station and AP  Reassociation  Enables transfer of association from one AP to another, allowing station to move from one BSS to another  Disassociation  Association termination notice from station or AP
  • 15. Access and Privacy Services  Authentication  Establishes identity of stations to each other  Deathentication  Invoked when existing authentication is terminated  Privacy  Prevents message contents from being read by unintended recipient
  • 16. IEEE 802.11 Medium Access Control  MAC layer covers three functional areas:  Reliable data delivery  Access control  Security
  • 17. Reliable Data Delivery  More efficient to deal with errors at the MAC level than higher layer (such as TCP)  Frame exchange protocol  Source station transmits data  Destination responds with acknowledgment (ACK)  If source doesn’t receive ACK, it retransmits frame  Four frame exchange  Source issues request to send (RTS)  Destination responds with clear to send (CTS)  Source transmits data  Destination responds with ACK
  • 20. Interframe Space (IFS) Values  Short IFS (SIFS)  Shortest IFS  Used for immediate response actions  Point coordination function IFS (PIFS)  Midlength IFS  Used by centralized controller in PCF scheme when using polls  Distributed coordination function IFS (DIFS)  Longest IFS  Used as minimum delay of asynchronous frames contending for access
  • 21. IFS Usage  SIFS  Acknowledgment (ACK)  Clear to send (CTS)  Poll response  PIFS  Used by centralized controller in issuing polls  Takes precedence over normal contention traffic  DIFS
  • 23. MAC Frame Fields  Frame Control – frame type, control information  Duration/connection ID – channel allocation time  Addresses – context dependant, types include source and destination  Sequence control – numbering and reassembly  Frame body – MSDU or fragment of
  • 24. Frame Control Fields  Protocol version – 802.11 version  Type – control, management, or data  Subtype – identifies function of frame  To DS – 1 if destined for DS  From DS – 1 if leaving DS  More fragments – 1 if fragments follow  Retry – 1 if retransmission of previous frame
  • 25. Frame Control Fields  Power management – 1 if transmitting station is in sleep mode  More data – Indicates that station has more data to send  WEP – 1 if wired equivalent protocol is implemented  Order – 1 if any data frame is sent using the Strictly Ordered service
  • 26. Control Frame Subtypes  Power save – poll (PS-Poll)  Request to send (RTS)  Clear to send (CTS)  Acknowledgment  Contention-free (CF)-end  CF-end + CF-ack
  • 27. Data Frame Subtypes  Data-carrying frames  Data  Data + CF-Ack  Data + CF-Poll  Data + CF-Ack + CF-Poll  Other subtypes (don’t carry user data)  Null Function  CF-Ack  CF-Poll  CF-Ack + CF-Poll
  • 28. Management Frame Subtypes  Association request  Association response  Reassociation request  Reassociation response  Probe request  Probe response  Beacon
  • 29. Management Frame Subtypes  Announcement traffic indication message  Dissociation  Authentication  Deauthentication
  • 31. Authentication  Open system authentication  Exchange of identities, no security benefits  Shared Key authentication  Shared Key assures authentication
  • 32. Physical Media Defined by Original 802.11 Standard  Direct-sequence spread spectrum  Operating in 2.4 GHz ISM band  Data rates of 1 and 2 Mbps  Frequency-hopping spread spectrum  Operating in 2.4 GHz ISM band  Data rates of 1 and 2 Mbps  Infrared  1 and 2 Mbps  Wavelength between 850 and 950 nm
  • 33. IEEE 802.11a and IEEE 802.11b  IEEE 802.11a  Makes use of 5-GHz band  Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps  Uses orthogonal frequency division multiplexing (OFDM)  Subcarrier modulated using BPSK, QPSK, 16-QAM or 64-QAM  IEEE 802.11b  Provides data rates of 5.5 and 11 Mbps  Complementary code keying (CCK)