SlideShare uma empresa Scribd logo
1 de 30
IIEEEEEE 880022..1111 
WWIIRREELLEESSSS LLAANN 
V.Par thipan Assistant Professor ,Saveetha 
University
 LANs provide connectivity for 
interconnecting computing resources at the 
local levels of an organization 
 Wired LANs 
Limitations because of physical, hard-wired 
infrastructure 
 Wireless LANs provide 
Flexibility 
Portability 
Mobility 
Ease of Installation
 In response to lacking standards, IEEE 
developed the first internationally recognized 
wireless LAN standard – IEEE 802.11 
 IEEE published 802.11 in 1997, after seven 
years of work 
 Most prominent specification for WLANs 
 Scope of IEEE 802.11 is limited to Physical 
and Data Link Layers.
 Appliance Interoperability 
 Fast Product Development 
 Stable Future Migration 
 Price Reductions 
 The 802.11 standard takes into account 
the following significant differences 
between wireless and wired LANs: 
Power Management 
Security 
Bandwidth
IEEE 802.3 
Carrier 
Sense 
IEEE 802.4 
Token 
Bus 
IEEE 802.5 
Token 
Ring 
IEEE 802.11 
Wireless 
IEEE 802.2 
Logical Link Control (LLC) 
PHY 
OSI Layer 1 
(Physical) 
Mac 
OSI Layer 2 
(Data Link)
 Medical Professionals 
 Education 
 Temporary Situations 
 Airlines 
 Security Staff 
 Emergency Centers
 In historical building and small office where 
cabling is not economical. 
 Supports nomadic access by providing a 
wireless link between a LAN hub and mobile 
data terminal with an antenna. 
 Creation of an adhoc n/ws. 
i.e peer to peer network with no centralized 
server that is set up temporarily to meet 
some immediate need.
CM 
10 Mbps 
Ethernet 
switch 
UM 
Bridge 
Or 
Router 
Server 
100 Mbps Ethernet switch 
Server
 Mostly a wireless Lan will be linked into a wired LAN. This is called LAN 
Extension. 
 Control Module is wireless LAN acts as an interface to a wired LAN 
 If all wireless end systems are within the range of a single control module, 
then it is called single cell wireless LAN. 
 If multiple control Module are present ,then it is multiple cell wireless LAN. 
 CM- control module uses polling or token passing scheme to regulate 
access from end systems. 
 Hubs or user module(UM), that control number of stations directly without a 
wired LAN, can also be a part of wireless LAN
 Wireless LAN requirement:- 
 throughput – should provide high capacity. 
 Number of nodes –should support many data. 
 Connectivity of backbone LAN. 
 Battery power consumption- use battery powered workstations , so when 
not using n/w, can be set to sleep mode to reduce power consumption. 
 Transmission robustness and security: 
Highly interference prone should provide reliable transfer. 
 coallocated network operation –Wireless LAN operating in same area may 
face interference. 
 License free operation – should provide wireless products without license 
for frequency based used. 
 Hand off (or) Roaming – mobile station can move from cell to another. 
 Dynamic configuration: automated addition or relocation of end systems 
without disruption to others.
WWLLAANN TTOOPPOOLLOOGGYY 
AADD--HHOOCC NNEETTWWOORRKK
WWLLAANN TTooppoollooggyy 
IInnffrraassttrruuccttuurree
 Access point (AP): A station that provides access 
to the DS. 
 Basic service set (BSS): A set of stations 
controlled by a single AP. 
 Distribution system (DS): A system used to 
interconnect a set of BSSs to create an ESS. 
DS is implementation-independent. It can be a wired 
802.3 Ethernet LAN, 802.4 token bus, 802.5 token 
ring or another 802.11 medium. 
 Extended service set (ESS):Two or more BSS 
interconnected by DS 
 Portal: Logical entity where 802.11 network 
integrates with a non 802.11 network.
 Distribution service (DS) 
Used to exchange MAC frames from station in 
one BSS to station in another BSS 
 Integration service 
Transfer of data between station on IEEE 
802.11 LAN and station on integrated IEEE 
802.x LAN
 Association 
Establishes initial association between station 
and AP. Each station must send its identify to 
all others through AP 
 Re-association 
Enables transfer of association from one AP to 
another, allowing station to move from one 
BSS to another 
 Disassociation 
Association termination notice from station or 
AP
RREE--AASSSSOOCCIIAATTIIOONN
 Authentication 
Establishes identity of stations to each other 
 De-authentication 
Invoked when existing authentication is 
terminated 
 Privacy 
Prevents message contents from being read by 
unintended recipient.
IEEE 802.11 MMEEDDIIUUMM AACCCCEESSSS 
CCOONNTTRROOLL 
 MAC layer covers three functional areas: 
Reliable data delivery 
Access control 
Security
MMAACC FFRRAAMMEE FFOORRMMAATT 
2 2 6 6 6 2 6 0-2312 4 
Frame 
Control 
Duration 
ID 
Addr 1 Addr 2 Addr 3 Sequence Addr 4 
Control 
Frame CRC 
Body 
802.11 MAC Header 
Bits: 2 2 4 1 1 1 1 1 1 1 1 
Protocol 
Version Type SubType To 
DS 
Retry Pwr 
Mgt 
More 
Data 
WEP Order 
From More 
DS 
Frag 
Frame Control Field
MMAACC LLAAYYEERR FFRRAAMMEESS 
 Data Frames 
 Control Frames 
RTS,CTS,ACK and PS-POLL 
 Management Frames 
Authentication and De-Authentication 
Association, Re-Association, and Disassociation 
Beacon and Probe frames
IISS WWLLAANN SSEECCUURREE ?? 
The Parking Lot 
attack 
Man in the 
middle attack 
Freely available 
tools like Air 
Snort, WEP 
crack to snoop 
into a WLAN
PHYSICAL MMEEDDIIAA DDEEFFIINNEEDD BBYY 
OORRIIGGIINNAALL 880022..1111 SSTTAANNDDAARRDD 
 Frequency-hopping spread spectrum 
Operating in 2.4 GHz ISM band 
Lower cost, power consumption 
Most tolerant to signal interference 
 Direct-sequence spread spectrum 
Operating in 2.4 GHz ISM band 
Supports higher data rates 
More range than FH or IR physical layers 
 Infrared 
Lowest cost 
Lowest range compared to spread spectrum 
Doesn’t penetrate walls, so no eavesdropping
FREQUENCY HHOOPPPPIINNGG SSPPRREEAADD 
SSPPEECCTTRRUUMM 
 Signal is broadcast over seemingly random series of 
radio frequencies 
 Signal hops from frequency to frequency at fixed 
intervals 
 Receiver, hopping between frequencies in 
synchronization with transmitter, picks up message 
 Advantages 
Efficient utilization of available bandwidth 
Eavesdropper hear only unintelligible blips 
Attempts to jam signal on one frequency succeed only at 
knocking out a few bits
DIRECT SSEEQQUUEENNCCEE SSPPRREEAADD 
SSPPEECCTTRRUUMM 
 Each bit in original signal is represented by 
multiple bits in the transmitted signal 
 Spreading code spreads signal across a 
wider frequency band 
 DSSS is the only physical layer specified for 
the 802.11b specification 
802.11a and 802.11b differ in use of chipping 
method 
802.11a uses 11-bit barker chip 
802.11b uses 8-bit complimentary code keying 
(CCK) algorithm
IEEE 880022..1111AA AANNDD IIEEEEEE 
880022..1111BB 
 IEEE 802.11a – limited data rate 
Makes use of 5-GHz band 
Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps 
Uses orthogonal frequency division multiplexing (OFDM) 
 IEEE 802.11b 
802.11b operates in 2.4 GHz band 
Provides data rates of 5.5 and 11 Mbps 
Complementary code keying (CCK) modulation scheme. 
Multiple carrier signals at different frequency sending some of the 
bits on each channel.
IEEE 802.11 standards : 
IEEE 802.11 a 
Multipath Effect(Multipath Fading) 
is simply a term used to describe the multiple 
Paths the radio wave may follow between 
transmitter and receiver
IEEE 802.11 standards : 
IEEE 802.11 a 
Orthogonal Frequency Division Multiplexing(OFDM) 
OFDM a digital multi-carrier modulation method. A large 
number of closely-spaced orthogonal sub-carriers are used to 
carry data. 
Although the principles and some of the benefits have 
been known since the 1960s, OFDM is popular for 
wideband communications today by way of low-cost digital 
signal processing components that can efficiently calculate 
the FFT.
IEEE 802.11 standards : 
IEEE 802.11 a 
Frequency = 5 GHz 
Maximum Speed = 54 Mbps 
Range = about 35 meters(Varies) 
Encoding Scheme = OFDM
IEEE 802.11 standards : 
IEEE 802.11 b 
Frequency = 2.4 GHz (ISM band) 
Maximum Speed =11 Mbps 
Range = about 38meters(Varies) 
Encoding Scheme = DSSS 
Modulation Technique= BPSK(1 Mbps), 
DQPSK(2 Mbps), CCK(5.5 Mbps,11Mbps)
FFUUTTUURREE OOFF WWLLAANN 
WLANs move to maturity 
Higher Speeds 
Improved Security 
Seamless end-to-end protocols 
Better Error control 
Long distances 
New vendors 
Better interoperability 
Global networking

Mais conteúdo relacionado

Mais procurados

Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
stuimrozsm
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
Kaushal Kabra
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
abdulquyyum
 

Mais procurados (20)

LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
SS7
SS7SS7
SS7
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Dsss final
Dsss finalDsss final
Dsss final
 
WiMAX
WiMAXWiMAX
WiMAX
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Millimeter Waves (mmWaves)
Millimeter Waves (mmWaves)Millimeter Waves (mmWaves)
Millimeter Waves (mmWaves)
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communications
 

Destaque

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

Destaque (20)

IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Lect3
Lect3Lect3
Lect3
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
token bus
 token bus token bus
token bus
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Token bus standard
Token bus standardToken bus standard
Token bus standard
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Token bus
Token busToken bus
Token bus
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 

Semelhante a Ieee 802.11 wireless lan

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
pmuthumca51
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
Darpan Patel
 

Semelhante a Ieee 802.11 wireless lan (20)

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Darsh
DarshDarsh
Darsh
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wlan 2
Wlan 2Wlan 2
Wlan 2
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
Seminar
SeminarSeminar
Seminar
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
 
J010216776
J010216776J010216776
J010216776
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Unit 3
Unit 3Unit 3
Unit 3
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 

Mais de Parthipan Parthi (20)

Inheritance
Inheritance Inheritance
Inheritance
 
Switch statement mcq
Switch statement  mcqSwitch statement  mcq
Switch statement mcq
 
Oprerator overloading
Oprerator overloadingOprerator overloading
Oprerator overloading
 
802.11 mac
802.11 mac802.11 mac
802.11 mac
 
Computer network
Computer networkComputer network
Computer network
 
Session 6
Session 6Session 6
Session 6
 
Queuing analysis
Queuing analysisQueuing analysis
Queuing analysis
 
WAP
WAPWAP
WAP
 
Alternative metrics
Alternative metricsAlternative metrics
Alternative metrics
 
Ethernet
EthernetEthernet
Ethernet
 
Data structures1
Data structures1Data structures1
Data structures1
 
Data structures 4
Data structures 4Data structures 4
Data structures 4
 
Data structures2
Data structures2Data structures2
Data structures2
 
Data structures 3
Data structures 3Data structures 3
Data structures 3
 
Input output streams
Input output streamsInput output streams
Input output streams
 
Io stream
Io streamIo stream
Io stream
 
Dbms lab questions
Dbms lab questionsDbms lab questions
Dbms lab questions
 
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
 
New syllabus combined_civil_services
New syllabus combined_civil_servicesNew syllabus combined_civil_services
New syllabus combined_civil_services
 
Pspice
PspicePspice
Pspice
 

Último

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Ieee 802.11 wireless lan

  • 1. IIEEEEEE 880022..1111 WWIIRREELLEESSSS LLAANN V.Par thipan Assistant Professor ,Saveetha University
  • 2.  LANs provide connectivity for interconnecting computing resources at the local levels of an organization  Wired LANs Limitations because of physical, hard-wired infrastructure  Wireless LANs provide Flexibility Portability Mobility Ease of Installation
  • 3.  In response to lacking standards, IEEE developed the first internationally recognized wireless LAN standard – IEEE 802.11  IEEE published 802.11 in 1997, after seven years of work  Most prominent specification for WLANs  Scope of IEEE 802.11 is limited to Physical and Data Link Layers.
  • 4.  Appliance Interoperability  Fast Product Development  Stable Future Migration  Price Reductions  The 802.11 standard takes into account the following significant differences between wireless and wired LANs: Power Management Security Bandwidth
  • 5. IEEE 802.3 Carrier Sense IEEE 802.4 Token Bus IEEE 802.5 Token Ring IEEE 802.11 Wireless IEEE 802.2 Logical Link Control (LLC) PHY OSI Layer 1 (Physical) Mac OSI Layer 2 (Data Link)
  • 6.  Medical Professionals  Education  Temporary Situations  Airlines  Security Staff  Emergency Centers
  • 7.  In historical building and small office where cabling is not economical.  Supports nomadic access by providing a wireless link between a LAN hub and mobile data terminal with an antenna.  Creation of an adhoc n/ws. i.e peer to peer network with no centralized server that is set up temporarily to meet some immediate need.
  • 8. CM 10 Mbps Ethernet switch UM Bridge Or Router Server 100 Mbps Ethernet switch Server
  • 9.  Mostly a wireless Lan will be linked into a wired LAN. This is called LAN Extension.  Control Module is wireless LAN acts as an interface to a wired LAN  If all wireless end systems are within the range of a single control module, then it is called single cell wireless LAN.  If multiple control Module are present ,then it is multiple cell wireless LAN.  CM- control module uses polling or token passing scheme to regulate access from end systems.  Hubs or user module(UM), that control number of stations directly without a wired LAN, can also be a part of wireless LAN
  • 10.  Wireless LAN requirement:-  throughput – should provide high capacity.  Number of nodes –should support many data.  Connectivity of backbone LAN.  Battery power consumption- use battery powered workstations , so when not using n/w, can be set to sleep mode to reduce power consumption.  Transmission robustness and security: Highly interference prone should provide reliable transfer.  coallocated network operation –Wireless LAN operating in same area may face interference.  License free operation – should provide wireless products without license for frequency based used.  Hand off (or) Roaming – mobile station can move from cell to another.  Dynamic configuration: automated addition or relocation of end systems without disruption to others.
  • 13.  Access point (AP): A station that provides access to the DS.  Basic service set (BSS): A set of stations controlled by a single AP.  Distribution system (DS): A system used to interconnect a set of BSSs to create an ESS. DS is implementation-independent. It can be a wired 802.3 Ethernet LAN, 802.4 token bus, 802.5 token ring or another 802.11 medium.  Extended service set (ESS):Two or more BSS interconnected by DS  Portal: Logical entity where 802.11 network integrates with a non 802.11 network.
  • 14.  Distribution service (DS) Used to exchange MAC frames from station in one BSS to station in another BSS  Integration service Transfer of data between station on IEEE 802.11 LAN and station on integrated IEEE 802.x LAN
  • 15.  Association Establishes initial association between station and AP. Each station must send its identify to all others through AP  Re-association Enables transfer of association from one AP to another, allowing station to move from one BSS to another  Disassociation Association termination notice from station or AP
  • 17.  Authentication Establishes identity of stations to each other  De-authentication Invoked when existing authentication is terminated  Privacy Prevents message contents from being read by unintended recipient.
  • 18. IEEE 802.11 MMEEDDIIUUMM AACCCCEESSSS CCOONNTTRROOLL  MAC layer covers three functional areas: Reliable data delivery Access control Security
  • 19. MMAACC FFRRAAMMEE FFOORRMMAATT 2 2 6 6 6 2 6 0-2312 4 Frame Control Duration ID Addr 1 Addr 2 Addr 3 Sequence Addr 4 Control Frame CRC Body 802.11 MAC Header Bits: 2 2 4 1 1 1 1 1 1 1 1 Protocol Version Type SubType To DS Retry Pwr Mgt More Data WEP Order From More DS Frag Frame Control Field
  • 20. MMAACC LLAAYYEERR FFRRAAMMEESS  Data Frames  Control Frames RTS,CTS,ACK and PS-POLL  Management Frames Authentication and De-Authentication Association, Re-Association, and Disassociation Beacon and Probe frames
  • 21. IISS WWLLAANN SSEECCUURREE ?? The Parking Lot attack Man in the middle attack Freely available tools like Air Snort, WEP crack to snoop into a WLAN
  • 22. PHYSICAL MMEEDDIIAA DDEEFFIINNEEDD BBYY OORRIIGGIINNAALL 880022..1111 SSTTAANNDDAARRDD  Frequency-hopping spread spectrum Operating in 2.4 GHz ISM band Lower cost, power consumption Most tolerant to signal interference  Direct-sequence spread spectrum Operating in 2.4 GHz ISM band Supports higher data rates More range than FH or IR physical layers  Infrared Lowest cost Lowest range compared to spread spectrum Doesn’t penetrate walls, so no eavesdropping
  • 23. FREQUENCY HHOOPPPPIINNGG SSPPRREEAADD SSPPEECCTTRRUUMM  Signal is broadcast over seemingly random series of radio frequencies  Signal hops from frequency to frequency at fixed intervals  Receiver, hopping between frequencies in synchronization with transmitter, picks up message  Advantages Efficient utilization of available bandwidth Eavesdropper hear only unintelligible blips Attempts to jam signal on one frequency succeed only at knocking out a few bits
  • 24. DIRECT SSEEQQUUEENNCCEE SSPPRREEAADD SSPPEECCTTRRUUMM  Each bit in original signal is represented by multiple bits in the transmitted signal  Spreading code spreads signal across a wider frequency band  DSSS is the only physical layer specified for the 802.11b specification 802.11a and 802.11b differ in use of chipping method 802.11a uses 11-bit barker chip 802.11b uses 8-bit complimentary code keying (CCK) algorithm
  • 25. IEEE 880022..1111AA AANNDD IIEEEEEE 880022..1111BB  IEEE 802.11a – limited data rate Makes use of 5-GHz band Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps Uses orthogonal frequency division multiplexing (OFDM)  IEEE 802.11b 802.11b operates in 2.4 GHz band Provides data rates of 5.5 and 11 Mbps Complementary code keying (CCK) modulation scheme. Multiple carrier signals at different frequency sending some of the bits on each channel.
  • 26. IEEE 802.11 standards : IEEE 802.11 a Multipath Effect(Multipath Fading) is simply a term used to describe the multiple Paths the radio wave may follow between transmitter and receiver
  • 27. IEEE 802.11 standards : IEEE 802.11 a Orthogonal Frequency Division Multiplexing(OFDM) OFDM a digital multi-carrier modulation method. A large number of closely-spaced orthogonal sub-carriers are used to carry data. Although the principles and some of the benefits have been known since the 1960s, OFDM is popular for wideband communications today by way of low-cost digital signal processing components that can efficiently calculate the FFT.
  • 28. IEEE 802.11 standards : IEEE 802.11 a Frequency = 5 GHz Maximum Speed = 54 Mbps Range = about 35 meters(Varies) Encoding Scheme = OFDM
  • 29. IEEE 802.11 standards : IEEE 802.11 b Frequency = 2.4 GHz (ISM band) Maximum Speed =11 Mbps Range = about 38meters(Varies) Encoding Scheme = DSSS Modulation Technique= BPSK(1 Mbps), DQPSK(2 Mbps), CCK(5.5 Mbps,11Mbps)
  • 30. FFUUTTUURREE OOFF WWLLAANN WLANs move to maturity Higher Speeds Improved Security Seamless end-to-end protocols Better Error control Long distances New vendors Better interoperability Global networking