Sei sulla pagina 1di 30

Wireless Ethernet IEEE 802.

11
By Kanade D.G.

IEEE 802.11 Wireless LAN


Desktop with PCI 802.11 LAN card

Network connectivity to the legacy wired LAN

Access Point

Laptop with PCMCIA 802.11 LAN card

Provides network connectivity over wireless media

An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network
The AP is connected to wired network and is equipped with antenna to provide wireless connectivity

About Wireless LAN


Use specialized physical and data link protocols Integrate into existing networks through access points which provide a bridging function Provide Roaming Unique security considerations Specific interoperability requirements Require different hardware Performance differs from wired LANs.

IEEE 802.11 Wireless LAN


Range ( Distance between Access Point and WLAN client) depends on structural hindrances and RF gain of the antenna at the Access Point To service larger areas, multiple APs may be installed with a 20-30% overlap

A client is always associated with one AP and when the client moves closer to another AP, it associates with the new AP (Hand-Off)

Flavors of WLAN

The Wireless Local Area Network (WLAN) technology is defined by the IEEE 802.11 family of specifications. There are currently four specifications in the family: 802.11, 802.11a, 802.11b, 802.11g.

All four use the Ethernet protocol and CSMA/CA (carrier

sense multiple access with collision avoidance instead of CSMA/CD) for path sharing.

IEEE 802.11
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 Applies to wireless LANs Supports data rate 1 or 2 Mbps transmission Uses 2.4 GHz frequency band

Data transmission using frequency hopping spread spectrum (FHSS) or direct sequence spread spectrum (DSSS).

IEEE 802.11a
An extension to 802.11 that applies to wireless LANs. Provides up to 54 Mbps in the 5GHz UNII band.
(UNII-Unlicensed National Information Infrastructure)

This higher frequency compared to 802.11b shortens the range of 802.11a networks Incompatible with devices operating in 2.4GHz. 802.11a uses an orthogonal frequency division multiplexing (OFDM) encoding scheme rather than FHSS or DSSS. The 802.11a specification applies to wireless ATM systems and is used in access hubs.

IEEE 802.11a(continued)
Pros of 802.11a
Fast maximum speed Regulated frequencies prevent signal interference from other devices

Cons of 802.11a
Highest cost Shorter range signal that is more easily obstructed

IEEE 802.11b
IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. Also referred to as 802.11 High Rate or Wi-Fi
an extension to 802.11 that applies to wireless LANS

Supports 1,2,5.5,11 Mbps transmission in the 2.4 GHz band. 802.11b uses only DSSS. 802.11b is a modification of the original 802.11 standard, allowing wireless functionality comparable to Ethernet.

IEEE 802.11b(continued)
Pros of 802.11b
Lowest cost Signal range is good and not easily obstructed

Cons of 802.11b
Slowest maximum speed Home appliances may interfere on the unregulated frequency band

IEEE 802.11g
Released in 2002 and 2003 . 802.11g -- offers wireless transmission over relatively short distances. 802.11g attempts to combine the best of both 802.11a and 802.11b Supports data rate 20 54 Mbps in the 2.4 GHz band. 802.11g also uses the OFDM encoding scheme. Provides backward compatibility with 802.11b equipment

IEEE 802.11g(continued)
Pros of 802.11g
Fast maximum speed Signal range is good and not easily obstructed

Cons of 802.11g
Costs more than 802.11b Appliances may interfere on the unregulated signal frequency

Modulation Techniques
802.11- Phase-shift keying (PSK).

802.11b Complementary Code Keying (CCK) Allows higher data speeds.


Less susceptible to multipath- propagation.

802.11a and 802.11g orthogonal frequencydivision multiplexing (OFDM)


data speeds as high as 54 Mbps, but most commonly, communications takes place at 6 Mbps, 12 Mbps, or 24 Mbps.

Protocol layers
Physical Layer:
The wireless NIC takes frames of data from the link layer, scrambles the data in a predetermined way, then uses the modified data stream to modulate a radio carrier signal.

Data Link Layer:


Uses Carriers-Sense-Multiple-Access with Collision Avoidance (CSMA/CA).

CSMA/CA
CSMA/CA
DIFS Medium Busy SIFS Random Backoff Frame

DIFS

DIFS:-Distributed Inter Frame Space SIFS:- Short Inter Frame Space

CSMA/CA
Station wishing to transmit senses air. If no activity is detected the station waits additional , randomly selected period. Then transmits if the medium is still free. If the packet is received intact, the receiving station issues ACK frame to sender. If the sender receives ACK successfully procedure is completed. If not then packet will be retransmitted

Wireless LAN
Stations
All components that can connect into a wireless medium in a network are referred to as stations.
All stations are equipped with wireless network interface controllers (WNICs). Access points Clients

Basic service set BSS is a set of all stations that can communicate with each other. Independent BSS (also referred to as IBSS) Infrastructure BSS. Every BSS has an identification (ID) called the BSSID An independent BSS (IBSS) is an ad-hoc network that contains no access points An infrastructure can communicate with other stations not in the same basic service set by communicating through access points.

IBSS & Infrastructure BSS

Wireless LAN
Extended service set
An extended service set (ESS) is a set of connected BSSs. Access points in an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte

Distribution system
A distribution system (DS) connects access points in an extended service set. The concept of a DS can be used to increase network coverage through roaming between cells. DS can be wired or wireless.

Extended service set

Multiple Access with Collision Avoidance (MACA)


other node in senders range

sender RTS

receiver
CTS

other node in receivers range

data ACK

Before every data transmission Sender sends a Request to Send (RTS) frame containing the length of the transmission Receiver respond with a Clear to Send (CTS) frame Sender sends data Receiver sends an ACK; now another sender can send data When sender doesnt get a CTS back, it assumes collision

The 802.11 Protocol Stack Structure

MAC Frame Structure

Frame Control Format


Protocol Version - indicates the version of IEEE 802.11 standard. Type Frame type: Management, Control and Data. Subtype
Frame subtype: Eg:- Authentication frame, Deauthentication frame , Association request frame , Association response frame .

To DS - is set to 1 when the frame is sent to Distribution System (DS) From DS - is set to 1 when the frame is received from the Distribution System (DS)

Frame Control Format(continued)

MF- More Fragment is set to 1 when there are more fragments belonging to the same frame following the current fragment Retry indicates that this fragment is a retransmission of a previously transmitted fragment. (For receiver to recognize duplicate transmissions of frames) Pwr - Power Management indicates the power management mode that the station will be in after the transmission of the frame. More - More Data indicates that there are more frames buffered to this station

Frame Control Format(continued)

W - WEP indicates that the frame body is encrypted according to the WEP (wired equivalent privacy) algorithm. O - Order indicates that the frame is being sent using the Strictly-Ordered service class.

About MAC Frame.


2 Dur atio n

Duration/ID (ID) For data frames :-Duration of frame.

For Control Frames :- The associated identity of the transmitting station.

About MAC Frame.

6 Addre ss 4

Addre Addre Addre ss 1 ss 2 ss 3

Address fields (1-4) - contain up to 4 addresses ADDR1 :-Source Address ADDR2:- Destination Address ADDR3:-Receiving station Address ADDR4:-Transmitter address Dependent on the frame control field (the ToDS and FromDS bits).

About MAC Frame.


2 SEQ 0-2312 Data 2 CRC

Sequence Control - consists of fragment number and sequence number. It is used to represent the order of different fragments belonging to the same frame and to recognize packet duplications. Data - is information that is transmitted or received. CRC - contains a 32-bit Cyclic Redundancy Check (CRC).

Thank You

Potrebbero piacerti anche