802.11: Introduction Reference: “IEEE 802.11: moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.

Slides:



Advertisements
Similar presentations
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Network Technology CSE Network Technology CSE3020 Week 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Wireless LAN Presented By : Pooja Maheshwari Guided By : Dr Jerry Gao.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Network Architecture and Design Wireless & Mobile Systems IEEE WLAN.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
WLAN b a Johan Montelius
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 5 outline 5.1 Introduction and services
Wireless LAN Simulation - IEEE MAC Protocol
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
CSE 6590 Wireless LANs and IEEE MAC 15 October 2015.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Fundamentals of Computer Networks ECE 478/578
Lecture 24 Wireless Network Security
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
IEEE Wireless LAN Standard
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Wireless LAN.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Chapter 15 Wireless LANs.
Wireless MAC.
EA C451 (Internetworking Technologies)
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Chapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 15 Wireless LANs.
Protocol Details John Bellardo UCSD.
Wireless LAN Simulation IEEE MAC Protocol
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June 2001; Page(s): 17 –23 (802.11Intro-1.pdf) Chapter 4, sections 2-4, Wireless Communications and Networks, by William Stallings, Prentice Hall

Terminology

Architecture

Architecture (cont)

Services Implemented in every station Provided between BSS ( in an AP)

Services (cont) Association –Before a station can transmit or receive frames on a wireless LAN, it must make its identity and address known –To do so, it establishes an association with an access point –The access point can then communicate this information to other access points, which makes it easier to route and deliver addressed frames Disassociation –Makes it possible for either a station or an access point to notify other access points that an existing association is terminated

Services (cont) Authentication –Stations must use an authentication service to establish their identity with other stations –IEEE does not mandate any particular authentication scheme, which could be anything from relatively unsecure handshaking to public-key encryption –It does specify two authentication algorithms, which vendors can decide to include in their products  Open-system authentication  Shard-key authentication

Services (cont) Distribution –The primary service used by stations to exchange MAC frames when the frame must traverse the DS (Distribution System) to get from a station in one BSS to a station in another BSS Integration –Enables transfer of data between a station on an IEEE LAN an a station on an integrated IEEE 802.x LAN

Services (cont) Privacy –To ensure privacy, IEEE provides for the optional use of encryption by specifying a scheme based on the Wired Equivalent Privacy (WEP) algorithm –To provide both privacy and data integrity, the WEP algorithm uses an encryption scheme based on the RC4 encryption algorithm –The idea in RC4 is that two communicating parties must share a 40-bit key which encrypts and decrypts all frames –For much stronger protections, some vendors offer optional 128-bit encryption

Protocol Architecture

Protocol Architecture (cont)

12 IEEE MAC Logic

13 IEEE MAC Timing Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA)

14 SIFS (short inter-frame space) –The shortest IFS, used for all immediate response actions PIFS (point coordination function IFS) –A mid-length IFS, used by the centralized controller in the PCF scheme when issuing polls DIFS (distributed coordination function IFS) –The longest IFS, used as a minimum delay for asynchronous frames contending for access IEEE MAC Timing (cont)

15 SIFS is used for –Acknowledgment (ACK)  MAC-level ACK provides for efficient collision recovery –Clear to send (CTS)  Sender sends Request to Send (RTS) frame  If receiver is ready to receive, responds with a CTS frame  All other stations defer using the medium until they see a corresponding CTS, or timeout –Poll response  For PCF IEEE MAC Timing (cont)

16 IEEE MAC Timing (cont)

17 IEEE MAC Timing (cont)

18 IEEE MAC Timing (cont)

MAC Frame Format

Physical Layer Spec.

Physical Layer Spec. (cont)