WLAN. Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network).

Size: px
Start display at page:

Download "WLAN. Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network)."

Transcription

1 WLAN Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network). Our presentation is split into the following key areas. First I will give you a short introduction. Secondly we want to cover the IEEE Standard and its features. For Example we want to discuss the topics Topology, then the layer model of the IEEE Standard, of course the Security of a WLAN and in addition to this we want to show you an example for a WLAN and the adjustments, which are necessary. So let s turn to the first point Features. Features Let s focus on the advantages and disadvantages of a WLAN. First I want to consider the Advantages. The biggest advantage compared to a normal LAN is the comfortable flexibility within the range. The next advantage of a WLAN is that no cabling has to be done. Everytime a system has advantages also disadvantages appear. So let s consider the Disandvantages: An important fact is the low bitrate of this Network. Moreover the lack of security doesn t improve the use. Another disprofit is the limited frequency range because every country has its own frequency range the WLAN is used in. International agreements will be defined in future. The last disadvantage is the limited range. The range of a WLAN is about 30 to 60 meters. The next point is the Aim of an perfect WLAN: A WLAN should be designed transparent because it must be posssible that the Layers of a WLAN can work with the Layers of a normal LAN for example. Another need is that a WLAN should be applicable worldwide. As I said earlier before this depends on the international agreements for example for the frequency. This was a short introduction and I rather suggest moving on to the next point The IEEE Standard. IEEE Standard There are many different standards for example the IEEE for CSMA/CD- based networks, therefore there is also a standard for WLANs so called IEEE The Standard defines the Layer 2, the MAC- Layer, and the Layer 1, the Physical- Layer. For a better understanding I would like you to look at the slide show. Here you can see the main parts of the IEEE standard. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (1 von 9) :43:21

2 The MAC- Layer includes the medium access and the function of encoding data, which is very important when the air-interface is used. Another function of the MAC- Layer is the fragmentation (Fragmentierung) of oversized data packets. The procedure of fragmentation is used for the adaption of the packet size on the current error rate without affecting (beeinflussen) higher layers. The Physical- Layer is split into the PLCP, the Physical Layer Convergence Protocol, and the PMD, the Physical Medium Dependent. The function of the PLCP is the check of the channel condition (Kanalzustand) and it offers an interface which is independent from the medium. The PMD controls the actual coding of the data. Parallel to these layers there are management- layers. The MAC- Management controls the roaming, which is the change of different access points (Zugangspunkten), the synchronization of the system and moreover it controls the actual transfer state. The Physical- Management chooses the transfer channel. There is another management- layer the station management, which operates parallel to the other layers. The function of the Station Management is the coordination of all the layers. I think you have already got an impression about the IEEE Standard so let me recommend turning to the next topic the Topology. Network Topology There a two possible types of a WLAN the Ad-hoc- and the Infrastructure- Network. Ad-Hoc-Network: The mobile users communicate together directly. The Topology of such an Ad-hoc- Network is called Independent Basic Service Set (IBSS). Each Station is an own communication cell. Only within their range they can communicate. Basically Infrared or Bluetooth is used for the Ad-hoc Network because the use of IEEE in this content is more difficult than with the other two systems. Infrastructure-Network: The Infrastructure- Network provides the communication between a remote station (Endgerät) and an Access Point (Basisstation). The Topology of such an Infrastructure- Network with an Access Point is called Basic Service Set (BSS). If the range is too short, a second Access Point can extend the range. Ranges of 100 to 300 meters can be achieved. This Topology is called Extended Service Set (ESS). The Access Point also allows the communication with the wired LAN. If the Access Point is used in this way, it works like a bridge. The result is that the Access Point can filter protocolls which are not used. The next point is giving you a summary of the networks. I want to cover an example of a network, which includes everything I have mentioned before. Therefore, ma I draw your file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (2 von 9) :43:21

3 attention to the slideshow. Example: The Example shows a network with two Access Points, three remote stations and a connection to the wired network. A station (STA) is a terminal equipment with access functions to the WLAN and with a radio contact to the Access Point. An Access Point (AP) is a device which is integrated in the WLAN and in the Distribution System (DS). A DS connects the Access Points with each other and offers a connection to the wired LAN via a portal. The APs, the DS and the Portal have a bridge function as I said earlier before. A group of STAs which communicates over the same AP is called Basic Service Set (BSS). With the help of the DS a Extended Service Set (ESS) can be designed. Within this ESS dates can be transmitted transparent because the DS is working like a bridge and so the DS forwards the dates to the right receiver. In this content the receiver can be the Portal or one of these Access Points. Before becoming too specific with the Network topology let s turn to the next point The Physical Layer. Physical Layer Originally there are three alternatives in the IEEE Standard. Two radio based (funkbasiert) methods the FHSS and the DSSS and one not radio based, the Infrared method. The data rate is about one to two Mbit/s. Spread Spectrum A big problem concerning the radio transmission is, that frequency-independent Fading or narrowband disturbing signals can delete a certain narrowband part of a signal. Therefore a method is needed to avoid this deletion and this deletion is called spread spectrum (Bandspreizverfahren). The hidden agenda (Hintergedanke) is that a narrowband signal gets spread to a broadband signal and so other narrowband disturbing signal can t delete the signal. In this spread spectrum method the bandwidth R of a signla is getting spread to a bandwidth G. The bandwidth G can be up to times wider than the bandwidth R. There are two spread spectrum methods. So let s focus on the first one the FHSS. FHSS Frequency Hopping Spread Spectrum: The process of the FHSS is the continuous frequency hopping. The change of the file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (3 von 9) :43:21

4 frequency is done in a certain sequence. This sequence assures (sichern) that each transmitter has another frequency. This alternative is used in the older gadgets. The minimum of frequency hops is 2,5 hops per second. DSSS Direct Sequence Spread Spectrum: The other spread spectrum method is the DSSS. This alternative is used in the latest devices. The spreading is achieved with the logical connection of the signal with a casual numeric order (Zufallszahlenfolge). Moreover the code of the casual numeric order must have some special features. This code is the barker code. Now I will explain the procedure of the DSSS. 1.) In the first part you can see the normal signal which should be transmitted. 2.) The Signal gets spread by the use of the logical connection with this barker code. 3.) The next step is the transmission of the spread signal. During the transmission narrowband and broadband faults disturb the signal. 4.) The next picture shows the reversion of the spreading. With the help of the identic casual numeric order the spread signal becomes narrowband again and the faults become broadband. 5.) The last step is the filtering of the original narrowband signal. The next point is the MAC- Layer. My colleague Martin Schwarzbauer will continue with this very interesting topic. Please stay tuned. Good afternoon gentlemen. As Mister Eder has mentioned I am going to give you information about the MAC-Layer. So let s start: MAC-Layer The MAC-Layer provides us with two services and 3 media access methods, which can be used together. The services are: asynchronous data service: This service is standard. It allows us to send data packets on best-effort base. This means that you can compare it with the fixed network (Festnetz) and it supports multicast and broadcast. time limited data service: This service can be used optional and it gives us a time guarantee for de transmission of data. As an obligatory version of media access the CSMA/CA was defined. The media access is named DFWMAC (Distributed Foundation Wireless MAC) The three types of media access are: DFWMAC DCF with CSMA/CA: file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (4 von 9) :43:21

5 This type of media access is standard. To avoid collisions this version uses parallel to CDMS/CD a back-off mechanism and acknowledge-bits. I ll give you an exact description of this type later in my presentation. DFWMAC DCF with RTS/CTS:(request to send and clear to send) This type of media access avoids problems with hidden end devices. DFWMAC PCF: (Point Coordination Function) The access point asks every station if they want to send data, this is called polling. With this method can t appear collisions and the time limits could be kept. Only the access point differ about the order of the scan und he is the only which can send whenever he wants. Now let s focus on my next point the Prioritisation: How and when the communications are set to the medium says the priority. There is no guarantee that the prioritisation was accomplished. (soft priorities). There are 3 different waiting times and they say when you can access the free medium. These three types are: SIFS: Short Inter Frame Spacing This is the shortest waiting time and has consequently the highest priority. High priorities have acknowledge Bits and answers to a send request. PIFS: Point Coordination Function Inter Frame Spacing This is the middle priority. Middle priorities have questions to an access point in the PCFaccess mode. DIFS: Distributed Coordination Function Inter Frame Spacing DIFS have the longest waiting times and the lowest priority. Low priority data is an access request in the asynchronous data service. Now I want to tell you in detail how DFWMAC-DCF with CSMA/CA works: CSMA/CA can in contrast to CSMA/CD avoid collisions but it can t find or correct them. How does it work?: The station which wants to send data listens to the medium. When the medium is free for the period of a DIFS the station can send his data. But when the medium is busy the station has to wait a DIFS period and after this period the station delays the time with a random time and start the Back-off Timer. This random time is called back-off time. When another station accesses the medium during the back-off time the back-off timer is stopped. The back-off timer starts again when the medium is free again. When the back-off timer executes the station can put his data to the medium. Originaldokument enthält an dieser Stelle eine Grafik! Original document contains a graphic at this position! The receiver of the packets has to approve the reception with an acknowledge bit. When the file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (5 von 9) :43:21

6 sending station doesn t receive this acknowledge it start to transmit the packet again and again till he got the acknowledge or the maximum of the repeat-counter was reached. Originaldokument enthält an dieser Stelle eine Grafik! Original document contains a graphic at this position! Now let s focus on the frame format: In this slide you can see the general frame body of a MAC frame. The frame control contains the version, type detection and so on. The duration ID contains the sending time for this packet. The sequence control holds a consecutive number to detect multiple transmitted packets. After the data array follows a 32 bit long checksum in the CRC method. MAC packets can be sent between mobile stations and inside the DS (Distribution System) so you need up to four addresses in one packet. Address one is read from every station in the reception area. With this address the station can decide if the packet is for it or another station. The second address describes the physical transmitter, this is important to send an acknowledge back to the transmitter. Address three and four are for the logical assignment of packets. Now let me demonstrate you 4 examples. You can see them here on this slide: Example 1: the packet is sent between two mobile stations without DS. Transmitter and receiver addresses and the BSS identifier are required. (Ad-Hoc network) Example 2: a packet is sent from a transmitter over the DS to the receiver. The BSSID stands on the second place and the logic receiver address on the third place. Example 3: A mobile station sends the packet to the DS and the DS sends this packet to the receiver. On the first place stands the physical receiver address and the logical receiver address on the third place Example 4: Is packet is sent inside two DS. The first and the second address represent receiver and transmitter inside the DS an address 3 and 4 are the logical receiver and transmitter addresses. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (6 von 9) :43:21

7 MAC-Management The following function groups have been standardised: synchronisation: The job is to find networks, for standing there or to synchronize the internal clocks. The access point sends for this reason the so called beacon signal to every mobile station. This signal contains further management information. power management: The power management contains function which can influence the readiness of the receiver or the transmission power. When a mobile station is used in the battery mode it is important keep the stations only ready to receive when data would be sent. For this reason exists defined sleep-models when a station has to receive data. association / reassociation: After the connection of a mobile station with the access point a association is build. When you use roaming ( later in my presentation I will explain it to you what this means) the association has to be rebuild and this is called reassociation. management infortmation base (MIB) Every parameter about the actual state of the mobile station is managed in the MIB. As I have mentioned before I will tell you what Roaming is: Roaming: When a mobile station recognizes that the transmission quality is getting bad it tries to find another access point with a better quality. This is called roaming. In addition the mobile station scans the neighbourhood for a compatible access point. The access point could be identified by the beacon signal. Every mobile station can send an active proof und wait for answers, because every access point in the neighbourhood is able to answer. Now let s turn to one of the most important points the SECURITY: Security: Wired Equivalent Privacy, shortly named WEP, is part of the wireless LAN standard IEEE and it is a safety standard. It contains FHSS, DSSS and RC4 algorithm for encryption. The encryption is only 40 bit or 104 bit long so that the code is easy to decode, because the RC4 and the CRC are mathematically seen as unsafe. For this reason they developed WEPplus, WPA and Fast Packet Keying. The follower of the WEP is the new safety standard i. He has a higher security level und is now not to decrypt. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (7 von 9) :43:21

8 Another way to encrypt data is on the IP-Layer. For example by usage the IPsec or a VPN tunnel. Shortly I want to tell you a few things about WPA: WPA stands for Wi-Fi Protected Access an is an encryption method. WPA gives further safety because it uses dynamic keys which are based on a Temporal Key Integrity Protocol, called TKIP. WPA uses the key only for initialisation und after the initialisation a session key is used. There are two methods of the key management: Managed Key: The access identifier is managed on a central server Pre-Shared Keys When you use Pre-Shared Keys every user of the network uses the same password. When this password is to short or to easy to guess this is a point where WPA could be hacked. Finally I want you to tell shortly a few thing about SSID: SSID stands for service set identifier. SSID is nothing other than the network name of a wireless LAN based on the standard IEEE Every WLAN holds this SSID and it is free configurable and it is used to identify clearly the WLAN. The SSID is up to 32 Bits long and ii is set in the access point. The 32 Bits are added unencrypted in front of every packet. On every mobile station you can select SSID ANY and this means that every reachable access point should send an SSID broadcast so that the mobile station can choose which access should be used. Thank you Martin. My next point is the Extension of IEEE Standard. Extension of IEEE Standard As a result of the success of the IEEE Standard, new Standards were realised. Basically the aim was the improvement of the bitrate. I would like to give you a short overview of the extensions (Erweiterungen). On the slide show you can see a really short overview. You see the improvement of the bitrate. The bitrate of the IEEE Standard is about 2 Mbit/s. The first improvement realised a bitrate of 11 Mbit/s. And so on the bitrate climbed up to 54 Mbit/s at the IEEE a and g Standard. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (8 von 9) :43:21

9 Of course, there are many more extensions but covering of all the extension would blow up (sprengen) the presention. You will be able to read it in the summary which you get. Before coming to the last point of our presentation I will give you a short Confrontation between WLAN and other radio technologies. The Confrontation On this slide you can see different LAN- radio access techniques. The confrontation contains of course the WLAN, the Hiperlan, Bluetooth and many more. Particularly I want to cover the differences of WLAN and Bluetooth. In the first place it must be said, that WLAN has a higher bitrate as opposed to that of Bluetooth. Also the WLAN has a higher range. The only advantage of Bluetooth is the simpleness. Ad- hoc networks can be achieved easier than with WLAN. In my opinion WLAN is the better solution realising an ad-hoc network. In this content the 3G- mobile radio must be mentioned. With regard to WLAN the 3Gmobile radio system doesn t only contain the telephone part, with the help of this system also a communication between two or more computers can be achieved. But 3Gtechnology has a lower bitrate than the WLAN technology. So, to conclude, WLAN is really the best solution realising a wireless connection between two terminal equipments. An exact listing of the features of the WLAN and the UMTS is printed on the summary you will get. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (9 von 9) :43:21

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Characteristics of Wireless LANs

More information

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal WIRELESS LANS By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal Introduction Why wireless? World will become fully mobile Increase in wireless devices usage Wireless will succeed; integrates into many

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Internetwork Expert s CCNP Bootcamp Wireless LANs http:// WLANs Overview WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Upper layer protocols like IP/TCP/UDP/etc. are

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Internet Protocol Stack

Internet Protocol Stack Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing

More information

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions 4.4 IEEE 802.11 MAC Layer 4.4.1 Introduction 4.4.2 Medium Access Control 4.4.3 MAC Management 4.4.4 Extensions 4.4.3 802.11 - MAC management Synchronization try to find a LAN, try to stay within a LAN

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Chapter 4 WIRELESS LAN

Chapter 4 WIRELESS LAN Chapter 4 WIRELESS LAN Distributed Computing Group Mobile Computing Summer 2002 Overview Design goals Characteristics IEEE 802.11 Architecture Protocol PHY MAC Roaming Security a, b, d, etc. Short intermezzo

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change 802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -

More information

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department ACOE 422 Wireless Computer Networks WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department Resources: Mobile Communications, J. Schiller book slides

More information

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards Wireless LANs Characteristics 802.11 PHY MAC Roaming Standards Bluetooth 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller, FU-Berlin www.jochenschiller.de

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs EEC173B/ECS152C, Winter 2006 Wireless LANs Evolution of Technology & Standards IEEE 802.11 Design Choices Architecture & Protocols PHY layer MAC layer design Acknowledgment: Selected slides from Prof.

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard Wireless LANs Outline Benefits Applications Technologies Issues Configurations Overview of 802.11 Standard Dr. Michael S. Boykin Spring 02-2 Local Area Networks 2 Outline II MAC layer protocols PHY layer

More information

Internet Structure. network edge:

Internet Structure. network edge: Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Wireless LAN USB Super G 108 Mbit. Manual

Wireless LAN USB Super G 108 Mbit. Manual Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Enabling Technologies

Enabling Technologies Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Functions of physical layer:

Functions of physical layer: Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Mohammad Hossein Manshaei

Mohammad Hossein Manshaei Mohammad Hossein Manshaei manshaei@gmail.com Chapter 9: (secowinet.epfl.ch) operating principles of IEEE 802.11, detecting selfish behavior in hot spots, and selfish behavior in pure ad hoc networks 2

More information

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals Wireless LAN Unit 2: Wireless Fundamentals Wireless connections which technology? Areas covered: Basic radio parameters. This area covers the main type of wireless communications. IEEE 802.11b issues.

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information