0% found this document useful (0 votes)
26 views7 pages

IEEE Standards 802

The document discusses IEEE 802.11 standards which specify wireless LAN protocols. It describes the physical and MAC layers including functions like modulation, addressing, and medium access control. It also defines ad-hoc networks which connect nodes directly without an access point and infrastructure networks which connect devices through a central access point.

Uploaded by

Ritesh Tamang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views7 pages

IEEE Standards 802

The document discusses IEEE 802.11 standards which specify wireless LAN protocols. It describes the physical and MAC layers including functions like modulation, addressing, and medium access control. It also defines ad-hoc networks which connect nodes directly without an access point and infrastructure networks which connect devices through a central access point.

Uploaded by

Ritesh Tamang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1. IEEE Standards 802.

11, layers and


functions.

IEEE 802.11 is a part of the IEEE 802 set of local area


network(LAN) protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for
implementing wireless local area network (WLAN) WI-FI
computer communication in various frequencies, including
but not the limited to 2.4 GHz, 5 GHz, 6 GHz, 60 GHz
frequency bands.

They are the world’s most widely used wireless computer


networking standards, used in most home and office
networks to allow laptops, printers, and smartphones to
talk to each other and access the internet without
connecting wires. They are created and maintained by the
Institute of Electrical and Electronics Engineers (IEEE)
LAN/MAN Standards Committee (IEEE 802). The base

Sangita Adhikari
version of the standard was released in 1997, and has had
subsequent amendments. The standards and amendment is
officially revoked when it is incorporated in the latest
version of the standard, the corporate world tends to
market to the revisions because they concisely denote
capabilities of their products using the WI-FI brand. While
each amendment is officially revoked when it is
incorporated in the latest versions of the standard, the
corporate world tends to market to the revisions because
they concisely denote capabilities of their products. As a
result, in the marketplace, each revision tends to become
its own standard.

The protocols are typically used in conjunction with IEEE


802.2, and are designed to interwork seamlessly with
Ethernet, and are very often used to carry Internet Protocol
traffic.
Although IEEE 802.11 specification list channels that might
be used, the radio frequency spectrum availability allowed
varies significantly by regulatory domain.

Sangita Adhikari
PHYSICAL LAYER

The physical layer defines the means of transmitting


raw bits over a physical data link connecting network nodes.
The bit stream may be grouped into code words or symbols and
converted to a physical signal that is transmitted over
a transmission medium. The physical layer provides an
electrical, mechanical, and procedural interface to the
transmission medium. The shapes and properties of
the electrical connectors, the frequencies to broadcast on,
the line code to use and similar low-level parameters, are
specified by the physical layer.
The major functions and services performed by the
physical layer are:

 Bit-by-Bit
 Providing a standardized interface to a physical including
 Modulation
 Line coding
 Bit synchronization in synchronous serial communication
 Star stop spelling and flow control in asynchronous serial
communication
 Circuit switching
 Multiplexing
Sangita Adhikari
o Establishment and termination of circuit switched connections
 Carrier sense and collision detention utilized by some level 2 multiple
access method
 Equalization filtering, training sequences plus shaping and other signal
processing of physical signals
 Forward error correction for example bitwise convolutional coding
 Bit- interleaving and other channel coding
The physical layer is also concerned with:

 Bit rate
 Point to point, multipoint or point-multipoint line configuration
 Physical network topology for example bus ring mesh or star network
 Serial or parallel communication
 Simplex, half duplex or full duplex transmission mode
 Auto negotiation

MAC LAYER (Medium access control )

The Media Access Control Layer is one of two sublayers that


make up the Data Link Layer of the OSI model. The MAC layer is
responsible for moving data packets to and from one Network
Interface Card (NIC) to another across a shared channel.
See a breakdown of the seven OSI layers in the Quick Reference
section of Webopedia.
The MAC sublayer uses MAC protocols to ensure that signals sent
from different stations across the same channel don't collide.

Sangita Adhikari
Functions performed in the MAC sublayer

The primary functions performed by the MAC layer are:

 Frame delimiting and recognition


 Addressing of destination stations (both as individual stations and as
groups of stations)
 Conveyance of source-station addressing information
 Transparent data transfer of LLC PDUs, or of equivalent information in
the Ethernet sub layer
 Protection against errors, generally by means of generating and
checking frame check sequences
 Control of access to the physical transmission medium
In the case of Ethernet, according to 802.3-2002 section 4.1.4, the
functions required of a MAC are:

 receive/transmit normal frames


 half-duplex retransmission and back off functions
 append/check FCS (frame check sequence)
 inter frame gap enforcement
 discard malformed frames
 Prepend (tx)/remove(rx) preamble, SFD (star frame delimiter), and
padding
 half-duplex compatibility: append(tx)/remove(rx) MAC address

Sangita Adhikari
AD HOC NETWORK

Ad hoc network does not has any central access point. Every node is
connected to another node physically. It is a temporary network setup
generally for emergency purposes. This network lacks access point. In
this architecture communication is done directly between the nodes.
This type of network provides great flexibility. Also this type of network
is fit for smaller coverage area. Interference and noise easily hinder the
communication between the nodes. However, detecting an error is easy
in ad hoc network as compared to infrastructure network. Also
configuring and re installation is quite economical as well. These
networks do not need much maintenance. This network is costly for a
small coverage area. Also the transmission of information is not reliable
as compared to infrastructure network. But they are very useful for
emergency purposes like during flood, earthquakes etc. The
transmission is not very secure but offers good speed and serves the
requirement for communication in need.

Sangita Adhikari
INFRASTRUCTURE NETWORK
Infrastructured network is a wired network. All the stations are connected
to a fixed wired network. All the wireless devices are connected to a fixed
point known as Access Point(AP). AP is responsible for any type of
communication between the nodes. When any node wants to
communicate with any other node, the first node needs to communicate
with AP then Access Point will transfer its message to the other node. In
other words, we can say that infrastructure network has a central access
point for transmission of information. This type of network does not
provide flexibility. Also this type of architecture is fit for large coverage
area. However, interference and noise often acts as a barrier in
communication. This network also offers great complexity in the detection
and configuration of faults. Also re installation is costly and requires
periodically maintenance. It becomes costly as the distance increases to a
some extent. It is a permanent type of network used for reliable
communication.

Sangita Adhikari

You might also like