




Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Summary about IEEE 802.11 MAC Packet Structure, Comparison, IEEE 802.11b, frequency, transmission power, Developments.
Typology: Study notes
1 / 8
This page cannot be seen from the preview
Don't miss anything!
1. Protocol version: (2 bits): indicates current protocol 2. Type : (2 bits): determine function of a frame, mgmt =00, control=01, data=10, reserved=11. 3. Subtype : (4 bits) :subtype of type field, eg:- association, beacon. 4. To DS / From DS : (1 bit each) for differentiating of transmission of frames among stations and access points. 5. More Fragments : (1 bits) : to remind (if) more frames are left. 6. Retry : (1 bit) : to indicate retransmitted frame. 7. Power Management : (1 bit) :indicates the mode (power-save mode) of station after successful transmission of a frame. 8. More data : (1 bit): to indicate that sender has more data to send than the current frame, use by an access point, station. 9. Wired Equivalent Privacy (WEP) (1 bit): indicate that the standard security mechanism of 802.11 is applied.
(^) frequency:
(^) transmission power:
(^) reach:
Comparison Parameters Standards 802. 802.11 802.11b 802.11a / h 802.11g Frequency band, GHz 2,4 (ISM-Band) 2,4 (ISM-Band) 5,1 2,4 (ISM-Band) Bit rate, MBit/s 1-11 11 54 54 Use field building, territory building, territory in the buildings building, territory Deployment End 1990 actually Since 2000 Since March 2003 Available Hardware Marketable NICs and APs Marketable NICs and APs Experimental operation Pre-standard Products Data security WEP 64/128/256 bit WEP 802.11i - security approaches for WLAN (encryption, authentication); WPA - WiFi Protected Access (competition with 802.11i) QoS for multimedia- transmission none none 802.11e (Ende 2003): use of QoS-approaches; realization of multimedia applications/ Voice over IP Problematic ^ low bit rate (^) low interoperability low bit rate National restrictions Pre-standard