EC8701 UNIT 1.pptxSAIJDXKASLJNDXIIIIIIIIIAEWOSNDC

KABLEESHWARANU 8 views 36 slides Sep 25, 2024
Slide 1
Slide 1 of 36
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36

About This Presentation

skajcnkejsufhdcnjzxknxjkcshhhhhhhhUID


Slide Content

ELEMENTS OF ADHOC WIRELESS NETWORK

The services offered by a typical IEEE 802.11 network can be broadly divided into two categories: AP services and STA services . The following are the AP services, which are provided by the DS: • Association: The identity of an STA and its address should be known to the AP before the STA can transmit or receive frames on the WLAN. This is done during association, and the information is used by the AP to facilitate routing of frames.

Reassociation : The established association is transferred from one AP to another using reassociation . This allows STAs to move from one BSS to another. • Disassociation: When an existing association is terminated, a notification is issued by the STA or the AP. This is called disassociation, and is done when nodes leave the BSS or when nodes shut down. • Distribution : Distribution takes care of routing frames. If the destination is in the same BSS, the frame is transmitted directly to the destination, otherwise the frame is sent via the DS. • Integration: To send frames through non-IEEE 802.11 networks, which may have different addressing schemes or frame formats, the integration service is invoked.

The following are the STA services, which are provided by every station, including APs : • Authentication: Authentication is done in order to establish the identity ofstations to each other. The authentication schemes range from relatively insecure handshaking to public-key encryption schemes. Deauthentication : Deauthentication is invoked to terminate existing authentication . • Privacy: The contents of messages may be encrypted (say, by using the WEP algorithm, which is explained later) to prevent eavesdroppers from reading the messages. • Data delivery: IEEE 802.11 naturally provides a way to transmit and receivedata . However, like Ethernet, the transmission is not guaranteed to be completely reliable.