Sunday, May 19, 2019

Wireless network management

The 802.11 protocol is defined for a wireless LAN (Local Area Network) and is based on a cellular architecture in which the network is divided into cells where separately cell (called a Basic help Cell (BSS)) is controlled by a base station called an Access Point (AP).The basic access tool implemented in the protocol is a Carrier Sence Multiple Access with Collision Avoidance (CSMA/CA). The CSMA protocol works as follows if a station wishes to transmit information through it network, it senses the median(a). In case the medium is busy (another station in the network is currently transmitting information) then the station will hinder its transmission requests to a later time. Otherwise, the medium is unacquainted(p) and the station is allowed to transmit the desired information.The problem with the CSMA protocol is the case where a collision occurs. A collision may occur if two different station sense the medium as free and begin to transmit information. For this purpose, we u se a collision evasion mechanism a station willing to transmit senses the medium. If the medium is busy, it defers its request.Otherwise, it sends an RTS (Request To Transmit) which includes the source, destination and the duration of the transaction. If the medium is free then the destination station will respond with a packet called CTS (Clear To Send) which will include the aforesaid(prenominal) duration information and once the source station receives this packet, it starts to transmit. The destination station checks the CRC (Cyclic Redundancy Check) and sends an acknowledgment package (ACK).Receiving the ACK informs the source station that no collision had occurred. If the source station does not receive the ACK it will delay resending the data or will throw it away after a given number of retransmissions.When a station wishes to join an existing BSS, it of necessity to receive synchronization information from the BSSs AP. First, the station needs to go through the APs auth entication process. During this process, the station and the AP exchange information proving to each other that each side is familiar with a specific password.

No comments:

Post a Comment