pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

IEEE 802.11 – The new standard

The Institute of Electrical and Electronics Engineers (IEEE) ratified the original 802.11 specification in 1997 as the standard for WLANs. That version of 802.11 provided for 1 Mbit/s and 2 Mbit/s data rates and a set of fundamental signalling methods and other services. The data rates supported by the original 802.11 standard were too slow to support most general business requirements with and did little to encourage the adoption of WLANs. Recognising the critical need to support higher data-transmission rates, the autumn of 1999 saw the IEEE ratify the 802.11b standard (also known as 802.11 High Rate) for transmissions of up to 11 Mbit/s.

802.11 defines two pieces of equipment, a wireless station, which is usually a PC equipped with a wireless network interface card (NIC), and an access point (AP), which acts as a bridge between the wireless and wired networks. An access point usually consists of a radio, a wired network interface (such as IEEE 802.3), and bridging software conforming to the 802.1d bridging standard. The access point acts as the base station for the wireless network, aggregating access for multiple wireless stations onto the wired network. Wireless end stations can be 802.11 PC Card, PCI, or ISA NICs, or embedded solutions in non-PC clients (such as an 802.11-based telephone handset).

The 802.11 standard defines two modes: infrastructure mode and ad hoc mode. In infrastructure mode, the wireless network consists of at least one access point connected to the wired network infrastructure and a set of wireless end stations. This configuration is called a Basic Service Set (BSS). An Extended Service Set (ESS) is a set of two or more BSSs forming a single subnetwork. Since most corporate WLANs require access to the wired LAN for services (file servers, printers, Internet links) they will operate in infrastructure mode.

IEEE

Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.11 wireless stations that communicate directly with one another without using an access point or any connection to a wired network. This mode is useful for quickly and easily setting up a wireless network anywhere that a wireless infrastructure does not exist or is not required for services, such as a hotel room, convention centre, or airport, or where access to the wired network is barred (such as for consultants at a client site).

The three physical layers originally defined in 802.11 included two spread-spectrum radio techniques and a diffuse infrared specification. The radio-based standards operate within the 2.4 GHz ISM band. These frequency bands are recognised by international regulatory agencies, such as the FCC (USA), ETSI (Europe), and the MKK (Japan) for unlicensed radio operations. As such, 802.11-based products do not require user licensing or special training. Spread-spectrum techniques, in addition to satisfying regulatory requirements, increase reliability, boost throughput, and allow many unrelated products to share the spectrum without explicit co-operation and with minimal interference.

The original 802.11 wireless standard defines data rates of 1 Mbit/s and 2 Mbit/s via radio waves using two different – mutually incompatible – spread spectrum transmission methods for the physical layer:

  • With Frequency Hopping Spread Spectrum (FHSS), a transmitting and receiving station are synchronised to hop from channel to channel in a predetermined pseudorandom sequence. The prearranged hop sequence is known only to the transmitting and receiving station. In the U.S. and Europe, IEEE 802.11 specifies 79 channels and 78 different hop sequences. If one channel is jammed or noisy, the data is simply retransmitted when the transceiver hops to a clear channel.
  • Under Direct Sequence Spread Spectrum (DSSS), each bit to be transmitted is encoded with a redundant pattern called a chip, and the encoded bits are spread across the entire available frequency band. The chipping code used in a transmission is known only to the sending and receiving stations, making it difficult for an intruder to intercept and decipher wireless data encoded in this manner. The redundant pattern also makes it possible to recover data without retransmitting it if one or more bits are damaged or lost during transmission. DSSS is used in 802.11b networks.

At the OSI data link layer 802.11 uses a slightly modified version of the CSMA/CD protocol known as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) or the Distributed Co-ordination Function (DCF). CSMA/CA attempts to avoid collisions by using explicit packet acknowledgement (ACK), which means an ACK packet is sent by the receiving station to confirm that the data packet arrived intact.

It works as follows. A station wishing to transmit senses the air, and, if no activity is detected, the station waits an additional, randomly selected period of time and then transmits if the medium is still free. If the packet is received intact, the receiving station issues an ACK frame that, once successfully received by the sender, completes the process. If the ACK frame is not detected by the sending station, either because the original data packet was not received intact or the ACK was not received intact, a collision is assumed to have occurred and the data packet is transmitted again after waiting another random amount of time.

CSMA/CA thus provides a way of sharing access over the air. This explicit ACK mechanism also handles interference and other radio-related problems very effectively. However, it does add some overhead to 802.11 that 802.3 does not have, so that an 802.11 LAN will always have slower performance than an equivalent Ethernet LAN.

Filed Under: Networking

Latest Articles

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, cross-chain trading has emerged as a game-changing trend that is shaping the future of crypto investing. It’s believed that cross-chain trading is poised to … [Read More...]

How Long Does It Take to Hire Vue Developers?

Businesses spend a lot of time and money on the hiring process; this is especially true when it comes to hiring Vue developers. About 90-95% of companies underestimate how long it really takes to hire a new employee. But only some of them understand how much money is required and how to hire Vue … [Read More...]

WinXP Installation Tuning

The final task is to fine-tune your Windows installation, especially if you elected to Install the most common components during the course of the installation. You can do this by clicking Start > Settings > Control Panel > Add/Remove Programs and then selecting the Add/Remove Windows … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

NetBurst – Pentium 4 7th generation x86 CPU microarchitecture

NetBurst is the name Intel gave to the new architecture that succeeded its P6 microarchitecture. The concept behind NetBurst was to improve the … [Read More...]

Case Study on a Spear Phishing Campaign from the Energy Secto

Earlier this week, we wrote an article on the threats of spear phishing. We thought we could drive the lesson home with a story about a spear phishing … [Read More...]

Colombia is Becoming a Major LATAM Software Producing Country

Over a two-day period in December, Cali hosted Softic 2019, an international software business conference organized by Fedesoft, Procolombia and the … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors