Computer Network Presentation
Computer Network Presentation
802.11
Frame format, Addressing
19-1-2024
2
12-1-2024
Group Members
Thanks For Joining Us
Muhammad Ibrahim
Hussyn
Moiz Ahmed
Asad Sohail
IBN-E-SHAHID SOHAIL
19-1-2024 3
Ethernet
• Invention by Bob Metcalfe (1973)
• Standardization (1983)
19-1-2024 4
Ethernet Cables
19-1-2024 5
Ethernet Cable Category Comparison
19-1-2024 6
Frame Processing in Ethernet
• Frame Structure
• Addressing
• Collision Handling
1. Carrier Sense and collision detection before and during data transmission.
19-1-2024 7
Frame Processing in Wi-Fi
• Frame Structure
1. Basic frame includes frame control, duration, address fields (RTA), sequence
control, frame body, frame check sequence (FCS).
• Frame Types
1. Management frames
2. Control frames
3. Data frames
19-1-2024 8
19-1-2024 9
Wi-Fi the
IEEE 802.11 Standard
• Wi-Fi Stands for Wireless Fidelity in
generic terms it refers to IEEE standard
for Wireless Local Area Network
(WLAN).
• It use radio frequency to transmit data
through the air.
• Concerned with the lower layers of OSI
model
1. Data Link Layer
2. Physical Layer
19-1-2024 10
Advantages
• Freedom - You can work from any
location
19-1-2024 11
Disadvantages
• Speed – Slower than cable
• Range – Affected by various medium
1. Best in open spaces
2. Reduces by walls and glass water
etc.
• Security – Greater exposure to risks
1. Unauthorized access
2. Denial of Service
19-1-2024 12
Evolution of IEEE 802.11 Standard
19-1-2024 13
Frames Format
• Process of wrapping data with certain info before sending out
• Frames are the units of digital transmission in computer network
• frames are comparable to the packets of energy called photons.
• Frames is a point-to-point connection between computer or devices
19-1-2024 14
Frame Structure
19-1-2024 15
Problems in Framing
• Detecting start of the frame – when a frame is
transmitted. Every station detects frames by
looking out sequence of bits it is known as
beginning of the frame i.e. (SFD) Start Frame
Delimiter.
• How station detect frame – every station
listens to link for SFD pattern through circuit if
SFD is detected it alerts station. Station check
address whether to accept or reject frame.
• Detecting end of frame – when to stop reding
the frame
19-1-2024 16
Problems in Framing
• Detecting end of frame – when to stop
reading the frame
1. Handling errors – framing errors occur due to
noise or other transmission errors. Which
can cause a station to misinterpret the frame
therefore error detection and correction
mechanism are used. Such as CRC (CRC) are
used to ensure the integrity of the frame.
19-1-2024 17
Coffe Break
Enjoy your 30’ pause!
19-1-2024 18
Framing Types
19-1-2024 19
Types of Frames
• Fixed size – The frame is of fixed • Variable size – In this, there is a
size and the length if the frame need to define the end of the
itself acts as a delimiter. frame as well as beginning of the
next frame to distinguish.
• There is no need to provide
boundaries to the frame. This can be done in two ways
Length Field: it is used to indicate
• Drawback – if the data size is
the length of the frame
less than frame size then the
solution is Padding End Delimiter (ED): it is used to
indicate the end of the frame. Used
in the token ring
19-1-2024 20
FRAME CHECK SEQUENCE
• Error detection – The sender calculates a mathematical value
based on the content of the frame using Cyclic Redundancy
Check (CRC) algorithm
• Transmission – The frame including the FCS, is transmitted to
the destination device.
• Reception – The receiving device also check the FCS using Cyclic
Redundancy Check (CRC) algorithm
• Error Detection – If calculated FCS matches the received FCS. It
indicated that the frame has been transmitted without errors.
19-1-2024 21
Variations in Frame Format
1. Ethernet Standards:
19-1-2024 23
Standard 802.11 frame format
19-1-2024 25
MAC Addressing
MAC (Media Access Control) addressing refers to the assignment and usage of MAC
addresses, which are unique identifiers assigned to network interfaces. MAC
addresses play a crucial role at the data link layer (Layer 2) of the OSI model.
Source and destination Address in addressing
1. Source Address:
•The source address is the MAC address of the device that initiates the transmission of data. When
a device sends a frame, it includes its own MAC address in the source address field of the frame
header.
•Example:
• If Device A is sending a frame, its MAC address will be placed in the source address field.
2. Destination Address:
•The destination address is the MAC address of the device to which the data frame is intended. The
destination address is placed in the frame header's destination address field.
•Example:
• If Device B is the intended recipient, its MAC address will be placed in the destination
address field.
Broadcast and Multicast
Addressing
• Broadcast:
• Broadcast communication involves sending data to all devices in a network segment.
It is a one-to-all communication method. In Ethernet, the broadcast MAC address has
all bits set to 1 (FF:FF:FF:FF:FF:FF).
• ARP (Address Resolution Protocol) uses broadcast to discover the MAC address
associated with a given IP address.
• Multicast:
• Multicast communication involves sending data to a specific group of devices within
a network. It is a one-to-many communication method.
• A multicast MAC address is used for this type of communication.
• Multicast is often employed for scenarios where data needs to be delivered to a
subset of device.
28
•IP (Internet Protocol) addressing is a
IP fundamental concept in networking that
involves assigning unique numerical labels to
addressing devices participating in a computer network.
•IPv4 vs. IPv6:
•IPv4 (Internet Protocol version 4): Utilizes a
32-bit address scheme, resulting in
approximately 4.3 billion unique addresses.
•IPv6 (Internet Protocol version 6):
Introduces a 128-bit address scheme,
providing an exponentially larger hub of
unique addresses
19-1-2024 29
Subnetting
It is a process in IP
Purpose to
addressing that
enhance network
involves dividing a
efficiency,
larger IP network
improve security
into smaller, more
and optimize the
manageable sub-
allocation of IP
networks or
Addresses
subnets.
19-1-2024 32
Advantages of Subnetting
1.Enhanced Security:
• By logically dividing a network into
subnets, administrators can implement
security measures more effectively.
2. Broadcast Address:
3. Multicast Address:
19-1-2024 34
IEEE 802.11 (Wi-Fi) Addressing:
19-1-2024 36
Security Consideration in Addressing
Address Exhaustion:
1. Issue: exhaustion of available IP addresses may occur due to insufficient address allocation.
2. Security Measure: properly manage IP address allocation, consider the use of IPv6 to limit
address exhaustion
Address Privacy:
1. Issue: Exposure of device details through addressing may raise privacy concerns.
2. Security Measure: Utilize technologies like Network Address Translation (NAT) to conceal
internal IP addresses from external networks.
The frame format, a key aspect of this standard, defines the structure of
data packets, ensuring efficient and reliable transmission of information.
19-1-2024 38
"I have not failed. I’ve just found 10,000
ways that won’t work."
Thomas Edison
19-1-2024 39
[email protected]
https://www.showeet.com/
Thank You!
Do you have any questions?
Credits & Copyrights
Copyrights:
Text Source : • Free with Attribution
• https://www.wikipedia.org • Cannot be resold or
/
redistributed under any
• https://www.cisco.com/
circumstances
• https://chat.openai.com/ • Cf.
• https://www.javatpoint.co https://www.showeet.com
m/ /terms-of-use/
• https://www.wikipedia.org
/ • Template Credits:
19-1-2024 https://www.showeet.com 41
/
THANK YOU !
Hope you like this :)
Made with by