Professional Documents
Culture Documents
WLAN
Advaotage
loMobility be avcilee toom any ocetion.
Îoternet copnectivity Can
aLow implementation Cot
ae easy to set up , elÏcate change ancl manage.
l3 In sallation Speeoi and Simpieity
The speed ot ingallation fast Sno cabling is eguied
Tt also si mplity the aschitectuoe of he netsosk
GNewosk eypango
Wiess tec hyalagy raches where cables cannot be aracheel
Sundaram FOR EDUCATIONAL USE
o WLAN -
+Disadantoges
uaity of Sevice !
WLAN oPfer lcwes quality c# setvices as Companed to
wied LAN Connection
Propietany sohionsi
Due to lack t standaclization many (ompanies agt cftesing
peoprie tany soions.
aRestoictions i
wLAN s ar bmited to lo power senders ond cestain
iense free toequenty bands
*he Hidden Tesmioal pssblem n WLAN:
DlThe wireless LANS hiclelen tesminl problem is
tansmissionpzobleno hat aisej when to oY mor stations
who ot o gonge of each oher tsansmi simfancously
ase
to a ommon otCeipient
toomawieless
fsom
ROhis occurs when a statiorn is vi_ible
a
od eqch other.
Sottyew
STA SIB
Rong c station
Range
statiosTA
LLe LL
Kor.) MAC 802.)) 3023 MAC 8023 MA
023 PHY $02.3 PHY
(a stalion
oragta
LLe
PLCP
PMAC Managerment
PHY Manaqemen
Pectocel architete o lEEE
802 |! stanard
FOR EDUCATIONAL USE
Sundaram
he hi_her layers (app heation TeP, (p) ct wsirelcs datda
node
wosks Same wid node. he uppes past of
ak Contal lyes e logicas Link condrolL) coves
ditfeences of themediumn
of he acess contro layers nedec
fox different media IEBE 8o2 I)|) standard only Covess the
IE BE 302
Specificetion physica layey and MAc layes
iPhysica layer
Tt is subdivideo (e psotocel
into physical layex cenvetgeo ce
LC) anc the physicl medium dependent sublayexIt PNp).
is kncen
PLCP Sublaes poovides Casries snse siqnad-
as cleas channel Assessment (cca).
lt lso provicles COmon PHY Service Acess Point SA).
This SAP independent oftansissjon technoleqy used.
2. MAL layex
asks pexfosmed are!
DMediuro acceSS
Fragraen ation f Ses cdata
ncyption
Manaqermcnt layer
Manase nment Layes an as Rllos!
EPNV imanageMen1
Station managem eol
) MA Managernentt
Supposts he assciadion anel e- asseciedion oPa station to
an accesS poit.Roaming bedween ofevent acesipoiots
Contools autheni caien mechanisms Encsyption
Syochroni 2ation ot a staion
a with rqaso to an access
pont
O
|Yoiwez
bl PHY
management to sar batdepouser
managemeot:
Channel tning
Physical MIB (Manag ement bfosm fion. Basc)
Maintenance
allPesfosmecl by ation managemers
Indesactien with both manage mcot ayer Réspon sib
fo addlitional hihes layess fupctiop Bke ontrol o! o
bojdaing ioteractio with distoibution Systerm io case e
access poiot ete
Q2tate the feaduocs of wiMAX coaw e expain asciteetue ct
WIMAX.
Intere
Care
wih
wiM ase
Saan
WIMA baje
Sati on
WIMAX
scale cscle iotee -opetabily
micoJae access
Tt is designed to proviole brood band iotesnet access
|foom fixec os mobile device Via antennas. t is h
last mile solution tor ire less btoadl bandl access.
t s an aHesnative to cable and psL (piital SubscoibessC
Line). Tt jsis Said that wiMAx JP CentÛc setyice
lpsovided Over wjce areo subscobex stations eEorsr
Communicate with base statons that
with connectel to
Core network
It is a geoal
good alts netie to fixecl binene petusorkg..
The avcbitetue ot the wMAX (ompsise o}
DCo hetuwosk;
H is the standaxcl intemet netsosk It provices te
plat Fosm fou the booaclband connectivity
BS Base Statioo)
Cell ste . ae the towers with
antennas equ'pped e
Featues of WIMAK
1t ses wieless ink withicoo ave ox
milbmete aves
Uses licensed spectsums
Simple stationary antenna s tovses mountel antennas
1t i Connection oented wide anea service
9 Suppssts bigh bard idth and hundeds of usexs pe
channel :
Range 3o miles
vai Tt is capabk provding bzoad band acess to remote
lacess
Vi) 1ake s uSe otof poiot to mtipint architectue.
ar
A4.10.4 Comparison between
MANET and VANET
Internet
Sink
Manager Node
Sensor nodes
Sensor field -
Vulnerable against Chopchop. Vulnerable against Chopchop. Vulnerable against DoS attacks due
Vulnerability Bittau's fragmentation and Ohigashi-Mori, WPA-PSK, to unprotected control frames and
DoS attacks including variety and Dos attacks. MAC spoofing
DoS attacks.
Deployment in Easy to deploy and configure WPA-2 requires complicated setup
terms of complexity with WPA enterprise.
foe Implementation of 48-bit
Replay attack No protection against replay proeicecounter
Implements:
protection attacks Fplay
repl datagrampacket number protects
against replay attack