当前位置:网站首页>5、 Wireless communication network
5、 Wireless communication network
2022-07-29 06:38:00 【Burning clouds fly up】
WLAN Basics
2G 3G
Move GSM TD-SCDMA Independent research and development
Unicom GSM WCDMA
telecom CDMA CDMA2000
802.11 802.11b 802.11a 802.11g 802.11n
Working frequency band 2.4GHZ 2.4GHZ 5.8GHZ 2,4GHZ 2.4GHZ、5.8GHZ
Non overlapping channel 3 3 5 3 3+5
Maximum transmission rate 2Mbps 11 54 54 300(MIMO 600)
WLAN Network classification
Infrastructure networks : Wireless access point AP( Working in OSI Model Data link layer )
Ad Hoc

Not in IEEE802.11 What is used in WLAN is CDMA.
WLAN Spectrum Introduction
ISM Frequency band
Industry 900M Science 2.4G Medical 5.8G
2.4G Frequency band 13 Channels ,3 Non overlapping channels (1,6,11)
5.8G Frequency band 12 Channels ,5 Non overlapping channels ( At home 149,153,157,161,165)
802.11 MAC layer
802.11 The standard for the MAC The sublayer defines three access control mechanisms :
1、CSMA/CA Distributed coordination
Wired CSMA/CD Collision detection , Wireless conflict avoidance , because Hide nodes problem .
2、RST/CTS Channel reservation
3、PCF Point coordination function
802.11 Three inter frame intervals
IFS Distributed coordination IFS The lowest priority Asynchronous frame contention access
PIFS A little coordination IFS Priority centered PCF operation
SIFS short IFS The highest priority ACK/ The reply
Move AD Hoc The Internet
MANET
Network topology changes , Not applicable to traditional routing protocols
Every node It is the host , It is also a router , No central node
Limited energy
WLAN Security
1、SSID Access control : hide SSID
2、 Physical address filtering : Wireless router settings MAC Black and white list of addresses
3、WEP Authentication and encryption :PSK Preshared key authentication ,RC4 encryption
4、WPA(802.11i The draft )
authentication :IEEE802.1X( user name + password )
For users connected to switch ports / equipment MAC Address authentication
encryption :RC4( enhance )+TKIP( Temporary key integrity protocol , Dynamically change the key )
5、WPA2(802.11i)
encryption : be based on AES Of CCMP and TKIP
边栏推荐
猜你喜欢
随机推荐
虹科 | 使用JESD204串行接口高速桥接模拟和数字世界
四、 局域网和城域网
Common server faults and their solutions
Merkle Tree 存在性功能第一次修改
虹科分享 | 带您全面认识“CAN总线错误”(一)——CAN总线错误与错误帧
IGMP protocol software development experiment
Scanbasepackages scanning range configuration
Merkle tree existential function modified for the first time
How to pre circumvent the vulnerabilities of unsafe third-party components?
使用STP生成树协议解决网络中的二层环路问题
Arrays&Object&System&Math&Random&包装类
Navicat for Oracle Cannot create oci environment
What if the 80443 port of the website server has been maliciously attacked?
day10_ Exception handling & enumeration
Those vulnerability attacks on app
网络安全学习(二)
2022 summer second day information competition learning achievement sharing 2
[leetcode skimming] array 1 - double pointer
Multithreaded server programming
unsigned right shift







![[leetcode skimming] array 1 - double pointer](/img/c3/a671395e20fad58f1c7f6abc6e1a39.png)

