Tuesday, August 19, 2008

Network Architecture IEEE 802.11

After knowing architecture from protocol 802.11, we also need to comprehend standard of network architecture 802.11, released by IEEE. Before feebleness solution and make-up of security protocol 802.11.


  1. Basic Service Set (BSS)

  2. Configuration BSS minimize there are a Access-Point which in circuit to network of cable or internet. This Access-Point recognized also as managed network. Communication of among two stations, for example A and B, have to from station A to Former Access-Point later then Access-Point repeat to send data to B. To develop build a network with server of at this configuration, server placed at Access-Point and Other stations as client.

    Traffic Flow to operate for Basic Service Set (BSS) is the following:


  3. Independent Basic Service Set (IBSS)

  4. Configuration of Independent Basic Service Set (IBSS) known as by an independent configuration. Logically configuration IBSS loo like with network of cable peer-to-peer, where communications usher station earn conducted directly without existence of managed network. This type IBSS recognized also as ad-hoc network and generally for network wireless in finite by space and is not interfaced to by network of computer or broader internet.


  5. Extended Service Set (ESS)
  6. Extended Service Set (ESS) consisted of some Basic Service Set (BSS) what each other overlap and each having Access-Point. Access-Point one another attributed to by Distributed System (Ds). Distributed System (Ds) can in the form of cable and or wireless. So there is 2 kinds of Extended Service Set (ESS) such as at picture in the following is :

    1. Extended Service Set (ESS) by using cable to Distributed System
    2. Traffic flow to operate for Extended Service Set (ESS) by using cable to Distributed System is the following :


    3. Extended Service Set (ESS) by using wireless to Distributed System
    4. Traffic Flow to operate for Extended Service Set (ESS) by using wireless for Distributed System is the following:

Standar Layer Protocol 802

Before studying feebleness and make-up of security protocol 802.11, us have to know ahead construction layer of at protocol 802. Picture - 1 in the following is showing comparison layer of at protocol 802 model with OSI.



Function from physical layer is :

  • Encoding/decoding Signal

  • Transmission and receiver of Data beet

Function from Medium Access Control (MAC) layer is :

  • In transmission, including data into frame with address and as error detection

  • In Acceptance, cozening frame become data and address also as error detection

Function from Logical Link Control (LLC) layer is :

  • As link to higher layer and [do/conduct] control of stream and error (mistake)

Arsitektur protocol 802.1

Architecture Protocol 802.11 shown by such as picture two in the following is :

Fundamental function at Medium Access Control (MAC) layer 802.11adalah :

    • Data’s deliverer which reliable

    • Controller of Data Access

    • Security
Arsitektur Media Acces Control (MAC) Protocol 802.11

But of architecture Detail from frame Medium Access Control (MAC) 802.11 shown at picture three in the following is :



From frame MAC 802.11 above which need paid attention to by is function from frame control. Because from frame control of this is conducting the fundamental functions from MAC done inclusive of in the case of security.