Last Updated 27 Jul 2020

Wireless network management

Words 349 (2 pages)
Views 19

The 802.11 protocol is defined for a wireless LAN (Local Area Network) and is based on a cellular architecture in which the network is divided into cells where each cell (called a Basic Service Cell (BSS)) is controlled by a base station called an Access Point (AP).

The basic access mechanism implemented in the protocol is a Carrier Sence Multiple Access with Collision Avoidance (CSMA/CA). The CSMA protocol works as follows:  if a station wishes to transmit information through it network, it senses the medium. In case the medium is busy (another station in the network is currently transmitting information) then the station will delay its transmission requests to a later time. Otherwise, the medium is free and the station is allowed to transmit the desired information.

Order custom essay Wireless network management with free plagiarism report


The problem with the CSMA protocol is the case where a collision occurs. A collision may occur if two different stations sense the medium as free and begin to transmit information. For this purpose, we use a collision avoidance mechanism: a station willing to transmit senses the medium. If the medium is busy, it defers its request.

Otherwise, it sends an RTS (Request To Transmit) which includes the source, destination and the duration of the transaction. If the medium is free then the destination station will respond with a packet called CTS (Clear To Send) which will include the same duration information and once the source station receives this packet, it starts to transmit. The destination station checks the CRC (Cyclic Redundancy Check) and sends an acknowledgment package (ACK).

Receiving the ACK informs the source station that no collision had occurred. If the source station does not receive the ACK it will keep resending the data or will throw it away after a given number of retransmissions.

When a station wishes to join an existing BSS, it needs to receive synchronization information from the BSS’s AP. First, the station needs to go through the AP’s authentication process. During this process, the station and the AP exchange information proving to each other that each side is familiar with a specific password.

This essay was written by a fellow student. You can use it as an example when writing your own essay or use it as a source, but you need cite it.

Get professional help and free up your time for more important courses

Starting from 3 hours delivery 450+ experts on 30 subjects
get essay help 124  experts online

Did you know that we have over 70,000 essays on 3,000 topics in our database?

Cite this page

Explore how the human body functions as one unit in harmony in order to life

Wireless network management. (2016, Jul 01). Retrieved from

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer