A beacon frame is a type of management frame in IEEE 802.11 WLANs. It contains information about the network. Beacon frames are transmitted periodically; they serve to announce the presence of a wireless LAN and to provide a timing signal to synchronise communications with the devices using the network (the members of a service set). In an infrastructure basic service set (BSS), beacon frames are transmitted by the access point (AP). In ad hoc (IBSS) networks, beacon generation is distributed among the stations. For the 2.4 GHz spectrum, when having more than 15 SSIDs on non-overlapping channels (or more than 45 in total), beacon frames start to consume significant amount of air time and degrade performance even when most of the networks are idle.
A beacon frame consists of an 802.11 MAC header, a body and a frame check sequence (FCS). [1] Some of the fields in the body are listed below.
Infrastructure network access points send beacons at a defined interval, which is often set to a default 100 TU which is equivalent to 102.4 ms. In the case of an ad hoc network where there are no access points, a peer station is responsible for sending the beacon. After an ad hoc station receives a beacon frame from a peer, it waits a random amount of time. After that random timeout has elapsed, it will send a beacon frame unless another station has already sent one. In this way, the responsibility of sending beacon frames is rotated amongst all the peers in the ad hoc network, while ensuring that beacons will always be sent.
Most access points allow the changing of the beacon interval. Increasing the beacon interval will cause the beacons to be sent less frequently. This reduces load on the network and increases throughput for clients on the network; however, it has the undesirable effect of delaying association and roaming processes as stations scanning for access points could potentially miss a beacon while scanning other channels. Alternatively, decreasing the beacon interval causes beacons to be sent more frequently. This increases load on the network and decreases throughput for users, but it does result in a quicker association and roaming process. An additional downside of decreasing the beacon interval is that stations in power save mode will consume more power as they must more frequently awake to receive beacons.
Inspecting an idle network with packet-monitoring tools such as tcpdump or Wireshark would show that most traffic on the network consists of beacon frames, with a few non-802-11 packets mixed in, such as DHCP packets. If users joined the network, responses to each beacon would begin to appear, along with regular traffic generated by the users.
Stations must schedule beacon transmission at the nominal beacon interval. However, the transmission may suffer some delays due to the channel access. Like other frames, beacons must follow the CSMA/CA algorithm. This means that if the channel is busy (e.g., another station is currently sending a frame) when the beacon needs to be sent, it must wait. This means that the actual beacon interval may differ from the nominal beacon interval. [3] However, stations are able to compensate for this difference by inspecting the timestamp in the beacon frame when it is finally sent.
While beacon frames do cause some non-trivial overhead for a network, they are vital for the proper operation of a network. Radio NICs generally scan all RF channels searching for beacons announcing the presence of a nearby access point. When a radio receives a beacon frame, it receives information about the capabilities and configuration of that network, and is also then able to provide a list of available eligible networks, sorted by signal strength. This allows the device to choose to connect to the optimal network.
Even after associating with a network, the radio NIC will continue to scan for beacons. This has several benefits. Firstly, by continuing to scan for other networks, the station has options for alternative networks if the current access point's signal becomes too weak to continue communication. Secondly, as it still receives beacon frames from the currently associated access point, the device is able to use the timestamps in those beacons to update its internal clock. Beacons from the currently associated access point also inform stations of imminent configuration changes, such as data rate changes.
Finally, beacons enable devices to have power saving modes. Access points will hold on to packets destined for stations that are currently sleeping. In the traffic indication map of a beacon frame, the access point is able to inform stations that they have frames waiting for delivery.
IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication. The standard and amendments provide the basis for wireless network products using the Wi-Fi brand and are the world's most widely used wireless computer networking standards. IEEE 802.11 is used in most home and office networks to allow laptops, printers, smartphones, and other devices to communicate with each other and access the Internet without connecting wires. IEEE 802.11 is also a basis for vehicle-based communication networks with IEEE 802.11p.
A MAC address is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth. Within the Open Systems Interconnection (OSI) network model, MAC addresses are used in the medium access control protocol sublayer of the data link layer. As typically represented, MAC addresses are recognizable as six groups of two hexadecimal digits, separated by hyphens, colons, or without a separator.
In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction. The MTU relates to, but is not identical to the maximum frame size that can be transported on the data link layer, e.g., Ethernet frame.
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.
Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle". When they do transmit, nodes transmit their packet data in its entirety.
Carrier-sense multiple access with collision detection (CSMA/CD) is a medium access control (MAC) method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.
Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks, used globally in home and small office networks to link devices and to provide Internet access with wireless routers and wireless access points in public places such as coffee shops, hotels, libraries, and airports to provide visitors.
Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation, medical device data collection, and other low-power low-bandwidth needs, designed for small scale projects which need wireless connection. Hence, Zigbee is a low-power, low-data-rate, and close proximity wireless ad hoc network.
In IEEE 802 LAN/MAN standards, the medium access control (MAC), also called media access control, is the layer that controls the hardware responsible for interaction with the wired or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer. The LLC provides flow control and multiplexing for the logical link, while the MAC provides flow control and multiplexing for the transmission medium.
IEEE 802.11e-2005 or 802.11e is an approved amendment to the IEEE 802.11 standard that defines a set of quality of service (QoS) enhancements for wireless LAN applications through modifications to the media access control (MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as voice over wireless LAN and streaming multimedia. The amendment has been incorporated into the published IEEE 802.11-2007 standard.
IEEE 802.15.4 is a technical standard which defines the operation of a low-rate wireless personal area network (LR-WPAN). It specifies the physical layer and media access control for LR-WPANs, and is maintained by the IEEE 802.15 working group, which defined the standard in 2003. It is the basis for the Zigbee, ISA100.11a, WirelessHART, MiWi, 6LoWPAN, Thread, Matter and SNAP specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4. In particular, 6LoWPAN defines a binding for the IPv6 version of the Internet Protocol (IP) over WPANs, and is itself used by upper layers like Thread.
In IEEE 802.11 wireless local area networking standards, a service set is a group of wireless network devices which share a service set identifier (SSID)—typically the natural language label that users see as a network name. A service set forms a logical network of nodes operating with shared link-layer networking parameters; they form one logical network segment.
A wireless distribution system (WDS) is a system enabling the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the traditional requirement for a wired backbone to link them. The notable advantage of WDS over other solutions is that it preserves the MAC addresses of client frames across links between access points.
In computer networking, the interpacket gap (IPG), also known as interframe spacing, or interframe gap (IFG), is a pause which may be required between network packets or network frames. Depending on the physical layer protocol or encoding used, the pause may be necessary to allow for receiver clock recovery, permitting the receiver to prepare for another packet or another purpose. It may be considered as a specific case of a guard interval.
A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless network, such as Wi-Fi, Bluetooth, or LTE (4G) or 5G rather than a wired network, such as an Ethernet network. A WNIC, just like other NICs, works on the layers 1 and 2 of the OSI model and uses an antenna to communicate via radio waves.
IEEE 802.11w-2009 is an approved amendment to the IEEE 802.11 standard to increase the security of its management frames.
Timing synchronization function (TSF) is specified in IEEE 802.11 wireless local area network (WLAN) standard to fulfill timing synchronization among users. A TSF keeps the timers for all stations in the same basic service set (BSS) synchronized. All stations shall maintain a local TSF timer. Each mobile host maintains a TSF timer with modulus counting in increments of microseconds. The TSF is based on a 1-MHz clock and "ticks" in microseconds. On a commercial level, industry vendors assume the 802.11 TSF's synchronization to be within 25 microseconds.
Traffic indication map (TIM) is a structure used in 802.11 wireless network management frames.
Network cloaking is an attempt to provide network security by hiding the devices behind the network gateway. The theory is that if hackers cannot see the devices or scan them, they cannot be attacked. To access the network behind the gateway, an authorized user must authenticate themselves to the gateway, and then the gateway allows them to see the devices they are permitted to by the security policy.
Time-Sensitive Networking (TSN) is a set of standards under development by the Time-Sensitive Networking task group of the IEEE 802.1 working group. The TSN task group was formed in November 2012 by renaming the existing Audio Video Bridging Task Group and continuing its work. The name changed as a result of the extension of the working area of the standardization group. The standards define mechanisms for the time-sensitive transmission of data over deterministic Ethernet networks.