| 45 | |
| 46 | == IBSS Node == |
| 47 | |
| 48 | || [[Image(wiki:802.11/files:IBSS_encap.png, width=600)]] || |
| 49 | || '''IBSS Node Encapsulation and De-encapsulation''' || |
| 50 | |
| 51 | The above figure shows how an IBSS node encapsulates and de-encapsulates different types of Ethernet frames. An IBSS node has the same challenge as a traditional STA -- it must spoof the MAC address of whatever Ethernet client is attached to it. |
| 52 | |
| 53 | === Encapsulation === |
| 54 | |
| 55 | The encapsulation behavior is nearly identical to the STA. The only difference is that the Ethernet destination addresses is directly used as the RA (addr1). In an IBSS, traffic is not sent via an AP. It is addressed directly. |
| 56 | |
| 57 | === De-encapsulation === |
| 58 | |
| 59 | De-encapsulation is also nearly identical to the STA. Since the RA (addr1) contains the destination of the wireless frame, that address is used as the destination address of the outgoing Ethernet frame. |