IEEE Wireless LAN
|
|
|
- Camron Ball
- 10 years ago
- Views:
Transcription
1 IEEE The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 ( )
2 WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players have invested in WLAN (Cisco, Intel, Nokia) Integrated WLAN solutions appearing (Apple, IBM, Dell,...) Wireless IP solutions have lots of momentum! People desire wireless IP terminals and access devices WLAN offers a good mobile solution for indoor IP access Added value for the user - Flexibility, user mobility Added value for ISP - solution for public high speed IP access WLAN standards are converging - IEEE b rules Interoperability has been the main obstacle wlan-tutorial.ppt-2 ( )
3 The market has taken off... In the past: Deployment of WLAN for vertical markets - moderate growth Now: Ubiquitous broadband wireless Internet access - the killer app IEEE802.11b 11 Mbps everywhere Airport Public W-LAN Campus Railway Station Office Semi-public W-LAN Hospital Congress hall, Hotel Corporate W-LAN Office Plant Remote Access Home W-LAN wlan-tutorial.ppt-3 ( )
4 IEEE Basic Architecture CPE + NIC local distribution network access router internet Netscape http tcp ip ppp Bluetooth IEEE ip apache http tcp ip ppp Bluetooth wlan-tutorial.ppt-4 ( )
5 What is unique about wireless? Difficult media interference and noise quality varies over space and time shared with unwanted devices shared with non-802 devices (unlicensed spectrum, microwave ovens) Full connectivity cannot be assumed hidden node problem Mobility variation in link reliability battery usage: requires power management want seamless connections Security no physical boundaries overlapping LANs Multiple international regulatory requirements wlan-tutorial.ppt-5 ( )
6 Industrial, Scientific and Medical (ISM) Bands 902 to 928MHz to GHz to 5.850GHz 26MHz 83.5MHz 125MHz FREQUENCY (GHz) Low bandwidth Polluted by cellular and cordless Relatively clean spectrum DS radios good at rejecting microwave interference Can fit several (11) WLAN Channels A band for the future No cost effective technology yet wlan-tutorial.ppt-6 ( )
7 Wireless IEEE Standard Approved June b approved September Standard supports 3 Physical Layers Frequency hopping Limited to 2Mbps data rate Requires more network overhead Has higher power density that can generate interference Direct sequence Only PHY to support the 11Mbps data rate Low power density to minimize interference Infrared Range limited wlan-tutorial.ppt-7 ( )
8 IEEE Ad Hoc Mode Peer-to-Peer Network Independent networking Use Distributed Coordination Function (DCF) Forms a Basic Service Set (BSS) Direct communication between stations Coverage area limited by the range of individual stations wlan-tutorial.ppt-8 ( )
9 IEEE Infrastructure Mode Wired Network Server BSS-A BSS-B Access Points (AP) and stations (STA) BSS (Basic Service Set): a set of stations controlled by a single coordination function Distribution system interconnects multiple cells via access points to form a single network Extends wireless coverage area and enables roaming wlan-tutorial.ppt-9 ( )
10 IEEE Network elements Distribution system Used to interconnect wireless cells multiple BSS connected together form an ESS, Extended Service Set Allows mobile stations to access fixed resources Not part of standard could be bridged IEEE LANs, wireless, other networks Distribution System Services are defined Access Points Stations select an AP and associate with it Support roaming Provide other functions time synchronization (beaconing) power management support point coordination function Traffic typically (but not always) flows through AP direct communication possible wlan-tutorial.ppt-10 ( )
11 MAC Functionality Independent and Infrastructure configuration support Each BSS has a unique 48 bit address Each ESS has a variable length address CSMA with collision avoidance MAC-level acknowledgment allows for RTS/CTS exchanges (hidden node protection) MSDU fragmentation Point Coordination option (AP polling) Association and Reassociation station scans for APs, association handshakes Roaming support within an ESS Power management support stations may power themselves down AP buffering, distributed approach for IBSS Authentication and privacy Optional support of Wired Equivalent Privacy (WEP) Authentication handshakes defined wlan-tutorial.ppt-11 ( )
12 CSMA/CA Explained Free access when medium is free longer than DIFS DIFS Busy Medium Defer Access DIFS PIFS SIFS Contention Window IFS: Inter Frame Space Backoff-Window Next Frame Slot time Select Slot and Decrement Backoff as long as medium is idle. Reduce collision probability where mostly needed. Stations are waiting for medium to become free. Select Random Backoff after a Defer, resolving contention to avoid collisions. Efficient Backoff algorithm stable at high loads. Exponential Backoff window increases for retransmissions. Backoff timer elapses only when medium is idle. Implement different fixed priority levels wlan-tutorial.ppt-12 ( )
13 Carrier Sense Multiple Access Collision Avoidance (CSMA/CA) Station 1 Station 2 Tx Data to STA 2 Rx data from STA 1 Short deferral Short interval ensures ACK is sent while other stations wait longer ACK to STA1 Distributed inter-frame deferral STA 3 s back-off is shorter than STA 4 s therefore it begins transmission first Station 3 Detects channel busy Detects channel busy Distributed interframe deferral Random back-off Tx Data Distributed inter-frame deferral Station 4 Detects channel busy Detects channel busy Distributed interframe deferral Random back-off Detects channel busy wlan-tutorial.ppt-13 ( )
14 CSMA/CA + ACK protocol DIFS Src Dest Other Data SIFS Ack DIFS Defer Access Contention Window Next MPDU Backoff after Defer Defer access based on Carrier Sense. CCA from PHY and Virtual Carrier Sense state. Direct access when medium is sensed free longer then DIFS, otherwise defer and backoff. Receiver of directed frames to return an ACK immediately when CRC correct. When no ACK received then retransmit frame after a random backoff (up to maximum limit). wlan-tutorial.ppt-14 ( )
15 IEEE Point Coordination Function (PCF) CFP repetition interval Contention Free Period Contention Period Access Point Beacon D1+Poll D2+Poll CF end Stations U1+ACK U2+ACK Optional PCF mode provides alternating contention free and contention operation under the control of the access point The access point polls stations for data during contention free period Network Allocation Vector (NAV) defers the contention traffic until reset by the last PCF transfer PCF and DCF networks will defer to each other PCF improves the quality of service for time bounded data wlan-tutorial.ppt-15 ( )
16 Hidden Node Provisions Problem Stations contending for the medium do not Hear each other Solution Optional use of the Duration field in RTS and CTS frames with AP STA B cannot receive data from STA A CTS-Range RTS-Range DIFS STA B Access Point STA A STA A AP STA B RTS CTS Data Ack STA B cannot detect carrier from STA A Time period to defer access is based on duration in CTS Next MPDU Back off after defer wlan-tutorial.ppt-16 ( )
17 Frame Formats MAC Header Bytes: Frame Control Duration ID Addr 1 Addr 2 Addr 3 Sequence Addr 4 Control Frame Body CRC Bits: Protocol Version Type SubType To DS From DS More Frag Retry Pwr Mgt More Data WEP Rsvd MAC Header format differs per Type: Control Frames (several fields are omitted) Management Frames Data Frames Includes Sequence Control Field for filtering of duplicate caused by ACK mechanism. wlan-tutorial.ppt-17 ( )
18 Physical Layer Convergence Protocol (PLCP) PLCP Protocol Data Unit SYNC SFD SIGNAL SERVICE LENGTH CRC (gain setting, energy detection, antenna selection, frequency offset compensation) (Start Frame Delimiter; bit synchronization) (rate indication; 1, 2, 5.5, 11 Mbit/s) (reserved for future use) (number of octets in PSDU) (CCITT CRC-16, protects signal, service, length field) wlan-tutorial.ppt-18 ( )
19 Three PHYs Frequency Hop Spread Spectrum 2.4GHz band, 1 and optional 2Mbps 2GFSK, 4GFSK (Gaussian Frequency Shift Keying) 2.5 hops/sec over 79 1MHz BW channels (North America) Direct Sequence Spread Spectrum 2.4GHz band, 1 and 2Mbps DBPSK, DQPSK (Differential Binary/Quadrature Phase Shift Keying) 11 chip Barker sequence 2.4GHZ band, 5.5 and 11Mbps CCK Baseband IR Complex spread functions Diffused infrared, 1 and 2Mbps, 16-PPM and 4-PPM (Pulse Position Modulation) wlan-tutorial.ppt-19 ( )
20 Direct Sequence Spread Spectrum RF Energy is Spread by XOR of Data with PRN Sequence 1 0 Data 1 bit period 11 Bit Barker Code (PRN*) chips PRN Out chips 1 bit period * PRN: Pseudorandom Number Signal Spectrum Transmitter baseband signal before spreading Receiver baseband signal before matched filter (Correlator) Transmitter baseband signal after spreading Receiver baseband signal after matched filter (De-spread) wlan-tutorial.ppt-20 ( )
21 DSSS Transmit Spectrum and Channels Transmit Spectrum Mask 0 dbr Unfiltered Sinx/x -30 dbr -50 dbr fc -22 MHz fc -11 MHz fc fc +11 MHz fc +22 Mhz Cannel USA ETSI Japan MHz 2412 MHz N/A MHz 2417 MHz N/A MHz 2422 MHz N/A MHz 2427 MHz N/A MHz 2432 MHz N/A MHz 2437 MHz N/A MHz 2442 MHz N/A MHz 2447 MHz N/A MHz 2452 MHz N/A MHz 2457 MHz N/A MHz 2462 MHz N/A 12 N/A 2467 MHz N/A 13 N/A 2472 MHz N/A 14 N/A N/A 2484 MHz wlan-tutorial.ppt-21 ( )
22 Power Management Mobile devices are battery powered. Power Management is important for mobility. Current LAN protocols assume stations are always ready to receive. Idle receive state dominates LAN adapter power consumption over time. How can we power off during idle periods, yet maintain an active session? Power Management Protocol: allows transceiver to be off as much as possible is transparent to existing protocols is flexible to support different applications possible to trade off throughput for battery life wlan-tutorial.ppt-22 ( )
23 Power Management Approach Allow idle stations to go to sleep station s power save mode stored in AP APs buffer packets for sleeping stations. AP announces which stations have frames buffered Traffic Indication Map (TIM) sent with every Beacon Power Saving stations wake up periodically listen for Beacons TSF assures AP and Power Save stations are synchronized stations will wake up to hear a Beacon TSF timer keeps running when stations are sleeping synchronization allows extreme low power operation Independent BSS also have Power Management similar in concept, distributed approach wlan-tutorial.ppt-23 ( )
24 Infrastructure Power Management TIM Time-axis AP activity TIM-Interval DTIM interval TIM Busy Medium DTIM TIM TIM DTIM Broadcast Broadcast PS Station Broadcast frames are also buffered in AP. all broadcasts/multicasts are buffered PS-Poll broadcasts/multicasts are only sent after Delivery Traffic Indication Message (DTIM) DTIM interval is a multiple of TIM interval Stations wake up prior to an expected DTIM. If TIM indicates frame buffered station sends PS-Poll and stays awake to receive data else station sleeps again Tx operation wlan-tutorial.ppt-24 ( )
25 Scanning Scanning required for many functions. finding and joining a network finding a new AP while roaming initializing an Independent BSS (ad hoc) network MAC uses a common mechanism for all PHY. single or multi channel passive or active scanning Passive Scanning Find networks simply by listening for Beacons Active Scanning On each channel Send a Probe, Wait for a Probe Response Beacon or Probe Response contains information necessary to join new network. wlan-tutorial.ppt-25 ( )
26 Active Scanning Example Access Point A Access Point C Steps to Association: Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. AP sends Association Response. Initial connection to an Access Point - ReAssociation follows a similar process wlan-tutorial.ppt-26 ( )
27 Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Mobile stations may move beyond the coverage area of their Access Point but within range of another Access Point Station 1 Reassociation allows station to continue operation wlan-tutorial.ppt-27 ( )
28 Roaming Approach Station decides that link to its current AP is poor Station uses scanning function to find another AP or uses information from previous scans Station sends Reassociation Request to new AP If Reassociation Response is successful then station has roamed to the new AP else station scans for another AP If AP accepts Reassociation Request AP indicates Reassociation to the Distribution System Distribution System information is updated normally old AP is notified through Distribution System wlan-tutorial.ppt-28 ( )
29 Privacy and Access Control Goal of is to provide Wired Equivalent Privacy (WEP) Usable worldwide provides for an Authentication mechanism To aid in access control. Has provisions for OPEN, Shared Key or proprietary authentication extensions. Optional (WEP) Privacy mechanism defined by Limited for Station-to-Station traffic, so not end to end. Only implements Confidentiality function. Uses RC4 algorithm based on: a 40 bit secret key (No Key distribution standardized) and a 24 bit IV that is send with the data. includes an ICV to allow integrity check. Only payload of Data frames are encrypted. Encryption on per MPDU basis. wlan-tutorial.ppt-29 ( )
30 IEEE Architecture Overview One MAC supporting multiple PHYs currently Frequency Hopping, Direct Sequence and Infrared PHYs Two configurations Independent (ad hoc) and Infrastructure CSMA/CA (collision avoidance) with optional point coordination Connectionless Service Transfer data on a shared medium without reservation data comes in bursts user waits for response, so transmit at highest speed possible is the same service as used by Internet Isochronous Service reserve the medium for a single connection and provide a continues stream of bits, even when not used works only when cells (using the same frequencies) are not overlapping. Robust against noise and interference (ACK) Hidden Node Problem (RTS/CTS) Mobility (Hand-over mechanism) Security (WEP) Power savings (Sleep intervals) wlan-tutorial.ppt-30 ( )
31 IEEE Current and future work TGd Regulatory updates TGe Enhancements of MAC MAC TGf Inter Access Point Protocol TGg b >20 Mbit/s Data Rate 2.4 GHz radio Freq. Hopping Spread Spectrum 2.4 GHz radio Direct Sequence Spread Spectrum Infra- Red 2.4 GHz Higher data rate extension b 5 GHz High data rate extension a 1 Mbit/s 2 Mbit/s 2 Mbit/s 1 Mbit/s 1 Mbit/s 2 Mbit/s 5.5 Mbit/s 11 Mbit/s 6,12,24 Mbit/s 9-54 Mbit/s Legend: italic (and red) = optional wlan-tutorial.ppt-31 ( )
32 WECA Mission Statement WECA s mission is to certify interoperability of Wi-Fi (IEEE b High Rate) products and to promote Wi-Fi as the global wireless LAN standard across all market segments. Current Activities: Promote IEEE b HR technology in enterprise, home, and education spaces One standard ---- everywhere Consortium of Over 40 companies Leading vendors WLAN equipment, PC companies, chip companies, service Published compliance matrix Independent test lab (SVNL) Wi-Fi seal of certified interoperability wlan-tutorial.ppt-32 ( )
33 2.4 GHz Standards Efforts 10M 8M Data Rate (Mbps) b By Data Rate and Range For 2.4GHz WLAN Applications 6M 4M 2M 0 Bluetooth HomeRF m 30m 60m 100m Range (meters) wlan-tutorial.ppt-33 ( )
34 Bluetooth Backed by cellular industry Ericsson, Nokia, Intel, IBM, Toshiba Not a network solution Simple point-to-point link Low data rate (sub 1Mbps) 10cm to 10m range Low power and low cost Under standard Applications Wireless desktop (replaces infrared) Cell phone, cordless phone, pager Internet bridge For more data: wlan-tutorial.ppt-34 ( )
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
A Technical Tutorial on the IEEE 802.11 Protocol
A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Wireless Local Area Networks and the 802.11 Standard
Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
Medium Access Control (MAC) and Wireless LANs
Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic
Introduction to IEEE 802.11 Wireless LAN
Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium
The IEEE 802.11 standard
The IEEE 802.11 standard Imad Aad INRIA, Planete team IN Tech, May 31st, 2002 IEEE 802.11 p.1 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999)
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello
PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Maximilian Riegel. ICM Networks, Advanced Standardization
Maximilian Riegel ICM Networks, Advanced Standardization Prolog: The ubiquitous WLAN n Today s road worriers require access to the Internet everywhere. n WLAN is more than just cable replacement, it provides
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
WI-FI TECHNOLOGY: SECURITY ISSUES
RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Philippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
IEEE 802.11 Wireless Local Area Networks
ABSTRACT The draft IEEE 82. Wireless Local Area Network (WLAN) specification is approaching completion. In this article, the IEEE 82. protocol is explained, with particular emphasis on the medium access
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
IEEE 802.11e WLANs / WMM. S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.
IEEE 802.11e WLANs / WMM S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
ECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Measuring the service level in the 2.4 GHz ISM band
Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)
LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM
LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
Wireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Overview of 802.11 Networks and Standards
Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de
Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Data Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Video Transmission over Wireless LAN. Hang Liu [email protected]
Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
Introduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
Wireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)
Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori
Ph.D. Thesis Resources optimization in multimedia communications Luca Sanna Randaccio Advisor: Prof. Luigi Atzori University of Cagliari Department of Electrical and Electronic Engineering Table of Contents
Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
TL-WN310G 54M Wireless CardBus Adapter
54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
Next Generation 802.11 Wireless Local Area Networks
Next Generation 802.11 Wireless Local Area Networks This is a 2 day course technical course intended to give student a solid understanding of the emerging IEEE 802.11 standards, how it works including
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
WildPackets Guide to Wireless LAN Analysis
WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
Getting Started with HP Wireless Networks. Version 10.41
Getting Started with HP Wireless Networks Version 10.41 Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice By Timo Vanhatupa, Ph.D. Senior Research Scientist at Ekahau Contents Introduction Why capacity matters with Wi-Fi... 3 Part 1: Modeling
IEEE 802.11 WIRELESS LAN STANDARD
CHAPTER14 IEEE 802.11 WIRELESS LAN STANDARD 14.1 IEEE 802 Architecture Protocol Architecture MAC Frame Format Logical Link Control 14.2 IEEE 802.11 Architecture and Services IEEE 802.11 Architecture IEEE
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Department of Computer Science Columbia University
Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, [email protected] Department of Computer Science Columbia University 28
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. [email protected]
802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. [email protected] Technical Reviewer: GT Hill, CWNE #21 [email protected] Copyright 2009 CWNP, Inc.
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Chapter 6: Wireless and Mobile Networks
Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime
Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology
120 Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology Technology Tracking Department July, 2003 WiFi Technology 1 Preface Wireless communication is becoming the standard
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
RoamAbout 802.11 Wireless Networking Guide
RoamAbout 802.11 Wireless Networking Guide W i r e l e s s L A N s TM 9034042-02 Notice Notice Cabletron Systems reserves the right to make changes in specifications and other information contained in
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Wireless LAN Networking White Paper
Wireless LAN Networking White Paper Introduction Wireless technology has helped to simplify networking by enabling multiple computer users to simultaneously share resources in a home or business without
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
