Low Latency Handover in IEEE g Wireless LANs

Size: px
Start display at page:

Download "Low Latency Handover in IEEE 802.11g Wireless LANs"

Transcription

1 Low Latency Handover in IEEE 8.11g Wireless LANs Mads Kronborg Agesen, Peter Dalgaard Hansen, Michael Hansen, Søren Brun Madsen and Hans Jørgen Uggerhøj Section for Automation and Control Department of Electronic Systems, Aalborg University Abstract When performing handovers in an IEEE 8.11 wireless network, a low latency handover can be crucial for some applications. Previous attempts to obtain low latency handover times are often based on hardware or driver specific solutions. This paper outlines two hardware and driver independent methods to decrease the handover time. The first method use fixed size wait states in order to resolve timing issues that arises during a handover procedure. The second method resolves the same timing issues, using a dynamic approach. Results show that the two methods achieve handover times below 73 ms and 1 ms respectively with 95 % confidence. These results are obtained when disregarding occassional handover times round 31 ms for the first method and round 5 ms for the second method. Decreasing the scan time further requires a driver modification, which is dependent on the specific hardware and application. offers high bandwidth, is easily accessible and is well documented. A drawback is the limited range of a WLAN Access Point,, which reduces the usability of the UAV. Therefore multiple s are needed to obtain a wireless link of acceptable quality over a larger area. The setup used for monitoring the UAV consists of several GSs connected to multiple s. This is illustrated in Figure 1. 1 UAV Wireless link Wired link Keywords: Handover, Handoff, IEEE 8.11, WLAN, Frequency Scan, TCP/IP I Introduction The background for this paper is the monitoring of an autonomous helicopter designated an Unmanned Aerial Vehicle, UAV. As the UAV is autonomous, controlling it from the ground is unnecessary. However, it is desirable to retrieve data from and send instructions to the UAV from a Ground Station, GS. In this way, the user of the GS is able to monitor a great amount of data and occasionally send instructions to the UAV. This makes it preferable to monitor the UAV from multiple GSs, supporting several users. The wireless connection between the UAV and the GSs is implemented as a WLAN connection complying with the IEEE 8.11 standard. This connection GS 1 GS GS 3 Figure 1: Illustration of the system with the UAV, multiple GSs and s. The GSs are ordinary PCs with a network interface card connected to a local area network. When the link quality between an and the UAV decreases to a critical low level, a handover to another with a better link quality is initiated. To achieve minimum package loss or minimum latency during handover, it is important with a low handover time. Whether a package latency or loss occurs depends on the implementation. Buffering unsent packages results in latency, and disregarding unsent packages results in package loss. The existing IEEE 8.11 implementation of the handover procedure contains a roaming feature providing the ability to roam between s located in the 1

2 same network and extended service set, ESS. Due to this implementation the handover is not controllable by the user and the timing is unpredictable. This paper contains an outline of the critical aspect in a handover procedure, and propose two methods that ensures a low handover time. In the following, a GS is denoted a and the UAV is denoted a Mobile Node, MN, to generalise the approach in this paper. Related Work Prior research related to handover procedures involves several types of handovers; some relies on changes in the link layer (L) and other introduces changes in the network layer (L3) of the OSI model. A method implementing a L3 handover mechanism, is Mobile IP. Mobile IP requires a Home Agent to manage the routing of traffic to the MN and offers roaming throughout e.g. the internet, by letting the MN act as it is located in its home network. However, this protocol does not provide low latency handovers, as it relies on the existing link layer [] [7]. Other approaches to improve the handover latency introduces changes in the implementation of the link layer. Common issues for all approaches are long scan time [4], which some of the methods handle by caching available s based on channel-wise scanning [6]. However, these approaches require hardware, supported by advanced open source drivers as MadWifi or and all violates the IEEE 8.11 standard specifying scan of all channels when performing active scanning [3]. II Handover Method Using Static Timing A handover in an IEEE 8.11 wireless network can generally be divided into three separate phases: Scanning, authentication, and association [1]. These phases are illustrated in Figure. The figure shows the handover procedure, where a data stream to a is interrupted by the handover and passed on to a new connected through a new. By manually configuring the MAC addresses and frequencies of the s, an active scanning to locate available s during a handover should be avoided. However, this obviously requires that the MAC address and frequency of any is known in advance, and does not entirely ensure that no scanning takes place during the handover. This is due to the occasional scanning performed by the wireless network interface card, in order to cache available s in its vicinity. This is shown as the scan event in Figure. Scan Time 4 4 MN 4 4 Authentication Request Authentication Response Reassociation Request Reassociation Response Figure : Event diagram for a normal handover showing the three phases during a handover procedure, without considering protocol specific issues. The MN can authenticate with an either by means of a shared key, or without any authentication. The latter only involves a -way handshake as shown in Figure. By not using any authentication in the handover procedure, a fast negotiation between the MN and the is ensured. First Timing Issue When performing a handover, two points in the procedure are time critical. The first timing issue occurs when the first connection is closed, initiating the handover. If the close command for the TCP connection is not completed properly before proceeding with the handover procedure, the handover is prolonged. Figure 3 illustrates the process of a TCP connection release used when closing a TCP connection. Mobile node Time FIN, ACK ACK FIN, ACK ACK Figure 3: Event diagram for the TCP connection release procedure. If timing is not considered the <ACK> and <FIN, ACK> from the is not received at the MN, and the TCP protocol repeatedly inquires for the missing response from the. This timing issue is solved by introducing a wait state, wait 1, before switching to another as illustrated in Figure 4. Authentication Association

3 Second Timing Issue The second timing issue occurs after the handover is performed, that is, after the MAC address and frequency of the new is set. At this point it is important to ensure that the MN is associated with the new before calling the connect command. The connect command connects a socket at the MN with a socket at the. If the association phase is not completed before connecting, the connect call fails and the TCP protocol occasionally attempts to reestablish a connection to the. This results in a longer connection time and thus a longer handover time. To ensure that the association phase with the new is finished before calling connect, a wait state, wait, is introduced before the sockets are connected, allowing the association to complete. An extended diagram of Figure is shown in Figure 4, where the inserted wait states are illustrated. Also the TCP connection release is shown, along with the TCP 3-way handshake performed when a new connection is opened. MAC address and frequency set Wait 1 Scan Time TCP Connection Release 4 4 MN 4 4 Authentication Request Authentication Response Reassociation Request Reassociation Response TCP 3-way handshake Figure 4: Extended event diagram, showing the introduced wait states emphasized in the handover test. Also the TCP operations between MN and s are shown. The length of the first wait state is determined by observing the TCP connection release, using the protocol analyzer Wireshark. The length of the second wait state is determined by trial and error. A limitation of this method is the fact that not all situations are accounted for, when determining the length of the static wait states. Thus, situations can arise where the length of the static waits are either insufficient or exaggerated, as the duration of the handover procedure varies. Authentication Association Wait III Handover Method Using Dynamic Timing This method is based on the same time critical points resolved in the Handover Method Using Static Timing. These time critical points are resolved in this method by a dynamic approach, as an alternative to the static waits in Figure 4. Furthermore the method uses static elements in the Address Resolution Protocol, ARP, table to optimise the handover mechanism. The first time critical point concerns proper TCP connection release before initiating a handover. To ensure the TCP connection release before initiating a handover, the linger socket option must be set for the used socket. By specifying this socket option the closure of the socket waits until the existing TCP connection is correctly closed and the timing is improved. The second time critical point is to ensure association to the new before connecting the sockets. After parsing the MAC address and frequency to the new, a check for the ESSID is periodically performed, as some phases during the handover procedure are time varying. The ESSID is the only available information to test for and is received in a probe response from the specified. As shown in Figure 4, the probe response is not in the final phase of the handover procedure and a reception of the ESSID is not a guarantee for an association. Thus a wait state is necessary after the ESSID is received. The duration of this wait state ensures the association after the ESSID is received, before connecting the sockets. When sending data over a network, an Address Resolution Protocol, ARP, is necessary. In general the ARP must map the logical IP addresses to physical MAC addresses in order to transmit data from one node to another node on a network. Even though the ARP stores the mapping in an ARP cache, the cache is periodically updated. This causes a problem if the update of the ARP cache happens during a handover, as this prolongs the handover procedure. To avoid an update of the ARP cache during the handover procedure, static elements are added to the ARP cache. IV Experimental Design To analyse the handover times obtained by use of the two methods a test bed was designed. The test was performed with use of two Asus WL-5g Deluxe- V s each having a PC connected that represented the. The employed s were installed with Ubuntu 6.6 kernel and Ubuntu 7.1 3

4 kernel operating systems respectively. The MN was installed with Ubuntu 7.1 kernel and the wireless network interface card was an Intel PRO/Wireless BG with an ipw1.. driver. The test bed used for handover test is shown in Figure 5. The s were set up with different ESSIDs at different frequencies and TCP was used as connection protocol during the handover test. For the s, a server program was written which continuously listened for packages sent from the MN. V Measured Handover Times Using Static Timing The results from the handover test using static timing are shown in Figure 6 and Figure 7. Overall 49 handover tests were conducted and the results are presented as two histograms. The majority of the handover times, are less than 8 ms, but occasionally some handovers takes round 31 ms.. Wireless link Wired link MN Wired link p(x) Figure 5: Test bed from the test. A client application was developed for the MN. The first step was to associate with the first using its MAC address and frequency. After association the client application started to send packages to the connected. After having sent 5 packages to the a handover was initiated by closing the existing connection, and parsing the MAC address and frequency of the new to the network interface card. After the handover was completed, another 5 packages were sent to the connected to the new. The packages sent to the s, contained the local time of the MN, thus the handover time was calculated by comparing the last and first package times stored at the s. Therefore the handover time is defined as the time from closing the existing connection to a new connection is established, which is the duration where no data is send. During the measurements the s were situated within 5 metres, for which reason the link quality was not taken into consideration. Each package was 16 bytes long, and no congestion had accumulated when sending the packages. The test were performed in an environment were also other s, from a local network, were present. It was assured that the s used a different frequency, than the local network, in order to avoid network interference. The function iwevent was used to observe the events from the wireless network interface card driver [8] x,time [ms] Figure 6: Results of the handover test, with handover times less than 8 ms and an approximated exponential density function Time [ms] Figure 7: Results of the handover test, showing the nonperiodic handover times round 31 ms. The difference in handover times below 8 ms and the handover times round 31 ms, is obviously not caused by normal variations. Therefore the two sample groups are treated separately. The distribution of handover times below 8 ms, illustrated in Figure 6, is approximated by a shifted exponential distribution. The approximated distribution is used to calculate a 95 % confidence interval of the mean. This confidence interval is used to decide an upper time limit 4

5 for 95 % of the handover times. The exponential distribution is given by the probability density function p(x) =λ e λx, (1) where both the mean µ and the variance σ of the distribution depends on the parameter λ. The parameter λ for the distribution is unknown and therefore estimated by the maximum likelihood estimator ˆλ, given by 1 ˆλ = i=1 x =.13, () i x min where x min is the minimum value in x, i.e. the shift of the distribution, which equals ms. A plot of the probability density function for the approximated exponential distribution is illustrated in Figure 6 together with the measured handover times. The 95 % confidence interval of the mean is calculated by applying, that an exponential distribution is approximately chi-square distributed with n degrees of freedom [5] { n i=1 P xi < ˆµ x χ min < n } i=1 xi =1 α. (3) χ α/,n (1 α)/,n This equation gives a two-sided interval for ˆµ x min. For α =.5, it is stated that ˆµ x min lies in the interval ˆµ x min (3.57, 6.58). (4) The density functions for the 95 % confidence interval ofthemeanareshowninfigure8. Probability p(x) Exponential Distr. Upper Limit for Exponential Distr. Lower Limit for Exponential Distr x, Time [ms] Figure 8: A plot of the approximated exponential distribution compared with the distributions from the 95 % confidence interval of the sample mean. From the upper time limit x t, it is stated that 95 % of the handover times are less than the boundary with 95 % confidence. This is calculated using the cumulative distribution function P (X x t )= xt λ e λx dx =.95. (5) The upper time limit of the approximated exponential distribution x t + x min is calculated to ms. The nine previously ignored samples round 31 ms, result from a scan performed by the network interface card at the MN. This fact is indicated by a scan request completed, which occurredateachofthese handovers, observed using the function iwevent provided by wireless extension [8]. The fact that these handovers takes round 31 ms, indicates that the scan takes longer than the wait state of 4 ms inserted in the handover procedure, which results in a stall when connecting the sockets. VI Measured Handover Times Using Dynamic Timing The test results from the method using dynamic timing are shown in Figure 9 and Figure 1 as two histograms. Overall 5 handover tests were conducted and the majority of the handover times, are less than 1 ms, but occasionally some handovers last round 5 ms x,time [ms] Figure 9: Results of the handover test, showing handover times without scan and an approximated Gaussian density function. As the high handover times are caused by a scan the two outcomes are processed separately. An approximated distribution is calculated to determine a 95 % confidence interval of the mean, used to determine the upper time limit for 95 % of the handover times. The distribution of the low handover times in Figure 9 is approximated by a Gaussian distribution. The Gaussian distribution is given by the probability density function p(x) = 1 πσ exp ( ) (x µ) σ p(x), (6) 5

6 Gaussian Distr. Upper Limit for Gaussian Distr. Lower Limit for Gaussian Distr Probability p(x) Time [ms] x, Time [ms] Figure 1: Results of the handover test, showing handover times during scan. where the mean µ and variance σ are unknown. As the mean and variance are unknown, the maximum likelihood estimators X and S are used to estimate µ and σ, respectively S = X = ( n i=1 n i=1 x i n (x i X) ) 1 n 1 = 69.7 ms, (7) = ms. (8) The probability density function for the approximated Gaussian distribution is illustrated in Figure 9. The 95 % confidence interval of the mean is calculated from atwo-sidedt-test [5] { } S S P X + t α/,n 1 n < ˆµ < X t α/,n 1 n =1 α. (9) It is stated that the mean ˆµ from the observed X, lies within the interval ˆµ (63.74, 74.4). (1) The density functions for the 95 % confidence interval ofthemeanareshowninfigure11. Basedonthe estimated confidence interval, the upper time limit is decided for 95 % of the handover times. This is calculated using the cumulative distribution function x ( ) 1 (x µ) P (X x) = exp dx =.95. πσ σ (11) The upper time limit is calculated to 1.69 ms. The outlier handover times round 5 ms in Figure 1 are caused by the unavoidable scan procedure, specified by the network interface card driver. Figure 11: A plot of the approximated Gaussian distribution compared with the distributions from the 95 % confidence interval of the sample mean. VII Discussion The purpose of this paper was to outline the critical aspects during a handover and develop two methods to ensure low handover times. The critical aspects were found to be two timing issues concerning TCP connection release and association with the new. These issues are solved by use of a static and a dynamic method. The two methods showed different results for the distribution of handover times. The minimum handover time is observed using dynamic timing. This handover time is unattainable for the method using static timing, as the sum of the two static waits exceeds this amount of time. However, from the calculated 95 % confidence interval, the handover method using static timing has the lowest upper limit handover time. Another disadvantage for the method using static timing, is some outlier handover times round 31 ms, where the method using dynamic timing has outlier handover times round 5 ms. The low handover times for the two methods do not have the same distribution. The second method using dynamic timing, is depending on a received ES- SID and therefore has more fluctuating handover times compared to the method using static timing. The outlier handover times in each of the developed methods arise because of a scan, ended by a scan request completed. In the method using static timing, the length of the second wait is less than the time of the scan. This entails that connection of the sockets is prolonged, since it is attempted to established the connection before a successful association with the new. In the method using dynamic timing, the connection of the sockets is performed after the scan is com- 6

7 pleted, which gives lower outlier handover times. This imposes a lower time limit for a handover, whenever a scan is performed. The scanning is unavoidable as the wireless network interface card occasionally must update the information of s in the vicinity. It is the firmware or driver, depending on the specific wireless network interface card, that determines when to scan. A possible solution to reduce the scan time during a handover, is to limit the number of frequencies to scan. However, this solution requires modification of the driver for the wireless network interface card, which eliminates the possibility of obtaining a hardware and driver independent handover solution. The necessity to make a specific solution to decrease the scanning time is also supported by other research [6]. Relating the measured handover times, of the two developed methods, to the UAV GS system, none of the methods are ideal. This is due to the outlier handover times, which causes an undesirable disruption of the data transmission. However, This disruption does not lead to a malfunction of the UAV, but the users of the GSs will experience outage when monitoring the UAV. This is not critical, as the data is stored on the UAV for later retrieval. If one of the developed methods should be implemented on the UAV system, the deciding argument would be based on the outliers. This is due to the fact that an upper time limit of 7 ms or 1 ms is not crucial for monitoring the UAV. Thus, the handover solution using dynamic handover timing is preferable, as a 5 ms outage is less noticeable compared to 3 ms. To summarise, it is not possible to consistently obtain handover times below 5 ms, with a hardware and driver independent handover solution. However, this only affects the monitoring of the UAV in a noncritical way. References [1] M. S. Gast wireless networks,. 1th edition. [] A. I. Hidetoshi Yokota and T. Hasegawa. Link layer assisted mobile IP fast handoff method over wireless LAN networks,. [3] IEEE. ANSI/IEEE std 8.11, 1999 edition (R3), [4] W. A. Mishra Arunesh, Minho Shin. An emperical analysis of the IEEE 8.11 MAC layer handoff process. [5] S. M. Ross. Probability and statistics for engineers and scientists, [6] A. S. R. Sangho Shin, Andrea G. Forte and H. Schulzrinne. Reducing MAC layer handoff latency in IEEE 8.11 wireless LANs,. [7] T.-c. C. Srikant Sharma, Ningning Zhu. Lowlatency mobile IP handoff for infrastructure-mode wireless LANs, 4. [8] J. Tourrilhes. Wireless tools for linux, Downloaded

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Scanning Delays in 802.11 Networks

Scanning Delays in 802.11 Networks Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks : Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Seamless Handover of Streamed Video over UDP between Wireless LANs

Seamless Handover of Streamed Video over UDP between Wireless LANs Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator) Cognitive Radio Experimentation World!"#$% Project Deliverable Showcase of experiment ready (Demonstrator) Contractual date of delivery: 31-03-14 Actual date of delivery: 18-04-14 Beneficiaries: Lead beneficiary:

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Mobility Management Technique for Real Time Traffic in 802.11 Networks

Mobility Management Technique for Real Time Traffic in 802.11 Networks Journal of Computer Science 3 (6): 390-398, 2007 ISSN 1549-3636 2007 Science Publications Mobility Management Technique for Real Time Traffic in 802.11 Networks 1 Gurpal Singh, 1 Ajay Pal Singh Atwal and

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

Department of Computer Science Columbia University

Department of Computer Science Columbia University Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, hgs@cs.columbia.edu Department of Computer Science Columbia University 28

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Analysis of Open Source Drivers for IEEE 802.11 WLANs

Analysis of Open Source Drivers for IEEE 802.11 WLANs Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,

More information

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.1.1 Radio Channels...

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li Presented by: Stephen Kazmierczak Overview Background Issues Motivation

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Application Performance Analysis and Troubleshooting

Application Performance Analysis and Troubleshooting Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

Profiling IEEE 802.11 Performance on Linux-based Networked Aerial Robots

Profiling IEEE 802.11 Performance on Linux-based Networked Aerial Robots Profiling IEEE 802.11 Performance on Linux-based Networked Aerial Robots Robert Kuschnig 1, Evsen Yanmaz 2, Ingo Kofler 1, Bernhard Rinner 2, and Hermann Hellwagner 1 1 Institute of Information Technology

More information

Position Aware Firewall

Position Aware Firewall Position Aware Firewall ELEC 499 - Progress Report #2 University of Victoria March 3, 2008 Students Adam Verigin - averigin@uvic.ca Sean Boyd - seanboyd@uvic.ca Steve Gillan - swgillan@gmail.com Tyler

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

12.5: CHI-SQUARE GOODNESS OF FIT TESTS

12.5: CHI-SQUARE GOODNESS OF FIT TESTS 125: Chi-Square Goodness of Fit Tests CD12-1 125: CHI-SQUARE GOODNESS OF FIT TESTS In this section, the χ 2 distribution is used for testing the goodness of fit of a set of data to a specific probability

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers

Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers Emil Ivov Network Research Team Louis Pasteur University / LSIIT Illkirch, Strasbourg emcho@clarinet.u-strasbg.fr Thomas Noël

More information

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Firewall Security: Policies, Testing and Performance Evaluation

Firewall Security: Policies, Testing and Performance Evaluation Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK lyu@cse.cuhk.edu.hk,

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

User Manual Network Interface

User Manual Network Interface User Manual Network Interface Rev. 1.00 SRP-350plusll SRP-352plusll http://www.bixolon.com Table of Contents 1. Manual Information...3 2. Specifications...3 2-1 Hardware version...3 2-2 Configuration Tool...3

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to

More information

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces 1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Supporting VoIP in IEEE802.11 Distributed WLANs

Supporting VoIP in IEEE802.11 Distributed WLANs Supporting VoIP in IEEE802.11 Distributed WLANs Zuo Liu Supervisor: Dr. Nick Filer July 2012 1 Voice VoIP Applications Constant Streaming Traffic Packetize interval usually 10-30 ms 8 160 bytes each packet

More information

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S

More information

Network Friendliness of Mobility Management Protocols

Network Friendliness of Mobility Management Protocols Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK

More information

User Manual. PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400. PePWave Mesh Connector Indoor Series: MC 200, E200, 400

User Manual. PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400. PePWave Mesh Connector Indoor Series: MC 200, E200, 400 User Manual PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400 PePWave Mesh Connector Indoor Series: MC 200, E200, 400 PePWave Surf AP Series: Surf AP 200-X, E200-X, 400-X PePWave Surf

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

RF Monitor and its Uses

RF Monitor and its Uses RF Monitor and its Uses Pradipta De prade@cs.sunysb.edu Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

The Elements of GigE Vision

The Elements of GigE Vision What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal

More information

Product Introduction and Setup Examples. RS232 to WIFI Converter

Product Introduction and Setup Examples. RS232 to WIFI Converter Product Introduction and Setup Examples RS232 to WIFI Converter Part WF5000B U.S. Converters LLC page 1 of 12 Content Product Introduction. 3 AP and STA Modes. 3 Auto- Frequency Function. 3 Security..

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

REPORT ITU-R M.2134. Requirements related to technical performance for IMT-Advanced radio interface(s)

REPORT ITU-R M.2134. Requirements related to technical performance for IMT-Advanced radio interface(s) Rep. ITU-R M.2134 1 REPORT ITU-R M.2134 Requirements related to technical performance for IMT-Advanced radio interface(s) (2008) TABLE OF CONTENTS... Page 1 Introduction... 2 2 Scope and purpose... 2 3

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Demystifying Wi-Fi Roaming

Demystifying Wi-Fi Roaming EDUCATIONAL BRIEF Demystifying Wi-Fi Roaming What You Need to Know to Avoid Costly Mistakes A wide variety of modern conveniences are made possible through Wi-Fi Networking. Home automation, real-time

More information

Setting up of a Wireless Distribution System (WDS)

Setting up of a Wireless Distribution System (WDS) Setting up of a Wireless Distribution System (WDS) - a user s perspective Sudipto Das Co worker: Rajesh Roy Department of Computer Science & Engineering Jadavpur University Kolkata 32 {sudipto.das,rajesh.roy}@rediffmail.com

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

Ten top problems network techs encounter

Ten top problems network techs encounter Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Wifi Web Server Module w TF Socket User s Guide

Wifi Web Server Module w TF Socket User s Guide Wifi Web Server Module w TF Socket User s Guide 2004-2010 Sure Electronics Inc. MB-CM14117_Ver1.0 WIFI WEB SERVER MODULE W TF SOCKET USER S GUIDE Table of Contents Chapter 1. Overview...1 1.1 Overview...

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

TERMINAL BRIDGE EXTENSION OVER DISTRIBUTED ARCHITECTURE

TERMINAL BRIDGE EXTENSION OVER DISTRIBUTED ARCHITECTURE TERMINAL BRIDGE EXTENSION OVER DISTRIBUTED ARCHITECTURE Sami Saalasti, Juha Jääskeläinen and Ari Valtaoja Lappeenranta University of Technology P.O.Box 20, 53851 Lappeenranta, Finland {sami.saalasti, juha.jaaskelainen,

More information

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Virtualization for Load Balancing on IEEE 802.11 Networks

Virtualization for Load Balancing on IEEE 802.11 Networks Virtualization for Load Balancing on IEEE 802.11 Networks Tibério M. de Oliveira 1, Marcel W. R. da Silva, Kleber V. Cardoso 2, and José Ferreira de Rezende 1 1 Universidade Federal do Rio de Janeiro -

More information