Communication Networks 629. IEEE Standards and Developments

Size: px
Start display at page:

Download "Communication Networks 629. IEEE 802.11 Standards and Developments"

Transcription

1 Communication Networks IEEE Standards and Developments Prof. Jochen Seitz Overview Organization of a WLAN according to IEEE Current IEEE standards IEEE layers IEEE MAC MAC synchronization, power saving and roaming WLAN security concerns and options WLAN and ad hoc networks Communication Networks 629 Prof. Jochen Seitz 1

2 LAN WLAN in Infrastructure Mode STA 1 ESS BSS 1 Access Point BSS x LAN Portal Distribution System Access Point STA LAN STA 3 Station (STA) Device with access to the wireless medium and connectivity to the access point Basic Service Set (BSS) Group of devices working on the same radio frequency Access Point Device that allows communication between stations and integrates them into the distribution system Portal Gateway to some other network Distribution System Connection of different WLAN cells to build an Extended Service Set EES Communication Networks LAN WLAN in Ad-hoc Mode STA 1 BSS 1 STA 3 STA 2 BSS 2 STA 5 STA LAN Direct communication with limited range Station (STA): Device with access to the wireless medium Basic Service Set (BSS): Group of devices working on the same radio frequency (Independent Basic Service Set IBSS) Communication Networks 631 Prof. Jochen Seitz 2

3 Hidden Node Problem A B C A would like to communicate with B C is already transmitting information to B using the same channel There are collisions in B Both A and C cannot detect these collisions Communication Networks 632 Exposed Node Problem A B C D B is already transmitting information to A C would like to communicate with D C finds the channel occupied and refrains from sending Free capacities are unused Communication Networks 633 Prof. Jochen Seitz 3

4 Mobile Terminal IEEE-Standard Fixed Terminal Server Application TCP IP MAC PHY MAC PHY Infrastructure Network Access Point Application MAC PHY TCP IP MAC PHY Communication Networks 634 IEEE Important Substandards n original standard from 1997 proposed amendment adding multiple-input multipleoutput data rate 1 or 2 MBit/s (MIMO) and many other newer features frequency range to GHz publication by the IEEE in September 2009 (ISM band) data rate at about 600 MBit/s a frequency range around 2,5 GHz or 5 GHz extended physical layer, published ac data rate 54 MBit/s Theoretical max. data rate 6.936Gbit/s with 8x8 MIMO frequency Range around 5 GHz Frequency: 5 GHz b p extended physical layer, published 1999 draft amendment to the IEEE standard to add wireless access in vehicular environments (WAVE) data Rate 11 MBit/s data exchange between high-speed vehicles and same frequency range as original between the vehicles and the roadside infrastructure in g the licensed ITS band of 5.9 GHz ( GHz) extended physical layer, published 2003 used as the groundwork for Dedicated Short Range data rate 54 MBit/s Communications (DSRC) frequency range to GHz approved p amendment was published in November 2010 Communication Networks 635 Prof. Jochen Seitz 4

5 Station Management Layers LLC Logical Link Control MAC Medium Access Control MAC Management PLCP Physical Layer Convergence Protocol PMD Physical Medium Dependent PHY Management Communication Networks Functions MAC Medium Access Segmentation/Reassembly Ciphering MAC Management Synchronization Roaming MIB Power Control PLCP Clear Channel Assessment Signal (Carrier Sense) PMD Modulation Coding PHY Management Channel Selection MIB Station Management Coordination of Management Functions Communication Networks 637 Prof. Jochen Seitz 5

6 images/80211fh.gif Radio Transmission Infrared (only for the first IEEE standard) nm, diffuse infrared operating at 1 Mbit/s, typically at a distance of max.10m carrier detection, energy detection and synchronization Frequency Hopping Spread Spectrum (FHSS) operating at 1 Mbit/s or 2 Mbit/s at least 2,5 frequency hops / s in the USA Direct Sequence Spread Spectrum (DSSS) originally DBPSK modulation for 1Mbit/s (Differential Binary Phase Shift Keying) and DQPSK for 2MBit/s (Differential Quadrature PSK) preamble of a frame is always transmitted at 1Mbit/s, remainder of the frame might be transmitted at higher speed chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker Code) max. transmission power 1W (USA), 100mW (EU), min. 1mW Orthogonal Frequency Division Multiplex (OFDM) a frequency-division multiplexing (FDM) scheme utilized as a digital multi-carrier modulation method Communication Networks MAC Frame Format Communication Networks 639 Prof. Jochen Seitz 6

7 Fields in the IEEE MAC Frame Synch Preamble: for FH PHY 80 bits for DSSS PHY 128 bits alternating '0's and '1's SFD Start Frame Delimiter: 16 bits PLW PLCP-PDU Length Word: 12 bits indicating the number of bytes in the packet first portion of the PLCP header PLCP header is transmitted only at 1 Mbps! PSF PLCP Signaling Field: 4 bits to show the rate of the MAC payload transmission Bit 0 is reserved and is always '0' Bits 1 to 3 indicate the data rates Communication Networks MAC Distributed Foundation Wireless MAC (DFWMAC) Different traffic types Asynchronous data transmission (standard) Exchange of MAC frames without Quality of Service ( best-effort ) Broadcast and multicast Time-limited transmission (optional) Point Coordination Function (PCF) only in infrastructure mode Communication Networks 641 Prof. Jochen Seitz 7

8 MAC Procedures Distributed Coordination Function: Carrier Sense Multiple Access with Collision Avoidance (DFWMAC-DCF CSMA/CA) Collision avoidance based on arbitrary backoff algorithm Minimum time span between two MAC frames (so called inter frame spacing) Correct transmission signaled with ACK-frame (except Broadcast or Multicast) Distributed Coordination Function with Request to Send / Clear To Send Frames (DFWMAC-DCF with RTS/CTS) Avoidance of hidden node problem Point Coordination Function (DFWMAC-PCF) List-based polling done in the Access Point (standard) (optional) (optional) Communication Networks MAC: Inter Frame Spacing Implementation of Priorities No guarantees Shorter inter frame spacing allows earlier sending time for the frame: (Short Inter Frame Spacing) Highest priority, for ACK, CTS, response to polling PIFS (PCF IFS) Medium priority, for time limited services in PCF DIFS (DCF, Distributed Coordination Function IFS) Lowest priority, for asynchronous data transmission DIFS medium busy DIFS PIFS Communication Networks 643 competition direct access, if medium is free DIFS next frame t Prof. Jochen Seitz 8

9 CSMA/CA I DIFS medium busy waiting time DIFS PIFS Competition Window (arbitrary backoff time) next frame time slot Carrier sense based on clear channel assessment signal Station may send, if medium is free for the appropriate IFS If medium is busy, station sets backoff time to an arbitrary number of time slots After the medium is free again, station waits the appropriate IFS and the backoff time If medium gets busy during backoff time, backoff time is frozen t Communication Networks CSMA/CA II DIFS DIFS DIFS DIFS bo e bo r bo e bo r bo e busy Station 1 bo e busy Station 2 Station 3 busy bo e busy bo e bo r Station 4 bo e bo r bo e busy bo e bo r Station 5 t busy medium busy (frame, ack etc.) bo e elapsed backoff time data arrival at MAC-SAP bo r residual backoff time Communication Networks 645 Prof. Jochen Seitz 9

10 CSMA/CA III Sending unicast frames Frames can be sent after DIFS (plus backoff time as described before) Receiver responds immediately (after ), if frame has been correctly received (CRC) If an error occurs, the frame is automatically repeated Sender Receiver Further Stations DIFS Data Communication Networks 646 Ack DIFS waiting time competition Data t RTS / CTS Sending unicast frames using RTS/CTS Before transmitting a data frame, an RTS frame has to be sent including the duration of the data frame (after DIFS) Receiver acknowledges RTS frame with a CTS frame (after ) Sender may then send the data frame after, which is acknowledged as usual Other stations store the time the medium is busy (as contained in the RTS and CTS frames) Sender Receiver DIFS RTS CTS data ACK Further Stations NAV = Network Allocation Vector Communication Networks 647 NAV (RTS) NAV (CTS) waiting time DIFS competition data t Prof. Jochen Seitz 10

11 RTS / CTS: Fragmentation Sender Receiver DIFS RTS CTS frag 1 ACK 1 frag 2 ACK2 Further Stations NAV (RTS) NAV (CTS) NAV (frag 1 ) NAV (ACK 1 ) DIFS competition data t Communication Networks 648 DFWMAC-PCF I t 0 t 1 Super Frame Medium busy Point Coordinator PIFS D 1 D 2 Stations U 1 U 2 NAV of the stations NAV Point Coordination Function Communication Networks 649 Prof. Jochen Seitz 11

12 DFWMAC-PCF II t 2 t 3 t 4 Point Coordinator D 3 PIFS D 4 CFend Stations U 4 NAV of the stations NAV period without competition competition t Communication Networks 650 MAC Address Format Frame Type to DS from DS Address 1 Address 2 Address 3 Address 4 Ad-hoc Network 0 0 DA SA BSSID - Infrastructure Network, from AP 0 1 DA BSSID SA - Infrastructure Network, to AP 1 0 BSSID SA DA - Infrastructure Network, in DS 1 1 RA TA DA SA DS : Distribution System AP : Access Point DA : Destination Address SA : Source Address BSSID : Basic Service Set Identifier RA : Receiver Address TA : Transmitter Address Communication Networks 651 Prof. Jochen Seitz 12

13 MAC Management Synchronization Finding and staying in a WLAN Timer etc. Power Management Sleep modus without loosing a frame Periodically sleeping, buffering of frames, traffic map Association / Reassociation Associating with a distribution system Roaming, i.e. changing networks when changing access points Scanning, i.e. actively looking for a WLAN MIB - Management Information Base Administering, reading, writing Communication Networks 652 MAC Synchronization in Infrastructure Mode beacon interval (20ms 1s) access point medium B B B B busy busy busy busy value of the timestamp B beacon frame t Communication Networks 653 Prof. Jochen Seitz 13

14 MAC Synchronization in Ad hoc Mode beacon interval station 1 B 1 B 1 station 2 B 2 B 2 medium busy busy busy busy t value of the timestamp B beacon frame random delay Communication Networks 654 Power Saving Idea: switch the transceiver off if not needed States of a station: sleep and awake Timing Synchronization Function (TSF) stations wake up at the same time Infrastructure Traffic Indication Map (TIM) list of unicast receivers transmitted by AP Delivery Traffic Indication Map (DTIM) list of broadcast/multicast receivers transmitted by AP Ad-hoc Ad-hoc Traffic Indication Map (ATIM) announcement of receivers by stations buffering frames more complicated - no central AP collision of ATIMs possible (scalability?) APSD (Automatic Power Save Delivery) new method in e replacing above scheme Communication Networks 655 Prof. Jochen Seitz 14

15 Power Saving in Infrastructure Mode TIM interval DTIM interval access point D B T T d D B medium busy busy busy busy station T TIM D DTIM p awake d t B broadcast/multicast p PS poll d data transmission to/from the station Communication Networks 656 Power Saving in Ad hoc Mode ATIM window beacon interval station B 1 A D B 1 1 station 2 B 2 B 2 a d B beacon frame random delay A transmit ATIM D transmit data t awake a acknowledge ATIM d acknowledge data Communication Networks 657 Prof. Jochen Seitz 15

16 Roaming No or bad connection? Then perform: Scanning scan the environment, i.e., listen into the medium for beacon signals or send probes into the medium and wait for an answer Reassociation Request station sends a request to one or several AP(s) Reassociation Response success: AP has answered, station can now participate failure: continue scanning AP accepts Reassociation Request signal the new station to the distribution system the distribution system updates its data base (i.e., location information) typically, the distribution system now informs the old AP so it can release resources Fast roaming r e.g. for vehicle-to-roadside networks Communication Networks 658 WLAN Security Concerns Anyone within the geographical network range of an open, unencrypted wireless network can 'sniff' the traffic, gain unauthorized access to internal network resources as well as to the Internet, and then possibly send spam or do other illegal actions using the wireless network's IP address. If router security is not activated or if the owner deactivates it for convenience, it creates a free hotspot. Modern operating systems such as Mac OS, or Microsoft Windows make it fairly easy to set up a PC as a wireless LAN 'base station' using Internet Connection Sharing, thus allowing all the PCs in the home to access the Internet via the 'base' PC. Communication Networks 659 Prof. Jochen Seitz 16

17 WLAN Security Options For closed networks (like home users and organizations) the most common way is to configure access restrictions in the access points. Encryption Checks on MAC address Disable ESSID broadcasting Wireless Intrusion Prevention Systems For commercial providers, hotspots, and large organizations, the preferred solution is often to have an open and unencrypted, but completely isolated wireless network. Captive portal which provides for payment and/or authorization Connect securely to a privileged network using VPN Finally, a general solution may be end-to-end encryption, with independent authentication on all resources that shouldn't be available to the public. Communication Networks 660 Access Control at the Access Point Level Allow access only from known, approved MAC addresses. No security against sniffing or spoofing MAC addresses Secret ESSID Not really secure. Wired Equivalent Privacy (WEP) U.S. FBI has demonstrated the ability to break WEP protection in only three minutes using tools available to the general public The Wi-Fi Protected Access (WPA and WPA2) security protocols Using a long enough random password (e.g. 14 random letters) or passphrase (e.g. 5 randomly chosen words) makes pre-shared key WPA virtually uncrackable. The second generation of the WPA security protocol (WPA2) is based on the final IEEE i amendment to the standard and is eligible for FIPS compliance (a U.S. government computer security standard used to accredit cryptographic modules). With all those encryption schemes, any client in the network that knows the keys can read all the traffic. Communication Networks 661 Prof. Jochen Seitz 17

18 Wi-Fi Protected Access Operating System Client Supplicant EAP Type Support Access point with support for EAP type a scheme of mutual authentication using either IEEE 802.1X/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology AAA server (RADIUS) with support for EAP type Communication Networks 662 Authentication Database Wi-Fi Protected Setup (WPS) Standard for easy and secure establishment of a wireless home network, created by the Wi-Fi Alliance and officially launched on January 8, To add a new device to the Network the user can have up to the following four choices: PIN Method (mandatory baseline model), in which a PIN (Personal Identification Number) has to be read from either a sticker on the new wireless client device (STA) or a display, if there is one, and entered at the "representant" of the network, either the wireless access point (AP) or a Registrar of the Network. PBC Method, in which the user simply has to push a button, either an actual or virtual one, on both the AP (or a Registrar of the Network) and the new wireless client device (STA). Support of this model is mandatory for APs and optional for STAs. NFC Method, in which the user simply has to bring the new STA close to the AP or Registrar of the Network to allow a Near Field Communication between the devices. NFC Forum compliant RFID tags can also be used. Support of this model is optional. USB Method, in which the user uses a USB stick to transfer data between the new STA and the AP or Registrar of the Network. Support of this model is optional. Communication Networks 663 Prof. Jochen Seitz 18

19 Restricted Access Networks IEEE 802.1x promises to enhance security on both wired and wireless networks. Wireless access points that incorporate technologies like these often also have routers built in, thus becoming wireless gateways. Communication Networks 664 End-to-End Encryption For protecting valuable data like passwords and personal s: Encryption and authorization in the application layer, using technologies like SSL, SSH, GnuPG, PGP and similar. The disadvantage with the end to end method is, it may fail to cover all traffic: With encryption on the router level or VPN, a single switch encrypts all traffic, even UDP and DNS lookups. With end-to-end encryption on the other hand, each service to be secured must have its encryption "turned on," and often every connection must also be "turned on" separately. For sending s, every recipient must support the encryption method, and must exchange keys correctly. For Web, not all web sites offer https, and even if they do, the browser sends out IP addresses in clear text. Communication Networks 665 Prof. Jochen Seitz 19

20 Ad hoc Networks (I)... a collection of wireless nodes, all of which may be mobile, dynamically create a wireless network among themselves without using any such infrastructure or administrative support. IEEE Feb S Communication Networks 666 Ad hoc Networks (II) A B C D E F G H Communication Networks 667 Prof. Jochen Seitz 20

21 Examples of Ad hoc Networking Technologies Infrastructure Networks Wireless Networks HIPERLAN 2/3/4 (WATM) Ad hoc Networks GSM UMTS GPRS... HIPERLAN 1 IEEE Bluetooth Communication Networks 668 IEEE s a draft IEEE amendment for mesh networking, defining how wireless devices can interconnect to create a WLAN mesh network, which may be used for static topologies and ad-hoc networks broadcast/multicast and unicast delivery using "radioaware metrics over self-configuring multi-hop topologies default mandatory routing protocol Hybrid Wireless Mesh Protocol (HWMP), inspired by a combination of AODV (RFC 3561) and tree-based routing One Laptop per Child project uses the s draft standard for its OLPC XO laptop and OLPC XS school server networking Communication Networks 669 Prof. Jochen Seitz 21

22 Routing in Ad hoc Networks (I) No loops Stability despite frequent changes in topology Unique addressing of member nodes Load distribution Security Little overhead Little energy consumption Handover (even with regards to quality of service) Localization of services Provision of mobile services and multicast abilities Transparent access to legacy networks / Internet Communication Networks 670 Routing in Ad hoc Networks (II) + compliance with all condition = = eierlegende Wollmilchsau (egg-laying wool-milk-sow) Conflicting goals: Functionality Load Energy Efficiency Thus: different routing protocols for different goals Equal load distribution Minimum number of hops Quality of service (bit rate, response time, etc.) Security Costs Communication Networks 671 Prof. Jochen Seitz 22

23 Table-Driven Routing Based on distance vector respectively link state algorithm Proactively keeping routing information in routing table Demands frequent updates Time between updates too long obsolete routing information if nodes are very mobile Time between updates too short high (unnecessary) traffic load Communication Networks 672 Source-initiated On-demand Driven Routing Reactively determining the route when it is needed For ongoing communication the route has to be kept actual Longer time for initial communication message First message will be flooded higher network load Communication Networks 673 Prof. Jochen Seitz 23

24 Different Ad hoc Routing Protocols WRP DSDV CGSR AODV (Wireless Routing Protocol) (Destination-Sequenced Distance-Vector Routing) (Clusterhead Gateway Switch Routing) (Ad-hoc On-Demand Distance Vector Routing) DSR LMR TORA ABR SSR (Dynamic Source Routing) (Lightweight Mobile Routing) (Temporally-Ordered Routing) (Associativity-Based Routing) (Signal Stability Routing) Communication Networks 674 Features of Different Ad hoc Routing Protocols Protocol Finding of Route QoS Avoidance of Loops Communication Networks 675 Flat or Hierarchical DSDV proactive * flat Support of Multicast CGSR proactive * hierarchical (cluster) With Extension WRP proactive * flat AODV reactive * flat * DSR reactive * flat TORA reactive * flat With Extension ABR reactive * * flat SSR reactive * flat CEDAR reactive * * hierarchical (backbone) Spine Routing reactive * hierarchical (virt. backbone) * RDMAR reactive * flat Prof. Jochen Seitz 24

25 Example Ad-hoc On-Demand Distance Vector Routing RFC 3561 (July 2003) Route discovery Route Request (RREQ) Route Reply (RREP) Route Maintenance Data route update Route Error (RERR) WiFi-Alliance: Deploying Wi-Fi Protected Access (WPA ) and WPA2 in the Enterprise, March Communication Networks 676 Ad hoc Networks and QoS (I) Guarantee of QoS even when topology keeps changing all the time! Normal procedure: Find route with enough resources Reserve the required resources Keep on controlling the achieved QoS For ad hoc networks: Limited range and energy Restricted availability of channels / bit rate (shared medium) Unforeseeable radio problems Vertical and horizontal handover Communication Networks 677 Prof. Jochen Seitz 25

26 Ad hoc Networks and QoS (II) Node cannot supply the required QoS Communication Networks 678 Ad hoc Networks and QoS (III) Trying to guarantee QoS through redundancy If QoS cannot be supplied: best effort transmission or communication breakdown Parallel Routes Simultaneous transmission Backup routes established and reserved Backup routes selected Communication Networks 679 Prof. Jochen Seitz 26

27 Interoperability with Other Networks One of the nodes in the ad hoc network allows access to some other network Problem: different network characteristics Addresses Capacity / QoS Routing and Signaling Example: WLAN-based ad hoc network Access Point Internet Communication Networks 680 Multimedia Transmission in an Ad hoc Network Idea: Transmitting a video stream in an ad hoc network based on AODV Problem: Communication Networks 681 Prof. Jochen Seitz 27

28 Summary on Ad hoc Networks Currently much research in this area Still not very well accepted Security? Benefits? Standards? Well suited to enhance an infrastructure network Communication Networks 682 Material Wikipedia Prof. Jochen Schiller: Mobile Communications Book available in many languages, e.g. German, English, Russian, Chinese Slides (PDF and PPT) can be found at Communication Networks 683 Prof. Jochen Seitz 28

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

Introduction to Ad hoc Networks

Introduction to Ad hoc Networks Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

Overview of 802.11 Networks and Standards

Overview of 802.11 Networks and Standards Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

IEEE802.11 Wireless LAN

IEEE802.11 Wireless LAN IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

Medium Access Control (MAC) and Wireless LANs

Medium Access Control (MAC) and Wireless LANs Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Introduction to IEEE 802.11 Wireless LAN

Introduction to IEEE 802.11 Wireless LAN Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

WUA-0605 300Mbps Wireless USB Network Adapter

WUA-0605 300Mbps Wireless USB Network Adapter WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant

More information

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a

More information

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/ WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

Wireless Local Area Networks and the 802.11 Standard

Wireless Local Area Networks and the 802.11 Standard Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...

More information

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL Introduction Thank you for your purchase of the Kozumi K-300MWUN High Power Wireless N Mini USB Adapter. Featuring wireless technology, this

More information

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

WI-FI TECHNOLOGY: SECURITY ISSUES

WI-FI TECHNOLOGY: SECURITY ISSUES RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. IEEE 802.11e WLANs / WMM S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Wireless LAN Pen-Testing. Part I

Wireless LAN Pen-Testing. Part I Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

IEEE 802.11 frame format

IEEE 802.11 frame format IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Mobile Ad Hoc Networks

Mobile Ad Hoc Networks Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/

ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ Wireless Long Range Multi-function 7+1 AP ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ EIRP up to 2000mW WDS Bridge/Client Router/AP Router ECB3500 is a powerful, enhanced,

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1. EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Chapter 2 Wireless Networking Basics

Chapter 2 Wireless Networking Basics Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).

More information

Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks

Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks Master Research Report June 6, 2008 Submitted By: Abbasi Ubaid Supervised By:Adlen Ksentini Team: DIONYSOS (IRISA) Abstract Wireless mesh networks

More information

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074 Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.1.1 Radio Channels...

More information

How To Configure the WLAN with QoS

How To Configure the WLAN with QoS How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any

More information

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012 WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Chapter 5: Wireless Design Models, Topologies, and Infrastructure

Chapter 5: Wireless Design Models, Topologies, and Infrastructure Chapter 5: Wireless Design Models, Topologies, and Infrastructure Overview Define, describe, and apply the following concepts associated with WLAN service sets Stations and BSSs Starting and Joining a

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

802.11b Access Point. User s Guide

802.11b Access Point. User s Guide 802.11b Access Point User s Guide FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Nokia Siemens Networks. CPEi-lte 7212. User Manual

Nokia Siemens Networks. CPEi-lte 7212. User Manual Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information