Introduction to the communication technologies

Size: px
Start display at page:

Download "Introduction to the communication technologies"

Transcription

1 Introduction to the communication technologies

2 The Open System Interconnection (OSI) model

3 The OSI model (cont) Layer Description Ex. Application Interaction with the software application FTP Presentation Data format conversion XDR Session Connection management SIP Transport Transfer of data and reliability TCP, UDP Network Addressing between a source and a destination via one network ore more IP Data Link Access medium management, error detection and correction IEEE Physical Specifications to access the medium Signal processing

4 Network Classification Categorization by range WAN MAN LAN PAN BAN Categorization by network topology...

5 Network Classification (cont)

6 The WSI Reference Model for the Wireless World

7 The new vision of the Wireless World The multi sphere model Human is the center of the services Proposed by the Wireless Strategic Initiative Initial partners: Alcatel, Ericsson, Nokia, Siemens In 2001, it became the Wireless World Research Forum

8 The MultiSphere Model 6 spheres PAN The Immediate Environment Instant Partners Radio Accesses Interconnectivity CyberWorld (Community Area Network)

9 Building Blocks of the Wireless World 1. Augmented Reality/Cyberworld 2. Semantic Aware Services 3. Peer Discovery 4. End-to-End security and Privacy 5. Co-operative Networks and Terminal 6. Heterogeneous Ad-hoc networking 7. Radio Interfaces 8. Smart Antennas and Base Stations 9. Software Defined Radio

10 The Communication Element (CE) Four blocks:

11 The IEEE 802 Project

12 Introduction to the IEEE model IEEE is the world s largest professional association dedicated to advancing technological innovation in electricity electronic 802 Project Project began in February 1980 Standards for LANs and MANs (network with variable-size packets) Define the Physical and Link Layer of the OSI model developed by the ISO (International Organization for Standardization) The Link Layer is divided in 2 sub-layers The Logical Link Control (LLC): IEEE The Media Access Control (MAC): IEEE (Ethernet), IEEE (Token Bus), IEEE (Token Ring)

13 Introduction to the IEEE model (cont) ISO Applciation Layer Presentation Layer Session Layer Upper Layers Transport Layer Network Layer Logical Link Control Data Link Layer Media Access Control Physical Signal Pjysical Layer Transmission Medium

14 The OSI model and LAN protocols

15 The MAC Address 48 bits Address Composed by 2 parts: 0rganizationally Unique Identifier (OUI): 3 most significant bytes (see RFC1700 for a list) Network Interface Controller (NIC) Specific: 3 less significant bytes Ex A-BC Canonical Format Non-Canonical Format

16 The MAC Address (cont)

17 The Ethernet Case

18 A little bit of history IEEE Standards for wired Ethernet networks Beginning 70s, the University of Hawaii propose the Aloha Protocol Communication between different islands Collision of frames 2400bps In 1973, Xerox PARC propose a new standard In 1976, DIX (DEC, Intel and Xerox) allow Ethernet to become an open standard Coaxial cable 3Mbps 10Mbps 1985, the IEEE standard is officially published Allow the implementation of several nodes (CSMA/CD)

19 The CSMA/CD protocol Carrier Sense Multiple Access with Collision Detection

20 The CSMA/CD protocol (cont) The principle is when a host detects a collision, all the others computers in the LAN should detect it The Slot time (TS) is defined like the twice of the time needed by a signal to travel the length of the maximum theoretical distance between two nodes In Ethernet the TS = 51,2μs, which represents 512bits at 10Mbps Considering that the speed of electricity in a copper cable is 200,000,000 m/s, what is the maximum theoretical length of a network using this technology? Length of frames must be equal or higher than the TS Add a padding if needed Except for jammings (length = 32bits)

21 Propagation speed Medium Propagation Speed Thick Coax.77c (231,000 km/sec) Thin Coax.65c (195,000 km/sec) Twisted Pair.59c (177,000 km/sec) Fiber.66c (198,000 km/sec) AUI Cable.65c (195,000 km/sec) c refers to the speed of light in a vacuum (300,000 kilometers per second)

22 Ethernet Cable Types, Lengths and Data Rate Cable Name Cable Type Maximum Length Data Rate 10Base5 Coax 500m per segment 10Mbps 10Base2 Coax 185m per segment 10Mbps 10BaseT UTP 100m per segment 10Mbps 10BaseF Fiber 4km 10Mbps 100BaseT UTP 100m per segment 100Mbps 100BaseTX 2 pair Cat 5 UTP 100m (hub and network node) 100Mbps

23 The BEB algorithm

24 The BEB Algorithm BEB: Binary Exponential Backoff After a collision, hosts wait d TS before continue sending frames d = rand(0, 2i 1) 1 i < 10 d = rand(0, 210 1) 10 I < 16 After 16 retransmissions, the process is aborted and the upper layer is informed about this failure

25 The BEB Algorithm

26 The 802.3D protocol CSMA/CD cannot guarantee a bounded access delay to frames transmitted Not adapted for real-time applications The CSMA/CDR protocol is the CSMA/CD version for real-time applications This protocol reverts to a toking passing algorithm when a collision is detected

27 Ethernet frame format

28 Frame Format Preamble 7 bytes with value Start Frame Delimiter 1 byte =

29 Some possible values of the Type Ethernet field

30 Example of an Ethernet Frame

31 Address Resolution MAC - IP

32 The ARP protocol ARP (Address Resolution Protocol) allow to know the MAC address of host from its IP address

33 The ARP packet Hardware Type IP = 0x0800 Hardware Address Length Ethernet = 1 Protocol Type Ethernet = 6 Protocol Address Length IPv4 = 4 Operation Request = 1 Reply = 2 Sender Hardware Address Sender IP Address Target Hardware Address Request = Target IP Address

34 Example of ARP frames Example 1 ADDR HEX 0000 FF FF FF FF FF FF C0 48 8C C0 48 8C Example 2 ADDR HEX C0 48 8C C0 E5 8C C0 E5 8C C0 48 8C

35 ARP messages and the Case of Multicast ARP Probe Gratuitous ARP The Case of Multicast: Conversion of a Class D IP address

36 Introduction to the Wireless Networks

37 Categorization of Wireless networks according to the range TAGGING RFID WPAN Wireless Personal Area Network (<10m) WLAN Wireless Local Area Network (<150m) WMAN Wireless Metropolitan Area Network (<5km) WRAN Wireless Regional Area Network (<100km)

38 IEEE standards for wireless networks WPAN IEEE Bluetooth IEEE UWB (Ultra Wide Band) IEEE ZigBee IEEE (Wi-Fi) IEEE b, a, g IEEE n IEEE s WMAN WLAN IEEE IEEE IEEE IEEE e/IEEE (Wi-Mobile) WRAN IEEE : Unused spaces in TV frequency spectrum MHz (Wi-RAN)

39 Wireless Networks: Data Rate vs Range

40 Wireless Networks: The Frequency bands

41 Wireless Metropolitan Area Network

42 Example of a WMAN: WiMAX

43 Example of a WMAN: WiMAX Network architecture Point to Point Point to MultiPoint Frequency band 2GHz et 11GHz Channel bandwidth 1.25 MHz, 5 MHz, 10 MHz or 20 MHz Up to 70Mbps New alternative for last Mile Networks

44 Example of a WMAN: WiMAX

45 Wireless Local Area Network

46 Example of a WLAN: IEEE Network architecture Point to Point Point to MultiPoint Frequency band Channel bandwidth 2.4GHz or 5GHz 22 MHz Rate: 11Mbps 54Mbps TM

47 Example of a WLAN: IEEE

48 Example of a WLAN: HomeRF Frequency band 2.4 GHz Maximum Rate HomeRF1 1.6Mbps HomeRF2 10 Mbit/s Range Between 50m and 100m

49 Example of a WLAN: HiperLAN Released in 1991 Frequency band Maximum Rate 5Ghz 20-54Mbps Range + 30 m

50 Wireless Personal Area Network

51 Example of WPAN: Bluetooth Frequency band Maximum rate 1Mbps Range 2.4GHz 10m Standards IEEE (Bluetooth) IEEE (Bluetooth 2)

52 Example of WPAN: Wireless USB Frequency band Maximum rate 53Mbps - 480Mbps Range 3.1GHz 10.6GHz 3m 10m Specification Wireless USB Specification Rev 1.1 (September 2010)

53 Example of WPAN: Wireless Z-Wave Frequency band Maximum Rate MHz (USA) 40Kbps Range 30m

54 Example of WPAN: ZigBee Frequency band Maximum rate 250Kbps Range 2.4GHz 10m Standard IEEE

55 Wireless Body Area Network

56 Example of WBAN: NFC Near Field Communication (NFC) Very low range Rate Similar to RFID (Radio Frequency Identification): HF 13.56MHz Applications ~424Kbps Frequency Range Only a few centimeters Access control NFC Forum:

57 The IEEE standard

58 Introduction The IEEE standard describes the characteristics of a Wireless LAN The term Wi-Fi is a contraction for Wireless Fidelity. Wireless Fidelity is the name that the Wi-Fi Alliance gave to the first specification Wi-Fi Alliance was founded in 1999 by 3com, Aironet, Intersil, Lucent Technologies, Nokia and Symbol Technologies The yin-yang logo indicates the certification of a product for interoperability

59 Introduction More specifically, IEEE defines the two lowest layer of the OSI model The Physical Layer (sometimes called the PHY Layer). The PHY Layer proposes 3 modulations techniques. This layer defines the technologies to transfer raw bits over a physical medium The Data Link Layer, which is composed by 2 sub-layers Logical Link Control (LLC) Media Access Control (MAC)

60 Introduction The LLC sub-layer provides the multiplexing and flow control mechanisms that make possible the coexistence of several network protocols on the same physical interface Same as IEEE802.3 The MAC sub-layer provides the addressing and channel access control mechanisms that make possible share the same link between different terminals

61 WLAN devices and operating modes WLAN devices Wireless Adapters Access Points (AP) Wireless routers Wireless network bridges Wireless repeaters defines two operating modes Infrastructure mode Ad-hoc mode

62 Operating modes

63 Infrastructure mode Wireless Stations (STAs) connect to the Access Point (AP) via a wireless link Basic Service Set (BSS): set of STAs connected to the same AP Each BSS is identified by a BSSID. In the infrastructure mode case, this BSSID correspond to the AP's MAC address It is possible to connect two BSSs by mean of a Distribution System (DS) Extended SS (ESS)

64 Infrastructure mode

65 Infrastructure mode An ESS is identified by an ESSID (also called SSID) 32B length (coded in ASCII) ESSID can be considered like the first level of security STAs can transparently change between APs in an ESS (ex. choice the AP with the highest signal quality) Roaming

66 Infrastructure mode To join a cell, STAs sends a probe request on each channel The probe request message indicates the ESSID to join and others characteristics like the supported data rate Upon reception of a probe request, the AP checks whether the ESSID matches its ESSID and if so, the AP sends a probe response containing synchronization information, supported data rate, etc. In absence of the requested ESS, the STAs can listen the medium to find a BSS APs can be configured to frequently send a beacon frame to diffuse the characteristics of the network

67 Ad-hoc networks In ad-hoc mode, nodes connect to one another to form a peer-to-peer network There is not Access points Self-organizing network without the need of fixed network infrastructure Multi-hop communication Nodes MAY behave like routers and forward packets on behalf of other nodes Decentralized, mobility-adaptive operation The set of nodes forms an Independent BSS (IBSS)

68 Ad-hoc networks In ad hoc networks, the coverage area depends on the range of each station in a IBSS

69 From infrastructure mode to ad-hoc networks As we move away from the BS, we move ourselves to pure ad-hoc operations Ad hoc networks can be used in several areas

70 IEEE802.11: The Physical Layer

71 Radio spectrum Radio frequency bands are usually regulated by the government Free spectrum Licensed spectrum Reserved for Astronomy observations

72 Radio spectrum Organizations that regulate the radio spectrum are ETSI (European Telecommunications Standards Institute) in Europe FCC (Federal Communications Commission) in USA MKK (Kensa-kentei Kyokai) in Japan l ART (Autorité de Régulation des Télécommunications (ART)) in France

73 The ISM band In 1985, the FCC designated 3 frequency band for the Industry, Scientific and Medical purposes. These parts of radio spectrum can be used without license The ISM bands (adopted later in several countries) are MHz, GHz and GHz In Europe, the frequency band between 890MHz and 915MHz is reserved for mobile communication (GSM). Only the bands at 2.4GHz and 5GHz can be used without license

74 PHY Layer IEEE defines 3 Physical Layer DSSS Physical Layer FHSS Physical Layer Infrared (IR) Physical Layer

75 Direct Sequence Spread Spectrum The ISM band at 2.4GHz is divided in 14 channels (13 channels In France and 11 channels in US), each one with a 22MHz bandwidth There are only 3 non overlapping channels Channel Frequen cy band

76 Direct Sequence Spread Spectrum DSSS may deliver frames at 1, 2, 5.5 and 11Mbps. The original standard specified only 1 and 2 Mbps data rates The only coding/modulation used is Baker code (pseudo-random noise, PN). PN = The chip sequence allow to detect errors during the transmission and introduce error correction techniques

77 Frequency Hopping Spread Spectrum FHSS consists in rapidly changing the transmission frequency in a predetermined pseudo random pattern Initially proposed for military activities FHSS uses Gaussian Frequency Shift Keying (GSFK) 75 channels with a 1MHz bandwidth Transmitter and receiver must be synchronized 78 hopping sequences grouped in 3 sets of 26 sequence each. Sequence from same set encounter minimum collision (suitable for collocated systems) To lower the amount of collision to acceptable levels, the actual number of collocated systems should be around 15

78 Frequency Hopping Spread Spectrum FHSS Consist in rapidly changing the transmission frequency in a predetermined pseudo random pattern Initially proposed for military activities FHSS uses Gaussian Frequency Shift Keying (GSFK) 75 channels with a 1MHz bandwidth Transmitter and receiver must be synchronized 78 hopping sequences grouped in 3 sets of 26 sequence each. Sequence from same set encounter minimum collision (suitable for collocated systems) To lower the amount of collision to acceptable levels, the actual number of collocated systems should be around 15

79 DSSS vs FHSS

80 IR PHY specifies also one alternative to the radio communication: the use of an infrared light IR PHY was proposed for short- and medium-range communication Systems may operate in line-of-sight mode or in diffuse mode (scatter mode) Unlike RF (radio frequency), IR cannot pass through walls IR support 1Mbps (using 16-PPM scheme) and 2Mbps (using 4-PPM scheme)

81 IR PHY

82 The MAC sub-layer

83 The Data Link Layer 2 sub-layer Logical Link Control Media Access Control The MACL sub-layer defines two methods to ensure all STAs get access to the medium Distributed Coordination Function (DCF) All STAs must implement DCF Point Coordination Function (PCF) Optional

84 CSMA/CA DCF is a method to access the media without synchronization or priority management DCF relies on the CSMA/CA alorithm CSMA/CA stands for Carrier Sense Multiple Access / Collision Avoidance While in wired networks, one station can know when one another is using the medium, this is not possible in Wireless networks CSMA/CA is the equivalent of CSMA/CD for wired networks CSMA/CA is a contention-based protocol making certain that all stations first sense the medium before transmitting Avoid collisions Avoid retransmissions

85 DCF DCF uses PCS (Physical Carrier Sensing) and VCS (Virtual Carrier Sensing) to avoid collisions The PCS implementation is based on the Clear Channel Assessment (CCA) function When the station senses an energy above a specific threshold the medium is busy VCS uses two different mechanisms to reserve the medium By mean of the RTS/CTS frames: the overhead may be important By mean of a timer (NAV)

86 Inter-Frame spacing The time elapsed between two frames is known like Inter-Frame Spacing (IFS) There are 4 types of IFS Short IFS (SIFS). Depend on the kind of PHY FHSS = 28microsec DSSS = 10microsec Distributed IFS (DIFS) = SIFS + 1TS Point Coordination IFS (PIFS) = SIFS + 2TS Extended IFS (EIFS)

87 The hidden/exposed node problem MS-D ignores the communication between MS-B and MS-C. MS-D sends data to MS-C MS-A listen the communication between MS-C and MS-B. MS-A cannot communicate with MS-D

88 BEB Algorithm

89 Timers and Constants Congestion Window Advised min = 15 Advised max = 1023 CWi = min(cwmax, CWmin*2i 1) Back-off T = random(0,cw)*ts Timeslot FHSS = 50μs DHSS = 20μs OFDM = 9μs...

90 DCF

91 Error Control In wireless networks, checking for data corruption is important due to the unreliability nature of the medium The MAC sub-layer usually implement the Cyclic Redundancy Check (CRC) to detect errors in the MAC frames Polynomial of order 32 x32+x26+x23+x22+x16+x12+x10+x8+x7+ x5+x4+x2+x+1

92 Frame format frames have the following format Preamble 80-bit sequence of alternating zeros and one Start Frame Delimiter (SFD) which consist of a 16-bits binary pattern ( ) PLCP (Physical Layer Convergence Protocol) header PLCP_PDU Length Word. Number of bytes in the packet PLCP Signaling Field. Rate information Header Error Check Field. 16-bit CRC MAC Data MAC frame

93 MAC frame format General format of a MAC frame The Frame Control Field contains the following information

94 Frame Control Protocol version Type and subtype with a length of 2 and 4 bits respectively Management type (00). Association/disassociation messages Control messages (01). Access control to the media Data messages (10). Contains data sent by the upper layer ToDS = 1 when the frame is addressed to a Distribution System (the AP). FromDS = 1 when the frame comes from a DS 2 bits = 00 What is the value for ToSD ans FromDS in an ad-hoc network? More fragments One Fragment belonging to the same frame follows current frame

95 Frame Control Retry = 1 indicates that this frame is a retransmission Power Management = 1 indicates that the station enters in power save mode More Data. Used by the AP to indicate to a STA that some frames are buffered WEP. Set to 1 when the frame body is encrypted with the WEP algorithm

96 MAC frame format Duration/ID. In Power-Save Poll messages this field indicate the ID of the STA In all other messages, this is the duration value used for the NAV calculation Address 1. The recipient address Address 2. Transmitter address Address 3. if FromDS=1, then this is the original Source Address. If ToDS = 1, then this is the Destination Address Address 4. Wireless Distribution System frame distributed from one AP to another AP

97 MAC Frame Format Sequence Control is used to re-assembly several fragments corresponding to a same frame Sequence number (12 bits) contains the ID of the fragmented frame Fragment number (4 bits). Number of each frame sent of a fragmented frame CRC

98 RTS and CTS frames

99 Type and subtypes (summary)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Overview of 802.11 Networks and Standards

Overview of 802.11 Networks and Standards Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

IEEE802.11 Wireless LAN

IEEE802.11 Wireless LAN IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection: Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

IEEE 802.11 frame format

IEEE 802.11 frame format IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and

More information

Wireless Local Area Networks and the 802.11 Standard

Wireless Local Area Networks and the 802.11 Standard Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...

More information

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/ WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

Introduction to Ad hoc Networks

Introduction to Ad hoc Networks Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Data Link Layer. Page 1. Ethernet

Data Link Layer. Page 1. Ethernet Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs Wireless LANs were once considered expensive and slow solutions to certain network connectivity issues. Wireless LAN sales are now

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Cabling LANs and WANs

Cabling LANs and WANs Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The

More information

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local

More information

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07. Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Introduction to IEEE 802.11 Wireless LAN

Introduction to IEEE 802.11 Wireless LAN Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter

More information

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL Introduction Thank you for your purchase of the Kozumi K-300MWUN High Power Wireless N Mini USB Adapter. Featuring wireless technology, this

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Medium Access Control (MAC) and Wireless LANs

Medium Access Control (MAC) and Wireless LANs Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

Tecnologías Inalámbricas.

Tecnologías Inalámbricas. Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

EKT 331/4 COMMUNICATION NETWORK

EKT 331/4 COMMUNICATION NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 331/4 COMMUNICATION NETWORK LABORATORY MODULE LAB 5 WIRELESS ACCESS POINT Lab 5 : Wireless Access Point Objectives To learn

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a

More information

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

WIRELESS ETHERNET (IEEE 803.11)

WIRELESS ETHERNET (IEEE 803.11) WIRELESS ETHERNET (IEEE 803.11) Wireless LANs form a very small percentage of LANs in operation today, but their use is growing rapidly. Wireless LANs transmit data through the air using radio or infrared

More information

How To Understand The Layered Architecture Of A Network

How To Understand The Layered Architecture Of A Network COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

WI-FI TECHNOLOGY: SECURITY ISSUES

WI-FI TECHNOLOGY: SECURITY ISSUES RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

More information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1 Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

More information

11Mbps Wireless LAN PC Card. User s Manual

11Mbps Wireless LAN PC Card. User s Manual 11Mbps Wireless LAN PC Card User s Manual Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic

More information