ACADEMICIA Volume 2, Issue 4 (April, 2012) ISSN ACADEMICIA: ROUTING ALGORITHM FOR SECURE BROADBAND NETWORKS ER.

Size: px
Start display at page:

Download "ACADEMICIA Volume 2, Issue 4 (April, 2012) ISSN ACADEMICIA: ROUTING ALGORITHM FOR SECURE BROADBAND NETWORKS ER."

Transcription

1 Published by: ACADEMICIA: A n I n t e r n a t i o n a l M u l t i d i s c i p l i n a r y R e s e a r c h J o u r n a l ROUTING ALGORITHM FOR SECURE BROADBAND NETWORKS ABSTRACT ER.GURJEET SINGH* *Assistant Professor, Department of CSE/IT, Desh Bhagat Institute of Engineering & Management, Moga, India. Broadband wireless access networks are considered to be enterprise-level networks providing more capacity and coverage. Wireless networking has offered an alternative solution to the problem of information access in remote inaccessible areas where wired networks are not cost-effective. They have changed the way people communicate and share information by eliminating worrisome factors of distance and location. This paper provides a technical analysis of alternatives for implementing last-mile wireless broadband services. It provides detailed technical differences between (Wi-FI) wireless networks with (WiMAX), a new technology that solves many of the difficulties in last-mile implementations. This paper proposes a new routing protocol that integrates WLANs and WMANs, allowing seamless interconnectivity. KEYWORDS: WiFi, WiMAX, Broadband Wireless Networks. I. INTRODUCTION Broadband wireless access (BWA) is increasingly gaining in popularity as an alternative lastmile technology to DSL lines and cable modems. Following the hugely successful global deployment of the wireless local area network standard, deployment of the IEEE d and e wireless metropolitan area network standards is currently in progress. This technology aims to provide broadband wireless access to residential and small business applications, as well as enable Internet access in countries without any existing wired infrastructure in place. The latter version (802.16e) attempts to provide mobility to the end user in a MAN environment. Wireless technologies need to be examined from two perspectives: that of access network and the backhaul network. Even the access networks are principally categorized into two groups. There is the cellular network group and the broadband wireless 60

2 access group, popularly known as the 802.xx family. The 802.xx family has seen the proliferation of different standards since its inception. Such diversity has been necessitated by the number of properties desired from them. II. OVERVIEW OF WI-FI & WIMAX THE IEEE (WI-FI) WiFi is a trade mark of the WiFi Alliance (Wireless Ethernet Compatibility Alliance), which is in charge of testing and certifying the interoperability of devices based on the IEEE standard [3]. WiFi allows APs a coverage radius, or hotspot, of approximately 100m in interior spaces [3]. Meanwhile, WiFi exterior coverage can cover a radius of approximately 300m, depending on environmental conditions [7]. The transmission speed of the different WiFi standards ranges from 11Mbps until 54Mbps [3]. There are three well known wireless family standard widely used today. B. THE IEEE B A refined standard for the original and was successful due to its high data rates of 11 Mb/s - range of 100 m to a maximum of a few hundreds meters, operates on 2,4 GHz unlicensed band b is the most widely deployed wireless network within the wireless families [4, 5]. It uses the DSSS modulation technique that is more reliable than the FHSS. C. THE IEEE G The IEEE g wireless standard also operates on the 2.4 GHz band and has similar range and characteristics as the b. It has a data rate of 54Mbps. The g has backward compatibility with b and differs only on the modulation technique; it uses Orthogonal Frequency Division Multiplexing (OFDM). This then makes the b devices not able to pick the signal from the g devices D. THE IEEE A Operates in the 5 GHz band with a maximum data rate of 54Mbps. The major disadvantage in deploying a with the other standards b and g is that, they cannot co-exist, as they operate on different frequency bands b/g operates on the 2.4 GHz spectrum. There are some wireless card and access points which are compatible to all the three standards thereby supporting the 2.4GHz and 5GHz frequencies. WiFi s advantages include: its use of a non-licensed frequency band. its fewer international regulatory restrictions. 61

3 its infrastructureless architecture that allows for ubiquitous functioning and dynamic growth. its low cost. its mobility without network connection breaks. WIFI S DISADVANTAGES INCLUDE III. WIMAX its use of the 2.4GHz spectrum, which is susceptible to interference. its higher energy consumption when compared to other standards. WiMAX is the acronym for Worldwide Interoperability for Microwave Access and its architecture is based on broadband point-to-multipoint wireless access [3]. WiMAX was created in 2001 to promote the IEEE standard. This standard was finally approved in June 2004 [4]. The standard provides for fixed and mobile WiMAX in d and e, respectively [9]. Some important characteristics of WiMAX include: Power: Varies with band. Profiles from 100 Mw up to 2W Configuration: P-P and P-MP Cellular Spectrum: Initially 3.5 GHz licensed and 5.8 GHz unlicensed bands Radio interface: OFDM, using 256 tones Access Protocols: Downstream - TDM (Broadcast), Upstream - TDMA with access contention Security via station authentication and encryption Data rates variable with channel bandwidth 3.5 MHz in 3.5 GHz band, 20 MHz in 5.8 GHz band Actual realizable data rates are ~ 2b/Hz Maximum range ~2Km for indoor Non-LOS cellular service at 3.5 GHz 62

4 APPLICATIONS OF WIMAX WiMAX will allow people to go from their homes to their cars, and then travel to their offices or anywhere in the world, all seamlessly[7]. WiMAX can serve the business, residential and mobile segments. The applications in these areas are listed below: RESIDENTIAL USERS Basic voice services, low cost domestic & international calls Basic (dialup speed) to advanced (over 1Mbps) data connections Bundled voice and data services BUSINESS USERS Basic data connectivity for small businesses Advanced data services to medium and large businesses Feature-rich, low cost voice services (VoIP) MOBILE USERS (MOBILE WIMAX ONLY) Data connectivity for mobile workforce Data connectivity for international visitors IV. ARCHITECTURE OF WIFI & WIMAX Ali-Yahiya et al. propose an architecture where the WiFi and WiMAX networks and their traffic routes are separated by dedicated gateways to provide interconnectivity [6]. The main characteristic of this architecture is that it employs an overlapping area between a WLAN and a WMAN hotspot, where they interconnect at a BS and an AP. The WMAN coverage area expands using the WLAN hotspots. More than one AP can be located near the limit of the WMAN s coverage area. The authors assume that WiFi network APs are connected to the WiMAX network by means of a gateway that permits bidirectional interconnectivity. 63

5 FIGURE 1 ARCHITECTURE OF WIFI & WIMAX To better integrate WiFi and WiMAX technologies, it is important to identify the differences between them, including: WiFi channels use a specific band frequency while WiMAX permits users to select the channel requirements. WiMAX uses licensed frequencies while WiFi employs unlicensed ISM frequency bands. WiFi has a range of approximately 10m while WiMAX can cover several kilometers. WiMAX is a MAN protocol that provides an alternative to DSL and cable modem technologies, providing broadband access for the last mile as it acts as a backbone for WiFi hotspots. Quality of service (QoS) and mobility are the most common challenges, thus require specific protocols to integrate different types of wireless networks. The most significant problem in terms of QoS is the actual handoff, where nodes must pass information between cells. An important aspect to consider is that the basic support for QoS differs significantly between WLAN and WMAN because of the different architectures, and more specifically, the specifications of their physical and MAC layers [6]. 64

6 WiMAX technology supports both PMP and Mesh. A WiMAX PMP network provides last mile access to broadband Internet services by organizing the nodes in a manner that is similar to cell phone networks because it uses a BS. Meanwhile, in mesh topology, an ad hoc network functions independently of the BS. Each node can simultaneously transmit and receive information from neighbor nodes. Additionally, they can send information using a multihop strategy to communicate with nodes that are further away. The security mechanism of the IEEE standard focuses principally of MAC layer security which does not, however, provide sufficient security for multihop transmissions. Consequently, the IEEE standard is insufficient to meet the requirement of WiMAX Networks. V. SECURITY FEATURES OF IEEE The IEEE WLAN or WiFi specification has identified several services to provide a secure operating environment. The security services are provided largely by the Wired Equivalent Privacy (WEP) protocol to protect link level data during wireless transmission between clients and access points. WEP does not provide end-to-end security, but only for the wireless portion of the connection. However, there are a number of problems with the WEP protocol and its vulnerabilities significantly limit its ability to safeguard data. Commonly available tools such as AirSnort, WEPCrack and dweputils have the ability to crack WEP keys by analysing traffic from totally passive data captures. An improvement on WEP is the Wi-Fi Protected Access (WPA) which was introduced in The three basic security services defined by IEEE for the WLAN environment are: AUTHENTICATION: provide access control to the network by denying access to client stations that cannot authenticate properly. This service addresses the question, Are only authorised persons allowed to gain access to my network? CONFIDENTIALITY: Are only authorised persons allowed to view my data? INTEGRITY: Ensure that messages have not been modified in transit between the wireless clients and the access point in an active attack. This service addresses the question, Is the data coming into or exiting the network trustworthy has it been tampered with? VI. THREATS There have been many reports describing attacks on wireless networks that expose organisations to security risks. These attacks, either active or passive, are essentially on confidentiality, integrity and network availability. According to the US National Institute of Standards and Technology (NIST) there are six different types of attacks under passive and active categories against IEEE networks: PASSIVE ATTACK: An attack in which an unauthorised party gains access to an asset and does not modify its content (i.e. eavesdropping). Passive attacks can be 65

7 either eavesdropping or traffic analysis (sometimes called traffic flow analysis) and are described below: EAVESDROPPING: The attacker monitors transmissions for message content. An example of this attack is a person listening into the transmissions on a LAN between two workstations or tuning into transmissions between a wireless handset and a base station. TRAFFIC ANALYSIS: The attacker, in a more subtle way, gains intelligence by monitoring the transmissions for patterns of communication. A considerable amount of information is contained in the flow of messages between communicating parties. ACTIVE ATTACK: An attack whereby an unauthorised party makes modifications to a message, data stream, or file. It is possible for these attacks to be detected but they may not always be preventable. Active attacks may take the form of one of four types (or combination thereof): masquerading, replay, message modification, and denial-of-service (DoS). These attacks are defined below: MASQUERADING: The attacker impersonates an authorised user and thereby gains certain unauthorised privileges. REPLAY: The attacker monitors transmissions (passive attack) and retransmits messages as the legitimate user. MESSAGE MODIFICATION: The attacker alters a legitimate message by deleting, adding to, changing, or reordering it. DENIAL-OF-SERVICE: The attacker prevents or prohibits the normal use or management of communications facilities. VII. COMPARISON OF WIFI AND WIMAX A start can be made by saying that comparing WiMAX and WiFi is comparing two different frameworks. WiMAX has much longer distances and may (or will) also include mobility between cells. In fact, WiFi and WiMAX are complementary, specifically if WiMAX is used for the backhauling of WiFi. There is also a difference in the chronology. WiFi is a WLAN, based on the IEEE standard, published in 1997, and the b variant, published in WiMAX is a BWA system, including mobility, based on the IEEE standard, published in 2004, and the e variant, published in February 2006 (in addition to other amendments). Hence, if we consider the standard or the products, there is a difference of about six years between the two. The main points of comparison of the three technologies that have been discussed in this paper are listed in table1. 66

8 Technology WiFi WiMAX Application Wireless LAN, Internet Metro Area Broadband Internet Connectivity Range 100m 50km Frequency Range 2.4 GHz 2-11GHz Data Rate Mbps 75Mbps Network P2P IP Network Topology Infrastructure(Ad-hoc also possible) Infrastructure Access Protocol CSMA/CA Request/Grant Key Attributes Wider Bandwidth Throughput TABLE 1 COMPARISON BETWEEN WIFI & WIMAX VIII. PROPOSED ROUTING ALGORITHM The goal of our algorithm is to afford users of ad hoc network broadband service using devices that can select the best route in terms of bandwidth, battery residual energy and distance. The proposed protocol can carry out the necessary hops to send and receive data within a WiMAX network. If, a connection is broken, the algorithm is designed to automatically reconnect. AODV is a routing protocol that is used to connect mobile nodes in Ad hoc networks. Important characteristics of AODV include: quick adaptation to dynamic conditions rapid data processing speed low network utilization its unicast route mechanism that permits easier data transmission between origin and destination pairs. The main characteristics of AODV algorithm is its reactive route discovery mechanism, that begins only when a node requires information from neighbor nodes. This strategy allows AODV to reduce the number of control packets sent, thus reducing overhead. AODV also maintains dynamic routing tables and its routing mechanism responds quickly to broken links by establishing alternative routes. 67

9 Figures 2 show the flow diagrams for the proposed routing algorithm. Source node requesting transmission begins with a RREQ packet until it can reach a destination node or the WiFi/WiMAX gateway. FIGURE 2 PROPOSED ROUTING ALGORITHM If the destination node is outside of the coverage area of the WiFi network, the AP should retransmit the RREQ packet. After, the WIFI/WIMAX gateway or destination node receive the packet, it will reply a RREP packet to the source node. CONCLUSION In this paper we discussed the algorithm for secure broadband networks. In the future, other algorithms can be developed using the same simulation scenario under different conditions in order to obtain quantitative data to determine which protocol best for routing WiFi and WiMAX technologies. WiMAX has a large number of mechanisms and is expected to be used for many 68

10 applications. The near future will tell which of these mechanisms will be implemented, how they will be implemented and the mechanisms that will be updated by the standardisation bodies. REFERENCES [1] Gurjeet Singh, Dr.Jatinder Singh(2011) Comparative Analysis of Broadband Wireless Technologies IJCST Vol. 2, Issue 4, Oct - Dec pp [2] R. Bera, B. Paul, A. Guchhait, S. Sil. N.B. Sinha, y S. Dogra. Wireless Embedded System for Multimedia Campus Network Utilizing IEEE N (draft) and WiMax Radio, en Proc Wireless and Optical Communications Networks, pp.1-5. [3] S. Jindal, A. Jindal, y N. Gupta. Grouping WI-MAX, 3G and WI-FI for wireless broadband, en Proc First IEEE and IFIP International Conference in Central Asia. [4] A. Ian F., W. Xudong, W. Weilin. Wireless Mesh Networks: A Survey, Computer Networks, Volume 47, Issue 4, 15 March 2005, pp [5] T. Su-En. WiMax-Prospect and New Business Models, en Proc G and Beyond, th IEEE International Conference on, pp.1-5. [6] T. Ali-Yahija, K. Sethom, y G. Puiolle. Seamless Continuity of Service across WLAN and WMAN Networks: Challenges and Performance Evaluation, Proc IEEE/IFIP International Workshop, pp [7] S. Dhawan. Analogy of Promising Wireless Technologies on Different Frequencies: Bluetooth, WiFi, and WiMAX, en Proc Wireless Broadband and Ultra Wideband Communications, AusWireless The 2nd International Conf. [8] IEEE and WiMAX: Broadband Wireless Access for Everyone, Intel Corporation,

Wi-Fi & Wi-MAX: A Comparative Study

Wi-Fi & Wi-MAX: A Comparative Study Wi-Fi & Wi-MAX: A Comparative Study Sourangsu Bandopadhyay 1, Rahul Singha Chowdhury 2 1,2 Dept of E.C.E., RCC-Institute of Information Technology, India Abstract Usually broadband wireless access networks

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Wi-Fi & WiMAX: A Comparative Study

Wi-Fi & WiMAX: A Comparative Study Wi-Fi & WiMAX: A Comparative Study Sourangsu Banerji 1*, Rahul Singha Chowdhury 2 1, 2 Department of Electronics & Communication Engineering, RCC-Institute of Information Technology, India ABSTRACT: Usually

More information

Spring 2014. Final Project Report

Spring 2014. Final Project Report ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca

More information

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Figure 1: Bandwidth and coverage of wireless technologies [2].

Figure 1: Bandwidth and coverage of wireless technologies [2]. Simulation and Performance Evaluation of WiFi and WiMAX using OPNET Ravinder Paul, Sukhchandan Lally, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {rpa28, lally,

More information

NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology

NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology NEW WORLD TELECOMMUNICATIONS LIMITED 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology Issue Number: 01 Issue Date: 20 April 2006 New World Telecommunications Ltd Page 1 of 9 Issue

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

What is 802.11? Why are standards important?

What is 802.11? Why are standards important? What is 802.11? The 802.11 standards are a group of evolving specifications defined by the Institute of Electrical and Electronic Engineers (IEEE). Commonly referred to as Wi Fi the 802.11 standards define

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

This tutorial has been prepared for readers to help them understand the concepts related to WiFi.

This tutorial has been prepared for readers to help them understand the concepts related to WiFi. About the Tutorial is primarily a local area networking (LAN) technology designed to provide in-building broadband coverage. It is based on IEEE 802.11 specification. This tutorial gives you a basic understanding

More information

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

How To Manage An 802.11 Wireless Network At A University

How To Manage An 802.11 Wireless Network At A University WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits

More information

Narrowband and Broadband Access Technologies

Narrowband and Broadband Access Technologies Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya (LKaya@ieee.org)

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,

More information

Appendix A: Basic network architecture

Appendix A: Basic network architecture Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile

More information

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.

More information

CHAPTER. Wireless Networking

CHAPTER. Wireless Networking 11 CHAPTER Wireless Networking CHAPTER OUTLINE 11-1 Introduction 11-2 The IEEE 802.11 Wireless LAN Standard 11-3 802.11 Wireless Networking 11-4 Bluetooth, WiMAX, and RFID 11-5 Securing Wireless LANs 11-6

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

What s so smart about Smart-hopping?

What s so smart about Smart-hopping? What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

WiMax broadband wireless access. Wireless communication is considered one of the big engineering success stories

WiMax broadband wireless access. Wireless communication is considered one of the big engineering success stories WiMax broadband wireless access Introduction Wireless communication is considered one of the big engineering success stories over the last two decades. It is one of the rapidly changing fields that demand

More information

ISSUES OF INTEROPERABILITY AMONG HETEROGENEOUS WIRELESS COMMUNICATION NETWORKS

ISSUES OF INTEROPERABILITY AMONG HETEROGENEOUS WIRELESS COMMUNICATION NETWORKS ISSUES OF INTEROPERABILITY AMONG HETEROGENEOUS WIRELESS COMMUNICATION NETWORKS T. L. SINGAL Professor, School of Electronics and Electrical Engineering Chitkara University, Chandigarh Abstract: - Several

More information

Tranzeo s EnRoute500 Performance Analysis and Prediction

Tranzeo s EnRoute500 Performance Analysis and Prediction Tranzeo s EnRoute500 Performance Analysis and Prediction Introduction Tranzeo has developed the EnRoute500 product family to provide an optimum balance between price and performance for wireless broadband

More information

The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications.

The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. 1 Study Approach We have performed a study to analyze Smart Grid Communication

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. pmccurdy@phoenixcon.com Ira Sharp Product Specialist Phoenix

More information

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.

More information

Nigerian Communications Commission

Nigerian Communications Commission Nigerian Communications Commission REGULATORY GUIDELINES FOR THE USE OF 2.4 GHz ISM BAND FOR COMMERCIAL TELECOM SERVICES Introduction The use of broadband for last mile access or for final distribution

More information

Nokia Siemens Networks Mobile WiMAX

Nokia Siemens Networks Mobile WiMAX Nokia Siemens Networks Mobile WiMAX 1. 2/6 Mobile WiMAX leads the way to wireless broadband access With Mobile WiMAX, the communications industry is another step closer to offering mobile broadband Internet

More information

XBEE 802.15.4 PROTOCOL COMPARISON

XBEE 802.15.4 PROTOCOL COMPARISON Connect with Confidence XBEE 802.15.4 PROTOCOL COMPARISON Abstract Creating wireless networks can be done using a variety of RF protocols. Some protocols are proprietary to individual vendors, others are

More information

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,

More information

So Many Wireless Technologies Which Is the Right One for My Application?

So Many Wireless Technologies Which Is the Right One for My Application? So Many Wireless Technologies Which Is the Right One for My Application? Don P. Dickinson Senior Business Development Manager Water Sector Phoenix Contact USA Abstract Wireless technology has transformed

More information

Computer Wireless Networking and Communication

Computer Wireless Networking and Communication Computer Wireless Networking and Communication Eng.Nassar Enad. GH. Muhanna Computer Engineer, Computer Department,The Higher Institute of Telecommunication and Navigation, Shuwaikh, Kuwait Kuwait City,

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Accelerating Wireless Broadband. Sparking New Competition in Broadband Through the IEEE* 802.16 WirelessMAN Specification

Accelerating Wireless Broadband. Sparking New Competition in Broadband Through the IEEE* 802.16 WirelessMAN Specification Accelerating Wireless Broadband Sparking New Competition in Broadband Through the IEEE* 802.16 WirelessMAN Specification Broadband has been a long time coming, and for most people it s still not here yet.

More information

Wireless in the production plant

Wireless in the production plant ATS MES Excellence Centres Wireless in the production plant For various industries How to avoid trouble when setting up a wireless network ETSI: European Telecommunications Standards Institute (www.etsi.org,

More information

Wireless The answer to all our communications needs?

Wireless The answer to all our communications needs? Wireless The answer to all our communications needs? Introduction Since BT s last review of its leased lines back in 2003, there has been a concern in local government that analogue lines will go the way

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Security in Wireless Mesh Networks

Security in Wireless Mesh Networks Thesis report, IDE 0949, June 2009 Security in Wireless Mesh Networks Master s Thesis in Computer Network Engineering Presented By: Shakeel Ahmad Ghumman Supervisor: Per-Arne-Wiberg School of Information

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

IEEE 802.11n Enterprise Class Wireless LAN?

IEEE 802.11n Enterprise Class Wireless LAN? Introduction Over the last decade Wi-Fi has advanced from a technology offering a maximum 2Mbps over-theair data rate, to 11Mbps and now to 54Mbps. The technology has been improved to include additions

More information

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber

More information

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2 BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

EKT 331/4 COMMUNICATION NETWORK

EKT 331/4 COMMUNICATION NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 331/4 COMMUNICATION NETWORK LABORATORY MODULE LAB 5 WIRELESS ACCESS POINT Lab 5 : Wireless Access Point Objectives To learn

More information

Broadband Access Technologies

Broadband Access Technologies Broadband Access Technologies Chris Wong Communications Engineering Sector Analysis & Reporting Branch International Training Program 23 October 2007 Presentation Outline What is broadband? What are the

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

Whitepaper. 802.11n The Next Generation in Wireless Technology

Whitepaper. 802.11n The Next Generation in Wireless Technology Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed

More information

Motorola s Wireless Broadband Point-to-Point Solutions. The PTP 100, 400 & 600 Series Part of Motorola s MOTOwi4 portfolio

Motorola s Wireless Broadband Point-to-Point Solutions. The PTP 100, 400 & 600 Series Part of Motorola s MOTOwi4 portfolio Motorola s Wireless Broadband Point-to-Point Solutions The PTP 100, 400 & 600 Series Part of Motorola s MOTOwi4 portfolio High-Speed Point-to-Point Solutions Engineered for Simple-to-Complex Applications

More information

Introduction to Networking

Introduction to Networking 1 CHAPTER ONE Introduction to Networking Objectives 2.3 Identify common physical network topologies. Star. Mesh. Bus. Ring. Point to point. Point to multipoint. Hybrid 2.7 Explain common logical network

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What

More information

ITU-T RECOMMENDATION J.122, SECOND-GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES IP CABLE MODEMS

ITU-T RECOMMENDATION J.122, SECOND-GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES IP CABLE MODEMS ORGANIZATION OF AMERICAN STATES INTER-AMERICAN TELECOMMUNICATION COMMISSION PERMANENT CONSULTATIVE COMMITTEE I: TELECOMMUNICATION STANDARDIZATION Standards Coordination Document Nr. 10: ITU-T RECOMMENDATION

More information

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8 54M/150M/300Mbps USB WIRELESS ADAPTER User s Manual Version 1.8 Introduction User s Manual Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup.

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Deploy WiFi Quickly and Easily

Deploy WiFi Quickly and Easily Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting

More information

ZoneFlex 7731. Smart 802.11n 5GHz Outdoor Wireless Bridge. The First Centrally Managed 802.11n 5GHz Outdoor Wireless Bridge BENEFITS

ZoneFlex 7731. Smart 802.11n 5GHz Outdoor Wireless Bridge. The First Centrally Managed 802.11n 5GHz Outdoor Wireless Bridge BENEFITS ZoneFlex 7731 The First Centrally Managed 802.11n 5GHz Outdoor Wireless Bridge The Ruckus ZoneFlex 7731 is the first centrally-managed, outdoor point-to-point and point-to-multipoint bridge that unleashes

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0 54M/150M/300Mbps USB WIRELESS ADAPTER User s Manual Version 2.0 1. Introduction User s Manual Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup.

More information

2.4GHz 802.11n Outdoor CPE Model:WLAN-LCCPE28-1

2.4GHz 802.11n Outdoor CPE Model:WLAN-LCCPE28-1 2.4GHz 802.11n Outdoor CPE Model:WLAN-LCCPE28-1 Features IP55 Rated Enclosure IEEE 802.11b/g/n Compliant Low Power Consumption Access Point, Client, PxP Modes Selectable Bandwidth Settings: 20/40MHz Applications

More information

The Basics of Wireless Local Area Networks

The Basics of Wireless Local Area Networks The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola ajn05012@student.mdh.se +46 712345678 ABSTRACT This paper is written as a brief education about the basics of

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading

Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading Summary Cisco outdoor wireless solutions make it practical to deploy and manage Wi-Fi on a citywide scale. This application note describes

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information