Wireless LAN IEEE WLAN Standard. Muhammad Jaseemuddin Ryerson University. Application. Presentation. Session. Transport.

Size: px
Start display at page:

Download "Wireless LAN IEEE WLAN Standard. Muhammad Jaseemuddin Ryerson University. Application. Presentation. Session. Transport."

Transcription

1 Wireless LAN Muhammad Jaseemuddin Ryerson University IEEE WLAN Standard Application Presentation Session Transport Network Data Link LLC MAC LLC Layer - IEEE MAC Layer - IEEE Carrier Sense Multiple Access (CSMA) Virtual Collision Detection (VCD) Asynchronous Data Service Time-bounded Service Error Correction, Access Control Encryption, Roaming, Power Saving PHY Layer - IEEE Radio 900MHz, 2.4GHz & 5.8GHz Frequency Hopping Spread Spectrum Direct Sequence Spread Spectrum 1, 2, 5.5 & 11Mbps Data Rates m Transmission Range Physical

2 Ad-Hoc Network STA1 STA2 STA3 Basic Service Set (BSS) - BSSID Infrastructure Network Distribution System STA1 BSS1 STA2 STA BSS2 Cellular Structure Cells operating in different frequency channel Roaming across BSS through Distribution System

3 Radio Frequency Spectrum The Industrial Scientific and Medical (ISM) Bands in N. America 900MHz 928MHz GHz GHz 5.725GHz 5.850GHz 900MHz 2.4GHz 5.8GHz FHSS IEEE PHY divides ISM band into a series of 1-MHz channels Approximately 99% of the radio energy is confined to the channel Channel sequence starts from GHZ with a step of 1 goes up to for total 95 channels In NA 78 channels are permitted from channel 2 (2.402) to channel 79 (2.479) An FH pattern Fxconsists of a permutation of all 79 channels, given as Fx = {fx(1), fx(2),, fx(79)} Where Fx is the FH pattern fx(i) is the channel number for the ith frequency in the xth FH pattern fx(i) = [b(i) + x] mod(79) + 2 The sequences are designed to ensure some minimum distances between the frequencies of the contiguous hops 6-MHZ gap in NA

4 FHSS PHY The FH patterns are divided into three sets The sets are defined to avoid prolonged collision periods between different sequences in a set Each set contains 26 patterns for NA S1: x = {0,3,6,9,12,15,18,21,, 72, 75} S2: x = {1,4,7,10,13,16,19,22,, 73,76} S3: x = {2,5,8,11,14,17,20,23,, 74,77} 2.5 hops per second yields maximum dwell time to be 390 TUs ~ 0.4 second Beacon Frame contains time stamp and FH Parameter Set element Hop Set # Hop pattern # Hop index All STAs in the IBSS synchronized their clock with the TBTT using beacon advertised timestamp They all tuned to the same FH pattern advertised in the beacon Hop occurs when the timestamp modulo dwell time becomes zero DSSS IEEE b PHY It requires more power to achieve the same throughput than the FH SS It is readily adaptable to much higher data rate adopted 11-bit Barker code { } It is tolerant to multipath delay spread Each data bit is encoded using the entire Barker word as the chipping sequence The DS PHY has 14 channels each 5MHz wide Channel 1: GHz, channel 2: GHz and so on up to channel 14: GHz In NA 11 channels are allowed: 1-11 ( GHz) Within a channel most of the energy is spread across a 22-MHz band To prevent interference caused by networks operating in adjacent channels IBSSes are required to operate on center frequencies that are 22-MHz apart With 5-MHz channel spacing it means the adjacent IBSSes must operate with 5 channels apart Typically they are configured at channels 1,6 and 11 Only three IBSSes can be adjacent

5 DS Channels (22 MHz Wide) Channel Center NA-ANZ ETSI Japan Frequency x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x Source: CISCO WLAN Adapters Software Guide DS PHY was announced in 1997 allowed 1 or 2 bits encoding per Barker word resulting into 1-2 Mbps The system is capable of processing 1 million chips per second b as announced in 1999 allowing 5 or 8 bits encoding per Barker word resulting into 5.5 to 11 Mbps bandwidth Using different encoding technique

6 Medium Access Control Why not CSMA/CA? Collision detection is difficult in radio environment Stations may interfere from other LANs (BSS) Hidden node problem Distributed Co-ordinated Function (DCF) For asynchronous data service CSMA/CA Virtual Collision Detection (VCD) Point Co-ordinated Function (PCF) For time-bounded data service Access Point (AP) serves as the co-ordinator Carrier Sensing Two carrier sensing mechanisms are defined A physical carrier sensing Depending upon the PHY layer, it senses the availability of the carrier frequency A virtual carrier sensing This is a logical carrier sensing at the MAC layer Every packet (with some exceptions) announces the duration for which the current transmission will hold the channel it is called Network Allocation Vector (NAV) All stations monitoring the channel read the MAC header, which contains the NAV. They all backoff for NAV microseconds before starting the contention for the next transmission

7 Virtual Carrier Sensing Sender Unicast Frame NAV ACK Data Access to medium is deferred Every unicast frame contains NAV value, which indicates the time in microseconds this transaction will take including the time for ACK All other monitoring stations will next sense the medium after NAV and the subsequent Basic Transmission Algorithm NAV=0? Sense the medium (perform physical channel assessment) Medium Idle? Random Backoff Time Transmit Frame Collision?

8 Medium Acces and IFS PIFS medium busy contention next frame PIFS Slot time Short Inter-Frame Spacing PCF Inter-Frame Spacing = + slot time DCF Inter-Frame Spacing = + 2*slot time For DSS = 10 µs Slot time = 20 µs acwmin = 31 acwmax = 1023 Exponential Back-off random back-off time within a contention window [0, CW] contention window size increases with retransmission back-off time = random() * slot time random() = a pseuodo random integer in [0,CW] acwmin <= CW <= acwmax, CW starts with acwmin and increases by every retransmission upto acwmax, and is reset after successful transmission time DSS Contention Window Initial Transmission medium busy CW = 31 slots 1st Retransmission medium busy CW = 63 slots time 2nd Retransmission medium busy CW = 127 slots time 3rd Retransmission medium busy CW = 255 slots time 4th Retransmission medium busy CW = 511 slots time 5th Retransmission medium busy CW = 1023 slots time 6th Retransmission CW = 1023 slots time

9 Transmission Mode (CSMA/CA) Station 1 bo e bo r bo e bo r bo e busy Station 2 bo e busy Station 3 busy Station 4 bo e busy bo e bo r Station 5 bo e bo r bo e busy bo e bo r Source: Mobile Communications - Jochen Schiller The Hidden Node Problem The Hidden Node problem occurs when two clients exist that can both connect to an AP but cannot see each other This can cause as much as 40% data loss through collisions and re-transmissions. Using VCD (the RTS/CTS mechanism) avoids these problems. Collision STA1 Maximum Range Access Point Maximum Range STA2

10 Transmission Mode (VCD) Virtual Collision Detection With the RTS threshold set (valid range Bytes, 128 Bytes recommended), this becomes CSMA/CA with VCD. Sender Receiver Other STA RTS Data CTS NAV (RTS) NAV (CTS) ACK Data When Mobile Units hear a CTS that is not for them, they back off for the duration specified Point Co-ordination Function (PCF) CFP Repetition Interval CFP Repetition Interval CFP CP CFP CP B PCF DCF B PCF DCF NAV NAV Co-existence of PCF and DCF Beacon marks the beginning of Contention Free Period (CFP) it contains the CFP maximum duration, which is used by other stations to set their NAV the CFP max duration must be at least equivalent to the transmission time a frame of maximum size

11 Frames Exchanged during PCF Data Vanilla data transmission CF-Ack Acknowledging the data transmitted in the previous frame CF-Poll Polling a station to transmit the data frame Data + CF-Ack Data is destined to any station and CF-Ack is to acknowledge the data received in the previous frame Data + CF-Poll Data is destined to the same station that is polled CF-Ack + CF-Poll CF-Ack is to acknowledge the data received in the previous frame and CF-Poll is to poll the next station in the poling list Data + CF-Ack + CF-Poll Data and CF-Ack are for the same station, and CF-Ack is to acknowledge the data received in the previous frame CF-End Marks the end of contention period CF-End + CF-Ack CF-End also contains acknowledgment for potentially the last data received Any management frame PCF An Example PIFS AP B P1 D2 CF end Station CFA2 NAV CFP Max Duration Contention Free Period (CFP) Released by AP

12 PCF Foreshortening CP Begins Expected CFP Start PIFS CFP CP Frame ACK Frame B ACK CFP Foreshortening Actual CFP Start CFP Max Duration CFP End Since the next time when a station is expected to be polled for data transfer may vary from its intended time, a hard bound on the data delivery time cannot be guaranteed near isochronous service PCF More Operations AP Data + CFP1 STA1 Data + CFA1 PCF continues STA1 STA2 Stations Data + CFA1 Data + CFA2 AP Data + CFA1 + CFP2 PCF continues

13 MAC Frame Frame Control Duration ID Address 1 Address 2 Address 3 Seq. Ctrl Address 4 Data CRC MAC Frame Control Prot. Version Type Subtype To DS From DS More Frag. Retry Power Mgmt More Data WEP Order Type Sub-type 0 0 Management Frame 0 1 Control Frame 1 0 Data Frame 1 1 Reserved Management Control Data Association Req, Resp; Reassociation Req, Resp; Disassociation Probe Req, Resp; Beacon; ATIM; Authentication; Deauthentication PS Poll; RTS; CTS; ACK; CF End; CF End + CF ACK Data; Data + CF Ack; Data + CF Poll; Data + CF ACK + CF Poll CF ACK; CF Poll; CF ACK + CF Poll

14 Address Assignment to DS from DS Address Address Address Address Comments DA SA BSSID - Ad hoc 0 1 DA BSSID SA - From AP 1 0 BSSID SA DA - To AP 1 1 RA TA DA SA Within DS Address 1 Receiver The node that receives the frame over the air and is responsible for acknowledging the reception Address 2 Transmitter The node the transmits the frame over the air and is responsible for retransmission in case of no acknowledgment Address 3 and 4 take different values depending upon the mode of operation BSSID BSSID uniquely identifies a BSS In infrastructure mode BSSID is the MAC address of the wireless interface of the AP that is creating the BSS In case of ad-hoc mode BSSID is a 48-bit number in the MAC address format, which is composed of 46-bit randomly generated number and local/universal bit is set to 1 and the group bit is set to 0 Address Assignment - Scenarios STA AP STA AP To Distribution System A1(RA)=BSSID (AP s MAC) A2(TA)=SA=STA s MAC A3(DA)=FN s MAC FN From Distribution System A1(RA)=DA=STA s MAC A2(TA)=BSSID (AP s MAC) A3(SA)=FN s MAC FN Within Wireless Distribution System (A to B) A1(RA)=AP2 s MAC A2(TA)=AP1 s MAC A3(DA)=B s MAC A4(SA)=A s MAC DS1 A AP1 AP2 DS2 B

15 Fragmentation Sender Frag 1 Frag 2 Frag 3 Receiver ACK1 ACK2 ACK3 Other STA NAV= F2+2*ACK+3* NAV= F2+ACK+2* NAV= F3+2*ACK+3* NAV= F2+ACK+2* To deal with interference Interference is often in the form of short bursts Breaking large frames into fragments (smaller frames) increase the percentage of reception of undamaged frames Fragmentation Every fragment is acknowledged individually Retransmission of fragments (small frames) are less expensive Fragmentation Threshold Any frame larger than the threshold undergoes fragmentation It is a configurable parameter All but non-final ACK contains NAV value Final ACK contains NAV value 0 Fragmentation with RTS/CTS Sender Receiver RTS CTS Frag 1 ACK1 Frag 2 ACK2 Other STA NAV((RTS)= CTS+F1+ACK+3* NAV (CTS)= F1+ACK+2* NAV= F2+2*ACK+3* NAV= F2+ACK+2* Fragmentation with RTS/CTS Often fragmentation is combined with RTS/CTS RTS/CTS provides exclusive access to the medium

16 Power Management 1 Power Management Frame (Any frame with PM bit on) 2 Beacon (TIM ) 3 PS Poll Frame AP BSS1 STA Transceivers can be turned off to put the station in power saving mode to conserve the battery power Access points perform following power-management tasks it maintains the power management state of every station it buffers the frames for the station in sleeping mode it announces the buffer status of every station every TIM interval powering up the receiver at the sleeping station to receive the buffer status consumes far less power than if the station periodically polls for the buffer status Station wakes up every listen interval listen interval is its contract with the AP that is negotiated at the association time Broadcast/Multicast packets are transmitted every DTIM interval Power Management More Data Station sens PS-Poll frame for every frame buffered at the AP AP sets more data bit in the frame header if more frames are waiting in the buffer for transmission Station sends acknowledgment for every frame An unacknowledged frame is retransmitted AP if not received ACK readvertises the frame in the next TIM Station can turn off PM bit anytime indicating to the AP of switchintg its mode from PS to normal operation STA PS-Poll Frame, More Data ACK PS-Poll Frame, More Data ACK PS-Poll Frame ACK AP

17 Power Management - Scenario Beacon Interval Frames for 1 Frames for 1 and 2 Frames for 2 Frames for 1 and 2 No Frames No Frames AP T T T T T T STA 1 STA 2 Listen interval of station 1 is 2 it wakes up every second beacon interval Listen interval of station 2 is 3 During the fourth beacon interval both stations 1 and 2 contend for the medium Station 1 wins and retrieves the frame from the AP Station 2 may next gain access to the medium if no other station contends for that Otherwise if it loses the access to another station then it will remain awake for the subsequent beacon intervals until it retrieves its frame from the AP, after that it resumes its normal power saving mode of operation Roaming Registry Distribution System AP1 AP2 BSS1 BSS2 STA STA ESS - SSID A station can attach to a single AP at any time Handoff detection active scanning - probe request + response passive scanning - beacon Mobile initiated handover mobile sends association/reassociation request The AP responds with Association/Reassociation Response it returns Association ID (AID) unique for each registered mobile

18 Registration Service Maintain a table of mappings: <BSSID, IP Address, UDP Port #> Perform add in response to add request refresh in response to refresh request refresh time is 5 minutes remove in response to deregistration if the entry is not refreshed (within 15 minutes) Supply mappings in response to query Handover Registry Distribution System BSS1 4 0 BSS2 Mobile Unit Mobile Unit 0 Reassociation Frame 1 AP lookup 2 Lookup response 3 Move Notify 4 Move Response

19 IAPP Packet Format General Packet Format IAPP Version Command Data 1 byte 1 byte 0-n bytes Move-notify Packet Format Add. Length Pad MAC Address Seq. # Move-response Packet Format Add. Length Pad MAC Address Length CB Context Blob

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

IEEE802.11 Wireless LAN

IEEE802.11 Wireless LAN IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/ WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

IEEE 802.11 frame format

IEEE 802.11 frame format IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Overview of 802.11 Networks and Standards

Overview of 802.11 Networks and Standards Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter

More information

Medium Access Control (MAC) and Wireless LANs

Medium Access Control (MAC) and Wireless LANs Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic

More information

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)

More information

Introduction to IEEE 802.11 Wireless LAN

Introduction to IEEE 802.11 Wireless LAN Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

IEEE 802.11 Wireless Local Area Networks

IEEE 802.11 Wireless Local Area Networks ABSTRACT The draft IEEE 82. Wireless Local Area Network (WLAN) specification is approaching completion. In this article, the IEEE 82. protocol is explained, with particular emphasis on the medium access

More information

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. IEEE 802.11e WLANs / WMM S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Wireless Local Area Networks and the 802.11 Standard

Wireless Local Area Networks and the 802.11 Standard Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Measuring the service level in the 2.4 GHz ISM band

Measuring the service level in the 2.4 GHz ISM band Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!

More information

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1 802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

Wireless LAN Pen-Testing. Part I

Wireless LAN Pen-Testing. Part I Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,

More information

The IEEE 802.11 standard

The IEEE 802.11 standard The IEEE 802.11 standard Imad Aad INRIA, Planete team IN Tech, May 31st, 2002 IEEE 802.11 p.1 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999)

More information

IEEE 802.11 WIRELESS LAN STANDARD

IEEE 802.11 WIRELESS LAN STANDARD CHAPTER14 IEEE 802.11 WIRELESS LAN STANDARD 14.1 IEEE 802 Architecture Protocol Architecture MAC Frame Format Logical Link Control 14.2 IEEE 802.11 Architecture and Services IEEE 802.11 Architecture IEEE

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

WI-FI TECHNOLOGY: SECURITY ISSUES

WI-FI TECHNOLOGY: SECURITY ISSUES RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,

More information

Communication Networks 629. IEEE 802.11 Standards and Developments

Communication Networks 629. IEEE 802.11 Standards and Developments Communication Networks IEEE 802.11 Standards and Developments Prof. Jochen Seitz Overview Organization of a WLAN according to IEEE 802.11 Current IEEE 802.11 standards IEEE 802.11 layers IEEE 802.11 MAC

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection: Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Protection Ripple in ERP 802.11 WLANs White Paper

Protection Ripple in ERP 802.11 WLANs White Paper Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO Devin@cwnp.com Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection

More information

Department of Computer Science Columbia University

Department of Computer Science Columbia University Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, hgs@cs.columbia.edu Department of Computer Science Columbia University 28

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,

More information

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori Ph.D. Thesis Resources optimization in multimedia communications Luca Sanna Randaccio Advisor: Prof. Luigi Atzori University of Cagliari Department of Electrical and Electronic Engineering Table of Contents

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

WildPackets Guide to Wireless LAN Analysis

WildPackets Guide to Wireless LAN Analysis WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business

More information

WIRELESS NETWORKS. Erina Ferro

WIRELESS NETWORKS. Erina Ferro WIRELESS NETWORKS Erina Ferro National Research Council (C.N.R.) ISTI, Institute of C.N.R. C.N.R. Research Area, Via Moruzzi 1, 56124 Pisa, Italy Phone: +39-050-315 3070 Fax: +39-050-313 8091 E-mail: erina.ferro@isti.cnr.it

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The

More information

Chapter 6: Wireless and Mobile Networks

Chapter 6: Wireless and Mobile Networks Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning

More information

Data Center Networks, Link Layer Wireless (802.11)

Data Center Networks, Link Layer Wireless (802.11) Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Introduction to Ad hoc Networks

Introduction to Ad hoc Networks Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch

More information

Wireless networking. more wireless (cell) phone users than wired phone users almost all incoming Dartmouth students have wireless laptops

Wireless networking. more wireless (cell) phone users than wired phone users almost all incoming Dartmouth students have wireless laptops Wireless networking Very popular! more wireless (cell) phone users than wired phone users almost all incoming Dartmouth students have wireless laptops Untethered (wireless) Internet access very appealing

More information

Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping?

Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping? Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard Presentation to IEEE 802 March 11, 1996 Naftali Chayat BreezeCom 1 Why Frequency Hopping? Frequency Hopping is one of the variants

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

In this Lecture Access method CDMA Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications Dr. Cecilia Mascolo In this Lecture In this lecture we will discuss aspects related to the MAC Layer of wireless

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information