Wireless Networking. Media Access Control Layer Standards Module-06

Size: px
Start display at page:

Download "Wireless Networking. Media Access Control Layer Standards Module-06"

Transcription

1 Wireless Networking Media Access Control Layer Standards Module-06 Jerry Bernardini Community College of Rhode Island CCRI J. Bernardini 1 REFERENCES LANs, 3rd Edition Chapter-6 CWTS Certified Wireless Technology Specialist Official Study Guide, Chapter-7 CWNA Certified Wireless Network Administration Official Study Guide (PWO-104), David Coleman, David Westcott, 2009, Chapter-7 The California Regional Consortium for Engineering Advances in Technological Education (CREATE) project CCRI J. Bernardini 2 1

2 Objectives Describe the three WLAN service sets Explain the features of MAC frames and MAC frame types Describe the MAC functions of discovering, joining, and transmitting on a WLAN 3 IEEE Topologies or Operating Modes The purpose of is to interconnect radio cards Every wireless device has a radio card All wireless devices are referred to as Stations (STA) Three topologies defined by Service Sets Basic Service Set (BSS) Extended Service Set (ESS) Independent Basic Service Set (IBSS) Nonstandard Topologies Bridging, Repeating, Workgroup bridging Mesh networking (growing in importance) 10/8/2014 Wireless Networking J. Bernardini 4 2

3 Service Set Identifiers - SSID and BSSID SSID -Service Set Identifier is a 1-32 byte alphanumeric sequence that uniquely names an ESS (the network name). Any SSID or Null SSID is a blank SSID used to associate with anyone. BSSID- Basic Service Set Identifier is a 48-bits that uniquely identifies a BSS BSA Basic service Area Physical Coverage Area ESS Id = SSID Wired LAN AP BSS Id = BSSID Basic Independent Basic Service Set (IBSS) Independent Basic Service Set (IBSS): Wireless network that does not use an AP Wireless devices communicate between themselves Peer-to-peer or ad hoc mode BSS more flexible than IBSS in being able to connect to other wired or wireless networks IBSS useful for quickly and easily setting up wireless network When no connection to Internet or external network needed 6 3

4 Basic Service Set (BSS) BSS - The Basic Service Set is a term used to describe the collection of Stations which may communicate together within an WLAN. Basic Service Set (BSS): Group of wireless devices served by single AP infrastructure mode BSS must be assigned unique identifier Service Set Identifier (SSID) Serves as network name for BSS Basic Service Area (BSA): Geographical area of a BSS Max BSA for a WLAN depends on many factors Dynamic rate shifting: As mobile devices move away from AP, transmission speed decreases 7 Extended Service Set (ESS) ESS - is comprised of a number BSS s ESS stations must have the same SSID The BSSID is the name of the BSS (not same as SSID) APs can be positioned so that cells overlap to facilitate roaming Wireless devices choose AP based on signal strength Stations going from one BSS to another will deal with Handoff Wired LAN ESS SSID BSS2 (BSSID2) BSS1 (BSSID1) BSS3 (BSSID3) 4

5 Extended Service Set and Mobile IP If STs move from one AP to another AP resides in a separate subnet a new IP address must be assigned Connectivity can be temporarily lost Running applications may have to be restarted Called Layer 3 roaming TCP/IP protocol support of mobile computing Computers given home address Static IP number on home network Home agent: Forwarding mechanism that keeps track of where mobile computer located When computer moves to foreign network, a foreign agent provides routing services Assigns computer a care-of address Computer registers care-of address with home agent 9 Mobile IP Components MN Mobile Node (VMD) FA Foreign Agent (MAP) HA Home Agent (MAP) AAP Authoritative Access Point MAP Mobile IP Access Point (MN) VMD Visiting Mobile Device (MN) COA Care-of-Address HAN Home Agent Network FAN Foreign Agent Network CN Correspondent Node CCRI J. Bernardini 10 5

6 Mobile IP Process - Discovery Mobile IP 3-Step Process 2 MN Mobile Node 1-Discovery 2-Registration FA Foreign Agent HA Home Agent 3-Tunneling 1- Mobile Node (MN) gets address from Home Agent (HA) 2- MN moves to Foreign Agent (FA ) network 3- MN discovers FA or solicits for an agent. 4- MN gets Care-of-Address (COA) from FA CCRI J. Bernardini 11 Mobile IP Process - Registration Mobile IP 3-Step Process 1-Discovery 2-Registration 3-Tunneling MN Mobile Node FA Foreign Agent HA Home Agent CN Correspondent Node 5- MN send registration request to FA 6- FA checks request, adds MN to pending list 7- FA relays request to HA 8- HA checks request and creates a mobile binding 9- HA sends registration reply to FA 10- FA checks reply and adds MN to visitor list and relays reply to MN 11-FA creates a routing entry and tunnel to HA 12- MN check reply and creates a tunnel to the HA Through the FA CCRI J. Bernardini 12 6

7 Mobile IP- Tunneling and Packet Forwarding MN Mobile Node FA Foreign Agent HA Home Agent CN Correspondent Node COA- Care-of-Address 13- Correspondent Node (CN) sends packet to MN and is routed to HA 14- HA intercepts packets and tunnels to the FA using the COA 15- FA relays the packets to the MN CCRI J. Bernardini 13 Subnets and Mobile IP Subnets provide many advantages: make network management easier Subnets reduce broadcasts Subnets provide security Subnets use subnet masks ( ) WLAN subnets creates problems for roaming devices Example: /24 can seamlessly roam within x /24 Note /24 is a subnet mask /24 can not seamlessly roam within x /24 without changing the IP address Mobile IP offers a solution can roam as a guest on the x network CCRI J. Bernardini 14 7

8 Mobile IP -Explained With mobile IP, computers are given a home address (static IP number on home network) Home agent: forwarding mechanism that keeps track of where the mobile computer is located When the computer roams to another network (foreign network) a foreign agent provides routing services to the computer Foreign agent assigns a temporary IP number (known as care-of-address) Computer then registers the care-of-address with its home agent 15 Mobile IP (continued): Mobile IP (continued) When a frame is sent to computer s home address, the home agent intercepts the frame Encapsulates that frame into a new frame with the care-ofaddress as the destination address Redirects it to the foreign agent, which send it to the computer located on the foreign network Mobile IP enables a host to be identified by a single IP number even as it moves from one network to another 16 8

9 Distribution system (DS) Distribution system (DS): used by an AP to determine what communication needs to take place with other APs in the ESS or with the wired network Decides if it is necessary to exchange frames in their own BSSs, with a wired network, or to forward frames to another BSS Distribution system media: media that interconnects APs Wireless distribution system (WDS) - A wireless configuration that is used to connect APs 17 Medium Access Control Layer Frame Formats and Types IEEE has divided the Data Link Layer into two sublayers: Logical Link Control (LLC) sublayer: provides a common interface, reliability, and flow control Medium Access Control (MAC) sublayer: appends physical addresses to the frame Functions performed at the MAC sublayer involve different frame formats and types There are three main types of MAC frames: Management frames Control frames Data frames Ethernet one frame type 18 9

10 MAC Frame Formats OSI model uses the term data unit to describe sets of data that move through the OSI layers Service Data Unit (SDU): specific unit of data that has been passed down from a higher OSI layer to a lower layer but has not yet been encapsulated by that lower layer Protocol Data Unit (PDU): specifies that data will be sent to the peer protocol layer at the receiving device Changing an SDU to a PDU involves an encapsulation process in which the lower layer adds headers and footers 19 MAC Frame Formats Process in a network using SDUs and PDUs: Layer 3 send data to LLC sublayer of Layer 2. Unit of data is called the MAC Service Data Unit (MSDU) LLC sends data unit to MAC sublayer where MAC header information is added. Data unit is now called MAC Protocol Data Unit (MPDU) also known as frame MPDU is sent to PLCP sublayer in the Physical Layer and is then called the PLCP Service Data Unit (PSDU) PSDU is passed to the PMD sublayer that creates the PLCP Protocol Data Unit (PPDU) by adding header/footer PPDU is then transmitted as a series of bits 20 10

11 SDUs and PDUs LANs, Third Edition 21 MAC Frame Formats Aggregate MAC Service Data Unit (A-MSDU): allows multiple MSDUs to be combined Aggregate MAC Protocol Data Unit (A-MPDU): allows multiple MPDUs to be combined Figure 6-9 A-MSDU and A-MPDU 22 11

12 Ethernet and Frames Ethernet Frame Preamble Source Destination Data FCS Start Of Frame Wireless Frame 10 or 18 Sync Type or Length Field 2 4 or 6 PLCP Header Start Of Frame Source Destination Rec. Adr Trans. Adr Data FCS Duration ID Frame Cntrl MAC Packet DATA Unit, (MPDU) Sequence Cntrl Management Frames Beacon Frame Probe Frames Association Frames more Control Frames Frame Categories / Types RTS and CTS Frames ACK Acknowledgement Frames more Data Frames Data Payload Frames 12

13 IEEE Frame Formats Management Frame Control (2) Duration (2) Des. Address (6) Source Address (6) BSSID (6) Seq. Control (2) Frame Body ( 1 to 2311) Frame Check Seq. (6) Control Frame Control (2) Duration (2) Receiver Address (6) Transmit Address ( 6) Frame Check Seq. (6) Data Frame Control (2) Duration (2) Address 1 (6) Address 2 (6) Address 3 (6) Seq. Control (2) Address 4 (6) Data ( 1 to 2311) Frame Check Seq. (6) (Bytes per field) LANs, Second Edition 25 Twelve Management Frame Types 10/8/2014 Wireless Networking J. Bernardini 26 13

14 Beacons Beacon information frame sent by an AP every 100 ms Beacon frames are approximately 50-bytes with the following information: Timestamp Beacon Interval Capability Info Service Set Identifier Support Rates Parameter Sets Traffic Indication Map Header Payload Trailer Beacon Frame Eight Control Frames Used to assist with the delivery of data frames 10/8/2014 Wireless Networking J. Bernardini 28 14

15 Fifteen Data Frames The frames that actually carry application data 10/8/2014 Wireless Networking J. Bernardini 29 Protocol Data Unit (PDU) MTU and Fragmentation Frames have different MTUs and may require fragmentation Frame Type and Vendor Support MTU (Bytes) TCP Transport maximum segment size 1460 IP Layer-3 default size 1500 MTU + Overhead (Bytes) MAC IEEE Ethernet default MPDU IEEE default 1534 MPDU IEEE maximum 2304 MAC Jumbo Frame >1500 MAC Cisco Baby giant A-MPDU IEEE Aggregate Service Unit 7935 MAC Cisco Catalyst MAC Cisco Catalyst /8/2014 Wireless Networking J. Bernardini 30 15

16 IEEE MAC Functions Main Functions Discovering a WLAN - Joining the WLAN - Transmitting on a WLAN Scanning- discover AP or BSS Synchronization- all stations have the same clock Frame Transmission- rules for frame transfer Authentication-allow device in network Association-after authentication associate with AP Reassociation-roaming and association with new AP Data Protection-data encryption protects data Power Management-save power by sleeping transceiver Fragmentation-breakup frame for efficiency and interfer. RTS/CTS- solution to hidden node problem 10/8/2014 Wireless Networking J. Bernardini 31 Beacon Management Frame A special management frame that is used by a client stations seeking a wireless network to join. Instead of beacon frames a station could use probe request and probe response frames In an ad hoc (IBSS ) wireless network all stations take turns broadcasting the beacon frame Beacon Beacon S1 S2 AP Control Point 10/8/2014 Wireless Networking J. Bernardini 32 16

17 Passive Scanning (Beacons) 1. Client stations listens for a beacon from an access point (AP) 2. If multiple beacons are received the strongest one is selected 3. The listening station then requests authentication and association S1 Beacons Beacons AP Control Point S2 10/8/2014 Wireless Networking J. Bernardini 33 Active Scanning (Probes) A station could use probe request and probe response frames Instead of beacon frames 1. Station is configured with SSID and switched to a channel 2. Probe request sent by requesting station 3. All stations that have the same SSID and have normal configurations respond with a Probe Response frame The process also involves waiting for ProbeDelay and MinChannel Timers S1 Probe Request AP Control Point Probe Response S2 10/8/2014 Wireless Networking J. Bernardini 34 17

18 Wireless Connection Process Authentication is the process used by a station to: verify that another station is approved for communications. this is a station authentication and not a user authentication. Authentication Step Two IEEE standards: Open System Authentication Shared Key Authentication 2-Step Connection Process Authentication Phase Association Phase Authentication Phase Association Phase IEEE Connection State Machine Unauthenticated and Unassociated Successful Authentication De-authentication Notification Authenticated and Unassociated Successful Association Disassociation Notification Authenticated and Associated De-authentication Notification 18

19 Unauthenticated & Unassociated In the first state: Wireless Client/Node is not connected to the network. Wired LAN Access Points Wireless Client Authenticated & Unassociated In the Second State: Wireless Client/Node has passed the authentication process but is not associated with the AP. Wired LAN Association Response Access Points Association Request Wireless Client 19

20 In the Third State: Authenticated & Associated Wireless Client/Node is now connected and associated with the AP. Data can now be transferred between the devices. Wired LAN Access Points Data Link Wireless Client Open System Authentication Open System / Null Authentication IEEE Default Authentications based on empty string SSID Client sends empty string SSID Receiving station, (AP) sends acknowledgment Wired LAN Authentication Management Frame - SSID Wireless Client ACK Authentication Management Frame ACK Access Points 20

21 Shared Key Authentication Wired LAN Authentication Management Frame - SSID Challenge Phrase Encrypted Phrase Access Points Wireless Client Authentication WEP Key Secure Channel WEP Key Roaming Roaming - The process of a client moving seamlessly from one area or cell to another while maintaining a data link. Wired LAN Access Points Wireless Clients Usually a 20%-30% cell overlap 21

22 Transmitting on the WLAN IEEE specifies three procedures for transmitting on the WLAN: Distributed coordination function Point coordination function Hybrid coordination function 43 MAC Layer Access Methods Communications Options DCF RTS/CTS (optional) Distributed function Wireless MAC Avoids hidden node problem DCF PCF (optional) AP polls stations Superframes to allow station to eventually get access Superframe = Beacon + CFP + CP CFP = Contention-Free Period CP = Contention Period 22

23 RTS/CTS Sending unicast packets Station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) Acknowledgement via CTS after SIFS by receiver (if ready to receive) Sender can now send data at once, acknowledgement via ACK Other stations store medium reservations distributed via RTS and CTS MAC Frame Formats Due to significant differences between highthroughput (HT) n and non-ht a/b/g, an AP can tell n devices to change to one of four HT Operation Modes: HT Greenfield Mode (Mode 0) HT Nonmember Protection Mode (Mode 1) HT 20 MHz Protection Mode (Mode 2) HT Mixed Mode (Mode 3) 46 23

24 Distributed Coordination Function The Distributed Coordination Function (DCF) is the fundamental access mechanism in IEEE Medium Access Control (MAC). DCF can be used in all wireless topologies: IBSS, BSS, and ESS. Distributed Coordination Function (DCF) Distributed coordination function (DCF) defines two procedures: Carrier Sense Multiple Access with Collision Detection and Request to Send/Clear to Send Channel access methods: Rules for cooperation among wireless devices Contention: Computers compete to use medium If two devices send frames simultaneously, collision results and frames become unintelligible Must take steps to avoid collisions 48 24

25 Distributed Coordination Function (DCF) Carrier Sense Multiple Access with Collision Detection (CSMA/CD): Before networked device sends a frame, listens to see if another device currently transmitting If traffic exists, wait; otherwise send Devices continue listening while sending frame If collision occurs, stops and broadcasts a jam signal CSMA/CD cannot be used on wireless networks: Difficult to detect collisions Hidden node problem (when stations are out of range of each other) 49 Distributed Coordination Function (DCF) Distributed Coordination Function (DCF): Specifies modified version of CSMA/CD Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Attempts to avoid collisions altogether Time when most collisions occur is immediately after a station completes transmission All stations must wait random amount of time after medium clear Slot time 50 25

26 Distributed Coordination Function (DCF) CSMA/CA also reduces collisions via explicit frame acknowledgment Acknowledgment frame (ACK): Sent by receiving device to sending device to confirm data frame arrived intact If ACK not returned, transmission error assumed IEEE n adds a feature known as block acknowledgment Supports multiple MPDUs in an A-MPDU CSMA/CA does not eliminate collisions Does not solve hidden node problem 51 Distributed Coordination Function (DCF) Request to Send/Clear to Send (RTS/CTS) protocol: Option used to solve hidden node problem Also known as virtual carrier sensing Significant overhead upon the WLAN with transmission of RTS and CTS frames Especially with short data packets RTS threshold: Only packets that are longer than RTS threshold are transmitted using RTS/CTS 52 26

27 Distributed Coordination Function (DCF) Fragmentation: Divide data to be transmitted from one large frame into several smaller ones Reduces probability of collisions Reduces amount of time medium is in use If data frame length exceeds specific value, MAC layer fragments it Receiving station reassembles fragments Alternative to RTS/CTS High overhead ACKs and additional SIFS time gaps 53 Distributed Coordination Function (DCF) Variations of RTS/CTS are used as protection mechanisms: CTS-to-self: process used when g devices are mixed with b devices HT Dual-CTS Protection: used with n devices in a mixed environment with a/b/g devices n devices sends a RTS to the AP, which responds with two CTS frames: one in n format and one in non n format HT L-SIG Protection: used with n devices in a mixed environment 54 27

28 Distributed Coordination Function (DCF) Interframe spaces (IFS): Intervals between transmissions of data frames Short IFS (SIFS): For immediate response actions such as ACK Point Coordination Function IFS (PIFS): Time used by a device to access medium after it has been asked and then given approval to transmit Distributed Coordination Function IFS (DIFS): Standard interval between transmission of data frames 55 Distributed Coordination Function (DCF) Interframe spaces (IFS) continued: Extended IFS: used when frames must be retransmitted Arbitration IFS: used when setting priorities to different types of transmissions Reduced IFS: reduces amount of dead space required between OFDM transmissions 56 28

29 Point Coordination Function (PCF) Polling: Channel access method in which each device asked in sequence if it wants to transmit Effectively prevents collisions Point Coordination Function (PCF): AP serves as polling device or point coordinator Point coordinator has to wait only through point coordination function IFS (PIFS) time gap Shorter than DFIS time gap 57 Point Coordination Function (PCF) If point coordinator hears no traffic after PIFS time gap, sends out beacon frame Field to indicate length of time that PCF (polling) will be used instead of DCF (contention) Receiving stations must stop transmission for that amount of time Point coordinator then sends frame to specific station, granting permission to transmit one frame standard allows WLAN to alternate between PCF (polling) and DCF (contention) 58 29

30 Hybrid Coordination Function (HCF) Hybrid Coordination Function (HCF): allows for different types of wireless traffic to be given different levels of priority Enhanced Distributed Channel Access (EDCA): Contentionbased but supports different types of traffic Four access categories (AC) Provides relative QoS but cannot guarantee service Hybrid Coordination Function Controlled Channel Access (HCCA): based upon polling Serves as a centralized scheduling mechanism 59 Timing Diagrams Event Timing or Sequence Diagrams - A graph showing events/levels as a function of time. Event 2ms 4ms 6ms 8ms 10ms Time tp1 sync mxc rst ack data A Time flag en tp2 data pd Time 30

31 SIFS SIFS - Shortest and highest priority time space sent before and/or after RTS, CTS, and ACK frames. For DSSS, SIFS is 10 microseconds or 10 S. sender DIFS data receiver SIFS ACK others DIFS DIFS data deferring mode contention waiting time PIFS PIFS Are used only in Point Coordination Mode by the APs. This mode is enabled by the administrator. It has medium priority and therefore always wins over DIFS, so that the AP can take control in polling. For DSSS, PIFS is 30 S. 31

32 Distributed Coordination Function The Distributed Coordination Function (DCF) is the fundamental access mechanism in IEEE Medium Access Control (MAC). DCF can be used in all wireless topologies: IBSS, BSS, and ESS. DIFS DIFS Is used by default on all stations. DIFS is the lowest priority and is used for data and management frames. For DSSS, DIFS is 50 s. DIFS PIFS Station Backoff Timers sender DIFS medium busy SIFS contention frame A look at all three: 10 s, 30 s, 50 s, for DSSS. 32

33 Hidden Node Wireless Client 1 2 Wireless Client Access Points 65 Hidden Node Detection and Solution Symptoms Increase corruption Increased retransmission Use protocol analyzer near to the AP and count corrupted frames Use protocol analyzer near to the STA and count retransmission frames Solutions Use RTS/RTS Increase STA power Remove obstacles and move STA if possible APs and STA at same IEEE h power level 66 33

34 Protection Mechanisms Protection Mechanisms allow for backward compatibility Older technology and newer technology compatibility Two Broad Categories of protection mechanism Extended rate physical (ERP) High throughput (HT) 10/8/2014 Wireless Networking J. Bernardini 67 Review g Protection Before an g client can transmit to an g AP it must reserve the medium. Must transmit so b will understand. Two Protection Methods CTS-to self at b modulation (slow Clear to Send) RTS-CTS at b modulation CTS-to-self is more efficient but may not be seen by hiddennode RTS-CTS is more reliable but has more overhead Both Methods dramatically reduce the g throughput CCRI J. Bernardini 68 34

35 802.11b/g Mixed Mode Operation Station g Station g AP g Station b 1-Slow CTS 2-Slow CTS 3-Fast Data 3-Fast Data 2-Slow CTS 3-Fast Data CCRI J. Bernardini Summary Characteristics Protocol Release Date Op. Frequency Throughput (Typical) Data Rate (Max) Modulation Technique Range (Radius Indoor) Depends, # and type of walls Range (Radius Outdoor) Loss includes one wall a GHz 23 Mbps 54 Mbps OFDM ~35 Meters ~120 Meters b GHz 4.3 Mbps 11 Mbps DSSS -CCK ~38 Meters ~140 Meters g GHz 19 Mbps 54 Mbps OFDM & DSSS ~38 Meters ~140 Meters n June GHz 5 GHz 74 Mbps 248 Mbps OFDM MIMO ~70 Meters ~250 Meters CCK-Complementary Code Keying OFDM-Orthogonal Frequency Division Multiplexing DSSS-Direct Sequence Spread Spectrum MIMO-Multi-Input Multi-Output CCRI J. Bernardini 70 35

36 HT Mode Non-HT Legacy Mandatory for n Only 20 MHz channels Same format as ag HT Mixed Two part preamble First part can be decoded by ag Second part can not be decoded by ag HT Greenfield Preamble can not be decoded by ag Can use both 20 MHz and 40 MHz channels 10/8/2014 Wireless Networking J. Bernardini 71 Dynamic Rate Switching Dynamic Rate Switching =Dynamic Rate Selection =Automatic Rate Shifting----All mean the same thing Process of reducing or increasing the data rate based upon RF signal levels RF signals attenuate over distance or by absorption AP will reduce data rate for weaker signals AP will increase data rate for higher signals Data Rate (Mb/sec) Received Signal (dbm) /8/2014 Wireless Networking J. Bernardini 72 36

37 Data Rate Coverage Areas -85 dbm -76 dbm -72 dbm 24 Mbps 18 Mbps 9 Mbps Summary A Basic Service Set (BSS) is defined as a group of wireless devices that is served by a single access point (AP) An Extended Service Set (ESS) is comprised of two or more BSS networks that are connected through a common distribution system An Independent Basic Service Set (IBSS) is a wireless network that does not use an access point A Service Data Unit (SDU) is a specific unit of data passed down from a higher OSI layer A Protocol Data Unit (PDU) specifies data that will be sent to the peer layer at the receiving device 74 37

38 Summary Because of the differences between n HT and non-ht a/b/g devices an AP can tell n devices to change to one of four HT Operation Modes in order to interoperate Three main types of MAC frames: management frames, control frames, and data frames WLAN discovery can be done by passive scanning or active scanning Passive scanning depends on the AP advertising itself Active scanning station send out a management probe request on an available channel 75 Summary Once a wireless device has discovered the WLAN, it requests to join the network; This is a twofold process known as authentication and association The IEEE standard specifies three procedures for transmitting on the WLAN, distributed coordination function (DCF), point coordination function (PCF), and hybrid coordination function (HCF) 76 38

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

IEEE802.11 Wireless LAN

IEEE802.11 Wireless LAN IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?

More information

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/ WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. IEEE 802.11e WLANs / WMM S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application

More information

Overview of 802.11 Networks and Standards

Overview of 802.11 Networks and Standards Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1

More information

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local

More information

Next Generation 802.11 Wireless Local Area Networks

Next Generation 802.11 Wireless Local Area Networks Next Generation 802.11 Wireless Local Area Networks This is a 2 day course technical course intended to give student a solid understanding of the emerging IEEE 802.11 standards, how it works including

More information

IEEE 802.11 frame format

IEEE 802.11 frame format IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Wireless Local Area Networks and the 802.11 Standard

Wireless Local Area Networks and the 802.11 Standard Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...

More information

Introduction to IEEE 802.11 Wireless LAN

Introduction to IEEE 802.11 Wireless LAN Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

IEEE 802.11 WIRELESS LAN STANDARD

IEEE 802.11 WIRELESS LAN STANDARD CHAPTER14 IEEE 802.11 WIRELESS LAN STANDARD 14.1 IEEE 802 Architecture Protocol Architecture MAC Frame Format Logical Link Control 14.2 IEEE 802.11 Architecture and Services IEEE 802.11 Architecture IEEE

More information

Whitepaper. 802.11n The Next Generation in Wireless Technology

Whitepaper. 802.11n The Next Generation in Wireless Technology Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice

Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice By Timo Vanhatupa, Ph.D. Senior Research Scientist at Ekahau Contents Introduction Why capacity matters with Wi-Fi... 3 Part 1: Modeling

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com

802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com 802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com Technical Reviewer: GT Hill, CWNE #21 gt@gthill.com Copyright 2009 CWNP, Inc.

More information

Department of Computer Science Columbia University

Department of Computer Science Columbia University Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, hgs@cs.columbia.edu Department of Computer Science Columbia University 28

More information

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL Introduction Thank you for your purchase of the Kozumi K-300MWUN High Power Wireless N Mini USB Adapter. Featuring wireless technology, this

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Protection Ripple in ERP 802.11 WLANs White Paper

Protection Ripple in ERP 802.11 WLANs White Paper Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO Devin@cwnp.com Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection

More information

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program. Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1 802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Getting Started with HP Wireless Networks. Version 10.41

Getting Started with HP Wireless Networks. Version 10.41 Getting Started with HP Wireless Networks Version 10.41 Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)

More information

User s Manual. Wireless LAN Access Point. Model No.: SP918GK http://www.micronet.info

User s Manual. Wireless LAN Access Point. Model No.: SP918GK http://www.micronet.info User s Manual Wireless LAN Access Point Model No.: SP918GK http://www.micronet.info Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4

More information

CWNA Instructor Led Course Outline

CWNA Instructor Led Course Outline CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether

More information

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!

More information

Measuring the service level in the 2.4 GHz ISM band

Measuring the service level in the 2.4 GHz ISM band Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)

More information

Getting the Most from Your Wireless Network

Getting the Most from Your Wireless Network WHITE PAPER Network disruptions are no longer minor inconveniences; they have become business disruptions with financial and sometimes even legal consequences. Network engineers need to quickly visualize

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1 IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g

More information

Key Features. EnGenius Outdoor Base Station designs High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment.

Key Features. EnGenius Outdoor Base Station designs High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment. 802.11 b/g/n N300 Access Point Key Features IEEE 802.11 b/g/n compliant Up to 300Mbps (2.4GHz) Complaint with IEEE 802.3 at for PoE supported PoE injector with reset from remote-end Two Gigabit Ethernet

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

WildPackets Guide to Wireless LAN Analysis

WildPackets Guide to Wireless LAN Analysis WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business

More information

Wireless LAN Pen-Testing. Part I

Wireless LAN Pen-Testing. Part I Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b/g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

How To Configure the WLAN with QoS

How To Configure the WLAN with QoS How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

Chapter 5: Wireless Design Models, Topologies, and Infrastructure

Chapter 5: Wireless Design Models, Topologies, and Infrastructure Chapter 5: Wireless Design Models, Topologies, and Infrastructure Overview Define, describe, and apply the following concepts associated with WLAN service sets Stations and BSSs Starting and Joining a

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Roaming, Handover, and Mobility

Roaming, Handover, and Mobility Chapter 6 Roaming, Handover, and Mobility This chapter talks about mobility and handover; in essence they mean the same thing with a slight difference: Mobility usually is used for wired systems, in particular

More information

Data Center Networks, Link Layer Wireless (802.11)

Data Center Networks, Link Layer Wireless (802.11) Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?

More information

Saturday, August 25, 2012 1. MUM Home INDIA Assignment 2012 Soumil Gupta Bhaya PROPRIETARY WIRELESS PROTOCOLS. N-Streme and Nv2

Saturday, August 25, 2012 1. MUM Home INDIA Assignment 2012 Soumil Gupta Bhaya PROPRIETARY WIRELESS PROTOCOLS. N-Streme and Nv2 1 MUM Home INDIA Assignment 2012 Soumil Gupta Bhaya PROPRIETARY WIRELESS PROTOCOLS N-Streme and Nv2 2 3 Nstreme and NV2 are Wireless Protocols created by Mikrotik to improve Point to Point and Point to

More information

Getting the Most from Your Wireless Network

Getting the Most from Your Wireless Network WHITE PAPER Network disruptions are no longer minor inconveniences; they have become business disruptions with financial and sometimes even legal consequences. Network engineers need to quickly visualize

More information

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection: Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to

More information