Reducing MAC Layer Handoff Latency in IEEE Wireless LANs
|
|
|
- Austin Reeves
- 10 years ago
- Views:
Transcription
1 Reducing MAC Layer Handoff Latency in IEEE Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning Schulzrinne Columbia University hgs@cscolumbiaedu ABSTRACT With the growth of IEEE based wireless LANs, VoIP and similar applications are now commonly used over wireless networks Mobile station performs a handoff whenever it moves out of the range of one access point (AP) and tries to connect to a different one This takes a few hundred milliseconds, causing interruptions in VoIP sessions We developed a new handoff procedure which reduces the MAC layer handoff latency, in most cases, to a level where VoIP communication becomes seamless This new handoff procedure reduces the discovery phase using a selective scanning algorithm and a caching mechanism Categories and Subject Descriptors C21 [Computer System Organization]: Computer- Communication Networks General Terms Measurement, Performance, Experimentation Keywords IEEE 80211, Fast Handoff, Selective scanning 1 INTRODUCTION IEEE based wireless LANs have seen a very fast growth in the last few years and Voice over IP (VoIP) is one of the most promising services to be used in mobile devices over wireless networks One of the main problems in VoIP communication is the handoff latency introduced when moving from one Access Point (AP) to another As we will show below, the amount of time needed for the handoff in the environment is too large for seamless VoIP communications We were able to reduce the handoff latency using a modified handoff procedure, with modifications being limited to mobile devices and compatible with standard behaviour Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro t or commercial advantage and that copies bear this notice and the full citation on the rst page To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior speci c permission and/or a fee MobiWac 04, October 1, 2004, Philadelphia, Pennsylvania, USA Copyright 2004 ACM /04/0010 $500 Figure 1: Channel frequency distribution in IEEE 80211b Below, first we discuss in brief work done in this particular area, followed by a brief description of how we tackled the problem Then, in section 3, we describe the IEEE architecture focusing on the management frames and the handoff process; then we will shortly describe the HostAP driver and how we modified it in order to implement our new algorithm In section 5, we illustrate how we were able to reduce the total handoff latency to an average value of 129 ms by using a selective scanning procedure and to an average of 3 ms by using a caching mechanism In section 7 and 8, we show the environment of the experiments and the measurement results 2 RELATED WORK A lot of work has been done to reduce the handoff latency when roaming between different subnets and many new schemes for mobile IP and route optimization have been proposed In this paper, we focused on reducing handoff latency at MAC layer As we will describe in Section 4, MAC layer handoff latency can be divided into three components: probe delay, authentication delay and association delay Arunesh et al in [3] focused on reducing the reassociation delay The reassociation delay is reduced by using a caching mechanism on the AP side This caching mechanism is based on the IAPP protocol in order to exchange the client context information between neighboring APs The cache in the AP is built using the information contained in an IAPP Move-Notify message or in the reassociation request sent to
2 standard is backwards-compatible with the 80211b standard while the 80211a standard, because of the different ISM band, is not compatible with the other two We will focus our attention on the IEEE 80211b standard even though most of the concepts and notions described here are still valid for 80211a and 80211g As we said earlier, the 80211b operates in the 24 GHz ISM band Its 14 channels are distributed over the range from 2402 GHz to 2483 GHz (see figure 1), each channel being 22 MHz wide In US, only the first 11 channels are used Of these 11 channels, only channels 1, 6 and 11 do not overlap So, in a well configured wireless network, all or most of the APs will operate on channel 1, 6 and 11 Also, to avoid co-channel interference, two adjacent APs should never be on the same channel Figure 2: IEEE architecture the AP by the client By exchanging the client context information with the old AP, the new AP does not require the client to send its context information in order to reassociate, hence reducing the reassociation delay Sangheun et al in [11] and Park et al in [12] focused on the IEEE 8021x authentication process This process is perfomed after the STA has already associated to a new AP The IEEE 8021x authentication delay is reduced by using the Frequent Handoff Region (FHR) selection algorithm In [2], it is shown how the discovery phase (scanning time) is the most time consuming part of the handoff process, taking over 90% of the total handoff delay, while (re)association time contributes only a few milliseconds Our work follows a novel approach and reduces the total handoff latency by reducing the scanning time This is achieved by using a selective scanning algorithm and a caching mechanism This caching data structure is maintained at the client side and no changes are required in the existing network infrastructure or the IEEE standard unlike in [3] All the required changes are done on the client side wireless card driver In [5], they also propose a selective scanning algorithm However, their proposition relies on the use of neighbor graphs This approach requires changes in the network infrastructure and use of IAPP The scanning delay is defined as the duration taken from the first Probe Request message to the last Probe Response message This definition does not take into consideration the time needed by the client to process the received probe responses This processing time represents a significant part of the scanning delay and increases significantly with the number of probe responses received In our work and in [2], the time required for processing the probe responses received by the client is taken into consideration 3 IEEE STANDARDS There are currently three IEEE standards: 80211a, 80211b and 80211g The 80211a standard operates in the 5 GHz ISM band, and it uses a total of 32 channels of which only 8 do not overlap The 80211b and 80211g standards both operate in the 24 GHz ISM band and use 11 of the 14 possible channels Of these 11 channels, only three do not overlap While 80211b can operate up to a maximum rate of 11 Mbit/sec, the 80211g and 80211a standards can operate up to a maximum rate of 54 Mbit/sec The 80211g 31 The IEEE Wireless LAN architecture The architecture is comprised of several components and services that interact to provide station mobility to the higher layers of the network stack We outline the following components as described in [8] Wireless LAN station: The station (STA) is the most basic component of the wireless network A station is any device that contains the functionality of the protocol: medium access control (MAC), physical layer (PHY), and a connection to the wireless media Typically, the functions are implemented in the hardware and software of a network interface card (NIC) A station could be a laptop PC, handheld device, or an Access Point (AP) All stations support the station services of authentication, deauthentication, privacy, and data delivery Basic Service Set (BSS): Basic Service Set (BSS) is the basic building block of an wireless LAN The BSS consists of a group of any number of stations Service Set Identifier (SSID): A service set identifier (SSID) is a unique label that distinguishes one WLAN from another So all APs and STAs attempting to become a part of a specific WLAN must use the same SSID Wireless STAs use the SSID to establish and maintain connectivity with APs 32 IEEE Management Frames The IEEE management frames enable stations to establish and maintain communications The following are common IEEE management frame subtypes, with the description quoted from [6]: Authentication frame: The authentication is a process whereby the access point either accepts or rejects the identity of a STA The STA begins the process by sending an authentication frame containing its identity to the access point With open system authentication (the default), the STA sends only one authentication frame, and the access point responds with an authentication frame as a response indicating acceptance (or rejection) Association request frame: association enables the access point to allocate resources for and synchronize with a STA A STA begins the association process by sending an association request to an access point This frame carries information about the STA (eg, supported data rates) and the SSID of the network it wishes to associate with After receiving the association request, the access point considers associating with the STA, and (if accepted) reserves memory space and establishes an association ID for the STA
3 Association response frame: An access point sends an association response frame containing an acceptance or rejection notice to the STA requesting association If the access point accepts the STA, the frame includes information regarding the association, such as association ID and supported data rates If the outcome of the association is positive, the STA can utilize the access point to communicate with other STAs on the network and systems on the distribution (ie Ethernet) side of the access point Reassociation request frame: If a STA roams away from the currently associated access point and finds another access point having a stronger beacon signal, the STA will send a reassociation frame to the new access point The new access point then coordinates the forwarding of data frames that may still be in the buffer of the previous access point waiting for transmission to the STA Reassociation response frame: An access point sends a reassociation response frame containing an acceptance or rejection notice to the STA requesting reassociation Similar to the association process, the frame includes information regarding the association, such as association ID and supported data rates Disassociation frame: A station sends a disassociation frame to another station if it wishes to terminate the association For example, a STA that is shut down gracefully can send a disassociation frame to alert the access point that the STA is powering off The access point can then relinquish memory allocations and remove the STA from the association table Beacon frame: The access point periodically sends a beacon frame to announce its presence and relay information, such as timestamp, SSID and other parameters regarding the access point, to STAs that are within range Probe request frame: A station sends a probe request frame when it needs to obtain information from another station For example, a STA would send a probe request to determine which access points are within range Probe response frame: A station will respond with a probe response frame, containing capability information, supported data rates, etc, after it receives a probe request frame 4 HANDOFF PROCEDURE WITH ACTIVE SCANNING Handoff is a procedure executed when a mobile node moves from the coverage area of one AP to the coverage area of another AP The handoff process involves a sequence of messages being exchanged between the mobile node and the participating APs This sequence of messages can be divided into three types: probe, authentication and association, which will be described later in detail The transfer from the old AP to the new AP results in state information being transferred from the former to the latter, consisting of authentication, authorization and accounting information This can be achieved by an Inter Access Point Protocol (IAPP) that is currently under draft in IEEE 80211f, or by a proprietary protocol, specific to a vendor 41 Steps during Handoff The handoff process can be divided into two logical steps: discovery and reauthentication [2] Discovery: The discovery process involves the handoff initiation phase and the scanning phase When the STA Probe delay Authentication delay Association delay STA Probe request (broadcast) Probe responses Probe request (broadcast) Probe responses Authentication request Authentication response Reassociation request Reassociation response A V A I L A B L E A P s New AP Figure 3: Handoff process using active scanning [2] is moving away from the AP it is currently associated with, the signal strength and the signal-to-noise ratio of the signal from the AP decrease This causes the STA to initiate a handoff Now, the STA needs to find other APs that it can connect to This is done by the MAC layer scanning function Scanning can be accomplished either in passive or active mode In passive scan mode, the STA listens to the wireless medium for beacon frames Beacon frames provide a combination of timing and advertising information to the STAs Using the information obtained from beacon frames the STA can elect to join an AP During this scanning mode the STA listens to each channel of the physical medium to try and locate an AP Active scanning involves transmission of probe request frames by the STA in the wireless medium and processing of the received probe responses from the APs The basic procedure of the active scan mode includes the following steps as explained in [7]: 1 Using the normal channel access procedure, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), gain control of wireless medium 2 Transmit a probe request frame which contains the broadcast address as destination 3 Start a probe timer 4 Listen for probe responses 5 If no response has been received by minchanneltime, scan next channel 6 If one or more responses are received by minchannel- Time, stop accepting probe responses at maxchanneltime and process all received responses 1 7 Move to next channel and repeat the above steps After all channels have been scanned, all information re- 1 minchanneltime and maxchanneltime values are device dependent
4 Selective Scanning Do active scanning with the channel mask Detected any AP? No Flip the channel mask Do active scanning with the new channel mask Figure 4: Handoff time in IEEE 80211b ceived from probe responses are processed so that the STA can select which AP to join next Reauthentication: The reauthentication process involves authentication and reassociation to the new AP as well as transfer of the STA s credentials from the old AP to the new AP Authentication is a process by which the AP either accepts or rejects the identity of the STA The STA begins the process by sending the authentication frame, authentication request, informing the AP of its identity; the AP responds with an authentication response, indicating acceptance or rejection After successful authentication, the STA sends a reassociation request to the new AP which will then send a reassociation response, back to the STA, containing an acceptance or rejection notice Figure 3, taken from [2], shows the sequence of messages expected during the handoff As seen in Figure 3, the sequence of messages can be divided into three types: 1 Probe messages: Once the STA decides to look for other APs, the probing process starts The STA starts sending out probe requests and then processes received probe responses, based on the active scanning algorithm explained above The time involved in this probing process is called probe delay 2 Authentication messages: Once the STA decides to join an AP, authentication messages are exchanged between the STA and the selected AP The time consumed by this process is called authentication delay 3 Reassociation messages: After a successful authentication, the STA sends a reassociation request and expects a reassociation response back from the AP These messages are responsible for the reassociation delay 5 FAST HANDOFF ALGORITHM As described in [2] and confirmed by our experiments, the probe delay constitutes the biggest part (over 90%) of the handoff latency (Figure 4); for this reason, we focus on minimizing this delay In order to reduce the probe delay, we have focused our attention on two different aspects of the problem First, we had to reduce the probe delay by improving the scanning procedure, using a selective scanning algorithm; second, we had to minimize the number of times the previous scanning procedure was needed This second point was achieved with Detected any AP? Compute new channel mask Reassociate to the best AP Complete No Do normal active scanning(full scanning) Figure 5: Selective scanning procedure the use of a caching mechanism We will now describe the two algorithms 51 Selective Scanning As we described in Section 3, among the 14 possible channels that can be used according to the IEEE 80211b standard, only 11 are used in USA and, among these 11 channels, only three do not overlap These channels are 1, 6 and 11 The selective scanning algorithm is based on this idea In the selective scanning, when a STA scans APs, a channel mask is built In the next handoff, during the scanning process, this channel mask will be used In doing so, only a well-selected subset of channels will be scanned, reducing the probe delay In the following, we describe in detail the selective scanning algorithm 1 When the driver is first loaded, it performs a full scan (ie, sends out a Probe Request on all the channels, and listens to responses from APs) 2 A channel mask is set by turning on the bits for all the channels in which a Probe Response was heard as a result of step 1 In addition, bits for channel 1, 6 and 11 are also set, as these channels are more likely to be used by APs 3 Select the best AP, ie the one with the strongest signal strength from among the scanned APs, and connect to that AP 4 The channel the STA connects to is removed from the channel mask by re-setting the corresponding bit, as the likelihood of an adjacent AP on the same channel of the current AP is very small So, the final formula for computing
5 No Handoff process with cache Check cache Has a cache entry for the current AP? Try to associate to the first AP in cache Succeeded? No Try to associate to the second AP in cache Succeeded? No Compute new channel mask Do Selective scanning Figure 6: Caching procedure Complete Table 1: Cache structure 1 Key Best AP Second Best AP 2 MAC1 (Ch1) MAC2 (Ch2) MAC3 (Ch3) 10 the new channel mask is scanned channels (from step 2) the current channel 5 If no APs are discovered with the current channel mask, the channel mask is inverted and a new scan is done If still no APs are discovered, a full scan, on all channels, is performed 52 Caching The selective scanning procedure described above reduced the handoff latency in our experiments (Section 7) to a value between 30% to 60% of the values obtained with the original handoff (see Figure 9), bringing the average values for the total handoff latency to 130 ms against an original handoff latency of 343 ms (see Table 2) For seamless VoIP, it is recommended that overall latency does not exceed 50 ms [1] This further improvement was achieved by using an AP cache The AP cache consists of a table which uses the MAC address of the current AP as the key Corresponding to each key entry in the cache is a list of MAC addresses of APs adjacent to current one which were discovered during scanning This list is automatically created while roaming Our cache has a size of ten, meaning that it could store up to ten keys and a width of two, meaning that for each key, it can store up to two adjacent APs in the list Below we describe how the caching algorithm works: 1 When a STA associates to an AP, the AP is entered in the cache as a key At this point, the list of AP entries, corresponding to this key, is empty 2 When a handoff is needed, we first check the entries in cache corresponding to the current key 3 If no entry is found (cache miss), the STA performes a scan using the selective scanning algorithm described in Section 51 The best two results based on signal strength are then entered in the cache with the old AP as the key 4 If an entry is found (cache hit), we issue a command to associate to this new AP On success, the handoff procedure is complete 5 When the STA fails to connect to the first entry in cache, the second entry is tried and if association with the second entry fails as well, our selective scanning algorithm is used From the above algorithm, we can see that scanning is required only if a cache miss occurs; every time we have a cache hit, no scanning is required Usually, using cache, it takes less than 5 ms to associate to the new AP But, when the STA fails to associate to the new AP, the firmware waits for a long time, up to 15 ms 2 To reduce this time-to-failure we are using a timer The timer expires after 6 ms, and the STA will then try to associate to the next entry in cache In selective scanning, when the timer expires the STA performs a new selective scanning using the new channel mask A cache miss does not significantly affect the handoff latency As mentioned above, when a cache miss occurs, the time-to-failure is only 6 ms For example, if the first cache entry misses and the second one hits, the additional handoff delay is only 6 ms When both cache entries miss, the total handoff delay is 12 ms plus selective scanning time, all of this still resulting in a significant improvement compared to the original handoff time 6 IMPLEMENTATION To implement our new algorithm, we had to modify the handoff procedure Usually the handoff procedure is handled by the firmware; using the HostAP driver [10], we were able to emulate the whole handoff process in the driver 61 The HostAP Driver The HostAP driver is a Linux driver for wireless LAN cards based on Intersil s Prism2/25/ chipset [10] Wireless cards using these chipsets include the Linksys WPC11 PCMCIA card, the Linksys WMP11 PCI card, the ZoomAir 4105 PCMCIA card and the D-Link DWL-650 PCMCIA card The driver supports a so-called Host AP mode, ie, it takes care of IEEE management functions in the host computer and acts as an access point This does not require any special firmware for the wireless LAN card In addition to this, it has support for normal station operations in BSS and possible also in IBSS 3 2 Actual values measured using Prism2/25/3 chipset cards These values may vary from chipset to chipset 3 IBSS, also known as ad-hoc network, comprises of a set of
6 The HostAP driver supports a command for scanning APs, can handle the scanning results and supports a command for joining to a specific AP It is also possible to disable the firmware handoff by switching to manual mode By enabling this mode, we were able to control the card functionalities at the driver level and use our fast handoff procedure Link Layer Handoff Time in IEEE 80211b Original Handofff Selective Scanning Cache 7 MEASUREMENTS This chapter describes the hardware and software used for measuring the handoff latency and the environment in which the measurements were taken 71 Experimental Setup For the measurements, we used three laptops and one desktop The laptops were a 12 GHz Intel Celeron with 256 MB of RAM running Red Hat Linux 80, a P-III with 256 MB of RAM running Red Hat 73, and another P-III with 256 MB RAM running Red Hat Linux 80 Linksys WPC11 version 30 PCMCIA wireless NICs were used in all three laptops The desktop was an AMD Athlon XP with 512 MB RAM running WinXP The 004 version of the HostAP driver was used for all three wireless cards, with one of them modified to load our improved driver, and the other two cards were used for sniffing Kismet 301 [9] was used for capturing the management frames, and Ethereal 0916 [4] was used to view the dump generated by Kismet and analyze the result 72 The Environment The experiments were conducted in the 80211b wireless environment in the CEPSR building of Columbia University, on the 7th and the 8th floor With only two laptops running the sniffer (Kismet), many initial runs were first conducted to get to know the wireless environment, specifically the channel numbers the APs were operating on, the handoff starting points and the next AP and channel the STA would connect to The environment in which the packet loss measurements were taken differed from the one above The measurements were still taken in the CEPSR building of Columbia University, on the 7th and 8th floor, but some rogue APs were removed This change in the environment caused a reduction of the original handoff time and consequentially a drastic reduction of the packet loss This will be shown in section Experiments After gathering sufficient information about the environment, we started taking the actual handoff measurements One sniffer was set to always sniff on channel 1 (as the first Probe Request is always sent out on channel 1 in normal active scanning), and the other sniffer on the next channel the STA was expected to associate to For the measurement, the system clock of the three laptops was synchronized using the Network Time Protocol (NTP) Also, to avoid multi-path delays, the wireless cards were kept as close as physically possible during the measurements For measuring the packet loss, in addition to the three laptops, the desktop was used as a sender and receiver A stations which can communicate directly with each other, via the wireless medium, in a peer-to-peer fashion msec Experiments Figure 7: Link layer handoff time in 80211b Figure 8: Packet loss and packet delay UDP packet generator was used to send and receive data packets Each UDP packet contained in the data field the packet sequence number to improve accuracy by linking the packet sequence number to its timestamp on all three laptops 8 MEASUREMENT RESULTS In the following sections we present the results for the total handoff time and packet loss 81 Handoff Time Figure 7 and Table 2 present the results we obtained As can be seen, with selective scanning the handoff latency improved considerably, with an average reduction of 40% But even this reduced time is not good enough for seamless VoIP However, using the cache, the handoff latency time drops to a few ms, making it possible to have seamless VoIP This huge reduction was possible because scanning, which took more than 90% of the total handoff time, was eliminated by using the cache 82 Packet Loss Table 3 present the results we obtained when the STA performing the handoff was the receiver Table 4 present the results we obtained when the STA performing the handoff was the sender For measuring packet loss, UDP packets were transmitted to and from the STA, to simulate voice traffic during
7 Table 2: Handoff delay (ms) of 80211b in link layer Experiment avg Original handoff Selective scanning Caching Table 3: Packet loss during handoff in mobile receiver (number of packets; 20 ms interval) Experiment avg Original Handoff Selective Scanning Cache ms Bridging Delay Experiments Figure 9: Bridging delay the handoff Transmitting data packets adds to the handoff delay This delay is caused by the fact that data packets are transmitted during the handoff process, in particular between the last probe response and the authentication request This behaviour is only noticed when the STA performing the handoff is the sender (see Table 5) When the STA performing the handoff is the receiver, no such delay is introduced However, a new delay is introduced This new delay, bridging delay [2], is caused by the time needed for updating the MAC addresses to the ethernet switches forming the distribution system In particular, when handoff happens and the STA associates to the new AP, the switch continues to send the packets, addressed to the STA, through the old AP which after many retries, discards them This behaviour persists for about 140 ms 4 (see Figure 9) after which the MAC addresses have been updated and the switch starts forwarding the data packets, addressed to the STA, through the new AP This results in an additional packet loss As can be seen in Figure 8, when the receiver is performing the handoff, the packet loss drops to about 60% and 40% of the value obtained with the original handoff using selective scanning and cache, respectively When using cache, the effect of the bridging delay is particularly prominent Table 3 shows how, even though the handoff time is only a few milliseconds, when using a cache, the packet loss is still considerable Figure 8 also shows the average packet delay introduced by the handoff procedure when the sender is performing the handoff For VoIP sessions, packets exceeding a delay of 100 ms can be considered lost Table 4 shows the packet delay when using the original handoff scheme, selective scanning and cache Even though selective scanning reduces such a delay by about 25%, in order to achieve seamless VoIP communication, the caching mechanism is necessary As a note, the behaviour of the selective scanning algorithm is not dependent on the environment, while the original handoff performance is very much affected by it Table 2 and Figure 7 show an environment in which rogue APs are present Table 5 refers to a clean environment, without the presence of rogue APs As we can see, the selective scanning behaviour is very consistent, while the original handoff performance deteriorates with the environment Figure 10: Handoff time in IEEE 80211a 9 CONCLUSIONS AND FUTURE WORK In this paper we described the handoff procedure and demonstrated how the handoff latency can be substantially 4 Actual values may vary according to the environment
8 Table 4: Delay during handoff in mobile sender (ms) Experiment avg Original Handoff Selective Scanning Cache Table 5: Summary of result Handoff time in Packet loss in Handoff time in Packet delay in mobile receiver (ms) mobile receiver mobile sender (ms) mobile sender (num of packets) (num of packets) Original Handoff Selective Scanning Cache reduced with the use of a caching mechanism combined to a selective scanning algorithm We demonstrated how, in the best case, we were able to reduce the handoff latency to an average value of 129 ms by only using the selective scanning algorithm and to an average value of 30 ms by using the caching mechanism (Table 2) This reduction in handoff latency also considerably decreased packet loss and packet delay (Table 5) By using a dynamic channel mask (refer to selective scanning algorithm 4 and 5 in section 51), scanning a subset of channels can be used as a generic solution Another important result of our work is that by using selective scanning and caching, the probing process, the most power consuming phase in active scanning, is reduced to the minimum This makes it possible to use the active scanning procedure also in those devices such as PDAs where power consumption is a critical issue With the new IEEE 80211g standard out, we will be testing our algorithm to the new standard The extension of our algorithm to the new 80211g standard will only require minor adjustments, if any Figure 10 shows the original handoff time in IEEE 80211a networks As can be seen, the discovery phase is still the most time consuming phase of the handoff process Future testing will be done in an IEEE 80211a environment The extension of our algorithm to this standard will also require minor adjustments such as modification of the channel mask (selective scanning), improved cache dimensioning and management The channel with the best signal is not necessarily the best channel to connect to because it could be much more congested than a channel with a lower signal strength Because of this, a heuristic which considers bit rate information together with signal strength can achieve optimal performance A procedure in which an AP somehow knew its neighboring APs [3] and could provide that information to the STA could be used to fill the cache This could also be combined with a positioning algorithm such as GPS or any other WiFi positioning algorithm allowing a real-time filling and refreshing of the cache, according to the STA actual position, always resulting in a cache hit Very critical issues are the cache size and cache management policy A good cache policy, together with the use of AP neighboring and other heuristics, can achieve seamless VoIP sessions 10 ACKNOWLEDGMENTS This work was supported by grant of SIPquest Inc Equipment was partially funded through grant CISE of the National Science Foundation 11 REFERENCES [1] General characteristics of international telephone connections and international circuits ITU-TG, 114, 1998 [2] M S A Mishra and W Arbaugh An Empirical analysis of the IEEE MAC Layer Handoff Process ACM SIGCOMM Computer Communication Review, 33(2):93 102, April 2003 [3] M S A Mishra and W Arbaugh Context caching using neighbor graphs for fast handoffs in a wireless network Technical report, University of Maryland, February 2004 [4] G Combs Ethereal network protocol analyzer [5] H-S K et al Selecive channel scanning for fast handoff in wireless lan using neighbor graph Japan, July 2004 International Technical Conference on Circuits/Systems, Computer and Communications [6] J Geier Understanding frame types Technical report, Jupitermedia Corporation, August 2002 [7] IEEE IEEE Std 80211, Wireless LAN Medium Access Control (MAC) and Physical (PHY) specifications: High Speed Physical Layer Extension in the 24 GHz Band, 1999 [8] A Jain Handoff delay for 80211b wireless lans Technical report, University of Kentucky, 2003 [9] M Kershaw Kismet wireless network sniffer [10] J Malinen Host AP driver for intersil prism2/25/3 [11] S Park and Y Choi Fast inter-ap handoff using predictive-authentication scheme in a public wireless lan Networks2002 (Joint ICN 2002 and ICWLHN 2002), August 2002 [12] S Park and Y Choi Pre-authenticated fast handoff in a public wireless lan based on ieee 8021x mode Singapore, October 2002 IFIP TC6 Personal Wireless Communications
Scanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
Department of Computer Science Columbia University
Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, [email protected] Department of Computer Science Columbia University 28
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Cooperative Handoff in Wireless Networks
Cooperative Handoff in Wireless Networks George Athanasiou, Thanasis Korakis and Leandros Tassiulas Dept. of Computer and Communications Engineering, University of Thessaly, Greece Email: [email protected]
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Demystifying Wi-Fi Roaming
EDUCATIONAL BRIEF Demystifying Wi-Fi Roaming What You Need to Know to Avoid Costly Mistakes A wide variety of modern conveniences are made possible through Wi-Fi Networking. Home automation, real-time
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
Mobility Management Technique for Real Time Traffic in 802.11 Networks
Journal of Computer Science 3 (6): 390-398, 2007 ISSN 1549-3636 2007 Science Publications Mobility Management Technique for Real Time Traffic in 802.11 Networks 1 Gurpal Singh, 1 Ajay Pal Singh Atwal and
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP
This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
802.11b and associated network security risks for the home user
802.11b and associated network security risks for the home user by Michael Osten [email protected] Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework
White paper. Cisco Compatible Extensions: Client Benefits on a Cisco WLAN
White paper Cisco Compatible Extensions: Client Benefits on a Cisco WLAN Overview Some of the most compelling benefits to working under a unified network architecture are the advanced networking capabilities
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
Nokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
Universiti Teknologi MARA. 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm
Universiti Teknologi MARA 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm Azwan Abdul Satar Thesis submitted in fulfillment of the requirements for Bachelor of Science (Hons) Information Technology
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Network Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
WUA-0605 300Mbps Wireless USB Network Adapter
WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo
Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
Figure 1. The Motorola SB4200 cable modem
Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable
Introduction. Voice over WLAN Challenges
Introduction Voice over Wireless LAN (VoWLAN) Voice over IP (VoIP) is maturing and achieving increasing corporate acceptance as device costs decrease and VoIP phones improve. Employing VoIP over wireless
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
DOCUMENT REFERENCE: SQ303-002-EN FIXED BROADBAND WHITEBOX SAMKNOWS BRIEFING. August 2015
DOCUMENT REFERENCE: SQ303-002-EN FIXED BROADBAND WHITEBOX SAMKNOWS BRIEFING August 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 303 003 EN DRAFT SC 20150810 REVISION HISTORY
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html
Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO http://www.examskey.com/msc-131.html Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product.
Protection Ripple in ERP 802.11 WLANs White Paper
Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO [email protected] Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection
EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.
EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
Advanced Wireless LAN VoIP Technology
Wireless LAN VoIP QoS Advanced Wireless LAN VoIP Technology A technical overview is given of an optimal access point selection method and an autonomous distributed scheduling MAC method that take QoS into
WL-5450AP & WL-5460AP Wireless Access Point. User s Guide
WL-5450AP & WL-5460AP Wireless Access Point User s Guide 1 FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
WLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
RoamAbout 802.11 Wireless Networking Guide
RoamAbout 802.11 Wireless Networking Guide W i r e l e s s L A N s TM 9034042-02 Notice Notice Cabletron Systems reserves the right to make changes in specifications and other information contained in
Wireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
