How To Write A Wireless Network Protocol For Rural Communication In India
|
|
|
- Amelia Wilkerson
- 5 years ago
- Views:
Transcription
1 Emulation of WiFiRe protocol on LAN Janak Chandarana, Ranjith Madalapu, Sameer Kurkure, Shravan Hullur Anirudha Sahoo and Sridhar Iyer Department of Computer Science and Engineering, IIT Bombay Abstract WiFi Rural Extension (WiFiRe) is a MAC layer protocol especially designed to provide broadband communication in rural areas of India. It supports long range communication using b PHY and a MAC similar to d. In this paper, we describe the implementation of software stack as an emulation over Ethernet. Implementation is done using C sockets and allows a user to test basic MAC functions such as connection establishment, packet flow and header construction in absence of WiFiRe hardware. We believe that, WiFiRe protocol implemented as part of LAN emulation can be easily ported to the WiFiRe hardware. A. Motivation I. INTRODUCTION Long range wireless for data and voice connectivity is being considered as a viable and affordable solution for rural India. As described in [1], the average user can not spend more than Rs. 300 per month for Internet. There is a need for affordable and easily available system, using which broadband access can be spread to every village in India. WiFiRe [2] presents one such solution, using cheap b chipset but modifying the MAC for longer range and better efficiency. Initiatives reported in [3] and [4] address very similar issues. B. WiFiRe architecture WiFi Rural Extension (WiFiRe) [2] uses the licencefree 2.4 GHz spectrum and cheap b RF chipset to provide long-range wireless communication. It replaces b MAC mechanism (DCF/PCF) with a MAC similar to d, while retaining b PHY. WiFiRe follows star topology (Figure 1) - a Base Station (BS) at the fiber Point of Presence (PoP) and Subscriber Terminal () in the villages nearby. BS has six sectorised antennas covering area of km. is connected to end users with different LAN technologies [5] and communicates with BS through directional antennas. Within a sector, WiFiRe follows time division multiplex (TDM) frame structure which is similar to d. sector km sector 2 BS3 BS2 BS4 `c BS1 sector 1 Fig. 1. sector 4 BS5 BS6 sector 5 40m 2-3 km sector 6 WiFiRe Architecture WiFiRe is promoted by CEWiT India 1 and the project is spread across IIT Bombay, IIT Madras and IISc Bangalore. C. WiFiRe supports time division duplex (TDD) over single channel with multi-sector TDM mechanism to provide about 25Mbps (for both uplink and downlink) for a cell [2]. In TDD, the uplink ( to BS) and downlink (BS to ) share the same channel but are activated at different times. BS and operate in synchronization with each other. Time is divided into frames, which is further divided into downlink (DL) and uplink (UL) segments, which need not be of equal time intervals. DL is further divided into two major parts: beacons and actual downlink PDU. Every Beacon message (Figure 2) have control information followed by UL-MAP and DL- MAP in first DL pdu. These MAPs have the information about total available slots for s in all the sectors. All s will read the DL-MAP and search for their own - ID. If -ID is found, will wake up in that particular 1 The Center of Excellence in Wireless Technology (CEWiT) is an independent research organization set up by the Ministry of Information Technology, Government of India (MIT) in partnership with industry. 10m
2 System (s) beacons Downlink Transmissions BS 1 DL Sub-Frame BS 2 BS 4 BS 5 Fig. 2. BS 3 BS 6 Uplink Transmissions Sector 1 Sector 4 Sector 2 Sector 5 UL Sub-Frame frame Sector 3 Sector 6 slot and receive the packet. transmits packets to BS according to UL-MAP [2]. s follows multi-sector TDD mechanism as illustrated in Figure 2. Connections established between BS and are identified by a 16 bit Connection Identifier (CID). Refer [2] for more details about. D. WiFiRe implementation Simulations have been done to check WiFiRe protocol s correctness, performance, scheduler design and few PHY related issues like antenna behavior [6]. We would like to test protocol behavior in actual implementation and emulation on LAN is the first step towards it. We are using layer-2 functionalities of C sockets to implement and test it on DIX 2 Ethernet based LAN. Emulator is carefully designed so that some modules are PHY dependent and some are PHY independent. PHY dependent modules will be replaced appropriately later on. E. Contributions There are two main contributions of this paper. (A) By doing emulation, we expect to encounter many implementation and system related issues which did not show up in simulation. This would help to improve WiFiRe protocol s correctness. We describe maintenance of soft timers, packet classification, VoIP on wireless, QoS and few other WiFiRe specific issues in subsequent sections. (B) We exploit the Ethernet network s parameters like frame size, MTU, collisions, propagation delay, to emulate a wireless link, even though they are different from Such a link can be used to test new wireless protocol proposal, in absence of wireless hardware. A. testbed II. ARCHITECTURE Implementation of is done using C sockets on Linux platform. Program runs in user space (see section 2-E for a discussion). Linux terminals with 2 s each are working as BS and s. This whole scenario gives us emulation of actual protocol. Many network parameters like IP address, ARP cache, DNS, proxy settings are kept fixed to keep design as simple as possible. WiFiRe testbed (Figure 3) includes a BS with two s, an with two s, a server which acts as gateway, FTP, proxy and web server. Several end-users are connected to through Ethernet switch. BS is connected to using DIX based Ethernet cross cable. This link is treated as wireless link of WiFiRe. Subsequently, it will be replaced with the hardware for WiFiRe PHY. s is connected with end users via switch. BS is connected to server using and sends data to by other interface (). of and BS have plain MAC based connectivity and it makes the network transparent for end users and (S) respectively. End-user clients send packets to, follows slot structure defined in the UL-MAP and sends packets to BS in designated slots. BS receives these packets, processes them using WiFiRe modules and forwards them to S as normal Ethernet packets. sends reply to BS, which forwards it to appropriate and finally, client receives the packets. B. Assumptions and limitations Both BS and are connected using a cross cable, which eliminates problems of propagation delays, ranging, synchronization and other such wireless specific issues. We assume that such issues will be taken care by underlying hardware in actual implementation. Implementation does not perform real ranging procedure as test-bed uses Ethernet cable where propa- Cross Cable BS Proxy 2 DIX frame (named after DEC, Intel, and Xerox) is a commonly used Ethernet standard today and has 16-bit type field Fig. 3. WiFiRe Test Bed
3 gation delay is not variable. In this scenario, Beacon transmission is enough for synchronization. Purpose of ranging here is to assign and transfer basic and primary CIDs only. As our emulation runs on Ethernet, and PCs are connected directly using RJ-45 cables, it can not get total flexibility on frame structure, size, CRC etc. This Ethernet link restricts size of individual packets and WiFiRe MPDUs as well. Due to absence of real hardware clock, software timers are used in implementation which guarantees precision up to milliseconds. BS_TABLE Timer Clock Timing Mechanism MC_TABLE Packet Classifier Set timers Raise SIGALRM DCID From CID Generator In Thread To Packet Controller From Scheduler Out Thread To C. Modules at BS and As shown in Figure 4, there are various modules in BS dedicated to different functions of. modules are explained in next paragraph but diagram is omitted due to space constrains. As expected, BS and have significantly different functionality in. BS MAC contains packet classifier, CID generator, packet controller, scheduler and timer clock. Packet classifier detects packet type, QoS requirements and connection details. It makes appropriate entries in the mapping table. CID generator module generates 16-bit CID for each new connection. These 16 bits are divided in subgroups, such that each group of bits represents -ID, ToS and client. Packet controller sends packets to outgoing queues, buffer queues or simply drops them based on MAC requirement. Scheduler keeps track of all connection s requirements and generates DL-MAP and UL-MAP. Both MAPs are sent in first slot of downlink segment to all s. Scheduler keeps dedicated slots for real-time traffic like VoIP. Timer clock reads UL-MAP and generates a sequence for packet reception. has simpler MAC compared to BS. has MAP parser, packet controller, connection classifier and CS layer. MAP parser reads both MAPs and prepares for uplink and downlink slots. Packet controller maintains incoming and outgoing queue, filled with raw IP packets. Packet controller takes inputs from parser for packet sequence. Connection classifier detects packets coming from different end-users and makes new dynamic service addition (DSA) request for each new connection. CS layer understands Ethernet and WiFiRe header, converts packets appropriately from WiFiRe to Ethernet and viceversa. BS and have similar modules for packet transmission and reception, CID tables and buffer queues. Implementation of these modules is done using wellknown strategies. Fig. 4. WiFiRe modules in BS D. Control and Data flow for various events Initially BS comes up and starts execution of its routine procedure of beacon broadcast, which is handled by packet controller. Whenever an comes up, it starts listening for a beacon. will go through ranging procedure, and finally get registered. is now ready to serve its client s requests, which were not served earlier. Timing mechanism module generates local sequence based on timer from DL-MAP/UL-MAP. This timing sequence is fed to the Clock to raise interrupts in the beginning of designated slots to wake up at required slot. Each maintains one table (-TABLE). The table entries include MAC address of client, CID and ToS. Each row of the table indicates unique connection from to BS. BS also maintains two tables: BS-TABLE and MC-TABLE. BS-TABLE entry includes BSID (indicates the sector), ID (indicates the ) and CID while MC- TABLE entry includes CID, client IP and ToS. Here, we give an example (Figure 5) of typical HTTP transaction to illustrate actions taken in at and BS. Whenever receives Ethernet packets from client(s), following actions are performed in uplink: 1) Packet classifier checks if received packet belongs to any existing connection by scanning table entries. If matched, goto to step 4. If no match found, then make new entry in the table with temporary CID. 2) creates DSA request and waits for DSA response from BS. Ethernet packet will be stored in the buffered queue till the response arrive. 3) Once receives DSA response, it updates the table entry in -TABLE with newly allocated CID.
4 C1 Cn Ethernet MAC header MAC1 MAC2 _TABLE Virtual wireless medium header BS & S MAC1 MAC3 MAC4 PHY1 PHY2 PHY3 PHY physical medium BS_TABLE Proxy Internet s Ethernet Packets WiFiRe Ethernet Packets Normal Ethernet Packets Fig. 5. BS MC_TAB Layering approach in WiFiRe emulation 4) removes existing Ethernet header from the packet. s CS layer creates a WiFiRe header (based on CID of the table entry) for raw IP packet PDUs. 5) transmits WiFiRe packet to BS through outgoing socket according to UL-MAP. Action at BS: 1) BS captures the packet from (Figure 3) using socket. 2) BS reads the WiFiRe header and updates the table with IP address to CID mapping entry. 3) Packet controller removes the WiFiRe header after making table entry and constructs an Ethernet MAC packet for proxy. 4) Transmits Ethernet packet to proxy, which ultimately forwards these packets to Internet and responds back to BS. 5) BS buffers the responses and send them in downlink frame according to DL-MAP. Similar steps happen for downlink as well. E. Discussion Implementation is done in C sockets instead of kernel for following reasons: A user level communication component, which provides direct access to low level communication (like putting bytes directly on PHY) mechanisms, bypasses operating systems complexity (like interrupts, sock-buff) in critical paths of communication. Overheads of kernel traps and memory copies along with various dependencies between user space and kernel space are avoided. LE S To develop a prototype when WiFiRe protocol still evolving and changing, it is difficult to change code and debug in kernel module frequently. III. INTEGRATING WITH HARDWARE In a typical implementation, such as WiMAX (802.16d), all the modules (MAC, RF, antenna, modem, and memory) are in same box [7]. Every component is closely coupled with each other and they exchange configuration parameters with each other. For example, memory has driver and API through which, it can store/retrieve data to/from buffer. This buffer is shared by MAC and PHY. In current WiFiRe implementation plan, and BS-PHY are separate from each other (Figure 6). PHY boards are being developed independently and require MAC frame to be delivered on Ethernet cable. Eventually, MAC and PHY will be integrated as single entity. Current hardware keeps six different s for six BSs. These six s are connected by single switch. This leads to Ethernet cable as single communication medium. All the non-wifire control messages such as 2 byte control data (explained later in this section) have to be transferred using same link. Extra control modules have to be written to handle such messages which adds to the complexity in implementation. WiFiRe frames are to be sent to this switch with destination address as a given BS-PHY MAC address. Frame structure and slot size is fixed. There is a centralized module which instructs all six BS-PHYs to synchronize with each other and send data as and when required. In our approach both BS-PHY and BS-MAC are separate from each other (Figure 6). There are various ways to transmit a frame which is built by Fig. 6. To TCP/IP Layer Ethernet MAC Base Station (BS) Ethernet Cable Ethernet Cable BS-PHY A1 A2 A3 A4 A5 6 A6 BS hardware: proposed WiFiRe real system component
5 from BS-MAC to respective BS-PHY such that each BS- PHY should knows when to transmit the data frame. We also need to optimize the PHY overhead, which is of 4 slots, for every new transmission at BS-PHY. Using concatenation we allocate all slots which belong to same BS consecutively, thereby reducing PHY overhead. We use a 2 byte control packet per DL-TB (down link transport block), having information <starting slot, number of consecutive slots> and then transmitted to BS-PHY. At BS-PHY, it reads the information present in control packet and does accordingly. Figure 7 shows how this approach works. Total DL frame is divided into groups (B1, B3, B5) and each group belongs to the respective BS-PHY. Beacons is transmitted to every BS-PHY. Down link Transport Blocks (DL-TB is a group of slots which belongs to the same BS. Each BS will have zero or more DL-TBs and this number depends on Ethernet packet size.) are created before inserting the WiFiRe frame into Ethernet packets. For example, when BS-PHY receives a Ethernet packet having a control packet <05,15>, it transmits from slot 5 to 19. This method has advantage of fixed size memory requirement at BS-PHY, minimal control and PHY overhead. However it increases the complexity of scheduler. Scheduler has to take care of constructing DL-TBs. IV. CHALLENGES In this section, we describe a few challenges that we faced during implementation of WiFiRe and our future directions. Detecting different traffic classes for QoS is not trivial. We created TCP-port based classification for RTP packets. We used 802.1Q aware clients and detected packets using MAC headers where cross-layering was not possible. BS and in our testbed are supposed to work as layer-2 devices. Because of Linux kernel inside BS and, services (like ARP and DNS) generate periodic packets which will get passed to WiFiRe s directly. These packets are misinterpreted as WiFiRe packets. Disabling these services is not an option, as they are shared by other based. Additional WiFiRe modules to drop such packets is required. If we consider G.729 codec, for 10 ms voice, there is 40 byte of header (RTP, UDP and IP) and 10 bytes of voice data. For WiFiRe system, this overhead is very high and some solutions are considered. VoIP gateways, which add headers for outgoing packets and remove headers from incoming packets and VoIP compression using advanced codecs (like GIPS) have been considered as an option for future implementation. V. CONCLUSION In this paper we have described an implementation of WiFiRe as a LAN emulation over a test bed. WiFiRe packets can be monitored over the link between BS and to verify factual working of the protocol. We have tested it for multiple clients with single system. We have done emulation for one sector, for single BS and but it can be modified easily to accommodate multiple sectors and this work is underway. REFERENCES Slots in UL-Frame UL-Frame DL-TB: WiFiRe Data Packet BS-MAC DL-TB's, B1 Ethernet Packet Control packet Ethernet Packets Slots in DL-Frame Group B1 Group B3 Group B5 Beacon Ethernet Header DL-TB's, B3 DL-TB's, B5 DL-TB's, B BS-PHY's BS1 BS2 BS3 BS4 BS5 BS6 [1] Bhaskar Ramamurthi, Anand Kannan, Ashok Jhunjhunwala, Interim 3.5G broadband wireless system for India: Framework, requirement, performance needs, CEWiT Tech Report, [2] Sridhar Iyer, Krishna Paul, Anurag Kumar, Bhaskar Ramamurthy, WiFiRe: Medium Access Control (MAC) and Physical Layer (PHY) Specifications, CEWiT Tech Report, India, [3] P Bhagwat, B Raman, D Sanghi, Turning Inside-Outs, ACM SIGCOMM Computer Communication Review, [4] Rabin Patra, Sergiu Nedevschi etc, WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks, USENIX NSDI, April, [5] J Chandarana, Sravana K, S Perur, R Rangarajan, S Sahasrabuddhe and S Iyer, VoIP-based Intra-village Teleconnectivity: An Architecture and Case Study, WISARD, COMSWARE, [6] Anitha Varghese, Design of a TDD Single Channel Multisector TDM MAC for a Single Cell WiFiRE System, MTech Thesis, IISc Bnagalore, [7] Intel Corporation, Intel PRO/Wireless 5116 Broadband Interface, Fig. 7. Consecutive allocation of DL slots for each BS
WiFiRE: Wireless Broadband Access for Rural Area
WiFiRE: Wireless Broadband Access for Rural Area Second Stage Report Submitted in partial fulfillment of the requirements of the degree of Master of Technology by Sameer Kurkure (Roll No. 05239025) & Shravan
Modelling Quality of Service in IEEE 802.16 Networks
1 Modelling Quality of Service in IEEE 802.16 Networks Giuseppe Iazeolla1, Pieter Kritzinger2 and Paolo Pileggi2 1 Software Engineering and System Performance Modelling Group University of Roma Tor Vergata,
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
Performance optimization of mobile WiMAX netwoks for VoIP streams
Performance optimization of mobile WiMAX netwoks for VoIP streams L Ortiz V Rangel J Gomez Department of Telecommunications UNAM Mexico City {lortiz victor javierg}@fi-bunammx R Santos School of Telematics
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Figure 1: Bandwidth and coverage of wireless technologies [2].
Simulation and Performance Evaluation of WiFi and WiMAX using OPNET Ravinder Paul, Sukhchandan Lally, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {rpa28, lally,
Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
International Journal of Advance Engineering and Research Development. QoS Analysis of VOIP Traffic over WiMAX
Scientific Journal of Impact Factor(SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2,Issue 5, May -2015 QoS Analysis of VOIP Traffic over WiMAX Saira Banu 1,
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
VOIP over Space Networks
VOIP over Space Networks C. Okino, W. Kwong, J. Pang, J. Gao, and L. Clare Jet Propulsion Laboratory California Institute of Technology Presented at The Fifth Space Internetworking Workshop 2006 Hanover,
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Improving the VoIP Capacity in WiMAX Networks
Improving the VoIP Capacity in WiMAX Networks Vitaliy Tykhomyrov Telecommunication laboratory MIT department University of Jyväskylä Outline 2 The topics to be presented: Existent 802.16 ns-2 modules WINSE
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
CT505-30 LANforge-FIRE VoIP Call Generator
1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
Optimization of VoIP over 802.11e EDCA based on synchronized time
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Voice Over Internet Protocol(VoIP)
Voice Over Internet Protocol(VoIP) By Asad Niazi Last Revised on: March 29 th, 2004 SFWR 4C03 Major Project Instructor: Dr. Kartik Krishnan 1. Introduction The telecommunications companies around the world
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks Khaled Alutaibi and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail: {kalutaib, ljilja}@sfu.ca Abstract
How To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Network Configuration Setup Guide. Air4G-W24 9.50
For Air4G-W24 9.50 This document forms the release note relevant to the specific product release as stated above. It covers new features, performance and any limitations of the product known at the time
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Design of PSTN-VoIP Gateway with inbuilt PBX & SIP extensions for wireless medium
Design of PSTN-VoIP Gateway with inbuilt PBX & SIP extensions for wireless medium Priyesh Wadhwa Under the guidance of Prof. Sridhar Iyer Department of Computer Science and Engineering Indian Institute
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Troubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
VoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
