How To Analyze The Security On An Ipa Wireless Sensor Network
|
|
|
- Mildred Hardy
- 5 years ago
- Views:
Transcription
1 Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, ABSTRACT This paper presents a performance investigation of the throughput in ad hoc sensor networks. We study the two cases: enabled WEP (Wired Equivalent Privacy), and disabled WEP. The analysis makes use of an ad hoc queuing model with one queue and one server to estimate the security delays in the traffic between ad hoc sensor nodes. We present an algorithm to estimate the service time delay and the security time delay based on real measurements of timestamps. The main result is that the security adds a significant degradation in throughput that may affect applications over ad hoc sensor networks like secure medical application and voice applications. Keywords: Ad hoc, sensor networks, IEEE802.11b, security, WEP, performance, throughput. 1. INTRODUCTION Ad hoc networks security is an important need for the success of many applications over sensors network. Security introduces negative effects on the quality of information change by decreasing the throughput. This is due to the reason that security adds more processing and bits to every packet. Many security protocols provide a manageable level to protect the user/customer data over ad hoc sensor networks. We compare the average delay values in two scenarios: (1) when WEP is enabled, and (2) when WEP is disabled. In addition, we look at the effect of the throughput using WEP protocol. Enabling WEP adds more bits to the secured frames and consumes more time processing while decrypting the frames. This increase in processing time and transmission of extra security bits will affect the QoS parameters, which affect throughput, like delay, jitter, and packet loss. Our interest comes from the new IT market, which is witnessing a huge demand on wireless killer applications that are delay-sensitive, like VoIP and other multimedia applications. Quantifying quality is crucial for setting application specific parameters. One goal is to design specific tests and algorithms to quantify the increase in delay due to security. Since the market is moving towards more voice and video applications, we design experiments utilizing User Datagram Protocol (UDP) with varying frame sizes. A mathematical model with one queue and one server can analyze waiting time values, service time values, and throughput. The model makes use of the recorded time stamps of arriving and departing packets. A key result is a mathematical model for the analysis of WEP security performance. Our results show that WEP security adds a significant delay that decreases the throughput monotonically. Using our queuing model, the algorithm can estimate the extra microseconds needed for security, which drastically affect the throughput. This research evaluates performance of network throughput in order to set application parameters to enhance QoS. 2. AD HOC THROUGHPUT QUEUING MODEL Representing ad hoc throughput sensor networks with queuing models assumes a queuing system for each ad hoc sensor node. Each queuing system consists of one queue and one server. This model measures the throughput for several scenarios using dissimilar security protocols implemented over ad hoc sensors networks. Our ad hoc throughput queuing model can also improve performance via the use of a new parameter, which we introduce as the quality figure of merit or QFoM in our coming
2 paper (Figure1). The QFoM includes many parameters like throughput, number of users, noise effect parameter, and protocol dependent index, which are the subject of our ongoing research, and we do not discuss them on this paper. However, the results of this paper are the initial step that intrigued us to start on the QFoM. Figure 2 demonstrates the mathematical model. The algorithm defines the process from the time that transmitted data enters the wireless part of the source node until it reaches the destination node and then enters the Network Interface Card (NIC) using the following steps: 1- Register the time data transmitted by recording the timestamp of the packet after all bits have entered the queue. 2- Data entering the queue waits until it enters the service facility (server). 3- Data entering the service facility will get encapsulated in an IEEE802.11b MAC frame, which is also encapsulated in the Physical Layer Convergence Protocol (PLCP) header and preamble. In addition, the security headers are added or removed in the server by enabling or disabling WEP protocol as shown in Figure3 [1]. Distance between Nodes (in meters) Arriving Traffic Queue Service Facility Queue Service Facility Point F: Received Traffic to be stored, more processed, or re-transmitted Ad hoc Node 1 Ad hoc Node 2 Throughput Process Figure1. Ad hoc throughput queuing model with two sensor nodes 4- Throughput measurements process depends on the number of packets transmitted with or without WEP over the transmission speed of 11Mbps and the physical distance in meters. Using ad hoc systems and our ad hoc queuing model, we are able to define the total time, service times, packet lost, and throughput, for the arriving traffic (packets) that are to transmitted between ad hoc sensors and throughput. 3. AD HOC THROUHGPUT QUEUING MODEL ALGORITHM The throughput queuing algorithm depends on the following factors according to our experiments: service time, queuing time, and the distance between sensor nodes. The delay in each node consists of two major parts: (1) the waiting time in the queue, and (2) the service time. The summation of these two is equal to the response time of the sensor node. The waiting time is defined as the time needed for a packet to wait in the queue before it is served and the service time is defined as the time
3 from when a packet leaves the queue and enters the server until it departs from the last node server. Hence, the service time, waiting time and response time are as follows: Response time (Rt) = Departure time (Td) Arrival time (Ta) = Waiting-time (Wt ) + Service-time(St) (1) and the throughput is defined as: Throughput = Number of IP data bytes (without IP header bytes) received at the final point (Point F) in the final node (2) Total time from the first traffic arrival till all data is at the final sensor node Figure2: Ad Hoc Throughput algorithm SYNC 128bits SFD 16bits Signal 8bits Service 8bits Lenght 16bits CRC 16bits PLCP Preamble 144bits PLCP Header 48bits MPDU PPDU Bytes: Frame Control Duration ID Address 1 Address 2 Address 3 Sequence Address 4 Data FCS control MAC Header Bytes: Frame Control Duration Address 1 Address 2 Address 3 Sequence Address 4 control MAC Header IV Data ICV FCS 2312B Figure 3: IEEE802.11b frame format. The MPDU is the MAC Protocol Data Unit, which expanded in the last shown frames.
4 4. EXPERIMENTS The experiment test-bed consists of two laptops with Linux kernel operating system and Lucent Orinoco IEEE802.11b wireless cards set on ad hoc mode. The traffic generated between the ad hoc sensor nodes uses UDP to avoid feedback Acknowledgement (ACK) packets that TCP adds. To solve the problem of timing synchronizations, the ad hoc nodes are synchronized via a local server to which all test-bed nodes are connected. The same test is repeated several times (at least three times per test) with network STUMBLER version 4 to measure the noise environments. The steps performed during the experiment are described below: )))) (((( Figure 4: Ad Hoc mode. 1- Security test: in this step of the experiment, WEP security shared key was set ON between the ad hoc stations with 40 bit encryption keys. The UDP payload starts at 32B and is incremented by 32B until the maximum data limit that can be sent over IEEE802.11b with WEP, which is 2304B (see Table 1). Table 1 and Table 2 show a difference between the maximum number of bytes we can send when WEP is enabled and when WEP is disabled, because thee are 8 bytes increase in the payload as shown in Figure 3. The number of packets sent between the ad hoc nodes is calculated according to (3), (4) and (5) [2] [3] [4]: Frame Size (bits) = DIFS + PLCP + MAC-header + FCS + WEP + IP-packet + SIFS +ACK + Back off (3) (IP-header + UDP-header + UDP-payload) Number of packet per second = Utilized bit rate / Packet Size In bits (4) Theoretical Max. Throughput = UDP-payload * 8 * (5) PLCP_time+(IP * 8 /R)+SIFS+PLCP_time+(ACK * 8 / R)+DIFS+(Backoff / 2) * Slot+(WEP*8)/R where, [1] DIFS = 50µs PLCP header = 192 bits MAC header and FCS = 34 bytes WEP = 8 bytes
5 IP packet = 20 bytes + UDP header + UDP payload variable SIFS =10µs ACK = 304 bits Back off = 20µs. Table1: UDP payload packets sent between ad hoc nodes with WEP encryption UDP payload (Bytes) Packet Size Bits Number of Packet per Seconds No Security test: in this step of the experiment, WEP security is put OFF between the ad hoc stations, and the UDP payload was initiated from 32B and incremented by 32B till the maximum data could be transferred over IEEE802.11b without security. The maximum amount was 2312B (see Table 2). The number of packets sent between the nodes is calculated according to (3), (4), and (5). Table 2: UDP payload sent between ad hoc nodes without WEP encryption. UDP payload (Bytes) Packet Size (Bits) Number of Packet per Second RESULTS Our results are for two categories of throughput: (I) with WEP and (II) without WEP. The practical experiment analyses show that, within the same category (within category I or within category II), as the payload increases the throughput increases and then decreases, which is a very interesting results. Another key result is that for the same packet size, the throughput is relatively higher than when WEP is enabled. However, the difference in throughput between category I and category II is not so large. Moreover, degradation in the QoS is a function of the number of attached users, the distances between them, and packet sizes of each user stream. Table 3 and table 4 show the results of throughput values, which can be used to feed applications of the network performance in order to enhance application performance. Table 3: Throughput for IEEE802.11b without WEP encryption UDP payload (Bytes) Average throughput for IEEE802.11b without WEP encryption(mbps)
6 Table 4: Throughput for IEEE802.11b with WEP encryption UDP payload (Bytes) Average Throughput for IEEE802.11b with WEP encryption(mbps) Performance degradation for ad hoc Wireless Sensor Networks of IEEE802.11b using WEP occurs because the WEP header has an initial vector and an Integrity Check Value (ICV) [1]. This header is augmented to the packet before transmission. Moreover, the RC4 security algorithm [1] generates the stream key and runs its XOR operation with the IP payload. The increase in the packet size increases time consumption. The decryption on the ad hoc destination introduces a higher delay. The extra security bits and the XOR-related time delays lead to throughput degradation [5]. CONCLUSION We present a queuing model and algorithm to analyze the throughput of ad hoc sensor networks for two categories: with WEP and without WEP. We analyze the throughput between the sensor nodes of IEEE802.11b. A comparison study shows that the performance is degraded when WEP is enabled compared to when WEP is disabled, but the degradation is not so large. However, a key result is that the throughput is affected by packet size and this affects delay-sensitive applications like VoIP and video streaming. As the packet size increases, the throughput increases till some packet size value (around 128B UDP payload) and then the throughput decreases. The distance between sensors nodes has an effect on the throughput. A key result is that the difference between the throughput of WEP experiments and the standard mode for the same payload is a function of the packet size. Therefore, QoS degradation is a function of the number of attached users and packet sizes of each user stream. The proposed ad hoc throughput queuing model and its related algorithm can be implemented in ad hoc sensor networks to better the performance of real time applications especially VoIP, by distributing traffic and location for sensors network and by choosing more suitable packet sizes. REFERENCES [1] IEEE Std , Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. [2] Matthew Gast, Wireless Network The Definitive Guide, 1st Edition, [3] William Stallings, wireless communication and networking, prentice Hall,2003. [4] Cisco 7920 Wireless IP Phone Design and Deployment Guide, March [5] Mohammad Saleh and Iyad Al Khatib, Wireless Access Point Security Performance Using WEP Encryption, ACM MobiSys 05 The Third International Conference on Mobile Systems, Applications, and Services, June 6-8, 2005, Seattle, Washington, USA.
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
Supporting VoIP in IEEE802.11 Distributed WLANs
Supporting VoIP in IEEE802.11 Distributed WLANs Zuo Liu Supervisor: Dr. Nick Filer July 2012 1 Voice VoIP Applications Constant Streaming Traffic Packetize interval usually 10-30 ms 8 160 bytes each packet
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
QoS-aware MPDU Aggregation of IEEE 802.11n WLANs for VoIP Services
QoS-aware MPDU Aggregation of IEEE 802.11n WLANs for VoIP Services Shinnazar Seytnazarov and Young-Tak Kim Department of Information and Communication Engineering, Graduate School, Yeungnam University
point to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
II. IEEE802.11e EDCA OVERVIEW
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
Can I add a VoIP call?
Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Abstract In this paper, we study the
Performance analysis and simulation in wireless mesh networks
Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:
Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Network Management Quality of Service I
Network Management Quality of Service I Patrick J. Stockreisser [email protected] Lecture Outline Basic Network Management (Recap) Introduction to QoS Packet Switched Networks (Recap) Common
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet
Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: [email protected]
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Enhancement of VoIP over IEEE 802.11 WLAN via Dual Queue Strategy
Enhancement of VoIP over IEEE 802.11 WLAN via Dual Queue Strategy + Multimedia & Wireless Networking Laboratory School of Electrical Engineering Seoul National University [email protected], [email protected]
A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage
Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS
V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
What is Network Latency and Why Does It Matter?
What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Asia-Pacific Advanced Network
Frame aggregations in the wireless LANs: A review paper Presented by: Anwar Saif Asia-Pacific Advanced Network Wireless communication 2009 Abstract The overhead induced by the IEEE 802.11 PHY and MAC layer
Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions
1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are
Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Application Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Admission Control for VoIP Traffic in IEEE 802.11 Networks
Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected]
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
How To Test A Network Performance
A.Jabbar : A Simulation Study of Tunneled Voice over Internet Protocol System A Simulation Study of Tunneled Voice over Internet Protocol System A. I. A. Jabbar D. M. Ali Electrical Department - Collage
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
No Ack in IEEE 802.11e Single-Hop Ad-Hoc VoIP Networks
No Ack in IEEE 802.11e Single-Hop Ad-Hoc VoIP Networks Jaume Barceló, Boris Bellalta, Anna Sfairopoulou, Cristina Cano, Miquel Oliver Abstract This paper analyzes the impact of the No Ack policy in VoIP
Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University
Wireless Mesh Networks Impact on Voice over Internet Protocol Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Email: [email protected] February 2014 What is wireless mesh networks?
