IEEE Draft MAC PICS Proforma
|
|
- Adela Horn
- 5 years ago
- Views:
Transcription
1 January 1996 Doc: IEEE P /1 IEEE Draft MAC PICS Proforma Simon Black Chris Zeglin Johnny Zweig Carolyn Heide Tom Baumgartner Tom Tsoulogiannis Bob O'Hara Symbionics Networks Ltd Symbol Technologies Inc XircomInc Spectrix Corp. Spectrix Corp Advanced Micro Devices Submission 1 Simon Black, et al
2 January 1996 Doc: IEEE P /1 Support for MAC Functions Item Protocol Feature References Status Value Support 1 * Is implementation an Access Point? 0 Yes D No D 2* Is implementation a Station? 0 YesDNoD 3* Is STA able to become a Point 0 YesDNoD Coordinator? 4* Is STA CF-Aware? 0 Yes DNoD 5* Does ST A support WEP? 0 Yes D NoD 6* Does AP support wireless DS? Cl:0 Yes DNoD 7* Does implementation have a Frequency 0 YesDNoD Hopping Physical Layer? 4.1 Implementation complies with frame format conventions? Implementation complies with octet M YesD ordering convention? Implementation complies with reserved M YesD field convention? 4.2 Frame field formats and values correct? M YesD Frame control field correct? M YesD Protocol version field correct? M 0 YesD Type and Subtype fields correct? M YesD ToDS field correct? M YesD FromDS field correct? M YesD More Fragment field correct? M YesD Retry field correct? M YesD Power management field correct? M YesD More Data field correct? M YesD WEP field correct? M YesD DurationlID field correct? M YesD Is Address representation correct in all M YesD transmitted frames? Is Address designation correct? M YesD Is the BSSID the correct format in frames M YesD where it occurs? In an infrastructure BSS is BSSID the M YesD MAC address of the STA in the AP? In an IBSS, is the BSSID the locally C2:M YesDN/AD administered individual IEEE MAC address generated by the STA that created the IBSS? Is the broadcast BSSID limited to C2:M YesDN/AD Management frames of Subtype PROBE? Is the source address the individual M YesD address of the implementation under test? Is the sequence control field format M YesD correct? Are MSDUs numbered M YesD Are fragments numbered M YesD Does implementation limit frames to less M YesD that or equal to the maximum frame body length? Is the CRC field calculated M Yes 0 Submission 2 Simon Black, et al
3 January 1996 Doc: IEEE P Frame formats correct? 4.2 M Yes Are RTS frames correctly formatted? M Yes Are the RTS frame control field, address M Yes 0 and duration fields correct? Are CTS frames correctly formatted? M Yes Are the CTS frame control field, address M Yes 0 and duration fields correct? Are ACK frames correctly formatted? M Yes Are the ACK frame control field, address M Yes 0 and duration fields correct? Are PS-PolI frames correctly formated? Cl:M Yes 0 N/AO Are the PS-PolI frame control field, C1:M Yes ON/A 0 address and SID fields correct Are CF-End frames correctly formated? C(1&3):M Yes ON/A Are the CF-End frame control field, C(1&3):: YesON/AO duration and address fields correct? M Are Data frames correctly formatted? M Yes Are Addresses assigned correctly in Data M Yes 0 frames? Is the Address 1 field used to perform M Yes 0 address matching for receive decisions? Is Address 4 field used exclusively for C6:M YesON/AO wireless DS? Is frame body formatted correctly? M Yes Are the correct Data subtypes used M Yes 0 exclusively during contention period? Are the correct Data subtypes used in a C(1&3):M YesON/AO PCF implemenation? Are the correct Data subtypes used in a C4:M Yes ON/A 0 CF-Aware implementation Is duration field set correctly in Data M Yes 0 frames? Are management frames correctly M Yes 0 formatted? Are Addresses assigned correctly in M Yes 0 Management frames? Is duration field set correctly in M Yes 0 Management frames? Is the Beacon management frame format M Yes 0 correct? Is the FH Paramenter set element present C7:M YesON/AO in Beacon frames? Are the values of the fixed fields and M Yes 0 elements within the Beacon frame correct with respect to MIB variable settings for the implementation? Is the CF Paramenter set element present C(1&3):M Yes ON/A 0 in Beacon frames? Is the IBSS Paramenter set element M Yes 0 present in Beacon frames when the ST A is operating within an IBSS? Is the ATIM management frame format C2:M Yes 0 N/A 0 correct? Is the Disassociation management frame M Yes 0 format correct? Submission 3 Simon Black, et al
4 January 1996 Doc: IEEE P / Is the Association Request management C2:M Yes DN/AD frame format correct? Is the Association Response management Cl:M Yes DN/AD frame format correct? Is the Reassociation Request management C2:M Yes 0 N/AD frame format correct? Is the Reassociation Response Cl:M Yes 0 N/AD management frame format correct? Is the Probe Request management frame C2:M Yes 0 N/AD format correct? Is the Probe Response management frame M Yes 0 format correct? Is the Authentication management frame M Yes 0 format correct? Is the Deauthentiaction management C2:M Yes 0 N/AD frame format correct? Are fixed management frame body M Yes 0 components used Is the Authentication Algorithm Number M Yes 0 used correctly in the relevant frames? Is the Authentication Transaction M Yes 0 Sequence Number used correctly in the relevant frames? Does the Beacon Interval appear correctly M Yes 0 in the frames? Does the Capability Information appear M Yes 0 correctly in the relevant frames? Does the Current AP Address appear M Yes 0 correctly in the relevant frames? Does the Listen Interval appear correctly M Yes 0 in the relevant frames? Is the the Station ID assigned correctly in M Yes 0 the relevant frames? Does the Timestamp appear correctly in Yes 0 the relevant frames? Are element management frame body M Yes 0 components formatted Does implementation use defined element M Yes 0 IDs Is the element length field used M Yes Is the TIM element formatted and used M Yes Is the DTIM count decremented M Yes Does the DTIM period appear Cl:M Yes 0 N/AD Is the bitmap control field coded Cl:M Yes 0 N/AD Is the partial virtual bitmap coded Cl:M Yes 0 N/AD Does the implementation correctly C2:M Yes 0 N/AD interpret the partial virtual bitmap? Is the ESSID element formatted correctly M Yes 0 and equivalent to the appropriate MIB variable? Submission 4 Simon Black, et al
5 January 1996 Doc: IEEE P Is the FH parameter set element formatted C7:M Yes 0 N/AO and used Are the dwell time, hop set and hop C7:M Yes 0 N/AO pattern parameters equivalent to the appropriate MIB variables? Is the supported rates element formatted M Yes 0 and used Is the CF parameter set element formatted C(1&3):M Yes 0 N/A 0 and used Are the CFP _Rate, CFP _Max_Duration C(1&3):M Yes 0 N/AO parameters equivalent to the appropriate MIB variables? Is the CFP _DucRemaining parameter C(1&3):M Yes ON/A 0 decremented Is the IBSS parameter set element M Yes 0 formatted and used Is the ATIM Window paramter equivalent M Yes 0 to the appropriate MIB variable? 5.1 Does the station implement Open System M Yes 0 Authentication? Are the contents of Open System M Yes 0 Authentication request frames correct? Does the station respond to an Open M Yes 0 System Authentication request frame with an Open System Authentication response frame? Are the contents of Open System M Yes 0 Authentication response frames correct? Is the result of an Open System M Yes 0 Authentication response "successful" if and only if the system generating the response is not currently using a different authentication algorithm? Is a station that receives a "successful" M Yes 0 rseponse to an Open System Authentication exchange authenticated with the station that sent the response? 5.2 Does the station implement Shared Key C5:M YesON/AO Authentication? Are the contents of Shared Key C5:M Yes 0 N/A 0 Authentication request frames correct, and are these frames sent with WEP off? Does the station respond to a Shared Key C5:M YesON/AO Authentication request frame with a Shared Key Authentication challenge text frame? Are the contents of Shared Key C5:M YesON/AO Authentication challenge text frames correct, and are these frames sent with WEPoff? Does the station respond to a Shared Key C5:M Yes 0 N/A 0 Authentication challenge text frame with a Shared Key Authentication encrypted Submission 5 Simon Black, et al
6 January 1996 Doc: IEEE P challenge text frame? Are the contents of Shared Key C5:M YesON/AO Authentication encrypted challenge text frames correct, and are these frames sent with WEP on? Does the station respond to a Shared Key C5:M YesON/AO Authentication encrypted challenge text frame with a Shared Key Authentication response text frame? Are the contents of Shared Key C5:M Yes ON/A 0 Authentication response frames correct, and are these sent with WEP off? Is the result of a Shared Key C5:M Yes ON/A 0 Authentication exchange "successful" if and only if the decrypted challenge text matches the original challenge text? Is a station that receives a "successful" C5:M Yes ON/A 0 rseponse to a Shared Key Authentication exchange authenticated with the station that sent the response? 5.3 Does each MPDU that is sent with WEP C5:M YesON/AO on expanded? When using the WEP Algorithm, does C5:M YesON/AO each expanded MPDU that is sent with WEP on include a correctly-constructed 32 bit IV field immediately preceding the MPDU data? When using the WEP Algorithm, does C5:M YesON/AO each expanded MPDU that is sent with WEP on include a correctly-computed 32 bit ICV field immediately following the MPDU data? 5.4 Does the station use MAC MIB variables 5.3 C5:M YesON/AO relating to WEP Is the awep _Default MAC MIB variable C5:M YesON/AO set and used correctly for encrypting and decrypting MPDUs? Is the aexclude_unencrypted MAC MIB C5:M Yes ON/A 0 variable set and used correctly for decrypting MPDUs? Are the awep_key_mapping and C5:M Yes 0 N/A 0 a WEP _Key_Mappin~Length MAC MIB variable set and used correctly for encrypting and decrypting MPDUs? Do the values in the C5:M Yes ON/A 0 a WEP _Key_Mapping MIB variable take precedence over the a WEP _Default and a WE_DefaulCKey MAC MIB variables for encrypting and decrypting MPDUs? Is the length of a WEP _Key_Mapping at C5:M YesON/AO least 10? Does the station refrain from ever using a C5:M YesON/AO null WEP key? Submission 6 Simon Black, et al
7 January 1996 Doc: IEEE P /1 6.1 Does Implementation use the virtual M Yes 0 carrier sense mechanism 6.2 ACK Frame protocol correct? 6.2 M Yes Are ACK frames sent within a SIPS time? M Yes Are ACK frames sent only if the received M Yes 0 frame had a correct CRC and the Address 1 field of the frame contained the implementation's MAC address? Are ACK frames not sent if the received M Yes 0 frame is a multicast or broadcast frame? Does the ACK frame tranmitted contain M Yes 0 the address contained in the Address2 field of the frame being acknowledged? 6.3 Random Backoff correct? 6.2 M Yes Is the first frame of a transmision M Yes 0 sequence deffered if the medium is detected busy? Does the implementation wait at least one M Yes 0 DIPS time after the medium goes idle before initiating a transmission sequence? Does the implementation follow the M Yes 0 backoff procedure if the first attempt of the first frame of a transmission sequence is deffered until the medium is idle? Is Random Backoff Time calculated M Yes Do retransmissions increase CW M Yes Are the correct values of CWmin and M Yes 0 CWmax used? Does the backoff time only start a DIPS M Yes 0 period after the medium goes idle at the end of a received ACK or the end of a ACK Timeout? Does the implementation monitor the M Yes 0 medium for carrier activity durring backoff slots and stop the backoff timer? Is the backoff time decremented M Yes Is the backoff time resumed only after the M Yes 0 media is detected idle for a DIFS time? Does the implementation start a deferred M Yes 0 transmission when the backoff timer reaches zero? Is there a random backoff between M Yes 0 successive non-burst transmissions from the implementation? 6.4 RTS/CTS protocol correct? 6.2 M Yes Is an RTS/CTS exchange used by the M Yes 0 implementation for directed frames of length greater than arts_threshold? Is an RTS/CTS exchange not used by the M Yes 0 implementation for directed frames of length less than or equal to Submission 7 Simon Black, et al
8 January 1996 Doc: IEEE P /1 arts_threshold? Is an RTS/CTS exchange not used by the M Yes 0 implementation for broadcast and multicast frames sent with the ToDS bit clear? Is an RTS/CTS exchange used by the M Yes 0 implementation only for the first fragment of an unbroken directed burst when the length of the first fragment of the burst is greater than arts_threshold? Is an RTS/CTS exchange used by the M Yes 0 implementation only for the first fragment of the remainder of burst that has been broken if the length of the fragment is greater than the RTS_Threshold? Do RTS retransmissions follow the M Yes 0 backoff procedure? Does the implementation transmit at most M Yes 0 ashorcretry_limit RTS retransmissions before failing the DATA or Managmenet transmission? Does the implementation transmit at most M Yes 0 ashort_retry _Max frame retransmissions of a Data or Management frame of length less than or equal arts_threshold before failing the frame transmission? Does the implementation transmit at most M Yes 0 along_retry _Max frame retransmissions of a Data or Management frame of length greater than arts_threshold before failing the frame transmission? 6.5 NA V protocol correct 6.2 M Yes Does the implementation only update its M Yes 0 NA V if the received frame is not addressed to the implementation and only if the NA V value is greater than the current NA V value? Is the implementation's NAV accurate to M Yes 0 1 microsecond of the busy/free condition of the medium? 6.6 Is there a SIFS time spacing between each M Yes 0 frame of a directed burst sequence? 6.7 DUplicate detetion and recovery correct? 6.2 M Yes Does the implementation discard M Yes 0 duplicate received fragments? Are broadcast/multicast fragmented M Yes 0 frames sent with a SIPS spacing? Does the implementation discard M Yes 0 duplicate received frames? Does the implementation keep a cache of M Yes 0 recently-received <source address, sequence number, fragment number> tuples? Does the implementation ackowledge M Yes 0 Submission 8 Simon Black, et al
9 January 1996 Doc: IEEE P /1 duplicate frames? 6.8 PCF protocol correct? 6.3 C3:M Yes 0 N/AD Do CF-Aware STAs and Point 6.3 C(3+4):M Yes 0 N/A 0 Coordinator never use RTS in contention free period? Does Point coordinator never poll non 6.3 C3:M Yes 0 N/A 0 CF-Aware STAs? Is Point Coordiantion Function (PCF) 6.3 C3:M Yes 0 N/AD activated by setting acfp _Max_Duartion to a non-zero value? Is a Beacon frame containg a DTIM C3:M YesDN/AD element generated at the start of a CFP? Do CFPs occur at acfp _Rate? C3:M Yes 0 N/A Is the length of the CFP less than, or C3:M Yes 0 N/A 0 equal to acfp _Max_Durationn? 6.9 Fragmentation protocol correct? 6.4 M Yes Are all fragment payloads of an MSDU, 6.4 M Yes 0 except the last, an equal number of octets? Is the last fragment payload smaller than 6.4 M Yes 0 or equal to the previous fragments of the same MSDU? When WEP is not invoked, s the payload 6.4 M Yes 0 of all fragments of an MSDU smaller than or equal to afragmentation_ Threshold? Is the payload of all fragments of an 6.4 C5:M Yes DN/A 0 MSDU smaller than or equal to the 5.2 payload size plus the size of the IV and the ICV? When a fragment is retransmitted, are 6.4 M Yes 0 the contents and size of the payload the same as when it was first transmitted? Can any size fragment, less than 6.4 M Yes 0 afragmentation_threshold plus the size ofiv and ICV, be received? Do all fragments of an MSDU have the 6.4 M Yes 0 same Sequence Number in the Sequence Control Field? Does the first or only fragment of an 6.4 M Yes 0 MSDU have Fragment Number equal to zero in the Sequence Control Field? Do sequential fragments of an MSDU 6.4 M Yes 0 have Fragment Numbers, in the Sequence Control Field, which increment by one? Is the More Fragments bit in the Frame 6.4 M Yes 0 Control Field one for all but the last or only fragment, in which it is zero? When there is not enough time 6.4 C7:M Yes 0 N/AD remaining in the current dwell to Submission 9 Simon Black, et al
10 January 1996 Doc: IEEE P /1 transmit a fragment and receive an ACK, is the defer and backoff procedure described in reference subclause followed? When the time from the first fragment 6.4 M Yes 0 transmission attempt exceeds amax_ TransmiCMSDU _Lifetime without having completed transmission of the MSDU, does the attempt to complete transmission of the MSDU cease? 6.10 Reassembly protocol correct? 6.5 M Yes Is an MSDU correctly reassembled 6.5 M Yes 0 regardless of the order in which the fragments are received? Are up to 6 MSDUs correctly 6.5 M Yes 0 reassembled when the fragments of those MSDUs are received interleaved? When the time from receipt of the first 6.5 M Yes 0 fragment of an MSDU exceeds amax_receive_msdu _Lifetime without receipt all fragments of that MSDU, are all received fragments of that MSDU discarded? Are duplicate fragments of an MSDU 6.5 M Yes 0 discarded? Are duplicate fragments of a directed 6.5 M Yes 0 MSDU acknowledged? Are all Control Frames and 6.6 M Yes 0 MulticastIBroadcast frames transmitted at one of the rates in abss Basic Rate Set? Submission 10 Simon Black, et al
11 January 1996 Doc: IEEE P /1 8.1 Is a local TSF timer maintained? M Yes Is the TSF timer started independently of C1:M YesON/AO other simultaneously started APs? Does the station adopt the time stamp in C2:M YesON/AO Beacons sent from an AP as the local TSFtimer? Are Beacons generated every C1:M YesON/AO abeacon_period time units? Does the station in an IBSS adopt the M Yes 0 time stamp of a Beacon or Probe Response whose value is greater than the Station's TSF timer? Does the station set its TSF timer to zero M Yes 0 and refrain from transmitting Beacons or Probe Responses when joining an IBSS until it has received a Beacon or Probe Response from a member of the IBSS? Does the TSF timer have a modulus of M Yes ? Does the station transmit the value of the M Yes 0 station At each TBTT, does the station correctly M Yes 0 determine when to transmit a Beacon? Does the station correctly update the M Yes 0 value of its TSF timer? Is the TSF timer accurate to M Yes %? 8.2 Does the station perform scanning? M Yes Does the station perform active scanning M Yes 0 and passive scanning as determined by ascan_mode and ascan_state? When scanning passively, does the M Yes 0 station listen to each channel scanned for no longer than apassive_scan_duration? Does the station properly send Probe M Yes 0 Responses? Does the station remain awake after M Yes 0 sending a Beacon and respond to Probe frames? Does the station always remain in the Cl:M YesON/AO Awake state? Does the station follow the active M Yes 0 scanning procedure? To initialize a BSS, does the station Cl:M YesON/AO select a BSSID, select channel synchronization information, select a beacon interval, initialize the TSF time and begin transmitting Beacons? Does the station perform the procedure C(!1):M YesON/AO to initialize a BSS or to synchronize with abss? When operating in an infrastructure BSS, C(!l):M YesON/AO does the station always adopt the tier Submission 11 Simon Black, et al
12 January 1996 Doc: IEEE P /1 value in the Beacon from the AP with which it is associated? When operating in an IBSS, does the C(!1):M YesON/AO station always adopt the information in the Beacon or Probe Response as required? Does the station implement the timer C7:M YesON/AO synchronization? Does the station maintain the required C7:M YesON/AO tables of hoppin~ sequences? 8.3 Does the station transition between C2:M YesON/AO power states appropriately, according to apower Management Mode? 8.4 Does the AP identify stations for which Cl:M Yes ON/A 0 MSDUs are buffered by properly setting bits in the TIM? Does the AP identify indicate the Cl:M YesON/AO presence of buffered broadcast and multicast frames by setting SID bit zero in the TIM? Does the AP transmit buffered broadcast Cl:M Yes ON/A 0 and multicast frames prior to unicast frames after a DTIM? Does the AP transmit a TIM with every Cl:M YesON/AO Beacon? Does the AP transmit a TIM of type Cl:M YesON/AO DTIM every adtim_interval rather than a TIM? 8.5 Does the AP maintain a power CI:M YesON/AO management status for each currently associated station? Does the AP buffer MSDUs for PS Cl:M Yes ON/A 0 stations? Does the AP transmit frames for AM Cl:M Yes ON/A 0 stations directly? Does the AP properly format the TIM Cl:M YesON/AO field and transmit it in the Beacon? Does the AP buffer all broadcast and Cl:M YesON/AO multicast frames if any stations are in PS mode? Does the AP transmit all buffered Cl:M YesON/AO broadcast and multicast frames and set the MoreData bit properly after every DTIM? Does the AP respond to a PS Poll by Cl:M Yes ON/A 0 sending a single MSDU with the More Data bit set apprpriately to indicate the presence of further buffered MSDUs? Does the AP implement an aging Cl:M Yes ON/AO function to delete buffered MSDUs? When informed that a station has Cl:M YesON/AO changed to the Active Mode, does the AP send bufeered MSDUs to the station without waiting for a PS Poll? Submission 12 Simon Black, et al
13 January 1996 Doc: IEEE P /1 8.6 Does the AP maintain a power C(1&3):M YesDN/AD management status for each associated CF-Aware station? Does the AP set the bits in the TIM field C(1&3):M YesDN/AD Does the AP transmitted to CF-Aware C(1&3):M YesDN/AD stations appropriately? Does the AP transmit frames to a CF C(1&3):M Yes DN/A 0 Aware station under control of the point coordinator when the CF-Aware station is detected to change from PS to AM? 8.7 Does the station awaken after C2:M Yes DN/A 0 alisten_interval to receive the next scheduled Beacon? Does the station issue PS Pols frames C2:M YesDN/AD appropriately? Does the station remain in the Awake C2:M YesDN/AD state until a response to its PS Poll is received or until a Beacon whose TIM indicates the presence of no further buffered traffic for the station? Does the station issue another PS Poll C2:M Yes DN/A 0 frame if the More Data bit in a received frame indicates that more MSDUs are buffered for that station? Does the station wake up to receive C2:M Yes 0 N/A 0 every DTIM? Does the station remain awake until the C2:M Yes 0 N/A 0 More Data bit of the broadcast/multicast frames indicate that no further broadcast/multicast MSDUs are buffered? 8.8 Does the station enter the Awake state to C(2&4):M YesDN/AD receive the Beacon at the start of each contention free period? Does the station remain in the Awake C(2&4):M YesDN/AD state when it detects its bit is set in the DTIM or subsequent TIMs of the contention free period until it receives a directed MSDU from the AP with the More Date bit indicating no further buffered traffic? 8.9 Does the AP implement an aging Cl:M YesDN/AD function based on the alisten_interval of each station for which traffic is buffered? Does the aging function prevent frames Cl:M YesDN/AD being discarded after any period shorter than alisten_interval of each station for which traffic is buffered? 8.10 When in PS mode in an IBSS, does the M Yes 0 station initialize its power management as described? When in an IBSS, does the station enter M Yes 0 PS mode only if the value of the Submission 13 Simon Black, et al
14 January 1996 Doc: IEEE P /1 ATIM_ Window is greater than zero? When in an IBSS, does the station transit M Yes 0 between the awake and doze states as required? When power management is in use in an M Yes 0 IBSS, does the station buffer MSDUs for stations known to be in PS mode? When in an IBSS, does the station M Yes 0 transmit the ATIM frame as described? When in an IBSS, does the station M Yes 0 acknowledge received ATIM frames? When in an IBSS, does the station M Yes 0 prevent the transmission of frames other than the A TIM during the A TIM window? When in an IBSS, does the station M Yes 0 continue to buffer frames for station known to be in PS mode until an acknowledgment the ATIM is received? When in an IBSS, does the station begin M Yes 0 transmission of buffered frames immediately following the ATIM window, as described? When in an IBSS, does the station retain M Yes 0 the buffered MSDU and announce it again with an A TIM in the next A TIM window, if the station is unable to transmit the MSDU during the beacon interval in which it was announced? 8.11 Does the station implement the C2:M YesON/AO association procedure? Does the AP implement the association Cl:M YesON/AO procedure? Does the station implement the C2:M YesON/AO reassociation procedure? Does the AP implement the reassociation Cl:M YesON/AO procedure? 8.12 Management Information Base Does the station implement the SMT M Yes 0 object class? Does the station implement the MAC M Yes 0 object class? Does the station implement the Resource M Yes 0 Type object class? Submission 14 Simon Black, et al
Actual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest
More informationOptional Point Coordination Function (PCF)
Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function
More informationPart 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society
Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC)
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationIEEE P Wireless Local Area Networks
Doc: IEEE P802.t1~96/16 Increasing the reliability of delivery of multicast frames in an IBSS network IEEE P802.11 Wireless Local Area Networks Matthew Fischer - AMD January 10, 1996 San Diego, CA 1 ad-hoc
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationComments on the Draft standard version b2
IEEE 802.11 Wireless Access Method and Physical Specification Title: Prepared by: Comments on the Draft standard version b2 Wim Diepstraten AT&T-GIS (NCR) WCND-Utrecht Nieuwegein The Netherlands Tel: (31)-3402-97482
More informationIEEE Wireless LANs
Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points
More informationWLAN The Wireless Local Area Network Consortium
WLAN The Wireless Local Area Network Consortium 802.11 Base AP MAC Layer Test Suite Version 3.5 Technical Document Last Updated: February 18, 2012 Wireless LAN Consortium 121 Technology Drive, Suite 2
More informationIntroduction to Wireless LAN
Introduction to Wireless LAN Po-Ning Chen, Professor Depart. Of Communications Engineering National Chiao-Tung University 1 Topologies of Wireless o Infrastructure versus ad hoc Infrastructure Portable-to-fixed
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationWLAN The Wireless Local Area Network Consortium
WLAN The Wireless Local Area Network Consortium 802.11 Base Station MAC Layer Test Suite Version 3.2 Technical Document Last Updated: November 25, 2008 Wireless LAN Consortium 121 Technology Drive, Suite
More informationABHELSINKI UNIVERSITY OF TECHNOLOGY
cm. Management Operations of the IEEE 802.11 Mei Yen Cheong meiyen.cheong@hut.fi S-72.333 Postgraduate Seminar on Radio Communications Helsinki University of Technology April 13, 2004 Management Operations
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationOutline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William
More informationWireless Communication Session 4 Wi-Fi IEEE standard
Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationFunctions of physical layer:
Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions
More informationECE442 Communications Lecture 3. Wireless Local Area Networks
ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More information4.1.1.General Frame Format The MAC frame format compz:ises a set of fields that shall occur in a fixed order in all frames.
Doc: IEEE P802.11-951177 4. Frame and MPDU Formats 4.1. MAC Frame Formats Each frame shall consist of the following basic components: a) A MAC Header, which comprises frame control, duration, address and
More informationInternet Protocol Stack
Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing
More informationIEEE Wireless Access Method and Physical Layer Specification
DOC: IEEE PS02.11-96/S9 IEEE 802.11 Wireless Access Method and Physical Layer Specification Title: Authors: Addition of ASN.l MIB code to Draft 3.1 Howard Hall and Richard Ozer Windata, Inc. 543 Great
More informationAppendix A Pseudocode of the wlan_mac Process Model in OPNET
Appendix A Pseudocode of the wlan_mac Process Model in OPNET static void wlan_frame_transmit () { char msg_string [120]; char msg_string1 [120]; WlanT_Hld_List_Elem* hld_ptr; const WlanT_Data_Header_Fields*
More informationWLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationIEEE WLAN (802.11) Copyright. Nomadic Communications
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationNomadic Communications WLAN MAC Fundamentals
Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è
More informationResults of Ballot on Draft Standard General comments, comments on first clauses and on Annexes
doc.: EEE P802.11-96/47-2 Seq. Section your Cmnt Part mmentlrationale C(' ~cted Text DispositioniRebuttai T,t vote Results of Ballot on Draft Standard 03.0 General comments, comments on first clauses and
More informationLocal Area Networks. Lecture 17 Fall Token Ring and FDDI
Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol
More informationTopic 4. Wireless LAN IEEE
Topic 4 Wireless LAN IEEE 802.11 What we will learn in this lecture: Basics of IEEE 802.11 MAC layer CSMA/CA Security WEP protocol Wireless LANs: Characteristics Types Infrastructure based Adhoc Advantages
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : PW0-300 Title : Certified Wireless Network Expert Vendors : CWNP Version : DEMO Get Latest
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationEnabling Technologies
Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationMarch 1996 doc.: IEEE P /49C Tutorial MAC Entity: MAC Basic Access Mechanism Privacy and Access Control. MAC Layer Management
802.11 Tutorial 802.11 MAC Entity: MAC Basic Access Mechanism Privacy and Access Control Copyright 1996 IEEE, All rights reserved. This contains parts from an unapproved draft, subject to change 802.11
More informationChapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationLecture (08) Wireless Traffic Flow and AP Discovery
Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame
More informationChapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationIntroduction. Giuseppe Bianchi, Ilenia Tinnirello
IEEE 802.11 Wireless LANs Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim) Abandoned by major
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationWLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto
WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,
More informationBasic processes in IEEE networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationWLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto
WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationJuly '95 MAC group Report LLC PHY. Page 1. Goals from May 95
July '95 MAC group Report Doc: IEEE P802.11 95/165 LLC I MAC I PHY Page 1 Goals from May 95 Send 01.3 (01.2 + July work) MAC chapters for 802.11 LB approval to forward to Sponsor ballot. Operating rule
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationWireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard
Wireless LANs Outline Benefits Applications Technologies Issues Configurations Overview of 802.11 Standard Dr. Michael S. Boykin Spring 02-2 Local Area Networks 2 Outline II MAC layer protocols PHY layer
More informationoutline background & overview mac & phy wlan management security
IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a
More informationTable of Contents 1 WLAN Service Configuration 1-1
Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationIEEE Wireless LANs Part I: Basics
IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.
Wireless Intro 15-744: Computer Networking L-9 Wireless TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving TCP Performance over Wireless Links [BDS+94]
More informationQualNet 4.0 Model Library: Wireless
QualNet 4.0 Model Library: Wireless December 2006 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationInvestigation of IEEE standard Medium Access Control (MAC) layer in ad-hoc networks and comparison with IEEE distributed mesh networks
Investigation of IEEE standard 802.11 Medium Access Control (MAC) layer in ad-hoc networks and comparison with IEEE 802.16 distributed mesh networks Master thesis performed in Electronics Systems by Fernando
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationIntroduction to IEEE Yu-Chee Tseng CS.NCTU. ieee802.11:1 WirelessNet Tseng
Introduction to IEEE 802.11 Yu-Chee CS.NCTU ieee802.11:1 Why do we need MAC? Contention and Collision Avoidance!!! ieee802.11:2 Why Do We Need MAC? Fairness!!! ieee802.11:3 Disconeinuity that We Have Seen
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationQualNet Wireless Model Library
QualNet 4.5.1 Wireless Model Library July 2008 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationCWNP PW Certified Wireless Network Expert. Download Full Version :
CWNP PW0-300 Certified Wireless Network Expert Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-300 Answer: B, E QUESTION: 130 Which parameters accurately describe the Beacon Interval
More informationMaster thesis 60 credits
UNIVERSITY OF OSLO Department of informatics Capacity and performance study of IEEE 802.11e in WLANs and ad hoc networks Master thesis 60 credits Frank Roar Mjøberg 2. May 2007 Abstract Today, WLANs allow
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationAnalysis of IEEE e for QoS Support in Wireless LANs
Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231
More informationAttacks on WLAN Alessandro Redondi
Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationMobile Communications Chapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair
More information4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions
4.4 IEEE 802.11 MAC Layer 4.4.1 Introduction 4.4.2 Medium Access Control 4.4.3 MAC Management 4.4.4 Extensions 4.4.3 802.11 - MAC management Synchronization try to find a LAN, try to stay within a LAN
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationLaboratory of Nomadic Communication. Quick introduction to IEEE
Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Characteristics of Wireless LANs
More informationMinutes of IEEE P Task Group E Interim Teleconference QoS Baseline Development
IEEE P802.11 Wireless LANs 802.11 Task Group E Teleconference Minutes Date: October 11, 2000 Author: Harry Worstell AT&T Labs - Research 180 Park Ave, Florham Park, NJ Phone: 973-236-6915 Fax: 973-360-5873
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:
More informationIEEE Wireless Access Method and Physical Specification
doc: IEEE P802.11-94117 IEEE 802.11 Wireless Access Method and Physical Specification Title: Prepared by: Abstract: The provisions required for handoft. Wim Diepstraten NCR WCND-Utrecht NCR/AT&T MPD Nieuwegein
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationChapter 4 WIRELESS LAN
Chapter 4 WIRELESS LAN Distributed Computing Group Mobile Computing Summer 2002 Overview Design goals Characteristics IEEE 802.11 Architecture Protocol PHY MAC Roaming Security a, b, d, etc. Short intermezzo
More information