An Adaptive and Preemptive Algorithm for Faster Handoffs in WLAN

Size: px
Start display at page:

Download "An Adaptive and Preemptive Algorithm for Faster Handoffs in WLAN"

Transcription

1 An Adaptive and Preemptive Algorithm for Faster Handoffs in WLAN Vijay Ukani Computer Engineering Department Institute of Technology, Nirma University Ahmedabad, Gujarat, India M. M. Gore Computer Science and Engineering Department Motilal Nehru National Institute of Technology Allahabad, Uttar Pradesh, India December 6, 2006 Abstract IEEE Wireless LANs have shown enormous growth in recent times. Due to the mobility promises shown by them, seamless roaming has become a critical component of the whole deployment. A handoff occurs when a Mobile Station moves away from transmission range of one Access Point and enters into transmission range of another Access Point. The current handoff procedure does not satisfy the jitter requirements for real time multimedia applications like VoIP. In this paper we propose a new handoff algorithm which reduces handoff latency to an extent to be seamlessly bearable by a multimedia application. We reduce the search phase latency by periodically scanning channels one at a time and caching the results. The cached results can be used be used for future handoff management. 1 Introduction Wireless network facilitates mobility with high speed information access. It has led to rapid growth in number of IEEE Wireless LAN deployments for internet and local network access. There are currently three IEEE WLAN standards[1]: a, b, and g. The IEEE a operates in 5 GHz ISM band and has 32 channels. The b and g operates in 2.4 GHz ISM band and use 11 of possible 14 channels. Of these 11 channels only 3 do not overlap in frequency range as shown in figure 1. In this paper we are concerned with IEEE b. The IEEE WLAN operates in two modes viz, Infrastructure and Ad-hoc mode. In Ad-hoc mode there is no central entity. Whenever two Mobile Stations (MS) come in communication range of each others, after detecting each other they establish a peer-to-peer communication link between them. Work conceived and completed during authors association with MNNIT, Allahabad as a masters student Figure 1: Channel Layout of b WLAN In Infrastructure mode of WLAN, there are Access Points (AP) acting as Base Stations which makes a single point of communication for all MS associated to it. The MSs and its associated AP forms a Basic Service Set(BSS). The BSS can be extended by connecting APs through a Distribution System (DS) to form Extended Service Set(ESS). Whenever an MS roams across APs, it makes handoff from current AP to a new AP in the range. During a handoff the MS leaves the association with old AP and establishes a new association with new AP. This process of locating a new AP and associating with it, generates latency. This latency may be long enough to break the ongoing communication or induce delay in transmission, which is not acceptable for real time multimedia applications. In this paper a new algorithm is proposed with which we were able to limit the handoff latency to a level where even VoIP application can work seamlessly. The rest of the paper is organized as follows. Section 2 details the operation of b WLAN, focusing on the handoff procedure and the related terms. Section 3 describes the existing methodologies to reduce handoff latency in WLAN. In section 4, a new algorithm for performing the handoff is presented. Section 5 demonstrates the simulation scenario and section 6 provides results and analysis. Finally, in section 7 some concluding remarks and scope for future work is presented.

2 2 The Handoff Process and Related Terminology As per ethernet technologies, roaming domain would mean a network, that connects devices that are capable of sending and receiving broadcast frames to and from one another. This domain is sometimes referred to as layer 2 network. In case of , APs that are in the same broadcast domain and configured with the same service set identifier(ssid) are said to be in the same roaming domain. IEEE natively supports layer 2 roaming ie. roaming within roaming domain or between APs having same SSID MAC does not support inter domain roaming as it is layer 3 roaming and MAC is layer 3 unaware. This doesn t mean layer 3 roaming is impossible with , some upper layer solutions like Mobile IP are required. The roaming user can maintain application connectivity as long as its layer 3 address does not change[5], which does not change in layer 2 roaming. Here, in this paper we are concentrating on layer 2 roaming. In the Infrastructure-based network, when an MS moves away from associated AP, the signal strength and signal-to-noise ratio decreases and at some point it falls below predefined threshold. This situation triggers MS to initiate handoff. The MAC layer handoff process can be divided into three distinct phases: Probe, Authentication, and Reassociation phase. The probe phase can be further categorized into 2 subphases: Detection and Search phase. In detection phase, the MS is responsible for detecting the need for handoff. Whenever an MS detects lack of activity on its transceiver, the possible reasons for this could be a collision, temporary signal fading or AP out of range [11]. The MS has to decide the possible reason and whether or not to go for handoff. In the search phase, after deciding to make handoff the MS should search the potential AP to which it can associate. This could be done by the MAC layer scan function. Scanning can be accomplished in either Active or Passive mode. In active scan the MS starts scanning for AP by broadcasting a probe request frame on one channel and waits for the probe response frame till minchanneltime and if no probe responses are heard during this interval then assuming that no APs are present on this channel, it tunes its transceiver onto next channel and repeats the same procedure. Else if probe responses were received till minchanneltime then it further waits till maxchanneltime, waiting and collecting more probe responses. After collecting all the probe responses, it starts scanning the next channel. After scanning all the channels, process all the received probe responses to determine the potential AP. This scenario is illustrated in figure 2. In passive scan mode the MS tunes its transceiver on one channel and passively listens to the beacons transmitted by the APs on that channel and after beacon interval has elapsed move to next channel. Using the information Figure 2: The Handoff Process using Active Scan contained in the beacon frames the MS decides to connect to an AP. The MS has to wait on each channel for beacon interval as more than one AP may be operating on one channel. Also standard makes it compulsory to scan all channels, passive scan tends to lengthen probe phase. So passive scan is not suitable as well as recommended for faster handoff. After locating an AP in the range the MS should authenticate itself to the new AP by sending an Authentication Request frame. The AP either accepts or rejects the identity of MS by sending an authentication response frame. After being authenticated the MS tries to reassociate with the new AP by sending a reassociation request to the new AP. The new AP then sends a reassociation response back to MS indicating the acceptance or rejection and using Inter Access Point Protocol(IAPP), it communicates with old AP for MS credentials and any buffered frames. It has been already proved in [8] that authentication process takes negligible time. Reassociation phase delay is also very small as compared to probe delay. Probe delay makes up almost 90% of the total handoff latency. So here we are concentrating on improving the probe phase algorithm so as to reduce total handoff latency. 3 Related Work A lot of work has been done to reduce the handoff latency when roaming across the roaming domain. Many new schemes for Mobile IP have been proposed for roaming between Wireless LANs. Here the focus is on roaming within the roaming domain ie. layer 2 roaming. Sangho Shin and A.S. Rawat in [10] focused on reducing handoff latency by using selective scanning and caching mechanism. The idea is to scan selected channels instead of all available channels in a single active scan. A channel mask is used to select a specific sub-

3 set of channels to be scanned, thus reducing the probe latency. Caching is the other technique used to further reduce the probe latency. The results of active scan are cached. This cached results are used for future handoff. Next time whenever MS wants to make handoff, it tries to locate an AP from the cache and try to reassociate with it. If not successful then again start selective scanning. This procedure reduces the probe phase latency but in any case the active scan has to be executed completely at least once, resulting into longer latency during that scan. As well as the selected channels are to be scanned at a stretch, during a handoff, thus the resulting delay would be sum of scan delay of the selected channels. A selective channel scanning mechanism was proposed by Hye-Soo Kin and Sung-Jea Ko [4], in which MS need not scan all channels during active scan but only the channels selected by neighbour graph of APs. In this approach also active scan of selected channel is involved, where in the selected channels are to be scanned in a single scan. While designing any handoff algorithm, the higher error rate of WLAN should be taken into consideration. The IEEE MAC protocol recommends active scanning for handoff process. The probe phase delay may increase considerably if a probe request or probe response packet is lost on the transit. A reliable active scanning procedure is proposed by Wei Li, Qing-An Zeng and D.P. Agrawal in [6]. The algorithm detects the loss of probe request and retransmits it and it assigns higher priority to management frames as compared to data frames. Hector Velayos and Gunnar Karlsson in [11] focused on reducing the detection phase, search phase and execution phase. The detection phase detects the need for handoff. This phase can be reduced by reacting quickly to packet losses and by using shorter beacon interval, in case of passive scanning. They tried to reduce the search phase by using active scanning instead of passive scanning. A. Mishra and W. Arbaugh in [8] described the detailed handoff process. They experimentally measured various components of the handoff process and proved that probe phase contributes dominantly in overall handoff latency, making almost 90% of it, while authentication and association phase contributing in few milliseconds. Here in the proposed approach we try to reduce the probe phase latency. F. A. Gonzalez and Jesus A. Perez in [2], suggested an accurate strategy for measuring actual handoff latency. They distinguished handoff latency from disconnection time and showed that actual disconnection time is very less as compared to handoff time. Most of the work described above are based on complete or selective active scanning. There are certain drawbacks when using complete/selective active scanning. Complete/selective scanning needs to scan all the available/selected channels. Each channel scan adds channel scan delay to probe latency. A new algorithm is presented in section 4, which aims at resolving this drawback and further improving the probe phase latency. 4 The Proposed Approach In active scanning, MS has to spend minchanneltime or maxchanneltime on each channel, depending on channel activity. Thus the time spent on each channel may vary. In case of selective channel scan, the number of channels to be scanned may vary, resulting into variable latency. If N is the number of channels to be scanned, then Probe Time (P T ) could be delimited by N * minchanneltime < P T < N * maxchanneltime. The values of minchannel- Time and maxchanneltime is very crucial in calculating the total handoff latency. Two threshold power levels are defined viz Periodic threshold and Handoff threshold. If received power level of any frame (data or beacon), falls below Periodic threshold (T P ), the MS should start periodic active scan immediately. This is an indicator to the MS about the future handoff. Handoff threshold (T H ) is the power level, which when reached indicates that there is need to execute handoff procedure now. Handoff threshold (T H ) is defined in such a way that MS gets sufficient time to execute handoff procedure before leaving communication range of an AP. The communication range of an AP or MS is decided by the a threshold power level(t). The AP or MS drops a frame if it is received with power level below T. Propagation measurements in a mobile radio channel show that the average received signal strength at any point decays as a power law of distance of separation between transmitter and receiver[9]. The average received power P r at a distance d from the transmitting antenna is approximated by p r = p 0 ( d d 0 ) ple (1) where p 0 is received power level at a distance d 0 between transmitter and receiver. ple is the path loss exponent. 4.1 Estimation of T H & T P T H is the power level which when attained, the MS should start executing the authentication and association procedure with the selected AP. The procedure should be completed before leaving the coverage area of current AP. The maximum time taken for authentication and reassociation phase is calculated experimentally. This is the minimum time MS must spend within the communication range, after receiving frames with power T H. Assuming the maximum speed with which an MS can move, the distance (d) inside transmission range of an AP can be calculated as shown in figure 3. Power level at this point would be T H. Knowing the transmission range(d 0 ), threshold power level(t), and d, T H can be calculated using equation 1. The procedure is made adaptive by dynamically calculating the value of T P. T P is the periodic threshold below which MS should start scanning the channels periodically. It is a function of number of channels to be

4 Figure 3: Relationship between T, T H,and T P scanned periodically(maxchanallowed), the ScanPeriod, and the speed at which MS is moving away from AP. Its value should be set such that MS has sufficient time to periodically scan all channels to be scanned before reaching d h. The speed is estimated by measuring received power level of last 10 beacons and the time at which beacons are received. The distance inside d h, as shown in figure 3, at which periodic scan should start can be given by dist = speed (ScanP eriod+sd) maxchanallowed (2) where SD is the maximum time taken by MS to scan one channel. So the distance from AP where power level is T P can be given by dp = dh - dist. Using equation 1, T P can be calculated. If MS is moving with varying speed, the value of T P is updated at receipt of each beacon frame thus making the algorithm adaptive to the situation. 4.2 Algorithm Following are the notations used in the proposed algorithm. T H :- Handoff threshold T P :- Periodic threshold maxchanallowed :- Number of channels allowed to be scanned ScanPeriod :- Periodic scan interval channellist:- Array of preferred channels channelindex:- Index of channel scanned from channel- List array Algorithm 1 The Proposed Algorithm Initialization Phase: 1 Initialize channellist=1,6,11,2,3,4,5,7,8,9,10 2 channelindex = 0 Periodic Active Scan Phase: 3 Monitor received power of all frames including beacons 4 if (receivedpower < T P && receivedpower > T H) 5 Start active scan for channel with channellist index = channelindex 6 if(ap is detected till minchanneltime) 7 collect probe responses till maxchanneltime and 8 store entries for each AP in cache, sorted according to received power 9 associate back with previously associated AP 10 else 11 shift the channel to end of channellist 12 associate back with previously associated AP 13 channelindex = channelindex + 1 repeat steps 4-13 at an interval of ScanPeriod Reassociation Phase: 14 else if(receivedpower < T H) check cache 15 if(any entry present in cache for that AP) 16 try to reassociate with 1 st AP 17 if(succeeded) 18 completed 19 else 20 try to reassociate next AP until all entries are tried 21 else 22 start complete active scanning 23 Continuously receive beacon frames and keep updating T P. The algorithm can be divided into three phases as initialization phase, periodic active scan phase, and reassociation phase. In the initialization phase, each MS initializes a channellist for each AP, wherein the channels are arranged in order of preference. Initially the channel- List contains all the channels with channel 1,6, and 11 as the first three channel(as there are more chances of an AP present there). When MS moves away from AP, the Signal Strength(SS) of received frames decreases. MS continuously monitors the received power of all frames(data and beacons). When it falls below T P, MS starts periodic channel scan by scanning first channel from channellist. This channellist array is updated at every channel scan. If a channel is found idle during minchanneltime it gets shifted at the end of the list. Thus building a list of channels in channellist, arranged in the order of preference. The MS stores the positive results of periodic channel scan in cache. The AP cache consists of a table which uses current MAC address as the key. Corresponding to each entry in the table the MAC of adjascent AP alongwith the channel is stored. Other fields are the received Signal Strength and SSID. The AP cache has a size of eight. We are limiting the entries per AP to eight, meaning that for each AP it can store details of eight adjascent APs. The cache entries are invalidated as as soon a handoff occurs. After minchanneltime or maxchanneltime, depending on presence of an AP on that channel, the MS again associates back to the previously associated AP, thus resuming the communication from where it had stopped. The breakage of communication due to the this periodic channel scan is either minchanneltime or maxchanneltime plus the reassociation delay, needed to associate back to previous AP. The suggested optimal values, deduced from previous experiments, are approximately 6.5ms for min- ChannelTime and 11ms for maxchanneltime [12]. The simulation results shows that the time taken to reassoci-

5 ate is approximately 3-4ms. Thus the latency generated from this would be less than the jitter bearable by most jitter critical application like VoIP. (The maximum unnoticeable jitter for VoIP is 40ms [7]). The above procedure is repeated periodically untill specified number of channels (MaxChanAllowed) are scanned one by one or the handoff threshold T H has reached. When the received power level of beacons or data packets falls below T H, the MS makes use of the cache to find an AP with maximum power level and tries to associate with it. If association is successful, the to and fro traffic will be routed through the new AP. In case of failure to associate the MS tries to look for next best AP and try reassociating with it. This procedure is repeated untill all APs in the cache are tried. from that AP now. So it finds the next best AP and associates with it. Thus increasing the delay. The actual 5 Simulation We have chosen OMNeT++ as simulation environment. The reasons for choosing OMNeT++ can be found in [3]. Above OMNeT++, IPv6SuiteWithINET model containing IEEE WLAN MAC layer implementation is being used. The simulation scenario has three APs, connected through a distribution system. The parameters used for the simulations are summarized below: Parameter Value Threshold Power -96 dbm Handoff Threshold Power dbm minchanneltime 6.5 ms maxchanneltime 11 ms maxchanallowed 11 When MS initially boots up, using complete active scan, it associates with an AP. During the movement, it initiates a handoff. The Handoff time is measured as difference between the time at which received power of MS falls below T H and the time at which reassociation response from new AP is received. During this time the MS retrieves best AP entry from the cache and authenticates itself with the found AP. Also it sends reassociation request to AP and waits for reassociation response. The packet delay can be measured by sending a stream of data from MS to a wired station while it moves from one AP to another. This is done by using a ping application, sending ICMP requests at regular intervals. The round trip time of response packets were traced to find out the packet delay due to periodic channel scan and handoff. 6 Results and Analysis The main result found is that the MS will not perceive any interruption in applications like VoIP as the handoff time obtained from the simulation results is very less compared to acceptable jitter. The handoff time is approximately 3 ms on most occasion except one in figure 4. During that handoff, the MS tries to associate with best AP from cache but failed to do so, as it has moved away Figure 4: Handoff Delay break in communication would be more than the handoff time while scanning individual channels periodically. The actual time taken for scanning a channel is highly dependant on minchanneltime and maxchanneltime. Practically the values of minchanneltime and maxchannel- Time would vary for different vendors, thus varying the communication break. By taking the optimal values of minchanneltime and maxchanneltime this delay can be controlled. The results are demonstrated in 5. Figure 5: Channel Scan Delay due to Periodic Scan The packet delay is measured as the round trip time of ping request, sent from MS to a wired station. The minimum delay occurs during normal association, and it seems to be around 0.4 ms. Maximum delay occurs during handoff or periodic channel scan, so it is always around 11 ms or more. The maximum delay recorded is ms, which is due to periodic active scan for a channel on which AP is present. The readings are taken as minimum, average and maximum delay for 6 experiments and average of these experiments as shown in figure 6.

6 [5] LEARY, J., AND ROSHAN, P. Wireless LAN Fundamentals: Mobility. Cisco Press, January [6] LI, W., ZENG, Q.-A., AND AGRAWAL, D. P. A reliable active scanning scheme for the ieee mac layer handoff. In IEEE Radio and Wireless Conference, RAWCON 2003 (Hilton Boston Logan Airport, Aug ). [7] MIRAS, D. A survey on network qos needs of advanced internet applications. INTERNET2 - QOS WORKING GROUP (November 2002). Figure 6: Packet Delay 7 Conclusion and Future Scope We have measured, analyzed and suggested means to reduce the MAC layer handoff latency by using periodic channel scan and caching the results, instead of every time scanning channels actively. We have shown that using periodic scan, the possible APs for future handoff can be stored in cache. Cache access and associating with AP, found from cache, is very fast resulting into very small handoff latency. Also by taking periodic threshold as function of speed and number of channels to be scanned periodically, the algorithm is adaptive to the situation. The AP prediction can be further improved by considering direction of movement instead of only power level and maintaining the results in cache throughout lifetime of MS. The handoff time can be further reduced by using pre-authentication as the authentication algorithm. The algorithm can be made more adaptive by dynamically choosing the number of channels to be scanned periodically as all the channels with APs present on it would be placed near the head in the channellist after one periodic scan. [8] MISHRA, M. S. A., AND ARBAUGH, W. An empirical analysis of the ieee mac layer handoff process. ACM SIGCOMM Computer Communication Review (April 2003). [9] RAPPAPORT, T. Wireless Communications, second ed. Prentice Hall India, New Delhi, [10] SHIN, S., RAWAT, A., AND SCHULZRINNE, H. Reducing mac layer handoff latency in ieee wireless lans. Mobiwac 04 (October 2004). [11] VELAYOS, H., AND KARLSSON, G. Techniques to reduce ieee b mac layer handover time. Tech. rep., Royal Institute of Technology, [12] WAHARTE, S., RITZENTHALER, K., AND BOUTABA, R. Selective active scanning for fast handoff in wlan using sensor networks. References [1] GAST, M wireless networks, the definitive guide. O Reilly and Associates, USA, [2] GONZALEZ, F. A., PEREZ, J. A., AND ZARATE, V. H. Hams: Layer 2 handoff accurate measurement strategy in wlans st IEEE International Workshop on Wireless Network Measurements(WiNMee 2005) (April 2005). [3] J.LAI, E.WU, A.VARGA, SEKERCIOUGLU, A., AND EGAN, G. A simulation suite for accurate modeling of ipv6 protocols. Proceedings of the 2nd Interanational OMNet++ Workshop (January 2002). [4] KIM, H.-S., AND KO, S.-J. Selective channel scanning for fast handoff in wireless lan using neighbor graph. ITC-CSCC2004.

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University,

More information

Improving the latency of Hand-offs using Sentinel based Architecture

Improving the latency of Hand-offs using Sentinel based Architecture Improving the latency of 802.11 Hand-offs using Sentinel based Architecture Lenin Ravindranath, Fredrick Prashanth, Leo Prasath, Praveen Durairaj, Arul Siromoney Department of Computer Science and Engineering,

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

Reducing MAC Layer Handoff Latency in IEEE Wireless LANs

Reducing MAC Layer Handoff Latency in IEEE Wireless LANs Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning

More information

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Hye-Soo Kim, Sang-Hee Park, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University, Anam-Dong

More information

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Hye-Soo Kim, Sang-Hee Park, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University, Anam-Dong

More information

Improving the IEEE MAC Layer Handoff Latency to Support Multimedia Traffic

Improving the IEEE MAC Layer Handoff Latency to Support Multimedia Traffic Improving the IEEE 802.11 MAC Layer Handoff Latency to Support Multimedia Traffic Yogesh Ashok Powar and Varsha Apte Dept. of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai

More information

An efficient trigger to improve intra-wifi handover performance

An efficient trigger to improve intra-wifi handover performance An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility

More information

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE 802.11 Chien-Chao Tseng *, Chia-Liang Lin *, Yu-Jen Chang * and Li-Hsing Yen * Department of Computer Science, National Chiao Tung University,

More information

An Empirical Analysis of the IEEE MAC Layer Handoff Process

An Empirical Analysis of the IEEE MAC Layer Handoff Process An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process Arunesh Mishra Dept of Computer Science University of Maryland College Park, MD, USA arunesh@cs.umd.edu Minho Shin Dept of Computer Science

More information

Global Path-Cache Technique for Fast Handoffs in WLANs

Global Path-Cache Technique for Fast Handoffs in WLANs Global Path-Cache Technique for Fast Handoffs in WLANs Weetit Wanalertlak and Ben Lee School of Electrical Engineering and Computer Science Oregon State University Corvallis, OR 97331, USA {wanalewe, benl}@eecs.orst.edu

More information

AN ADAPTIVE MULTIMEDIA-ORIENTED HANDOFF SCHEME FOR IEEE WLANS

AN ADAPTIVE MULTIMEDIA-ORIENTED HANDOFF SCHEME FOR IEEE WLANS AN ADAPTIVE MULTIMEDIA-ORIENTED HANDOFF SCHEME FOR IEEE 802.11 WLANS Ahmed Riadh Rebai 1 and Saïd Hanafi 2 1 Electrical & Computer Engineering Program, Texas A&M University, Doha, Qatar riadh.rebai@qatar.tamu.edu

More information

FastScan - A handoff scheme for Voice over IEEE WLANs

FastScan - A handoff scheme for Voice over IEEE WLANs Noname manuscript No. (will be inserted by the editor) FastScan - A handoff scheme for Voice over IEEE 802.11 WLANs Ilango Purushothaman Sumit Roy Received: date / Accepted: date Abstract IEEE 802.11 Wireless

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

ABSTRACT OF REPORT. Anshul Jain

ABSTRACT OF REPORT. Anshul Jain ABSTRACT OF REPORT Anshul Jain The Graduate School University of Kentucky 2003 Abstract IEEE 802:11-based wireless local area networks have been growing immensely in the last few years. Until then, LANs

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks

Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks The following guide is intended for users of Enhanced PTT to ensure that their Wi-Fi networks meet minimum requirements for

More information

Wireless Review- Probing. William Arbaugh University of Maryland

Wireless Review- Probing. William Arbaugh University of Maryland Wireless Review- Probing William Arbaugh University of Maryland Joint work with students Min-ho Shin Arunesh Mishra OUTLINE Motivation & Background Neighbor Graph NG / NG-prune probing algorithm Experiment/simulation

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Configuring Client Roaming

Configuring Client Roaming Finding Feature Information, page 1 Restrictions for, page 1 Information About Client Roaming, page 2 How to Configure Layer 2 or Layer 3 Roaming, page 4 Monitoring Client Roaming Parameters, page 10 Monitoring

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Configuring Client Roaming

Configuring Client Roaming Finding Feature Information, page 1 Restrictions for, page 1 Information About Client Roaming, page 2 How to Configure Layer 2 or Layer 3 Roaming, page 4 Monitoring Client Roaming Parameters, page 11 Monitoring

More information

Adaptive Mobility Management in Infrastructure Networks

Adaptive Mobility Management in Infrastructure Networks Adaptive Mobility Management in 802.11 Infrastructure Networks B. Issac, K. A. Hamid and C. E. Tan Abstract In 802.11 wireless infrastructure networks, as the mobile node moves from the current access

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Internetwork Expert s CCNP Bootcamp Wireless LANs http:// WLANs Overview WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Upper layer protocols like IP/TCP/UDP/etc. are

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model 1

Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model 1 Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model 1 Sangheon Pack and Yanghee Choi School of Computer Science & Engineering, Seoul National University, Seoul, Korea Telephone:

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Fast Handoff Support in IEEE Wireless. Networks

Fast Handoff Support in IEEE Wireless. Networks TO APPEAR IN IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, THE FIRST QUARTER, 2007. 1 Fast Handoff Support in IEEE 802.11 Wireless Networks Sangheon Pack Member, IEEE, Jaeyoung Choi Student Member, IEEE,

More information

Whitepaper. MYSTERIES OF Wi-Fi ROAMING REVEALED. Understand Wi-Fi roaming problems so you can solve them

Whitepaper. MYSTERIES OF Wi-Fi ROAMING REVEALED. Understand Wi-Fi roaming problems so you can solve them Whitepaper MYSTERIES OF Wi-Fi ROAMING REVEALED Understand Wi-Fi roaming problems so you can solve them Table of Contents Basics of Roaming... 2 Roaming Defined... 2 Connection Metrics... 3 Preemptive vs.

More information

Handoff Management Schemes in Wireless Mesh Networks

Handoff Management Schemes in Wireless Mesh Networks Handoff Management Schemes in Wireless Mesh Networks Zhenxia Zhang Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For the Ph.D. degree in

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Converged Access: Wireless AP and RF

Converged Access: Wireless AP and RF This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient

More information

An Analysis of Handoff in Multi-band Networks

An Analysis of Handoff in Multi-band Networks An Analysis of Handoff in Multi-band 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au Michael Dixon Murdoch University

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY cm. Management Operations of the IEEE 802.11 Mei Yen Cheong meiyen.cheong@hut.fi S-72.333 Postgraduate Seminar on Radio Communications Helsinki University of Technology April 13, 2004 Management Operations

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Per-WLAN Wireless Settings

Per-WLAN Wireless Settings DTIM Period, page 1 Off-Channel Scanning Deferral, page 3 Cisco Client Extensions, page 10 Client Profiling, page 12 Client Count per WLAN, page 15 DTIM Period Information About DTIM Period In the 802.11

More information

Survey Topic: WiFi On The Move Presented by - Abhinav Tekumalla (atekumal) Bahula Gupta (bahulag)

Survey Topic: WiFi On The Move Presented by - Abhinav Tekumalla (atekumal) Bahula Gupta (bahulag) Outline Survey Topic: WiFi On The Move Presented by - Abhinav Tekumalla (atekumal) Bahula Gupta (bahulag) WiFi on the move : Challenges VanLAN ViFi Cabernet HSPDA/ WiMax WiFi on the move Providing WiFi

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

IEEE Wireless Access Method and Physical Specification

IEEE Wireless Access Method and Physical Specification doc: IEEE P802.11-94117 IEEE 802.11 Wireless Access Method and Physical Specification Title: Prepared by: Abstract: The provisions required for handoft. Wim Diepstraten NCR WCND-Utrecht NCR/AT&T MPD Nieuwegein

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

WiFi. A Fast Beacon Scanning Method for WiFi Positioning System. Yusuke Konishi 1 and Toshiyasu Nakao 1 LAN PDA LAN STA STA. 2.1 IEEE 802.

WiFi. A Fast Beacon Scanning Method for WiFi Positioning System. Yusuke Konishi 1 and Toshiyasu Nakao 1 LAN PDA LAN STA STA. 2.1 IEEE 802. WiFi 1 1 LAN LAN LAN IEEE 82.11 LAN IEEE 82.11b/g DSSS A Fast Beacon Scanning Method for WiFi Positioning System Yusuke Konishi 1 and Toshiyasu Nakao 1 Recently, WLAN infrastructure and mobile terminals

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Monitoring the Mobility Express Network

Monitoring the Mobility Express Network About the Cisco Mobility Express Monitoring Service, on page 1 Customizing the Network Summary View, on page 2 Viewing the Details of Configured WLANs, on page 5 Customizing Access Points Table View, on

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Congestion handling in wired TCP: Detailed treatment 1. - Fundamental assumptions and principles - Key parameters - Slow start - Congestion avoidance - Fast re-transmit and fast recovery 2 Fundamental

More information

Measurements in the wireless

Measurements in the wireless Contents Measurements in the wireless Lecture slides for S-38.3183 6.4.2006 Mika Ilvesmäki Motivation Wireless environment spesifics Wireless trace collection Wireless measurement methods Mobility measurements

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Managing and Reducing Handoffs Latency in Wireless Local Area Networks using Multi-Channel Virtual Access Points

Managing and Reducing Handoffs Latency in Wireless Local Area Networks using Multi-Channel Virtual Access Points Managing and Reducing Handoffs Latency in Wireless Local Area Networks using Multi-Channel Virtual Access Points Kamran Javed 1, Fowad Talib 2, Mubeen Iqbal 3, Asif Hussain Khan 4 Faculty of Computing

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

3 Steps for Managing RF Interference Challenges

3 Steps for Managing RF Interference Challenges WHITE PAPER 3 Steps for Managing RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Step-by-Step: Handling RF Interference Challenges

Step-by-Step: Handling RF Interference Challenges WHITE PAPER Step-by-Step: Handling RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Eliminating Handoff latencies in WLANs using Multiple Radios: Applications, Experience, and Evaluation

Eliminating Handoff latencies in WLANs using Multiple Radios: Applications, Experience, and Evaluation Eliminating Handoff latencies in 802.11 WLANs using Multiple Radios: Applications, Experience, and Evaluation Vladimir Brik, Arunesh Mishra, Suman Banerjee Presented by: Ibrahim Ben Mustafa For Wireless

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Cisco Aironet 350 (DS) AP IOS Software

Cisco Aironet 350 (DS) AP IOS Software Cisco Aironet 350 (DS) AP IOS Software This document details the specifications for configuring the Cisco Aironet 350 series access points (APs) using the IOS software with NetLink Wireless Telephones.

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1. 300-365.exam Number: 300-365 Passing Score: 800 Time Limit: 120 min CISCO 300-365 Deploying Cisco Wireless Enterprise Networks Version 1.0 Exam A QUESTION 1 The customer has deployed C7960 phones with

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

A Beginner s Guide to Wireless Tools 1 A

A Beginner s Guide to Wireless Tools 1 A A Beginner s Guide to Wireless Tls 1 A To say Wi-Fi is a complex topic is an understatement. On the surface Wi-Fi seems simple enough, but as you go deeper, it sn becomes overwhelming. Even wireless professionals

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Cisco CCIE Wireless Beta Written. Download Full Version :

Cisco CCIE Wireless Beta Written. Download Full Version : Cisco 351-050 CCIE Wireless Beta Written Download Full Version : https://killexams.com/pass4sure/exam-detail/351-050 Question: 228 66 Which information is most important for you to obtain from the customer

More information

Client Roaming. Assisted Roaming. Restrictions for Assisted Roaming. Information About Assisted Roaming

Client Roaming. Assisted Roaming. Restrictions for Assisted Roaming. Information About Assisted Roaming Assisted Roaming, page 1 802.11v, page 4 802.11 Bands, page 7 Optimized Roaming, page 11 CCX Layer 2, page 13 Assisted Roaming Restrictions for Assisted Roaming This feature must be implemented only if

More information

CSCD 433/533 Advanced Networking

CSCD 433/533 Advanced Networking CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction

More information

Wi-Fi: The Importance of Mobility in Industrial Environments

Wi-Fi: The Importance of Mobility in Industrial Environments Wi-Fi: The Importance of Mobility in Industrial Environments Originally Published: November 2009 Updated: June/July 2010, October 2012 A White Paper from Laird Technologies Today s mobile workers need

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Enhancing DSR Protocol Performance in Mobile Ad Hoc Networks

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed. Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in

More information

Security Issues of Roaming in Wireless Networks

Security Issues of Roaming in Wireless Networks Security Issues of Roaming in Wireless Networks Jaroslav Kadlec 1, Radek Kuchta 1, Radimir Vrba 1 1 Dept. of Microelectronics, Faculty of Electrical Engineering and Communication Brno University of Technology,

More information

FAST-HANDOFF SUPPORT IN IEEE WIRELESS NETWORKS

FAST-HANDOFF SUPPORT IN IEEE WIRELESS NETWORKS ST QUARTER 7, VOLUME, NO. IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal Peer-Reviewed Survey Articles www.comsoc.org/pubs/surveys FAST-HANDOFF SUPPORT IN IEEE 8. WIRELESS NETWORKS

More information

QoS based vertical handoff method between UMTS systems and wireless LAN networks

QoS based vertical handoff method between UMTS systems and wireless LAN networks QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.

More information