Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007

Size: px
Start display at page:

Download "Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007"

Transcription

1 Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 5: Wireless LANs and IEEE Part III This lecture completes the study of wireless LANs, looking at the developing and security aspects of IEEE I. Network Allocation Vector (NAV) Chapter 14 Wi-Fi and the IEEE Wireless LAN Standard (continued) frame headers notify the other nodes how long to freeze for a transmission. Nodes create what is called the Network Allocation Vector. This is especially helpful when all nodes cannot hear each other, since pure CSMA may not avoid collisions in that case. This can also save power. Why? Nodes do not need to listen to the channel the whole time. Lecture 5, Page 1 of 16

2 The RTS/CTS, therefore, helps to prevent collisions in what types of ways? If not using the RTS/CTS, the information in the MAC header also provides some of this functionality. Hidden nodes - Collisions when nodes are trying to start. - Collisions when nodes do not know others are finished yet. Collisions of packets, since RTS s will collide instead. II. IEEE MAC Frame and Physical Layers The MAC Frame Lecture 5, Page 2 of 16

3 Frame Format Figure 14.8 shows the frame format without security features enabled. Not all fields are used in all contexts. Duration/Connection ID Either indicates time (in microseconds) the channel will be busy, or an association identifier. - Duration helps stations know how long to wait until it is expected that the channel will no longer be busy. Addresses - 48 bits - 3 fields - The number and meanings of the fields depend on context. - Types include source or destination address. - And possibly the address of the network itself Called the service set ID (SSID). The SSID is the address of the AP for the BSS. Sequence Control used for numbering and reassembly in conjunction with fragmentation. Frame Check Sequence a 32 bit cyclic redundancy check. - Checks for bit errors in the entire frame. Bits of the Frame Control Field Protocol Version for is currently version 0. Type control, management, or data. Subtype Further identification of the type of frame. See Table 14.4 on page 440 and discussion on pages Examples are association, reassociation, probe, RTS, CTS, ACK, etc. To DS Bit set to 1 if destined for the distribution system. From DS Set to 1 if coming from the distribution system. More fragments Set to 1 if more fragments are coming. Retry Set to 1 if this frame is a retransmission of a previous frame. Power management Set to 1 if transmitting station is in sleep mode. More data Indicates station has more data to send. - Each block of data may be sent by one frame or a group of fragments in multiple frames. WEP Set to 1 if the Wired Equivalent Protocol (WEP) or Wi-Fi Protected Access (WPA) are being used for security. Order Set to 1 to tell receiver that frames must be processed in order. Lecture 5, Page 3 of 16

4 Control Frames Details on page 441. Includes RTS, CTS, ACK, and indication of the end of the contention-free period (the contention-free period is the PCF part of the superframe). Data Frames Data plus possible information for the contention free period (ACKs, polls, etc.). There are also messages for stations to notify others that they are using power saving modes. Management Frames For association, reassociation, disassociation, authentication, deauthentication. Association establishes a link with a BSS and its AP. Reassociation allows transfer between BSS s without needing a new association. The new AP negotiates with the old AP for forwarding data frames. Probe To obtain information from another station or AP. - Used to locate a BSS Physical Layers Mbps or 2 Mbps Three possibilities Two types of spread spectrum at 2.4 GHz (Direct Sequence Spread Spectrum and Frequency Hopping Spread Spectrum) for unlicensed bands and also infrared. Provides three non-overlapping frequency bands. - Provides overlapping channels numbered 1-11, but when using 1, 6, and 11, those three do not overlap a Up to 54 Mbps Uses the Universal Networking Infrastructure (UNNI) bands. - Internationally recognized. - Parts between 5 and 6 GHz - Higher frequencies have shorter ranges. Can have more channels than b or g 4 nonoverlapping frequency bands. Same data rate as g Uses a relatively uncluttered spectrum (5 GHz). Lecture 5, Page 4 of 16

5 Not sure this will ever be popular. - Mainly because of shorter range because of the higher frequency. - Signals decay more quickly with distance at higher frequencies. Uses Orthogonal Frequency Division Multiplexing (OFDM) b Called Wi-Fi. Uses unlicensed 2.4 GHz. Advanced version of Direct Sequence Spread Spectrum. - Added 5.5 Mbps and 11 Mbps. Has the same three non-overlapping frequency bands as g Uses unlicensed 2.4 GHz. Up to 54 Mbps, now the most popular. Can operate the same as b, and also at 22 and 33 Mbps. Can also use OFDM for 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. - Depending on channel conditions. - Same methods as a. Table 14.8 gives estimated ranges for a typical office environment. III. Other IEEE Standards Other standards have been issued or are in the works e Enhance the MAC to improve Quality of Service. Addresses Quality of Service - So some packets can be delivered with higher priority. - Important for audio, video, telephone, etc. - Details provided in the next section. Final approval by Task Group E occurred in July i Security and Authentication Mechanisms Developed Wired Equivalent Privacy (WEP) for Lecture 5, Page 5 of 16

6 WEP proved to be too weak. The Wi-Fi Alliance developed Wi-Fi Protected Access (WPA) as a better alternative. - WPA is discussed in a later section of this lecture k Radio Resource Measurements for Higher Layers Normally in the OSI layering model, upper layers know nothing about the physical layer. But in the wireless context, it is good for upper layers to know about the physical layer. How can this be beneficial? Routing decisions So upper layers can decide about retransmissions and timeouts until a lost packet is assumed. So applications can format the data (like MPEG video) k provides the following information. - Site reports help with roaming decisions. - As a station is moving away from an AP, an ordered list of other APs is provided. - From best to worst service. - To help in deciding a change to another AP. - Noise Histogram - Displays all non energy on a channel. - Also displays how long a channel is used during a given time. - MAC Statistics - Retries - Packets transmitted - Packets received - Power Control k extends transmit power control procedures. - For other regulatory domains - To reduce interference and power consumption. Lecture 5, Page 6 of 16

7 802.11n Physical/MAC Enhancements to Enable Higher Throughput Both Physical and MAC layer standards Physical - Multiple antennas - Allows the device to choose from multiple signals to find which is best (or combine them together). - Called making us of. - Makes use of MIMO (Multiple Input, Multiple Output) antenna technology. - Can create huge capacity gains. - Smart antennas to direct signal energy to specific locations. - New signal encoding schemes. MAC - Goal is to achieve over 100 Mbps. - As measured at the interface between the MAC layer and the Network layer. - Current specifications (like 54 Mbps g) measure only at the physical layer. - Actual data rates (to the network layer) today may only be ½ of that 54 Mbps. - Caused by overheads with frame preambles, acknowledgements, contention windows, and IFSs. - So the real goal is a jump from 27 Mbps to over 100 Mbps. - Ideas for accomplishing this. - MAC control of adaptation of the PHY to the current wireless environment. - Bidirectional transfer ACKs that also include data. - Feedback from the AP on what transfer rates are best. - Multiple MAC frames aggregated into larger frames for less header overhead and one ACK to cover multiple frames. - What is the potential drawback of using larger frames (larger than the current maximum of 4096 octets)? Greater likelihood of a packet being lost/corrupted. More retransmissions. In some environments, this may not be possible. Lecture 5, Page 7 of 16

8 802.11n also addresses improved range at existing throughputs, increased resistance to interference, and more uniform coverage within a coverage area. IEEE Draft Version 1.10, soon to be called Approved in January 2007, with good likelihood of moving forward after compromises were struck between handset manufacturers, consumer electronics manufacturers, and major hardware network and chip manufacturers. ( n requires completely new hardware on clients access points. - Key features are MIMO, channel bonding, and frame aggregation ( e.html). - Channel bonding using more than one 20 MHz channel at a time. - Controversial - Causes harsh interference to other devices using the same unlicensed bands n devices will scan for the presence of those types of devices and refrain from using channel bonding when they are present. - Frame aggregation avoids the problem of 50% channel utilization because of backoffs. - It allows long packets to be transmitted without significant delays between transmissions. Other active groups p, Wireless Access in the Vehicular Environment - enhancements to required to support Intelligent Transportation Systems (ITS) applications r, Fast Roaming Fast Handoff s, Mesh Networking T, Wireless Performance Prediction u, Wireless Interworking With External Networks v, Wireless Network Management w, Protected Management Frames y, Contention Based Protocol Study Group Lecture 5, Page 8 of 16

9 IV. IEEE e The Need for QoS LANs are increasingly used for a wide variety of applications. Data applications Web, , e-commerce, digital photos, etc. Real-time applications Voice telephone (VoIP), audio streaming, video, etc. - How is wireless especially helpful for these types of applications? With a potential for audio and video servers to distribute throughout a home. Real-time applications place special demands on a WLAN Packets must be delivered in a very steady stream. - Which means there should be lower packet delay and low variation in the delay. And video applications also have high data rate requirements. The solution: Preferential Treatment Some packets should be delivered before other packets. Even if they arrive later. So not just first-come, first-served. Preferential treatment is usually the model. It is hard to guarantee a certain performance. But can at least say some packets will be delivered before others e provides enhancement to both the DCF and PCF. 1. Enhanced DCF (EDCF) Allows packets to be separated into 4 Access Categories (ACs) Each AC can have its own IFS, CW min, and CW max. Lecture 5, Page 9 of 16

10 All of this arbitration between classes happens a node, not nodes. The Virtual Collision Handler also enforces priorities if there is an internal collision. - Highest priority will be transmitted. - Lower priority will backoff - But not using exponential backoff. - Just reset its congestion window to CW min. Lecture 5, Page 10 of 16

11 The overall timing of EDCF can be seen below. A new IFS is used, called the Arbitration IFS (AIFS). - Those with shorter AIFSs start their contention windows earlier. - Note: They do not necessarily send their packets, they just start their backoff. - Although they may also have shorter backoff. EDCF requires admission control To put new flows of packets into the right ACs. And to make sure there are not too many flows. 2. Hybrid Coordination Function (HCF) HCF is an enhancement to PCF. In addition to polling by the AP, stations can also request transmission opportunities (called TXOPs). Then the AP uses a complicated scheduling mechanism to give each station a chance to send its packets. To provide the delay and throughput they require. Group Acknowledgements In every frame is acknowledged before another frame can be sent. This creates a robust communication mechanism. But also adds a lot of overhead. - Extra packets that need to be sent. - Time delays waiting for those packets. - Time delays not being able to send more packets. Lecture 5, Page 11 of 16

12 802.11e allows groups of frames to be transmitted before any acknowledgement. After sending a burst of frames, the sender requests a group acknowledgement frame. Reference for e Y. Xiao, IEEE e: QoS Provisioning at the MAC Layer, IEEE Wireless Communications, June V. Wi-Fi Protected Access Security is of prime importance in a wireless LAN. Why is this especially difficult because of the wireless environment? Not confined physically (say, within a building) Users are expected to move in an out of the network a lot. Easy to obtain or use a rouge device. Lecture 5, Page 12 of 16

13 Owners may not configure properly. Some networks expect lots of new users (public hot spots). Naive end users. Security Requirements Security can be defined as having multiple types of requirements. Security is not either on or off. Instead it can be implemented at multiple levels. Here are a few requirements. Data Integrity Protect data from being modified. Privacy Protect data from being viewed. Authentication Make sure data is authentic really from the indicated sender. Non-repudiation Make sure those who send packets do not later claim they did not send those packets. An additional key requirement is Access Control Make sure that only those who are authorized are allowed to use a system or resources. Example: When might a person need data integrity but not necessarily privacy? Broadcasting, digitally signed letter from a school official. In such an example, the data may not be encrypted, but instead just have code that goes with it to make sure it arrives the same as it was sent. Encryption Foundational element to security. Packets are scrambled. Lecture 5, Page 13 of 16

14 Common approach: Using security keys. A key is used to encrypt and decrypt the data. - Hopefully this key cannot be discovered and used to decrypt the data. - The longer the key, the hard it is to discover through trial and error. Symmetric key mechanisms. - Trusted entities share a key. - They use the same key to encrypt and decrypt the data. - Keys must be securely distributed. Public key mechanisms - Two keys are used, say from user A. - Private key - Kept by A and never shared with anyone. - Public key - Key publicly available and known to apply to A. - Public and private keys are large numbers that are related mathematically. - But the mathematical relationship is very hard to discover. - From A to anyone else: - If a private key is used by A to encrypt a message, anyone with the public key can decrypt the message. - Lets you be confident that A sent the message. - From anyone to A: - Anyone can use the public key to encrypt a message, and only A can use the private key to decrypt the message. - A message can be sent that only A could read. - Public key mechanisms use larger keys. - So it is much more computationally expensive to do encryption using public keys. Original had security, but with weak features. Used the Wired Equivalent Privacy (WEP) algorithm for privacy. Used the RC4 algorithm with a 40-bit key bit was too short, so a later revision added a 104-bit key. Used symmetric keys for authentication. Two parties shared a key not used by any other party. WEP defines a protocol for using the key for mutual authentication. Weaknesses The 40-bit key was woefully inadequate. 104-bit key also vulnerable because of weaknesses in the protocol. Lecture 5, Page 14 of 16

15 Static keys were used Attackers could determine the key by looking at successive packets, or packets that were predictable (like control packets). Encryption sequences were heavily reused. - WEP used a short enough encryption sequence that it recurred fairly soon. - Patterns could be seen in the packets to determine the pattern. - Which could be used to compromise packets. Lack of any key management within the protocol. - How does one get another s key? - How is it protected? - Etc. Also a number of problems with the shared-key scheme i Task Group Developed a set of capabilities to address WLAN security issues. Wi-Fi Alliance also promulgated Wi-Fi Protected Access (WPA). Three Main Security Areas of i Authentication Key Management Data Transfer Privacy Authentication Requires use of an authentication server - Plays an important role in key distribution. See Figure Lecture 5, Page 15 of 16

16 First the station and the AP agree on security capabilities to be used. Then the authentication server (AS) and the station cooperate to provide secure authentication. Then the AS distributes keys to the AP. - The AP manages and distributes keys to stations. Finally strong encryption is used to protect data transfer between the station and the AP. Three main ingredients of the i architecture Authentication AS provides mutual authentication and temporary keys. - Authentication above LLC and MAC protocols is out of the scope of Can use Extensible Authentication Protocol (EAP), Remote Authentication Dial-In User Service (RADIUS), etc. Access control enforces use of authentication Privacy with message integrity MAC-level data is encrypted. - Along with a message integrity code to ensure data has not been altered. Access Control Makes use of 802.1X Port-Based Access Control A wireless port on an AP that a station wishes to use starts out blocked and is only unblocked once proper authentication is executed. Privacy with Message Integrity Two schemes are used. - TKIP Temporal Key Integrity Protocol - CCMP Counter Mode-CBC Mac Protocol TKIP is a huge improvement over WEP - WEP keys were static and short enough to be discovered by looking at consecutive packets. - TKIP uses a key that changes every packet. - TKIP uses a much longer key also. Much, much more can be said about WLAN security that is beyond the scope of this class (and the competence of the instructor!). Lecture 5, Page 16 of 16

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1 Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Functions of physical layer:

Functions of physical layer: Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

Overview of IEEE Networks. Timo Smura

Overview of IEEE Networks. Timo Smura Overview of IEEE 802.11 Networks Timo Smura 24.03.2004 Outline Introduction IEEE 802.11 standards Protocol model Network topologies 802.11 MAC layer 802.11 PHY layers Interoperability: Wi-Fi Alliance 3GPP

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Overview of Wireless LANs

Overview of Wireless LANs Wireless LANs Chapter 17 CS420/520 Axel Krings Page 1 Overview of Wireless LANs use wireless transmission medium issues of high prices, low data rates, occupational safety concerns, & licensing requirements

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page

More information

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals Wireless LAN Unit 2: Wireless Fundamentals Wireless connections which technology? Areas covered: Basic radio parameters. This area covers the main type of wireless communications. IEEE 802.11b issues.

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

I N D E X Numerics 100 Mbps WLANs, WLANs, 88

I N D E X Numerics 100 Mbps WLANs, WLANs, 88 I N D E X Numerics 100 Mbps WLANs, 233 234 802.11 WLANs, 88 control frames, 54 ACK frames, 57 CF-End frames, 57 58 CTS frames, 56 PS-Poll frames, 54 55 RTS frames, 55 56 DSSS, 93-95 data frames, 76-78

More information

CHAPTER 11 WIRELESS LAN TECHNOLOGY AND THE IEEE WIRELESS LAN STANDARD

CHAPTER 11 WIRELESS LAN TECHNOLOGY AND THE IEEE WIRELESS LAN STANDARD CHAPTER 11 WIRELESS LAN TECHNOLOGY AND THE IEEE 802.11 WIRELESS LAN STANDARD These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

IEEE Wireless LANs Part I: Basics

IEEE Wireless LANs Part I: Basics IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless LAN Overview History IEEE 802.11-1997 MAC implementations PHY implementations

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, jyu@cs.depaul.edu School of Computer Science, Telecommunications, and Information Systems DePaul

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (11 th Week) Wireless LANs 11.Outline Overview IEEE 802.11 Architecture and Services IEEE 802.11 Medium Access Control

More information

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert SharkFest 18 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch Introduction 2 Rolf Leutert,

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change 802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.  Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 17 Wireless LANs Eighth Edition by William Stallings Overview of Wireless LANs use wireless transmission medium Wireless LAN were little used issues of high prices,

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information