The IEEE standard
|
|
- Antonia Baker
- 5 years ago
- Views:
Transcription
1 The IEEE standard Imad Aad INRIA, Planete team IN Tech, January 24th, 2002 IEEE p.1
2 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.2
3 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.2
4 WLANs vs. Wired LANs No wires Mobility IEEE p.3
5 WLANs vs. Wired LANs No wires Mobility Scarse bandwidth (?) IEEE p.3
6 WLANs vs. Wired LANs No wires Mobility Scarse bandwidth (?) Multipath, pathloss, interference / noise BER Obstacle 1 s1 Tx s0 Rx s s2 s0 + s1 + s2 Obstacle 2 IEEE p.3
7 WLANs vs. Wired LANs No wires Mobility Scarse bandwidth (?) Multipath, pathloss, interference / noise LOS BER No LOS Average received power α =2 α =4 Average received power α = db drop α =4 6 Distance Distance IEEE p.3
8 WLANs vs. Wired LANs IEEE p.3
9 WLANs vs. Wired LANs No wires Mobility The hidden node problem Scarse bandwidth (?) Multipath, pathloss, interference / noise Protection / Privacy BER IEEE p.3
10 WLANs vs. Wired LANs IEEE p.3
11 WLANs vs. Wired LANs Application layer Network layer LLC sub layer MAC sub layer PHY layer IEEE IEEE IEEE IEEE p.3
12 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.4
13 History 1970s: ALOHA IEEE p.5
14 History 1970s: ALOHA 1972: Slotted ALOHA IEEE p.5
15 History 1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) IEEE p.5
16 History 1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) non persistent IEEE p.5
17 History 1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) non persistent p-persistent IEEE p.5
18 History 1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) non persistent p-persistent CSMA with collision detections (CD): Ethernet (1976) IEEE p.5
19 History 1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) non persistent p-persistent CSMA with collision detections (CD): Ethernet (1976) CSMA w/ coll. avoidance (CA): IEEE (1997) IEEE p.5
20 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.6
21 Working modes Ad-hoc mode vs. Infrastructure mode (IS) IEEE p.7
22 Working modes Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS) IEEE p.7
23 Working modes Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS) IBSS IEEE p.7
24 Working modes Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS) Acess Point (AP) BSS IEEE p.7
25 Working modes Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS) AP1 AP2 AP3 ESS Distribution System (DS) IEEE p.7
26 Working modes Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS) AP1 AP2 AP3 ESS Distribution System (DS) Handoff on the MAC sub-layer IEEE p.7
27 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.8
28 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) PCF: Polling Coordination Function (in IS mode, optional) IEEE p.9
29 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) PCF: Polling Coordination Function (in IS mode, optional) IEEE p.9
30 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) - Basic machanism ( ) DIFS Time Source (Tx) Destination (Tx) CW Data SIFS ACK DIFS Other NAV Contention Window Defer access = NAV+DIFS Backoff IEEE p.9
31 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) - The hidden node problem A B C IEEE p.9
32 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) - RTS/CTS mechanism ( ) DIFS SIFS Time Source (Tx) RTS SIFS Data SIFS Destination (Tx) CTS ACK DIFS Other NAV (RTS) NAV (CTS) CW NAV (data) Defer access Backoff IEEE p.9
33 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) - Fairness?... YES IEEE p.9
34 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) - Fairness?... YES - QoS?... not yet IEEE p.9
35 MAC sub-layer DCF: Distributed Coordination Function (ad-hoc, IS modes) PCF: Polling Coordination Function (in IS mode, optional) IEEE p.9
36 MAC sub-layer PCF: Polling Coordination Function (in IS mode, optional) B IEEE p.9
37 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP B PCF IEEE p.9
38 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP CP B PCF DCF IEEE p.9
39 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF IEEE p.9
40 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF PIFS IEEE p.9
41 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF SIFS B D1+Poll PIFS IEEE p.9
42 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF SIFS B D1+Poll U1+ACK PIFS SIFS IEEE p.9
43 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF SIFS SIFS B D1+Poll D2+ACK+Poll U1+ACK U2+ACK PIFS SIFS SIFS IEEE p.9
44 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF SIFS SIFS SIFS B D1+Poll D2+ACK+Poll D3+ACK+Poll U1+ACK U2+ACK PIFS SIFS SIFS IEEE p.9
45 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF SIFS SIFS SIFS PIFS B D1+Poll D2+ACK+Poll D3+ACK+Poll D4+Poll U1+ACK U2+ACK U4+ACK PIFS SIFS SIFS SIFS IEEE p.9
46 MAC sub-layer PCF: Polling Coordination Function (in IS mode) CFP repetition interval CFP repetition interval CFP CP CFP CP B PCF DCF B PCF DCF SIFS SIFS SIFS PIFS SIFS CP B D1+Poll D2+ACK+Poll D3+ACK+Poll D4+Poll CF End U1+ACK U2+ACK U4+ACK PIFS SIFS SIFS SIFS IEEE p.9
47 MAC sub-layer Packet fragmentation Fragment burst Time SIFS SIFS SIFS SIFS SIFS SIFS DIFS Src. (Tx) Fragment 0 Fragment 1 Fragment 2 CW Dest. (Tx) ACK0 ACK1 ACK2 Other NAV (CTS) NAV (fragment 0) NAV (fragment 1) NAV(fr.2) Other NAV (ACK0) NAV (ACK1) IEEE p.9
48 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.10
49 The PHY layer (1997) Application layer Network layer LLC sub layer MAC sub layer PHY layer 3 PHY types: DSSS (most products) FHSS (less products) IR (unknown products) IEEE p.11
50 The PHY layer (1997) the EM spectrum allocation Gamma rays X rays UV Visible Infrared! Freq. 1 KHz 1 MHz 1 GHz 1 THz 1 PHz 1 EHz IEEE p.11
51 ,,, : : : * * * ( ( ( $ $ $ " " " & & & The PHY layer (1997) the EM spectrum allocation Gamma rays X rays UV Visible Infrared /,- Freq. 1 KHz 1 MHz 1 GHz 1 THz 1 PHz 1 EHz :; (SW radio) (FM radi TV) (TV Cell.) HF VHF UHF SHF 89 *+ () $% (AM radio) LF MF "# &' 30 KHz 300 KHz 3 MHz 30 MHz 300 MHz 3 GHz 30 GHz Freq. IEEE p.11
52 P P P N N N L L L J J J H H H F F F T T T R R R D D D B B B > > > < @ X X X V V V The PHY layer (1997) the EM spectrum allocation Infrared Visible UV X rays Gamma rays JK FG HI NO LM PQ 1 KHz 1 MHz 1 GHz 1 THz 1 PHz 1 EHz Freq. (AM radio) MF <= (SW radio) (FM radi TV) (TV Cell.) HF VHF UHF SHF >? BC DE RS TU 30 KHz 300 KHz 3 MHz 30 MHz 300 MHz 3 GHz 30 GHz Freq. XY VW 902 MHz 928 MHz Freq. Cordless phones Baby monitors (old) Wireless LANs IEEE p.11
53 n n n l l l j j j h h h f f f d d d r r r p p p b b b ` ` ` \ \ \ Z Z Z ^ ^ ^ z z z x x x v v v t t t The PHY layer (1997) the EM spectrum allocation Infrared Visible UV X rays Gamma rays hi de fg lm jk no 1 KHz 1 MHz 1 GHz 1 THz 1 PHz 1 EHz Freq. LF ^_ (AM radio) MF Z[ (SW radio) (FM radi TV) (TV Cell.) HF VHF UHF SHF \] `a bc pq rs 30 KHz 300 KHz 3 MHz 30 MHz 300 MHz 3 GHz 30 GHz Freq. tu vw ISM xy z{ 902 MHz 928 MHz 2.4 GHz GHz Freq. Cordless phones Baby monitors (old) Wireless LANs IEEE (b) Bluetooth Microwave ovens IEEE p.11
54 Ž Ž Ž Œ Œ Œ Š Š Š ˆ ˆ ˆ ~ ~ ~ š š š ž ž ž œ œ œ The PHY layer (1997) the EM spectrum allocation Infrared Visible UV X rays Gamma rays Š ˆ Ž Œ 1 KHz 1 MHz 1 GHz 1 THz 1 PHz 1 EHz Freq. LF (AM radio) MF } (SW radio) (FM radi TV) (TV Cell.) HF VHF UHF SHF ~ ƒ 30 KHz 300 KHz 3 MHz 30 MHz 300 MHz 3 GHz 30 GHz Freq. ISM œ žÿ U NII š 902 MHz 928 MHz 2.4 GHz GHz GHz GHz Freq. Cordless phones Baby monitors (old) Wireless LANs IEEE (b) Bluetooth Microwave ovens IEEE a Hiperlan II IEEE p.11
55 The PHY layer (1997) DSSS (Direct Sequence Spread Spectrum) FHSS (Freq. Hopping Spread Spectrum) IR (Infra Red) IEEE p.11
56 The PHY layer (1997) DSSS: principle 1 bit period Scrambled 1 0 Data chips Periodic 11 Bit Barker code mod 2 adder Carrier modulator Note: single code (11-chips) multiple access?... no security?... no IEEE p.11
57 The PHY layer (1997) DSSS: principle Transmitter baseband signal before spreading 1 bit period Scrambled 1 0 Data chips Periodic 11 Bit Barker code mod 2 adder Carrier modulator Transmitter baseband signal after spreading IEEE p.11
58 The PHY layer (1997) DSSS: Receiver before spreading IEEE p.11
59 The PHY layer (1997) DSSS: Receiver before spreading after spreading IEEE p.11
60 The PHY layer (1997) DSSS: Receiver before spreading after spreading before despreading IEEE p.11
61 The PHY layer (1997) DSSS: Receiver before spreading after spreading before despreading after despreading IEEE p.11
62 The PHY layer (1997) DSSS: Receiver before spreading after spreading before despreading after despreading narrowband interference IEEE p.11
63 The PHY layer (1997) DSSS: Receiver before spreading after spreading before despreading after despreading narrowband interference IEEE p.11
64 The PHY layer (1997) PSK (Phase Shift Keying) Data x spreading code S 0 time S(t) = A sin ( 2πω t + ϕ(t)) ϕ = 0 IEEE p.11
65 The PHY layer (1997) PSK (Phase Shift Keying) Data x spreading code 0 S 0 time S(t) = A sin ( 2πω t + ϕ(t)) ϕ = 0 IEEE p.11
66 The PHY layer (1997) PSK (Phase Shift Keying) Data x spreading code 0 0 S 0 time S(t) = A sin ( 2πω t + ϕ(t)) ϕ = 0 IEEE p.11
67 The PHY layer (1997) PSK (Phase Shift Keying) Data x spreading code S 0 time S(t) = A sin ( 2πω t + ϕ(t)) ϕ = 180 IEEE p.11
68 The PHY layer (1997) PSK (Phase Shift Keying) Data x spreading code S 0 time S(t) = A sin ( 2πω t + ϕ(t)) ϕ = 180 IEEE p.11
69 The PHY layer (1997) PSK (Phase Shift Keying) Data x spreading code S 0 time S(t) = A sin ( 2πω t + ϕ(t)) ϕ = 0 IEEE p.11
70 The PHY layer (1997) DPSK (Differential PSK): no reference signal needed Data x spreading code S 0 time S(t) = A sin ( 2πω t + ϕ(t)) IEEE p.11
71 ª ª ª ª ª The PHY layer (1997) DSSS: modulation DBPSK DQPSK 90 (11) ª (0) (1) (00) (01) «« (10) Mbps 2Mbps IEEE p.11
72 The PHY layer (1997) DSSS: modulator output 0dBr 30dBr 50dBr fc 22MHz fc 11MHz fc fc + 11MHz fc + 22MHz IEEE p.11
73 The PHY layer (1997) in France: allowed channels (ch.10) MHz (ch.11) MHz (ch12) MHz (ch13) MHz IEEE p.11
74 The PHY layer (1997) in France: maximum channel separation (ch.10) MHz (ch13) MHz IEEE p.11
75 The PHY layer (1997) in Europe (except France and Spain) (ch.1) MHz (ch13) MHz IEEE p.11
76 ² ± ² ± The PHY layer (1997) Transmission power GSM wave IEEE oven Typical 100 mw mw 0.2mW/ 2.5 mw Regulations 1-5 mw/ 100 5cm (Eur.) IEEE p.11
77 ² ± ² ± The PHY layer (1997) Transmission power GSM wave IEEE oven Typical 100 mw mw 0.2mW/ 2.5 mw Regulations 1-5 mw/ 100 5cm (Eur.) IEEE p.11
78 The PHY layer (1997) DSSS (Direct Sequence Spread Spectrum) FHSS (Frequency Hopping Spread Spectrum) IR (Infra Red) IEEE p.11
79 È ËÌ Ç Â Å The PHY layer (1997) FHSS Modulation: GFSK binary 0/1: (for 1 Mbps) 00, 01, 10, 11: (for 2 Mbps) sequence = : tables : 3 sets ³ ¾ ¼½ ¹ ³µ ¹ º ³µ ¾À ¼½ ³µ» ¾Äà ¼½ ÁÂ Æ ± Å Fast-FH vs. Slow-FH: min 2.5 hops/s Bluetooth interference?... YES ¾Äà ¼ÉÊ (France) IEEE p.11
80 The PHY layer (1997) DSSS (Direct Sequence Spread Spectrum) FHSS (Freq. Hopping Spread Spectrum) IR (Infra Red) IEEE p.11
81 Í Í Ñ Ï ÐÑ ÎÏ ÐÑ ÎÏ Ð Î The PHY layer (1997) Infra Red (IR) Pulse Position Modulation (PPM) 1 Mbps: 4 data bits 2 Mbps: 2 data bits 16-PPM symbol 4-PPM symbol Data bits 4 PPM symbol Data Î Ï Ð Ñ Txed Pulse IEEE p.11
82 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.12
83 PHY Extensions (1999) IEEE b: 2.4 GHz. 1Mbps, 2Mbps, 5.5Mbps 11 Mbps. High Rate DSSS Modulation: (backward compatible)dbpsk, DQPSK Complementary Code Keying (CCK) + DQPSK, (opt.) Packet Binary Convolutional Coding (PBCC) + (BPSK,QPSK) Currently the most widely used one IEEE p.13
84 Í PHY Extensions (1999) IEEE a: 5.7 GHz, 6 Mbps 54 Mbps!! OFDM (Orthogonal Frequency Division Multiplexing) Principle: High-rate data is devided into several lower rate binary signals. Each low-rate signal modulates a different sub-carrier (48) Sub-carrier sets are orthogonal. Modulation: BPSK, QPSK, 16QAM and 64QAM FEC: Convolutional encoding needed (Viterbi) Close to Hiperlan 2 specs. coming soon IEEE p.13
85 Outline WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security IEEE p.14
86 Security WEP (Wired Equivalent Privacy) IEEE p.15
87 Security WEP (Wired Equivalent Privacy) Plaintext IEEE p.15
88 Security WEP (Wired Equivalent Privacy) Plaintext Encryption IEEE p.15
89 Security WEP (Wired Equivalent Privacy) Key Plaintext Encryption IEEE p.15
90 Security WEP (Wired Equivalent Privacy) Key Plaintext Encryption Cyphertext IEEE p.15
91 Security WEP (Wired Equivalent Privacy) Key Plaintext Encryption Cyphertext Eavesdropper IEEE p.15
92 Security WEP (Wired Equivalent Privacy) Key Plaintext Encryption Cyphertext Decryption Eavesdropper IEEE p.15
93 Security WEP (Wired Equivalent Privacy) Key Key Plaintext Encryption Cyphertext Decryption Eavesdropper IEEE p.15
94 Security WEP (Wired Equivalent Privacy) Key Key Plaintext Encryption Cyphertext Decryption Original Plaintext Eavesdropper IEEE p.15
95 Security WEP (Wired Equivalent Privacy) Plaintext IEEE p.15
96 Security WEP (Wired Equivalent Privacy) Plaintext Integrity Algo. IEEE p.15
97 Security WEP (Wired Equivalent Privacy) Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
98 Security WEP (Wired Equivalent Privacy) Secret Key Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
99 Security WEP (Wired Equivalent Privacy) Initialization Vector (IV) Secret Key Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
100 Security WEP (Wired Equivalent Privacy) Initialization Vector (IV) Secret Key Seed Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
101 Security WEP (Wired Equivalent Privacy) Initialization Vector (IV) Secret Key Seed WEP PRNG Key Sequence Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
102 Security WEP (Wired Equivalent Privacy) Initialization Vector (IV) Secret Key Seed WEP PRNG Key Sequence XOR Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
103 Security WEP (Wired Equivalent Privacy) Initialization Vector (IV) Secret Key Seed WEP PRNG Key Sequence XOR Plaintext Integrity Algo. Integrity Check Value (ICV) IEEE p.15
104 Security WEP (Wired Equivalent Privacy) IV Initialization Vector (IV) Secret Key Seed WEP PRNG Key Sequence XOR Ciphertext Plaintext Message Integrity Algo. Integrity Check Value (ICV) IEEE p.15
105 Security WEP (Wired Equivalent Privacy) default keys / established keys bit key Algorithm: RC4 (symmetric stream cypher) Cracking tools: WEPcrack, AirSnort: if 100MB-1GB of data can be gathered then one can guess the encryption password in less than a second!! IEEE p.15
106 Security WEP (Wired Equivalent Privacy) default keys / established keys bit key Algorithm: RC4 (symmetric stream cypher) Cracking tools: WEPcrack, AirSnort: if 100MB-1GB of data can be gathered then one can guess the encryption password in less than a second!! Access control table?... inefficient IEEE p.15
107 Security WEP (Wired Equivalent Privacy) default keys / established keys bit key Algorithm: RC4 (symmetric stream cypher) Cracking tools: WEPcrack, AirSnort: if 100MB-1GB of data can be gathered then one can guess the encryption password in less than a second!! Access control table?... inefficient Network ID?... inefficient IEEE p.15
108 Conclusion it works! looks just like ethernet to higher layers no QoS support... yet. limited security management. Planete team: Imad AAD: IEEE p.16
Data and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationInvestigation of WLAN
Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationWireless Communication Session 4 Wi-Fi IEEE standard
Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission
More informationOverview of Wireless LANs
Wireless LANs Chapter 17 CS420/520 Axel Krings Page 1 Overview of Wireless LANs use wireless transmission medium issues of high prices, low data rates, occupational safety concerns, & licensing requirements
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationInternet Structure. network edge:
Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair
More informationIEEE Wireless LANs
Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 PLCP, Packet Format 2 PHY Layer Characteristics and Data Rates Area Concept Layers and Functions (PLCP and PMD Sublayers) Antennas DSSS in IEEE 802.11b
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationVehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl
Vehicle Networks Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless LAN Overview History IEEE 802.11-1997 MAC implementations PHY implementations
More informationOverview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV
Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWireless Local Area Network. Internet Protocol Suite
Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationMobile Radio Communications
Session 7: Wireless networks & WLANs Session 7, page 1 Backbone network MSC PSTN PLMN BSC Session 7, page 2 Public switched telephone network (PSTN) PABX central office local exchange long distance subscriber
More informationMobile Communications Chapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationMobile Communications Chapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationData and Computer Communications
Data and Computer Communications Chapter 17 Wireless LANs Eighth Edition by William Stallings Overview of Wireless LANs use wireless transmission medium Wireless LAN were little used issues of high prices,
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Characteristics of Wireless LANs
More informationWIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal
WIRELESS LANS By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal Introduction Why wireless? World will become fully mobile Increase in wireless devices usage Wireless will succeed; integrates into many
More informationEE 597: Wireless Networks (Spring 12)
EE 597: Wireless Networks (Spring 12) Intro to Cellular and WiFi Networks Bhaskar Krishnamachari= Acknowledgement These slides were prepared by Dr. Kyuho Son, kyuhoson@usc.edu, visiting scholar at USC.
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationPublic Wireless LAN Service.
Public Wireless LAN Service touch@coe.psu.ac.th Radio Wave Wave Frequency Amplitude Wave Length Radio Wave Band Frequency Wavelength VLF 3-30 khz > 10 km LF 30-300 khz 1-10 km MF 300-3,000 khz 100-1000
More informationPage 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs
EEC173B/ECS152C, Winter 2006 Wireless LANs Evolution of Technology & Standards IEEE 802.11 Design Choices Architecture & Protocols PHY layer MAC layer design Acknowledgment: Selected slides from Prof.
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationLecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)
Lecture Objectives Wireless Networks and Mobile Systems Lecture 1 Wireless Environment and Wireless LANs Discuss the impact of the wireless environment on networks Explain the concept of spread spectrum,
More informationChapter 4 WIRELESS LAN
Chapter 4 WIRELESS LAN Distributed Computing Group Mobile Computing Summer 2002 Overview Design goals Characteristics IEEE 802.11 Architecture Protocol PHY MAC Roaming Security a, b, d, etc. Short intermezzo
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationThe Alphabet Soup. Sachin Ganu WINLAB
The 802.11 Alphabet Soup Sachin Ganu WINLAB 802.11 Background First standard was in 1997 Replacement for wired Ethernet 2.4 GHz (Industrial Scientific and Medical Band) CSMA/CA based contention 1, 2 Mbps
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More informationPage 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands
Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationEnabling Technologies
Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols
More informationAnnouncements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1
Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2
More informationIntroduction to Wireless LAN
Introduction to Wireless LAN Po-Ning Chen, Professor Depart. Of Communications Engineering National Chiao-Tung University 1 Topologies of Wireless o Infrastructure versus ad hoc Infrastructure Portable-to-fixed
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (11 th Week) Wireless LANs 11.Outline Overview IEEE 802.11 Architecture and Services IEEE 802.11 Medium Access Control
More informationOverview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect
168 430 Computer Networks Chapter 17 Wireless LANs Overview A wireless LAN uses wireless transmission medium Used to have high prices, low data rates, occupational safety concerns, and licensing requirements
More informationArchitecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change
802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -
More informationMOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF
More informationOutline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationIEEE Wireless LANs Part I: Basics
IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationFunctions of physical layer:
Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationLocal Area Networks. Lecture 17 Fall Token Ring and FDDI
Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationChapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationChapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationInvestigation of WLAN throughput
Laboratory works in Radiocommunications Investigation of WLAN throughput 1 Version 22.09.2008 1 Table of Contents 1 Table of Contents...I 2 Abbreviations...II 3 Introduction...3 4 IEEE 802.11...3 4.1 Architecture...3
More informationOutline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space
Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationWiFi Overview. 2/14/2005 Pietrosemoli 1
WiFi Overview Abdus Salam ICTP, February 2005 Radio Based Computer Networking for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)
More informationAdvanced Computer Networks. WLAN, Cellular Networks
Advanced Computer Networks 263 3501 00 WLAN, Cellular Networks Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last week Medium Access COPE Today Last week Short
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationWLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto
WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationCS4/MSc Computer Networking. Lecture 12: Wireless Local Area Networks
CS4/MSc Computer Networking Lecture 12: Wireless Local Area Networks Wireless Networking Motivation Mobility Connect from anywhere, anytime, on the move Wi-fihotspots beginning to proliferate» coffee shops,
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationOutline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards
EEC-682/782 Computer Networks I Lecture 9 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB
More informationWireless Local Area Networks: Recent Developments
Wireless Local Area Networks: Recent Developments Ohio Highway Patrol Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 13-1 Overview Spread Spectrum Wireless local area networks Wireless LAN standard:
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.
Wireless Intro 15-744: Computer Networking L-9 Wireless TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving TCP Performance over Wireless Links [BDS+94]
More informationSample solution to Midterm
College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the
More information