A Survey on Enterprise WLAN Techniques

Size: px
Start display at page:

Download "A Survey on Enterprise WLAN Techniques"

Transcription

1 A Survey on Enterprise WLAN Techniques Jaegook Lee, Young-Joo Suh and Chansu Yu POSTECH WCU Division of ITCE, Pohang, S. Korea, {ljk8918, Cleveland State University Department of ECE, Cleveland, OH, Abstract WLANs are getting more and more popular. Even though an independent WLAN works in an optimal manner, many problems occur when they are deployed densely particularly with the advancement of new standards (e.g., n and ac) and new devices supporting dual- or non-standard features (e.g., dual-band devices such as iphone 5 and adaptive power save mode operation found in most smartphones). Research community has been exploring an integrated system to monitor or control the APs and clients so that the network performance can be maximized. Enterprise WLAN (EWLAN) uses a central controller to address problems arising from a collection of APs and their associated clients due to their behavior with the lack of knowledge of other APs and clients in the proximity. This article presents EWLAN s architecture and characteristics. Then it presents a survey on several solutions in terms of interference mitigation, traffic balance, and mobility support. I. INTRODUCTION While data service through cellular networks such as 3G and LTE has been a dominant technology, based WLANs would continue to exist as they can offload enormous demand on Telco networks and offer a higher throughput than cellularbased data networks. For example, the current n standard supports up to 150Mbps and the anticipated ac supports as high as 1.73Gbps while 3G and LTE supports 14.4Mbps and 150Mbps, respectively. On the other hand, WLAN deployments has been observed chaotic even in seemingly controlled environment such as office buildings, manufacturing sites, shopping malls, and campuses [1], [2] due to the random additions of APs for convenience, fast advancement of mobile devices as well as standards such as a/b/g/n/ac/ad and no or limited control over WLANs. This becomes serious when AP density is high. For example, it is observed that about 60% of retransmissions is the frame type of probe response because APs keep retransmit the frame even if a mobile station transmitted a probe request frame but left the channel to scan the next [2]. This becomes even more serious in large-scale venues contributing to a large volume of non-data traffic. Unmanaged WLANs are destined to suffer from unnecessary overheads as well as significant performance degradation, which can be addressed by having a central control entity with prudent monitor and control mechanisms in the context of enterprise WLAN (EWLAN). This article discusses the EWLAN architecture, interference and mitigation, traffic monitor and control, and mobility support. II. ARCHITECTURE OF EWLAN Control mechanism in an EWLAN can be either centralized or distributed. However, centralized mechanism in most cases makes more sense because the communication with the controller uses wired connections and thus, it does not disrupt wireless communications. Most popularly, they target interference mitigation or traffic balance. Figure 1 shows a general architecture of EWLAN. An EWLAN system consists of APs, a central controller, client devices, and LAN switches. The controller can control various parameters such as operating channel and transmission power for all APs considering locations of APs, interference among APs, and traffic loads on each cell. Furthermore, when a client device attempts to associate with one of several candidate APs, it dynamically decides the target AP based on monitored information. The controller also performs MAC operations such as packet scheduling for associated clients to mitigate inter-cell interference and load balancing. EWLAN also can conduct security related operations as opposed to most of open wireless networks that do not maintain logs or mechanisms for forensic investigations. Fig. 1. Architecture of EWLAN

2 To realize those control objectives, it needs information such as RSSI of client/ap, traffic, channel, and so on. Several standards specify how to collect information k is for radio resource management and explains the information collection scheme on a single BSS. According to this standard, an AP can query statistics such as channel status, retries, packets transmitted and packets received. Based on this statistics, the AP can manage their radio resource f (Inter Access Point Protocol or IAPP) supports AP-to-AP communication via distribution system (DS) for the purpose to assist client s handoff. III. INTERFERENCE MONITORING AND MITIGATION A. Monitoring With drastically increasing number of APs in wireless networks, interference problem becomes critical as it degrades performance [3], [4]. However, in order to mitigate the interference, it is important to understand the status of interference between APs, necessitating the proper method to monitor interference and build up the interference map, which can be done in a passive or active manner. Passive interference monitor: One advantage of passive is that it doesn t need an additional traffic while a disadvantage is that the mechanism typically takes more time to analyze the interference. For example, in [5], the key elements to monitor the interference are timestamp and reception status of packets. When two packets timestamps are overlapped but only one of them succeeds, it can be concluded that one link is interfering the other but not vice versa. Fig. 2. scenario Active interference monitor: In contrast, active mechanisms are generally more accurate than passive at the cost of the additional test traffic to construct a conflict graph. For instance, a prior work on conflict graph construction uses bandwidth tests [6]. This mechanism tries to take all of cases between all APs and clients in the network into account so that the result is very accurate but takes a long time to run and incurs a large control traffic. One possible approach to avoid the intolerable control traffic is found in [7]. This mechanism does not try all possible cases enumerating all APs and all potential client positions. Instead, it divides all links into several topologies in terms of hop count, i.e., inter-ap (0-hop), AP-client (1-hop) and inter-client (2-hop) [7] as shown in Fig 2. To test it, AP 1 and AP 2 send a dummy packet to C 1 and C 2, respectively. If AP 1 does not receive an ACK, it could be regarded due to the interference from C 2. This could significantly reduce the time and traffic when constructing a conflict graph but the accuracy is almost the same as the bandwidth test mechanism. B. Mitigation Based on the result of interference, one can mitigate the interference problem in the network with a large number of APs in the proximity. The spectrum of the solutions ranges from the selection of AP (association) to the frequency (channel) and time multiplexing. Multi association & packet scheduling: The knowledge of conflicting APs can be utilized to mitigate the interference problem. For example, downlink packets are queued on the central controller and then, distributed in batches to, for example, two APs that do not interfere with each other [4]. To make it more effective, they break single association between a client and an AP and adopt multi-association scheme to release the increased handoff overhead [4], [8]. -aware channel assignment: [3] uses the conflict graph to calculate a pack of transmissions, which is referred to as those with no interference with each other. The pack is calculated for each time frame. If the pack improves network throughput or capacity, that is kept in transmission schedule. Beacon Positioning: mitigation is also needed to save clients energy. When APs use power save mechanism of standard to save clients energy, it would be better to stagger the beacon intervals so that clients associated with an AP do not interfere others associated with other APs [9], [10]. In other words, APs wakeup/sleep schedule are determined to be minimally overlapped with each other. IV. TRAFFIC MONITORING AND MITIGATION A. Monitoring is important in optimizing the performance of EWLAN. For the traffic, the global view is very important to tune the parameters correctly. Unlike the interference, it is typically performed in a passive manner. Desktop-based traffic monitor: This scheme uses desktop PCs with Wifi USB, making the PCs as monitors [11]. This framework is well-suited for the traffic as well as solving many wireless management problems including detection of unauthorized access points, handling malfunctioning APs, and performance. Another advantage is

3 that it uses wired connectivity and idling CPUs to assist the. Sensor-based traffic monitor: This scheme implements additional RF sensors attached to APs to monitor the network traffic [12]. This method does not (more correctly, cannot) measure the number of packets but measures the channel busy time with the sensor. They took account not only data transmission time but also back-off delay, IFS and RTS/CTS to obtain more accurate traffic condition. B. Control Based on the traffic information, EWLAN can improve network performance. Simply speaking, if the traffic is concentrated to an specific AP, clients associated with that AP suffer from a significant performance degradation. On EWLAN, the controller can solve this problem by manipulating the association process. Furthermore, it can improve performance by supporting the traffic-aware channel assignment. AP scheduling (association): To choose an optimal AP is very important in a WLAN. Rohan et al. proposed a mechanism that takes not only channel utilization but also RSSI to estimate an optimal AP [13]. Then, the controller could enforce the association with the particular AP by deferring the response from other APs for the probe request. For this purpose, the controller lets the APs set the SSID field to null to hide SSID. -aware channel assignment: Rozner et al. proposed a channel assignment mechanism taking traffic demand into account [14]. It observes the recent sent and received traffic via SNMP and predicts the traffic demand with the central controller. This information can be utilized by the controller when it assigns channels to APs. It also makes the conflict graph to better assign the channels. A highly demanded AP gets a channel with little interference while a less demanded AP gets a more interfered channel. Dual-band traffic and control: The enormous success of smartphones has accelerated the saturation of existing WLANs at 2.4GHz. This in turn facilitates the development of standards at 5GHz such as n and ac as well as dual-band (2.4 & 5GHz) devices such as iphone 5 and Galaxy S2/S3/S4 and dual-radio or multi-radio APs such as Apple Airport and Cisco 1040 series. For example, Airport Extreme supports either 2.4GHz or 5GHz operation but not both at the same time, which means it needs to make a decision which band to operate. On the other hand, a newer Airport Utility supports dual bands simultaneously. In this case, the same network name (SSID) is used at both bands to allow dualband clients to switch the two bands dynamically without handoffs. Dual-band radio relieves the saturated 2.4GHz band based on band steering. This technique renders dual-band clients to operate at 5GHz by, for example, not responding to probe request messages at 2.4GHz, leaving 2.4GHz band for legacy devices [15]. However, there has been little work done to understand the issues and solutions with a mixture of dualand single-band clients/aps in the context of EWLAN. V. MOBILITY SUPPORT There has been a plethora of work on mobility prediction for variety of wireless networks, such as cellular, WLANs, ad hoc networks, and mesh networks, and applied to reduce handoff latency, provide efficient resource reservation, improve routing protocols, and conserve power. Mobility & Handoff prediction: Reduce the handoff delay in WLANs has been an important topic since the onset of WLAN development. An immediate solution lies in optimizing the probing or scanning process because this is the most time consuming part of a handoff [16], [17]. [18] uses multiple APs in a mesh network to monitor the connectivity quality of clients in their vicinity. [16], [19] [21] reduce the number of channels to scan by defining a directed graph that represents the topological placement of APs and the mobility patterns of clients. More specifically, for example, [22] designed a fast handoff scheme based on next AP prediction. They could eliminate scanning process with the prediction scheme. This scheme is based on statistics of handoff sequence (HS). If it is considered a time-series data, the prediction is more accurate. By preassociating, they could eliminate the scanning process. The history of HS is maintained in a central controller, called Path- Cache server in Figure 3. A global history of all the MSs in the network is maintained in the Path-Cache, Fig. 3. Mobility cache (Path-cache) Handoff virtualization: Handoffs and the corresponding delay problem for delay-sensitive applications like VoIP have been considered in [23]. It sets up a virtual environment for VoIP with the purpose of eliminating handoffs. To achieve it, it uses a single virtualized channel, the same ESSID and the same MAC address on an ESS. While a single channel could cause fatal interference problems, it avoids interference by using micro-probing and an interference map and eliminates handoffs during a VoIP call. Since handoff refers to an association as well as authentication with a new AP, it is equally important to centralize

4 the authentication process too. In [24], APs are built with the PHY and lower portions of the MAC protocol only, and the remaining functionalities of AP are implemented in and managed by a central controller. The controller allows clients to connect to any of the APs without re-authentication which facilitates the handoff virtualization mentioned above. Localization: Localization has become an indispensable technology for the future ubiquitous life. This helps people find their indoor locations with mobile devices. Recently, there introduced numerous commercial localization services such as Skyhook, WiFiSLAM, Wifarer and NAO Campus. There s a growing demand for indoor localization in a large-scale EWLAN at a reduced control overhead and latency. WLAN-based positioning system (WPS) is very popular mainly due to the wide spread deployments of Wifi infrastructures. The most popular technique estimates the location by matching fingerprint measurements at the time with priori location fingerprints stored in, for example, a central controller [25] [27]. While the estimation accuracy depends on many factors including physical environments such as building structures, materials, walls, etc. [25] as well as the noise characteristics of signal propagation [25], [28], it also depends on the desired level of WPS performance, most importantly the response time during the online phase. VI. SUMMARY AND CONCLUSIONS This article presents a comprehensive survey of existing EWLAN schemes, which is summarized in Table I. To monitor interference and traffic, some schemes use test traffic [3], [7], [11] while others use real traffic [5], [10] [12]. As for the former, [7] uses probe packets to measure loss ratio while [3] measures SINR. More specifically about the latter, [10] monitors RSSI of APs beacons and [5] uses timestamp and reception status of all packets. Most of above EWLAN schemes apply their algorithm to infrastructure (controller or AP) as shown in Table I. However, several schemes [3], [4], [22] need client modification also as presented in Table I. For example, [4] needs changes in client side so that it is allowed to associate with multiple APs. By the same token, most of EWLAN schemes focus on downlink traffic rather than uplink traffic although the latter would cause interference too. [3], [23], [29] addressed this issue by utilizing, for example, CTSto-self packets. Although existing schemes are well suited to EWLAN and improve performance of network, the potential of this area has not been exhausted yet. ACKNOWLEDGMENT This research was supported in part by the Basic Science Research Program ( ) and WCU program (R ), both through the NRF (Korea) funded by the Ministry of Education, Science, and Technology. REFERENCES [1] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, Self-management in chaotic wireless deployments, Wireless Networks, vol. 13, no. 6, pp , [2] J. Yeo, M. Youssef, and A. Agrawala, Characterizing the ieee traffic: the wireless side, Univ. of Maryland, Res. Rep. CS-TR-4570, [3] S. Rayanchu, V. Shrivastava, S. Banerjee, and R. Chandra, Fluid: Improving throughputs in enterprise wireless lans through flexible channelization, Mobile Computing, IEEE Transactions on, vol. 11, no. 9, pp , [4] A. Zhou, M. Liu, T. Shu, Y. Song, and Z. Li, Exploiting the full potential of multi-ap diversity in centralized wlans through back-pressure scheduling, in Local Computer Networks (LCN), 2011 IEEE 36th Conference on. IEEE, 2011, pp [5] V. Shrivastava, S. Rayanchu, S. Banerjee, and K. Papagiannaki, Pie in the sky: online passive interference estimation for enterprise wlans, NSDI11, [6] J. Padhye, S. Agarwal, V. Padmanabhan, L. Qiu, A. Rao, and B. Zill, Estimation of link interference in static multi-hop wireless networks, in Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. USENIX Association, 2005, pp [7] N. Ahmed and S. Keshav, Smarta: a self-managing architecture for thin access points, in Proceedings of the 2006 ACM CoNEXT conference. ACM, 2006, p. 9. [8] N. Ahmed, V. Shrivastava, A. Mishra, S. Banerjee, S. Keshav, and K. Papagiannaki, mitigation in enterprise wlans through speculative scheduling, in Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, 2007, pp [9] J. Manweiler and R. Roy Choudhury, Avoiding the rush hours: Wifi energy management via traffic isolation, in Proceedings of the 9th international conference on Mobile systems, applications, and services. ACM, 2011, pp [10] J. Ma, S. Kim, and D. Kim, Tame: Time window scheduling of wireless access points for maximum energy efficiency and high throughput, in Embedded and Real-Time Computing Systems and Applications (RTCSA), 2012 IEEE 18th International Conference on. IEEE, 2012, pp [11] P. Bahl, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, Dair: A framework for managing enterprise wireless networks using desktop infrastructure, in Proceedings of the Annual ACM Workshop on Hot Topics in Networks (HotNets), [12] G. Wu and T. Chiueh, Passive and accurate traffic load estimation for infrastructure-mode wireless lan, in Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems. ACM, 2007, pp [13] R. Murty, J. Padhye, R. Chandra, A. Wolman, and B. Zill, Designing high performance enterprise wi-fi networks, in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, 2008, pp [14] E. Rozner, Y. Mehta, A. Akella, and L. Qiu, -aware channel assignment in enterprise wireless lans, in Network Protocols, ICNP IEEE International Conference on. IEEE, 2007, pp [15] LANCOM, Wlan band sterring, LANCOM Techpaper. [16] M. Shin, A. Mishra, and W. A. Arbaugh, Improving the latency of hand-offs using neighbor graphs, in ACM MobiSys, [17] H. Velayos and G. Karlsson, Techniques to reduce the ieee b handoff time, in IEEE International Conference on Communications, [18] Y. Amir, C. Danilov, M. Hilsdale, R. Musvaloiu-Elefteri, and N. Rivera, Fast handoff for seamless wireless mesh networks, in ACM MobiSys, [19] I. Ramani and S. Savage, Syncscan: Practical fast handoff for infrastructure networks, in IEEE INFOCOM, [20] S. Pack and Y. Choi, Fast handoff scheme based on mobility prediction in public wireless lan systems, IEE Proceedings Communications, vol. 151, no. 5, pp , [21] S. Shin, A. G. Forte, A. S. Rawat, and H. Schulzrinne, Reducing mac layer handoff latency in ieee wireless lans, in ACM MobiWAC, [22] W. Wanalertlak, B. Lee, C. Yu, M. Kim, S. Park, and W. Kim, Behaviorbased mobility prediction for seamless handoffs in mobile wireless networks, Wireless networks, vol. 17, no. 3, pp , [23] N. Ahmed, S. Keshav, and K. Papagiannaki, Omnivoice: a mobile voice solution for small-scale enterprises, in Proceedings of the Twelfth ACM

5 Schemes Issues Strategies Function of controller PIE [5] Micro probing [7] GMS [4] TAME [10] DAIR [11] Wintry [12] DAP [13] -aware channel assignment [14] BMP [22] OmniVoice [23] FLUID [3] mitigation mitigation balancing balancing Handoff Handoff Flexible channelization Overlapped packet Coordinated probe testing Multi-association packet scheduling & Beacon interval distributing with packed APs Desktop infrastructure based Air time using RF sensor RSSI & channel air time considering AP selection demand & interference weighted channel assignment Mobility based prediction for next handoff AP Virtualizing WLAN using single virtualized channel & same MAC address Bandwidth packing based on conflict graph - Gathering time stamp and reception status - Judging whether overlapped packets nodes are in interference range - Coordinating test-probe packets - Judging whether nodes are in interference range - Extending conflict graph with multi-association - Scheduling packets - Constructing topology map and AP clustering - Beacon time schedule - Requesting specific application to monitors - Gathering requested information - Gathering channel utilization information from RF sensor - Gathering RSSI of a client from each AP and channel air time - Choose a proper AP for handoff to keep traffic balance - Weighting traffic demand and interference - Assigning channel to weighted link first - Gathering historical information of handoff - Predicting a next AP - Storing authentication parameters of each client - Setting ESSID same for every AP to be virtualized - Generating a conflict graph taking channel width and center frequency - Scheduling packets simultaneously sent on proper spectrum not to interfere each other Usage of conflict graph TABLE I SUMMARY AND COMPARISON OF EXISTING EWLAN SCHEMES Client modification - N R N T Y Y Y N R N N Both N N R N N Y N N Y Y N Y Y T Test probing& Real traffic International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 2011, p. 5. [24] P. Calhoun, M. Montemurro, D. Stanley et al., Control and provisioning of wireless access points (capwap) protocol binding for ieee , IETF RFC5416, [25] P. Bahl and V. Padmanabhan, Radar: An in-building rf-based user location and tracking system, in IEEE INFOCOM, [26] M. Youssef, A. Agrawala, and A. Shankar, Wlan location determination via clustering and probability distributions, in IEEE Percom, [27] R. Battiti, T. Nhat, and A. Villani, Location-aware computing: A neural network model for determining location in wireless lans, in University of Trento, Technical Report, DIT , [28] M. Borenovic and A. Neskovic, Comparative analysis of rssi, snr and noise level parameters appli-cability for wlan positioning purposes, in IEEE EUROCON, [29] V. Shrivastava, N. Ahmed, S. Rayanchu, S. Banerjee, S. Keshav, K. Papagiannaki, and A. Mishra, Centaur: realizing the full potential of centralized wlans through a hybrid data path, in Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, 2009, pp

Improving the latency of Hand-offs using Sentinel based Architecture

Improving the latency of Hand-offs using Sentinel based Architecture Improving the latency of 802.11 Hand-offs using Sentinel based Architecture Lenin Ravindranath, Fredrick Prashanth, Leo Prasath, Praveen Durairaj, Arul Siromoney Department of Computer Science and Engineering,

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

Converged Access: Wireless AP and RF

Converged Access: Wireless AP and RF This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient

More information

An efficient trigger to improve intra-wifi handover performance

An efficient trigger to improve intra-wifi handover performance An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility

More information

WiFi. A Fast Beacon Scanning Method for WiFi Positioning System. Yusuke Konishi 1 and Toshiyasu Nakao 1 LAN PDA LAN STA STA. 2.1 IEEE 802.

WiFi. A Fast Beacon Scanning Method for WiFi Positioning System. Yusuke Konishi 1 and Toshiyasu Nakao 1 LAN PDA LAN STA STA. 2.1 IEEE 802. WiFi 1 1 LAN LAN LAN IEEE 82.11 LAN IEEE 82.11b/g DSSS A Fast Beacon Scanning Method for WiFi Positioning System Yusuke Konishi 1 and Toshiyasu Nakao 1 Recently, WLAN infrastructure and mobile terminals

More information

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University,

More information

Survey Topic: WiFi On The Move Presented by - Abhinav Tekumalla (atekumal) Bahula Gupta (bahulag)

Survey Topic: WiFi On The Move Presented by - Abhinav Tekumalla (atekumal) Bahula Gupta (bahulag) Outline Survey Topic: WiFi On The Move Presented by - Abhinav Tekumalla (atekumal) Bahula Gupta (bahulag) WiFi on the move : Challenges VanLAN ViFi Cabernet HSPDA/ WiMax WiFi on the move Providing WiFi

More information

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Hye-Soo Kim, Sang-Hee Park, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University, Anam-Dong

More information

Methods for Channel Assignment in Infrastructure based WLAN-A Survey

Methods for Channel Assignment in Infrastructure based WLAN-A Survey Methods for Channel Assignment in Infrastructure based WLAN-A Survey Mrs. Sandhya Tanpure tanpure.sandhya@gmail.com Prof. Sujata Kadam sujatamane@yahoo.com Mrs. Mrunalini Gavfale mrunalyg@gmail.com Abstract:

More information

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN

Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Fast Handoff Scheme for Seamless Multimedia Service in Wireless LAN Hye-Soo Kim, Sang-Hee Park, Chun-Su Park, Jae-Won Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea University, Anam-Dong

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Page 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance?

Page 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance? Overview 18-759: Wireless Networks Lecture 15: WiFi Self-Organization Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Deployment Guidelines for Highly Congested IEEE b/g Networks

Deployment Guidelines for Highly Congested IEEE b/g Networks Deployment Guidelines for Highly Congested IEEE 8.b/g Networks Andrea G. Forte Department of Computer Science Columbia University andreaf@cs.columbia.edu Henning Schulzrinne Department of Computer Science

More information

ARUBA OS ARUBA CONTROLLER FEATURES USED TO OPTIMIZE PERFORMANCE

ARUBA OS ARUBA CONTROLLER FEATURES USED TO OPTIMIZE PERFORMANCE ARUBA OS ARUBA CONTROLLER FEATURES USED TO OPTIMIZE PERFORMANCE Technical Climb Webinar 10:00 GMT 11:00 CET 13:00 GST Oct 26th, 2016 Presenter: Barath Srinivasan barath.srinivasan@hpe.com Welcome to the

More information

Wireless Challenges and Resolutions

Wireless Challenges and Resolutions Wireless Challenges and Resolutions 1 Steven Shelton Senior Network Engineer Oak Ridge National Laboratory Oak Ridge, Tennessee ows@ornl.gov 2 Wireless Challenges and Resolutions Sections Common Problems

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Improving the IEEE MAC Layer Handoff Latency to Support Multimedia Traffic

Improving the IEEE MAC Layer Handoff Latency to Support Multimedia Traffic Improving the IEEE 802.11 MAC Layer Handoff Latency to Support Multimedia Traffic Yogesh Ashok Powar and Varsha Apte Dept. of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai

More information

WiFi Overcast: Enabling True Mobility for Realtime Applications in the Enterprise. Technical Report CS

WiFi Overcast: Enabling True Mobility for Realtime Applications in the Enterprise. Technical Report CS WiFi Overcast: Enabling True Mobility for Realtime Applications in the Enterprise Nabeel Ahmed, Usman Ismail {n3ahmed, uismail}@cs.uwaterloo.ca David R. Cheriton School of Computer Science University of

More information

VoWLAN Best Practices

VoWLAN Best Practices VoWLAN Best Practices WiNG 5 Vik Evans Systems Engineer Enterprise Networking and Communications 1 VoWLAN Best Practices: Topics Planning Design Implementation Configuration 2 Planning Starts with project

More information

Network+ Guide to Networks 6 th Edition. Chapter 8 Wireless Networking

Network+ Guide to Networks 6 th Edition. Chapter 8 Wireless Networking Network+ Guide to Networks 6 th Edition Chapter 8 Wireless Networking Objectives Explain how nodes exchange wireless signals Identify potential obstacles to successful wireless transmission and their repercussions,

More information

A Dynamic Channel Allocation Mechanism for IEEE Networks

A Dynamic Channel Allocation Mechanism for IEEE Networks A Dynamic Channel Allocation Mechanism for IEEE 802.11 Networks Marcel William Rocha da Silva, José Ferreira de Rezende Abstract The great popularity of IEEE 802.11 along with channel scarcity may lead

More information

BIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany

BIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany BIGAP Seamless Handover in High Performance Enterprise IEEE 802.11 Networks Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany Outline Motivation, System Model, Applications, Design

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

FastScan - A handoff scheme for Voice over IEEE WLANs

FastScan - A handoff scheme for Voice over IEEE WLANs Noname manuscript No. (will be inserted by the editor) FastScan - A handoff scheme for Voice over IEEE 802.11 WLANs Ilango Purushothaman Sumit Roy Received: date / Accepted: date Abstract IEEE 802.11 Wireless

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Enhanced Fast BSS Transition on Enterprise WLAN with SDN-based Distribution System

Enhanced Fast BSS Transition on Enterprise WLAN with SDN-based Distribution System Enhanced Fast BSS Transition on Enterprise WLAN with SDN-based Distribution System Hyundong Hwang and Young-Tak Kim Dept. of Information and Communication Engineering, Graduate School, Yeungnam University,

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Datasheet: AirMagnet Survey

Datasheet: AirMagnet Survey Datasheet: AirMagnet Survey AirMagnet Survey is ideal for planning and designing 802.11 a/b/g/n wireless LANs for optimal performance, security and compliance. It calculates the ideal quantity, placement

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Designing Cisco Wireless Enterprise Networks (WIDESIGN)

Designing Cisco Wireless Enterprise Networks (WIDESIGN) Designing Cisco Wireless Enterprise Networks (WIDESIGN) Don t need to take any stress about the 300-360 Exam. We provide you 300-360 Real Exam Questions Along with Updated Test Engine. PDF + Practice Test

More information

Fast Handoff for Seamless Wireless Mesh Networks

Fast Handoff for Seamless Wireless Mesh Networks Fast Handoff for Seamless Wireless Mesh Networks Yair Amir, Claudiu Danilov, Michael Hilsdale, Raluca Musaloiu-Elefteri, Nilo Rivera Distributed Systems and Networks Lab Johns Hopkins University MobiSys

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE 802.11 NETWORKS Wee Lum Tan 1, Konstanty Bialkowski 1 1 Queensland Research Laboratory National ICT Australia Brisbane, QLD, Australia Email: {weelum.tan,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Certified Wireless Network Administrator (CWNA) Course Overview This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Course

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

Fast Handoff Support in IEEE Wireless. Networks

Fast Handoff Support in IEEE Wireless. Networks TO APPEAR IN IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, THE FIRST QUARTER, 2007. 1 Fast Handoff Support in IEEE 802.11 Wireless Networks Sangheon Pack Member, IEEE, Jaeyoung Choi Student Member, IEEE,

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks  Wi-Fi A Wireless Success Story Overview of Wi-Fi Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic trends Source: Cisco percentage

More information

Global Path-Cache Technique for Fast Handoffs in WLANs

Global Path-Cache Technique for Fast Handoffs in WLANs Global Path-Cache Technique for Fast Handoffs in WLANs Weetit Wanalertlak and Ben Lee School of Electrical Engineering and Computer Science Oregon State University Corvallis, OR 97331, USA {wanalewe, benl}@eecs.orst.edu

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Configuring RF Profiles

Configuring RF Profiles Prerequisites for, page 1 Restrictions for, page 1 Information About RF Profiles, page 2 Configuring an RF Profile (GUI), page 5 Configuring an RF Profile (CLI), page 6 Applying an RF Profile to AP Groups

More information

The All-in-One, Intelligent WLAN Controller

The All-in-One, Intelligent WLAN Controller The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum

More information

An Analysis of Handoff in Multi-band Networks

An Analysis of Handoff in Multi-band Networks An Analysis of Handoff in Multi-band 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au Michael Dixon Murdoch University

More information

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band New Channel Access Approach for the IEEE 802.15.4 Devices in 2.4 GHz ISM Band Tolga Coplu and Sema F. Oktug Department of Computer Engineering, Istanbul Technical University, Istanbul, Turkey {coplu,oktug}@itu.edu.tr

More information

Enterprise Mobility with Smarter Wi-Fi

Enterprise Mobility with Smarter Wi-Fi Enterprise Mobility with Smarter Wi-Fi Wi-Fi as Ubiquitous Utility to access your Data Martin Šmrha Product Manager, DNS Agenda 1. Introducing Ruckus 2. The Issues with WiFi 3. Technologies 4. Products

More information

Wireless Survey, Analysis, and Deployment Example

Wireless Survey, Analysis, and Deployment Example Wireless Survey, Analysis, and Deployment Example Organization - Your City, MO. Executive Summary On July 7, 2012, MOREnet performed a wireless survey at the Organization. The purpose of the assessment

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Wi-Fi Technology, Standards,and Evolution. Dr. Srikanth Subramanian CKO, Nanocell Networks

Wi-Fi Technology, Standards,and Evolution. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi Technology, Standards,and Evolution Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com percentage Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic

More information

Link Quality based Association Mechanism in IEEE h compliant Wireless LANs

Link Quality based Association Mechanism in IEEE h compliant Wireless LANs Link Quality based Association Mechanism in IEEE 802.11h compliant Wireless LANs T. Korakis +, O. Ercetin α, S. Krishnamurthy, L. Tassiulas +, S. Tripathi ρ + Computer Engineering and Telecommunications

More information

Route and Spectrum Selection in Dynamic Spectrum Networks

Route and Spectrum Selection in Dynamic Spectrum Networks Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa

More information

Best Practice for Smart Classroom Deployments

Best Practice for Smart Classroom Deployments Best Practice for Smart Classroom Deployments This deployment guide is designed to embody insights and lessons learned from real-world deployment experience to help maximizing the success designing, implementing

More information

Think Enterprise WLAN, Think Samsung

Think Enterprise WLAN, Think Samsung Think Enterprise WLAN, Think Samsung WLAN Solution Enjoy seamless connectivity and mobility with Samsung Wireless Enterprise Solution The wireless enterprise environment has faced a new paradigm shift

More information

Efficient Handoff using Mobile IP and Simplified Cellular IP

Efficient Handoff using Mobile IP and Simplified Cellular IP Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial

More information

A Phy/Mac Layer Mechanism to Improve Aggregation in WLANs

A Phy/Mac Layer Mechanism to Improve Aggregation in WLANs A Phy/Mac Layer Mechanism to Improve Aggregation in WLANs 66 1 Anjaly Kurian, 2 Gnana Sheela K 1,2 Department of ECE, Toc H Institute of Science and Technology, Kerala, India Abstract - In recent years,

More information

] Designing Cisco Wireless Enterprise Networks

] Designing Cisco Wireless Enterprise Networks 300-360] Designing Cisco Wireless Enterprise Networks NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 300-360 Exam on Designing Cisco Wireless

More information

CWTS Exam Objectives (Exam PW0-070)

CWTS Exam Objectives (Exam PW0-070) Introduction The Certified Wireless Technology Specialist (CWTS) certification, covering the current objectives, will certify that successful candidates know the fundamentals of RF behavior, can explain

More information

Ruckus ZoneDirector 1106 WLAN Controller (up to 6 ZoneFlex Access Points)

Ruckus ZoneDirector 1106 WLAN Controller (up to 6 ZoneFlex Access Points) Product Name: Manufacturer: - Model Number: 901-1106-UK00 Please Note: The Ruckus ZoneDirector 1106 has been discontinued. For an alternative, we recommend the Ruckus ZoneDirector 1205. Ruckus ZoneDirector

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

MESH TECHNOLOGY PRIMER

MESH TECHNOLOGY PRIMER MESH TECHNOLOGY PRIMER The Evolution of Wi-Fi: From Hot Spots to Hot Zones to Municipal Networks Wi-Fi technology has experienced unprecedented growth for both consumer and enterprise use in a very short

More information

Datasheet ac Wave 2 Enterprise Wi-Fi Access Point. Model: UAP-AC-HD. Simultaneous Dual-Band 4x4 Multi-User MIMO

Datasheet ac Wave 2 Enterprise Wi-Fi Access Point. Model: UAP-AC-HD. Simultaneous Dual-Band 4x4 Multi-User MIMO 802.11ac Wave 2 Enterprise Wi-Fi Access Point Model: UAP-AC-HD Simultaneous Dual-Band 4x4 Multi-User MIMO Four-Stream 802.11ac Wave 2 Technology 802.3at PoE+ Compatibility Scalable Enterprise Wi-Fi Management

More information

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee 642-742 Q&As Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0 Pass Cisco 642-742 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Taking the Scary out of BYOD What Enterprises REALLY Want 1 2 3 4 5 6

More information

Cisco Exam Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ]

Cisco Exam Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ] s@lm@n Cisco Exam 642-742 Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ] Question No : 1 A client reports that video is not streaming. The administrator

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed. Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Wireless Mesh Networks

Wireless Mesh Networks Distributed Systems 600.437 Wireless Mesh Networks Department of Computer Science The Johns Hopkins University 1 Wireless Mesh Networks Lecture 10 Further reading: www.dsn.jhu.edu/publications/ 2 The Wireless

More information

Enterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC, UAP-Outdoor+, UAP-Outdoor5, UAP-AC Outdoor

Enterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC, UAP-Outdoor+, UAP-Outdoor5, UAP-AC Outdoor Enterprise WiFi System Models: UAP, UAP-LR, UAP-PRO, UAP-AC,, UAP-Outdoor5, UAP-AC Outdoor Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Speeds up to 1300 Mbps (802.11ac)

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Measuring the Performance of User Traffic in Home Wireless Networks

Measuring the Performance of User Traffic in Home Wireless Networks Measuring the Performance of User Traffic in Home Wireless Networks Srikanth Sundaresan 1(B), Nick Feamster 2, and Renata Teixeira 3 1 ICSI, Berkeley, USA srikanth@icsi.berkeley.edu 2 Princeton University,

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Monitoring the Mobility Express Network

Monitoring the Mobility Express Network About the Cisco Mobility Express Monitoring Service, on page 1 Customizing the Network Summary View, on page 2 Viewing the Details of Configured WLANs, on page 5 Customizing Access Points Table View, on

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Wireless LAN Tester Conformable to IEEE802.11ac

Wireless LAN Tester Conformable to IEEE802.11ac Practical Field Information about Field Telecommunication Information Technologies about Telecommunication Technologies Wireless LAN Tester Conformable to IEEE802.11ac Abstract This article describes the

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS PrepKing Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 61.0 http://www.gratisexam.com/ CISCO 642-742 EXAM QUESTIONS & ANSWERS Exam Name: CCNP Wireless - IUWVN Certkey QUESTION 1

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information