SlideShare a Scribd company logo
1 of 25
Information and Communication
Technologies(ICT)
Principles and Perspectives
Lecture : Distributed multimedia systems
The 802.11 MAC Protocol
• 3 classes of multiple access protocol
1. Channel partitioning
2. Random Access
3. Taking Turns
• Random access was chosen which is know as CSMA with collision avoidance
(CSMA/CA)
• CSMA : carrier sense multiple access
Ethernet Vs 802.11(aka Wifi)
• Ethernet collision detection
• An Ethernet station listens to the channel as it transmits. If, while transmitting, it
detects that another station is also transmitting, it aborts its transmission and tries to
transmit again after waiting a small, random amount of time
• 802.11 MAC doesn’t implement CD ( collision detection)
• For CD , ability to send and receive at same time is required which is costly in 802.11
adapter
• Even if it is build; due to hidden terminal all collisions will not be detected
802.11 MAC
• once a station begins to transmit a frame, it transmits the frame in its entirety
• Link layer acknowledgment
• Receiver will send an ACK after a short period of time known as Short Inter-frame
Spacing (SIFS)
• If the transmitting station does not receive an acknowledgment within a given amount
of time, it assumes that an error has occurred and retransmits the frame
• If an ACK is not received after some fixed number of retransmissions, the transmitting
station gives up and discards the frame
802.11 CSMA/CA protocol
1. If station sense channel idle; it will transmit after a short period of time
Distributed Inter-frame Space (DIFS)
2. Otherwise, the station chooses a random backoff value. Counts down this
values when channel is idle, if channel is busy value will remain frozen
3. When value counter is zero ( channel is idle) transmit entire frame and wait
for ACK
4. If ACK received , start process for second frame from step 2. If not
received station chooses a backoff value with larger interval
Why DIFS
• Why not immediate action when channel is idle
• Compare strategy with Ethernet Collision detection
Hidden Terminal Problem
Request to send /
Clear to send
Issues with RTS
• Collision can occur on RTS
• Delay will added in the system
• RTS should only be used for long data frames.
• In practice, each wireless station can set an RTS threshold such that the
RTS/CTS sequence is used only when the frame is longer than the threshold
Advance Features
• Rate adaptation
• Power management
Bluetooth
• to replace the cables used on mobile devices with radio frequency waves
• Each Bluetooth device comprises a 9x9 mm chip which enables it to
communicate with other
• Bluetooth uses the 2.45 GHz frequency band
• A Bluetooth piconet is a collection of devices connected via Bluetooth
technology in an ad hoc fashion
Wimax
• Reading assignment
Mobility management Principles
Mobility management Principles
• If a node can maintain its IP then mobility becomes invisible from the
application standpoint
• Example of an adult living at different places at different times
Terminologies
• the permanent home of a mobile node (such as a laptop or smartphone) is known
as the home network
• the entity within the home network that performs the mobility management
functions is known as the home agent
• The network in which the mobile node is currently residing is known as the foreign
(or visited) network
• the entity within the foreign network that helps the mobile node with the mobility
management functions discussed below is known as a foreign agent
• A correspondent is the entity wishing to communicate with the mobile node
Mobility management
• How network will know about mobile node’s current address
• COA ( care of address) will be created by foreign agent
• Foreign agent will inform home agent
• Sometimes mobile node acts as foreign agent (DHCP protocol)
• How data will be forwarded to mobile node from correspondent
Indirect Routing summary
• A mobile-node–to–foreign-agent protocol. The mobile node will register with the foreign agent when
attaching to the foreign network. Similarly, a mobile node will deregister with the foreign agent
when it leaves the foreign network.
• A foreign-agent–to–home-agent registration protocol. The foreign agent will register the mobile node’s
COA with the home agent. A foreign agent need not explicitly deregister a COA when a
mobile node leaves its network, because the subsequent registration of a new COA, when the
mobile node moves to a new network, will take care of this.
• A home-agent datagram encapsulation protocol. Encapsulation and forwarding of the
correspondent’s original datagram within a datagram addressed to the COA.
• A foreign-agent decapsulation protocol. Extraction of the correspondent’s original datagram from
the encapsulating datagram, and the forwarding of the original datagram to the mobile node.
Triangle routing problem
• Imagine a scenario where mobile node visiting correspondent network
• Direct routing is the solution
• Correspondent first learns about COA of mobile node from home agent
Mobile Routing
• Mobile user location protocol
• Mobile node move from one foreign network to other
• Anchor Foreign agent
• the foreign agent in that foreign network where the mobile node was first found
wireless networks

More Related Content

What's hot

What's hot (20)

Network switch
Network switchNetwork switch
Network switch
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
ITFT_Transmission modes
ITFT_Transmission modesITFT_Transmission modes
ITFT_Transmission modes
 
VirtuaL area network (VLAN)
VirtuaL area network (VLAN)  VirtuaL area network (VLAN)
VirtuaL area network (VLAN)
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Switching
SwitchingSwitching
Switching
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Layer 3 messages (2G)
Layer 3 messages (2G)Layer 3 messages (2G)
Layer 3 messages (2G)
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Module3 part1
Module3 part1Module3 part1
Module3 part1
 
8251 a basic
8251 a basic8251 a basic
8251 a basic
 

Similar to wireless networks

Computer Network
Computer NetworkComputer Network
Computer NetworkRubaya Mim
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfADARSHN40
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxkarthiksmart21
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptxAzmiNizar1
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.pptsyam babu
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 

Similar to wireless networks (20)

Computer Network
Computer NetworkComputer Network
Computer Network
 
Week16 lec2
Week16 lec2Week16 lec2
Week16 lec2
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Chapter13
Chapter13Chapter13
Chapter13
 

More from Saqib Shehzad

خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfخاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfSaqib Shehzad
 
Multimedia continued
Multimedia continuedMultimedia continued
Multimedia continuedSaqib Shehzad
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability EvaluationSaqib Shehzad
 
User centered Design
User centered DesignUser centered Design
User centered DesignSaqib Shehzad
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCISaqib Shehzad
 
Cognitive frameworks
Cognitive frameworksCognitive frameworks
Cognitive frameworksSaqib Shehzad
 
Cognition, information processing, perception and attention
Cognition, information processing, perception and attentionCognition, information processing, perception and attention
Cognition, information processing, perception and attentionSaqib Shehzad
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer InteractionSaqib Shehzad
 

More from Saqib Shehzad (20)

خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfخاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
 
Security
Security Security
Security
 
wireless networks
wireless networkswireless networks
wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia continued
Multimedia continuedMultimedia continued
Multimedia continued
 
Multimedia
MultimediaMultimedia
Multimedia
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability Evaluation
 
Prototype in HCI
Prototype in HCIPrototype in HCI
Prototype in HCI
 
User centered Design
User centered DesignUser centered Design
User centered Design
 
HCI
HCIHCI
HCI
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
 
Interaction styles
Interaction stylesInteraction styles
Interaction styles
 
Cognitive frameworks
Cognitive frameworksCognitive frameworks
Cognitive frameworks
 
Cognition, information processing, perception and attention
Cognition, information processing, perception and attentionCognition, information processing, perception and attention
Cognition, information processing, perception and attention
 
Conceptual Model
Conceptual ModelConceptual Model
Conceptual Model
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

wireless networks

  • 1. Information and Communication Technologies(ICT) Principles and Perspectives Lecture : Distributed multimedia systems
  • 2. The 802.11 MAC Protocol • 3 classes of multiple access protocol 1. Channel partitioning 2. Random Access 3. Taking Turns • Random access was chosen which is know as CSMA with collision avoidance (CSMA/CA) • CSMA : carrier sense multiple access
  • 3. Ethernet Vs 802.11(aka Wifi) • Ethernet collision detection • An Ethernet station listens to the channel as it transmits. If, while transmitting, it detects that another station is also transmitting, it aborts its transmission and tries to transmit again after waiting a small, random amount of time • 802.11 MAC doesn’t implement CD ( collision detection) • For CD , ability to send and receive at same time is required which is costly in 802.11 adapter • Even if it is build; due to hidden terminal all collisions will not be detected
  • 4. 802.11 MAC • once a station begins to transmit a frame, it transmits the frame in its entirety • Link layer acknowledgment • Receiver will send an ACK after a short period of time known as Short Inter-frame Spacing (SIFS) • If the transmitting station does not receive an acknowledgment within a given amount of time, it assumes that an error has occurred and retransmits the frame • If an ACK is not received after some fixed number of retransmissions, the transmitting station gives up and discards the frame
  • 5.
  • 6. 802.11 CSMA/CA protocol 1. If station sense channel idle; it will transmit after a short period of time Distributed Inter-frame Space (DIFS) 2. Otherwise, the station chooses a random backoff value. Counts down this values when channel is idle, if channel is busy value will remain frozen 3. When value counter is zero ( channel is idle) transmit entire frame and wait for ACK 4. If ACK received , start process for second frame from step 2. If not received station chooses a backoff value with larger interval
  • 7. Why DIFS • Why not immediate action when channel is idle • Compare strategy with Ethernet Collision detection
  • 9. Request to send / Clear to send
  • 10. Issues with RTS • Collision can occur on RTS • Delay will added in the system • RTS should only be used for long data frames. • In practice, each wireless station can set an RTS threshold such that the RTS/CTS sequence is used only when the frame is longer than the threshold
  • 11. Advance Features • Rate adaptation • Power management
  • 12. Bluetooth • to replace the cables used on mobile devices with radio frequency waves • Each Bluetooth device comprises a 9x9 mm chip which enables it to communicate with other • Bluetooth uses the 2.45 GHz frequency band • A Bluetooth piconet is a collection of devices connected via Bluetooth technology in an ad hoc fashion
  • 13.
  • 16. Mobility management Principles • If a node can maintain its IP then mobility becomes invisible from the application standpoint • Example of an adult living at different places at different times
  • 17. Terminologies • the permanent home of a mobile node (such as a laptop or smartphone) is known as the home network • the entity within the home network that performs the mobility management functions is known as the home agent • The network in which the mobile node is currently residing is known as the foreign (or visited) network • the entity within the foreign network that helps the mobile node with the mobility management functions discussed below is known as a foreign agent • A correspondent is the entity wishing to communicate with the mobile node
  • 18.
  • 19. Mobility management • How network will know about mobile node’s current address • COA ( care of address) will be created by foreign agent • Foreign agent will inform home agent • Sometimes mobile node acts as foreign agent (DHCP protocol) • How data will be forwarded to mobile node from correspondent
  • 20.
  • 21. Indirect Routing summary • A mobile-node–to–foreign-agent protocol. The mobile node will register with the foreign agent when attaching to the foreign network. Similarly, a mobile node will deregister with the foreign agent when it leaves the foreign network. • A foreign-agent–to–home-agent registration protocol. The foreign agent will register the mobile node’s COA with the home agent. A foreign agent need not explicitly deregister a COA when a mobile node leaves its network, because the subsequent registration of a new COA, when the mobile node moves to a new network, will take care of this. • A home-agent datagram encapsulation protocol. Encapsulation and forwarding of the correspondent’s original datagram within a datagram addressed to the COA. • A foreign-agent decapsulation protocol. Extraction of the correspondent’s original datagram from the encapsulating datagram, and the forwarding of the original datagram to the mobile node.
  • 22. Triangle routing problem • Imagine a scenario where mobile node visiting correspondent network • Direct routing is the solution • Correspondent first learns about COA of mobile node from home agent
  • 23.
  • 24. Mobile Routing • Mobile user location protocol • Mobile node move from one foreign network to other • Anchor Foreign agent • the foreign agent in that foreign network where the mobile node was first found

Editor's Notes

  1. Bluetooth piconet
  2. Indirect routing
  3. Direct routing
  4. Direct Routing