SlideShare a Scribd company logo
1 of 96
IEEE 802.11s implementation for multimedia campus networking Sikkim Manipal Institute Of Technology Jan 2008 – Jun 2008
Why, What ,How?
Wireless Mesh Networks IEEE 802.11s ,[object Object],[object Object],[object Object],[object Object],[object Object]
Classical 802.11 WLAN
WLAN with mesh
Why Mesh? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes Of WMN ,[object Object],[object Object],[object Object]
Infrastructure/Backbone WMNs
Client WMNs
Hybrid WMNs
Comparison with existing technologies
Mesh vs. Ad-Hoc Networks ,[object Object],[object Object],[object Object],[object Object],Ad-Hoc Networks WMN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mesh vs. Sensor Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],Wireless Sensor Networks WMN ,[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN Coverage 802.11 WMN Wiring Costs Low High Number of APs As needed Twice as many Cost of APs High Low Bandwidth Good Very Good
Mesh Implementation Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Marginal S/N ,[object Object],[object Object],[object Object],[object Object],[object Object]
Long bursts of interference Bursty noise might corrupt packets without affecting S/N measurements A B
Short bursts of interference (802.11) A B Outcome depends on relative signal levels When a nearby AP sends a packet, we lose a packet.
Multi-path interference Reflection is a delayed and attenuated copy of the signal A B B
SOFTWARE & HARDWARE DEVELOPMENT
HARDWARE  DEVELOPMENT
HORN ANTENNA
PARABOLIC REFLECTOR ,[object Object]
CAT5 CABLE
i Pod Touch
Wireless Settings For iPod
WIRELESS ROUTER
What is a router? ,[object Object]
LINKSYS WRT54G
 
WRT54G Series  Router Specification
LINKSYS WRT54GL version 1.1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MS WINDOWS
LINUX—UBUNTU GUTSY RIBBON
WI FI RADAR
DEVELOPMENT PLATFORM MATLAB AND SIMULINK
What is VoIP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VoIP Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why VoIP? ,[object Object],[object Object]
VoIP Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft Windows Netmeeting
 
 
 
TRAFFIC MONITORING
PRTG Traffic Grapher ,[object Object]
[object Object],TRAFFIC MONITORING  GRAPH-1
TRAFFIC MONITORING  GRAPH-2
NETWORK  TRAFFIC TOP  PROTOCOLS
Network Traffic Table
Wireless Site Survey Netstumbler
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Graph- SNR vs Time
Netstumbler Window Showing network details
FIRMWARE ,[object Object],[object Object],[object Object],[object Object]
OPEN WRT FIRMWARE
OPEN WRT FIRMWARE ,[object Object],[object Object],[object Object]
 
 
 
FREIFUNK FIRMWARE
FREIFUNK FIRMWARE ,[object Object],[object Object],[object Object]
CONFIGURTION OF A MESH NODE
FREIFUNK FIRMWARE LAN Settings
System Settings
MAD WI FI FIRMWARE
MAD WIFI FIRMWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
TOMATO FIRMWARE
TOMATO FIRMWARE ,[object Object],[object Object],[object Object]
Supported Devices ,[object Object],[object Object],[object Object]
Upgrading The Firmware ,[object Object],[object Object],[object Object],[object Object]
Menus in Tomato  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STATUS- DEVICE LIST
STATUS OVERVIEW
STATUS OVERVIEW
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless( continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STATUS OVERVIEW   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bandwidth Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BANDWIDTH REAL TIME
TOOLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOOLS-PING
TOOLS-TRACE
TOOLS-WIRELESS SURVEY
QoS( Quality Of Service) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Restriction ,[object Object]
 
ADMINISTRATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object]
Thank You

More Related Content

What's hot (20)

Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Ipv6
Ipv6Ipv6
Ipv6
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
WLAN
WLANWLAN
WLAN
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Cellular network
Cellular networkCellular network
Cellular network
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Mobile ipv6
Mobile ipv6Mobile ipv6
Mobile ipv6
 
6lowpan
6lowpan6lowpan
6lowpan
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
DHCP
DHCPDHCP
DHCP
 
Comparison between-ipv6-and-6 lowpan
Comparison between-ipv6-and-6 lowpanComparison between-ipv6-and-6 lowpan
Comparison between-ipv6-and-6 lowpan
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 

Viewers also liked

Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routingAbhishek Kona
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentationIftach Ian Amit
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)Jyoti Yadav
 
MobiMESH: Mesh Evolution
MobiMESH: Mesh EvolutionMobiMESH: Mesh Evolution
MobiMESH: Mesh Evolutionacapone
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Olpcpresentation
OlpcpresentationOlpcpresentation
Olpcpresentationwdb
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkRohit Das
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamicsAir-Fi
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...VK2MB
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi InfographicBenjamin Eggerstedt
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky FannyCarl Ford
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-resultsMichal Jarski
 

Viewers also liked (20)

Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
 
MobiMESH: Mesh Evolution
MobiMESH: Mesh EvolutionMobiMESH: Mesh Evolution
MobiMESH: Mesh Evolution
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Olpcpresentation
OlpcpresentationOlpcpresentation
Olpcpresentation
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh Network
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamics
 
Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
Wifi presentation
Wifi presentation Wifi presentation
Wifi presentation
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
 
Wi fi
Wi fiWi fi
Wi fi
 

Similar to IEEE 802.11s - Wireless Mesh Network

BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)Diwakar Singh
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUNArun Franco
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxShehanMarasinghe1
 
OpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpen Networking Summits
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Controlsandy_vasan
 

Similar to IEEE 802.11s - Wireless Mesh Network (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Darsh
DarshDarsh
Darsh
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
OpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless Infrastructure
 
Ccna report
Ccna reportCcna report
Ccna report
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 

More from Arunabh Mishra

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Arunabh Mishra
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing Arunabh Mishra
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focusArunabh Mishra
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments Arunabh Mishra
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsArunabh Mishra
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case StudyArunabh Mishra
 
Synergy between manet and biological swarm systems
Synergy between  manet and biological swarm systemsSynergy between  manet and biological swarm systems
Synergy between manet and biological swarm systemsArunabh Mishra
 

More from Arunabh Mishra (10)

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing
 
Coffee 101
Coffee 101Coffee 101
Coffee 101
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focus
 
What is ai ?
What is ai ?What is ai ?
What is ai ?
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile robotics
 
I beacons 101
I beacons 101I beacons 101
I beacons 101
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case Study
 
Synergy between manet and biological swarm systems
Synergy between  manet and biological swarm systemsSynergy between  manet and biological swarm systems
Synergy between manet and biological swarm systems
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

IEEE 802.11s - Wireless Mesh Network

Editor's Notes

  1. Now let’s talk about interference Previous slide covered non-bursty weak interference Make this not look like directional antennas (broadcasts, waves) Distance, trees attenuate signal Delivery probability depends in part on signal-to-noise ratio P(delivery) = f(S/N) Perhaps many Roofnet node pairs have S/N corresponding to intermediate delivery probabilities Mention S/N measurements calibrated in the lab Replace hypothesis slides w/ pictures Mention s/n reported by the card Don’t #2 make it sound so definite Qualify the second point Mention ‘textbook model of ber’
  2. We’ve eliminated the possibility that we’re losing bursts of packets We’ve narrowed the possibilities enough that we know we’re losing packets individiually “ the important special case” Start the explanation of this hypothesis here Why two phases? Mention it’s all beacons, constant, 8 APs XXX Roofnet shares its 802.11 channel with the rest of Cambridge XXX Other 802.11 traffic could corrupt our traffic at a time-scale of individual packets, without affecting our S/N measurements (xxx what’s the experiment?)