This document discusses wireless local area networks (WLANs) and the IEEE 802.11 standard. It covers the architectural comparison of wired vs wireless networks, common problems in WLANs including attenuation, interference and multipath propagation. It also summarizes the addressing modes, access methods, frame format and architecture of WLANs including the basic service set, extended service set, and distributed coordination and point coordination functions.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
2.3b access control random access methods - part 3 - csma ca2.3b access control random access methods - part 3 - csma ca2.3b access control random access methods - part 3 - csma ca
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
4. Architectural Comparison
• Obviously, its wired.
• Hosts are always connected
to the network
• Lack of mobility
• Point to point
communication
• Obviously, its wire free.
• Hosts need not be always
connected to the network
• High mobility
• Broad cast
communication
Similarities and connection to other NWs
Similarities:
Both uses PHYSICAL Addressing modes
Connecting to other NWs:
In wireless cases only the internal or limited area is wireless.
Example, The connection between your laptop and the
modem in your home is wireless. But still the connections
behind the modem are wired. (Remember ISP’s and Back
Bone Networks)
5. Problems in Wireless LANs (WLAN)
Unpredictable
Environment Reliability of message as
we cannot send it for
intended user
Power Requirements
for transmitting and
receiving
There are lots of chances
for Eavesdropping
➢ All these issues are common problems that arises
when we migrate from wired to wireless mode of
communication.
➢ As a communication engineer , we should
incorporate required mechanisms to overcome
these challengesVisit www.youtube.com/GURUKULA for Lecture Videos
6. Lets discuss in Engineering Perspective
Attenuation:
➢ The strength of electromagnetic signals decreases rapidly because
the signal disperses in all directions;
➢ The situation becomes worse with mobile senders that operate on
batteries and normally have small power supplies.
Interference:
➢ Another issue is that a receiver may receive signals not only from
the intended sender, but also from other senders if they are using
the same frequency band.
Multipath Propagation:
➢ A receiver may receive more than one signal from the
same sender because electromagnetic waves can be
reflected back from obstacles such as walls, the
ground, or objects. The result is that the receiver
receives some signals at different phases (because
they travel different paths). This makes the signal less
recognizable.
8. Why not CSMA – CD in WLANs ?
1. Need for Full Duplex
To detect a collision, a host needs to send and receive at the same time, which means the host needs to work in a
duplex mode. Wireless hosts do not have enough power to do so. They can only send or receive at one time.
2. Hidden Node Problem:
• Any node present in their respective region can hear all of its respective
transmission
• From figure station C is outside the coverage of station A
• Station A is outside the coverage of station C
• Station B is covered by both A and C. Hence it can hear all communications
from A and C as well.
• A sends data to B. after some time C sends data to B. this leads in collision. (C
does not know that A is transmitting the data to B)
• In this case A and C are hidden Nodes to each other.
• This problem is overcome by using handshaking signals before transmission
3. Signal Fading
Due to large distance between the stations fading occurs. This prevents the station at one end from hearing
a collision at other end. Visit www.youtube.com/GURUKULA for Lecture Videos
9. Architecture of 802.11
• IEEE 802.11 standard defines 2 types of services they are
• Basic Service Set – BSS
• Extended Service Set – ESS
Visit www.youtube.com/GURUKULA for Lecture Videos
10. Basic Service Set (BSS)
• BSS is made up of stationary or
mobile stations and an optional
central base station known as Access
Point (AP)
• BSS without AP is called as Ad hoc
Networks
• BSS with AP is called as
Infrastructure Network
Visit www.youtube.com/GURUKULA for Lecture Videos
11. Extended Service Set
•ESS is made up of more BSS and
are connected to a “Distributed
Systems”
•The Distributed systems
connects the AP’s in the BSS
•There are 2 types of stations
➢Mobile Stations
➢Stationary Stations
Visit www.youtube.com/GURUKULA for Lecture Videos
12. Frame Format of IEEE 802.11 [WLANs]
• The MAC layer frame contains 9 fields.
Visit www.youtube.com/GURUKULA for Lecture Videos
13. Type of Frames
• There are 3 types of Frames
• Management Frame:
• These frames are used for initial communications between the
stations and access points
• Control Frame:
• These frames are used for accessing the channel and
acknowledging the frames.
• It can be an RTS frame, CTS Frame or ACK Frame
• Data Frames:
• These frames are used for carrying the data and control
information
14. Frame Control (FC) :
• Defines the type of the frame and some other
control information.
• It has 11 sub fields.
Protocol Version :
• It defines the version of the protocol.
Type :
• It defines the type of information.
• 00 – management frame
• 01 – control frame
• 10 – data frame
Sub Type :
• It defines the sub type of each frame.
• 1011 – RTS Frame
• 1100 – CTS Frame
• 1101 - Acknowledgement
More Flag :
• When this bit is “1” it indicated more fragments are to
be received
Retry :
• When this bit is “1” it indicates the retransmitted
frame
Pwr Mgt (Power Management) :
• When this bit is “1” it indicates station is in
power management Mode
More Data:
• When this bit is “1” it indicates station has more
data to send
WEP (Wired Equivalent Privacy):
• When this bit is “1” it indicates encryption is
implemented
RSVD (Reserved):
• This is reserved for future use
D (Duration):
• This field defines the duration of the
transmission used to set the NAV timers
• This is used as the ID for control frames
Addresses:
• There are 4 address fields
• The values in the address fields depends on the
values of “to DS” and “From DS” sub fields
SC (Sequence Control):
• This field defines the sequence number of the
frames for flow control.
Frame Body :
• This field can be between 0 bytes to 2312 bytes.
• This field contains the actual information based
on the values of the sub fields
FCS (Frame control Sequence):
• This field carries the 32 bit CRC for error
detection and Correction.
Visitwww.youtube.com/GURUKULAfor
LectureVideos
15. Addressing Mechanisms / Modes
• The values of the 4 Address fields will be decided based
on the values of “To DS” and “From DS”
Address 1:
• This field is always the address of next device
Address 2:
• This field is always the address of previous device
Address 3:
• This field is always the address of final destination if
it is not defined by address 1
Address 4:
• This field is always the address of Original Source if
it is not defined by address 2
ADDRESS REPRESENTS
1 Address of Next Device
2 Address of Previous device
3 Address of Final Destination
4 Address of Original Source
17. Case 1
• In this case the frame is not
going to DS (To DS =0) also
not coming from DS (From
DS =0)
• The frame is moving from
one station to another
station of same BSS without
passing through DS
Visit www.youtube.com/GURUKULA for Lecture Videos
18. Case 2
• In this case the frame is not
coming from DS (From DS
=0) and the frame is going
to DS (To DS =1)
• The frame comes from a
station and going to the AP
Visit www.youtube.com/GURUKULA for Lecture Videos
19. Case 3
• In this case the frame is
coming from DS (From DS
=1) and the frame is going to
DS (To DS =1)
• The frame comes from AP
of one BSS and going to the
AP of another BSS
Visit www.youtube.com/GURUKULA for Lecture Videos
20. Case 4
• In this case the frame is
coming from a DS (From
DS =1) and the frame is not
going to DS (To DS =0)
• The frame comes from AP
and going to the station
Visit www.youtube.com/GURUKULA for Lecture Videos
21. MAC Layers of 802.11
• The MAC sublayer contains 2 protocols
• Distributed Coordination Function – DCF
• Point Coordination Function – PCF
• These 2 protocols are related with the access methods of the standard
25. References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…