SlideShare a Scribd company logo
IEEE 802.11ah
TOPIC
1 IEEE 802.11ah
is the WLAN standard
operating under sub 1GHz
frequency range (about 900MHz). It
is designed to extend range of
existing 11ac wifi network
operating in 2.4/5GHz as well as to
utilize the emerging opportunities
in IoT(Internet of Things) space.
It will also be used for
home automation, smart grid,
low power sensors and
wearable consumer electronic
devices.
supports completely new
PHY(Physical) layer and
MAC(Medium Access Control)
layer. These have been described
below. Following table-1 mentions
802.11ah frequencies supported in
different parts of the world.
It supports various bandwidths
viz. 1MHz, 2MHz, 4MHz, 8MHz and 16MHz.
Hence it is considered to be 10 times
downclocked version of IEEE 802.11ac
standard. Like other wifi network, 802.11ah
network also consists of 11ah AP(Access
Point) and 11ah compliant devices such as
water meter, power meter, Gas meter as
well as systems compliant to IEEE
802.11ah protocol stack.
It has higher
frequency range.
The IEEE 802.11 is
easy to installation.
The IEEE 802.11 has
reduced wiring
expense.
Simultaneously use of
equipment. It use also
unlicensed part of the
radio spectrum.
1 There are some important advantages of IEEE 802.11 are given below,
It is less cost
effective
It has efficient coding
technique..
4 There are some disadvantages of IEEE 802.11 are given below,
1 IEEE 802.11ah sub GHz Wi-Fi basics
2 Challenges for IoT Applications and IEEE
802.11ah
In IEEE 802.11ah, the
extended range requirement is
fulfilled by introducing 1 MHz wide
transmission and by using a new
Modulation and Coding Scheme
(MCS) index (MCS10).
3 COVERAGE RANGE
The IEEE 802.11ah amendment is
intended to operate below 1 GHz which,
besides improved coverage, faces less
interference. This characteristic of the
IEEE 802.11ah appears particularly
attractive for IoT applications, where
hundreds or thousands of devices are
expected to coexist.
3 TIME AND FREQUENCY RESOURCES
1 SUPPORTING A LARGE NUMBER OF IOT DEVICES
1 LOW POWER CONSUMING
2 MAC LAYER
In 802.11 system, an AP allocates an identifier called Association
IDentifier (AID), to each station during the association stage [15]. In a given
network, AID is a unique ID, through which the AP can indicate its associated
stations. The possible number of associated stations of an AP is up to 2,007 in
legacy 802.11 standard due to the limited length of the partial virtual bitmap of
Traffic Indication Map (TIM) Information Element (IE), where each bit indicates
the corresponding station’s AID.
4
with power saving mode, a station alternates between
awake state and doze state, where the station in doze state turns
off the radio components such that it cannot sense incoming
signals at all. When there are packets destined to a station in doze
state, the AP buffers the packets until the station wakes up and
requests the delivery of the buffered traffic.
4 POWER SAVING
To make the non-TIM stations’ traffic under control, 802.11ah
AP can let them wake up at a predefined time so that the wake-up time
of these non-TIM stations and their channel access attempts could be
temporally spread out. To exchange the wake up timing information
between AP and stations, 802.11ah has defined an IE called Target
Wake Time (TWT) IE, which is exchanged by association request and
association response frames. In TWT IE, there are four fields, i.e.,
request type, target wake time, minimum wake duration, and wake
interval mantissa, which are used to determine when and how often a
station wakes up for downlink and/or uplink transmissions.
4 CHANNEL ACCESS
A major deficiency of 802.11ah is its low data rates, and to overcome it,
there have been many efforts on throughput enhancements.
The first intention was to design more compact frame formats to reduce protocol
overheads, and correspondingly, a more compact MAC header format has been
proposed. Compares the proposed short MAC header format and the legacy
802.11 MAC header format. For the downlink, the address 1, which is destination
MAC address in the legacy MAC header, is replaced with the AID of the
destination station in the short MAC header format. Similarly, in the case of
uplink, the address 2, which is the MAC address of source station in the legacy
MAC header, is replaced with the AID of source station in the short MAC header.
In addition, in the short MAC header, the sequence control field is moved before
address 3 field. The address 3 field is optionally included in the short MAC
header and its inclusion is indicated by the indication bit in Frame Control (FC)
field.
4
THROUGHPUT ENHANCEMENTS
3 Comparative Analysis of IEEE 802.11ah with Previous IEEE 802.11
Amendments
3 Comparative Analysis of IEEE 802.11ah with Previous
IEEE 802.11 Amendments
2 IOT APPLICATION
2 CONCLUSION
THANK YOU
MEMBERS:
ABLETES, CHARLES CHILLE
AGUSTIN, ELOISA MARIE
CURAMMENG, ALONA JANE
GALVAN, CYRUS KIM
MACAYSA, CZYRYL ANNE
PAGTACCUNAN, ROSHIELA MAE
IEEE 80211 ah

More Related Content

What's hot

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
Arnab Ghosal
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
Narendar Bogala
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
Viet Nguyen
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Faisal Mehmood
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
Tom Chou
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
WLAN
WLANWLAN
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
NetProtocol Xpert
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
Manje Gowda
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Ethernet
EthernetEthernet
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 

What's hot (20)

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
WLAN
WLANWLAN
WLAN
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Ethernet
EthernetEthernet
Ethernet
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 

Similar to IEEE 80211 ah

3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt
Kp Sharma
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt
Kp Sharma
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
 
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
cscpconf
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
802 tutorial
802 tutorial802 tutorial
802 tutorial
trimba
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
Sai Shankar
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
Sai Shankar
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
RESHAN FARAZ
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
DrAdeelAkram2
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Ashish Khare
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
IJERA Editor
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 

Similar to IEEE 80211 ah (20)

3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard: Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard:
 
Wifi wimax
Wifi wimaxWifi wimax
Wifi wimax
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
802 tutorial
802 tutorial802 tutorial
802 tutorial
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
Survey on mobile wimax
Survey on mobile wimaxSurvey on mobile wimax
Survey on mobile wimax
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

IEEE 80211 ah

  • 2. 1 IEEE 802.11ah is the WLAN standard operating under sub 1GHz frequency range (about 900MHz). It is designed to extend range of existing 11ac wifi network operating in 2.4/5GHz as well as to utilize the emerging opportunities in IoT(Internet of Things) space. It will also be used for home automation, smart grid, low power sensors and wearable consumer electronic devices. supports completely new PHY(Physical) layer and MAC(Medium Access Control) layer. These have been described below. Following table-1 mentions 802.11ah frequencies supported in different parts of the world. It supports various bandwidths viz. 1MHz, 2MHz, 4MHz, 8MHz and 16MHz. Hence it is considered to be 10 times downclocked version of IEEE 802.11ac standard. Like other wifi network, 802.11ah network also consists of 11ah AP(Access Point) and 11ah compliant devices such as water meter, power meter, Gas meter as well as systems compliant to IEEE 802.11ah protocol stack.
  • 3. It has higher frequency range. The IEEE 802.11 is easy to installation. The IEEE 802.11 has reduced wiring expense. Simultaneously use of equipment. It use also unlicensed part of the radio spectrum. 1 There are some important advantages of IEEE 802.11 are given below, It is less cost effective It has efficient coding technique..
  • 4. 4 There are some disadvantages of IEEE 802.11 are given below,
  • 5. 1 IEEE 802.11ah sub GHz Wi-Fi basics
  • 6. 2 Challenges for IoT Applications and IEEE 802.11ah
  • 7. In IEEE 802.11ah, the extended range requirement is fulfilled by introducing 1 MHz wide transmission and by using a new Modulation and Coding Scheme (MCS) index (MCS10). 3 COVERAGE RANGE
  • 8. The IEEE 802.11ah amendment is intended to operate below 1 GHz which, besides improved coverage, faces less interference. This characteristic of the IEEE 802.11ah appears particularly attractive for IoT applications, where hundreds or thousands of devices are expected to coexist. 3 TIME AND FREQUENCY RESOURCES
  • 9. 1 SUPPORTING A LARGE NUMBER OF IOT DEVICES
  • 10. 1 LOW POWER CONSUMING
  • 12. In 802.11 system, an AP allocates an identifier called Association IDentifier (AID), to each station during the association stage [15]. In a given network, AID is a unique ID, through which the AP can indicate its associated stations. The possible number of associated stations of an AP is up to 2,007 in legacy 802.11 standard due to the limited length of the partial virtual bitmap of Traffic Indication Map (TIM) Information Element (IE), where each bit indicates the corresponding station’s AID. 4
  • 13. with power saving mode, a station alternates between awake state and doze state, where the station in doze state turns off the radio components such that it cannot sense incoming signals at all. When there are packets destined to a station in doze state, the AP buffers the packets until the station wakes up and requests the delivery of the buffered traffic. 4 POWER SAVING
  • 14. To make the non-TIM stations’ traffic under control, 802.11ah AP can let them wake up at a predefined time so that the wake-up time of these non-TIM stations and their channel access attempts could be temporally spread out. To exchange the wake up timing information between AP and stations, 802.11ah has defined an IE called Target Wake Time (TWT) IE, which is exchanged by association request and association response frames. In TWT IE, there are four fields, i.e., request type, target wake time, minimum wake duration, and wake interval mantissa, which are used to determine when and how often a station wakes up for downlink and/or uplink transmissions. 4 CHANNEL ACCESS
  • 15. A major deficiency of 802.11ah is its low data rates, and to overcome it, there have been many efforts on throughput enhancements. The first intention was to design more compact frame formats to reduce protocol overheads, and correspondingly, a more compact MAC header format has been proposed. Compares the proposed short MAC header format and the legacy 802.11 MAC header format. For the downlink, the address 1, which is destination MAC address in the legacy MAC header, is replaced with the AID of the destination station in the short MAC header format. Similarly, in the case of uplink, the address 2, which is the MAC address of source station in the legacy MAC header, is replaced with the AID of source station in the short MAC header. In addition, in the short MAC header, the sequence control field is moved before address 3 field. The address 3 field is optionally included in the short MAC header and its inclusion is indicated by the indication bit in Frame Control (FC) field. 4 THROUGHPUT ENHANCEMENTS
  • 16. 3 Comparative Analysis of IEEE 802.11ah with Previous IEEE 802.11 Amendments
  • 17. 3 Comparative Analysis of IEEE 802.11ah with Previous IEEE 802.11 Amendments
  • 20. THANK YOU MEMBERS: ABLETES, CHARLES CHILLE AGUSTIN, ELOISA MARIE CURAMMENG, ALONA JANE GALVAN, CYRUS KIM MACAYSA, CZYRYL ANNE PAGTACCUNAN, ROSHIELA MAE