SlideShare a Scribd company logo
QoS In WLAN

       BY
 WAQAS SHEHZAD
FAST NU PAKISTAN
Outline


 Introduction
 QoS Parameters.
 802.11 medium access control schemes
  (MAC).
 802.11e medium access control schemes
  (MAC).
 Conclusion.
 Reference.
Introduction

 What is 802.11?
 802.11 refers to a family of specifications
    developed by the IEEE for wireless LAN
    technology.
   802.11 Standards.
   1997 - 802.11 up to 2Mbps (900MHZ).
   1999 - 802.11b 2.4GHZ and up to 11Mbps.
   1999 – 802.11a 5GHZ and up to 54Mbps.
   200x – 802.11g 2.4GHZ and up to 54Mbps.
   200x – 802.11e for QoS.
Quality of Service (QoS)

   QoS is the capability to provide resource
    assurance in a network.
   QoS Parameters:
    Bandwidth.
    Delay.(how long it takes for a bit of data to travel
    across the network from one node or endpoint to
    another.)
    Packet loss rate.
    Jitter.
QoS in TP link wireless router



upload stream

   Download
IEEE 802.11e




               HCF Controlled Channel
               Access




                 Enhanced DCF Channel
                 Access
802.11 medium access control schemes (MAC).



   There are two basic medium
     access control (MAC) modes:
    Distributed Coordination
     Function (DCF).
    Point Coordination Function
     (PCF).
Distributed Coordination Function (DCF)


 Contention-Based.
 Based on Carrier Sense Multiple Access with
  Collision Avoidance (CSMA/CA) algorithm.
 Designed for a best-effort service.
 Supports Asynchronous transmission.
Limitation of Distributed Coordination Function
                      (DCF)

 Does not provide any QoS guarantees.
 Does not support real-time application.
 Designed for equal priorities.
 Does not support the concept of differentiating
 frames with different user priorities.
Point Coordination Function (PCF)


 Contention free-based.
 Uses a centralized polling scheme.
 Differentiation Considered based on priority.
 Supports synchronous transmission.
.
Limitation of Point Coordination Function (PCF)


   poor QoS performance.
   Uses a simple round-robin
    algorithm, which can not handle the
    various QoS requirements.
   Transmission time of the polled
    stations is unknown.
Hybrid Coordination Function (HCF)



There are two methods of channel
  access:
 Enhanced DCF channel access (EDCA).
 HCF controlled channel access
  (HCCA).
Enhanced DCF Channel Access (EDCA)


 Contention-Based channel access(many
  users to use the same radio channel
  without pre-coordination).
 Provides service differentiation.
 Classifies the traffic into 8 different
  classes.
 Each station has 4 access categories to
  provide service differentiation.
EDCA


    Priority      Access            Designation
               Category (AC)        (Informative)

0              0               Best Effort
1              0               Best Effort
2              0               Best Effort
3              1               Video Probe
4              2               Video
5              2               Video
6              3               Voice
7              3               Voice
HCF Controlled Channel Access ( HCCA)



 Provides Guaranteed Services with a
  much higher probability than EDCA.
 Combines the advantages of PCF and
  DCF.
 Coordinates the traffic in any fashion
  (not just round- robin).
Conclusion


 The IEEE 802.11 wireless LAN (WLAN) has
  become one of the most widely used wireless
  technologies in these days.
 The 802.11 standards can not provide any
  QoS guarantees due to poor performance.
 The 802.11e offers QoS support to time-
  sensitive applications, such as, audio and
  video communications.

More Related Content

What's hot

Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwarding
IJARIIT
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
United International University
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
IAESIJEECS
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Dhrumil Panchal
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Dheryta Jaisinghani
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC Layer
Mahdi Ahmed Jama
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
Wlan systems
Wlan systemsWlan systems
Wlan systems
DAVID RAUDALES
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Ramasubbu .P
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04
daniel ayalew
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
Tutun Juhana
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
Ami Prakash
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
Abhishek G
 

What's hot (17)

Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwarding
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC Layer
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
Wlan systems
Wlan systemsWlan systems
Wlan systems
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 

Similar to QoS in WLAN

An2418881897
An2418881897An2418881897
An2418881897IJMER
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
Seminar
SeminarSeminar
Seminar
cnnithin
 
Qos wlan
Qos wlanQos wlan
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
IJERA Editor
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
nandhakumar421744
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
ijsrd.com
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
Saikiran Panjala
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
stephen972973
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
silenceIT Inc.
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
Daniel Viveros Sepulveda
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Mumbai Academisc
 
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
IDES Editor
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
IJERA Editor
 
Darsh
DarshDarsh
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
DaisyWatson5
 
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLA NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
IAEME Publication
 

Similar to QoS in WLAN (20)

An2418881897
An2418881897An2418881897
An2418881897
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Seminar
SeminarSeminar
Seminar
 
Qos wlan
Qos wlanQos wlan
Qos wlan
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
 
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
Darsh
DarshDarsh
Darsh
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLA NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
 

More from 8neutron8

String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,8neutron8
 
Cloud computing by amazon
Cloud computing by amazonCloud computing by amazon
Cloud computing by amazon8neutron8
 
Max flow problem and push relabel algorithem
Max flow problem and push relabel algorithemMax flow problem and push relabel algorithem
Max flow problem and push relabel algorithem8neutron8
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation8neutron8
 
Cloud computing vs grid computing
Cloud computing vs grid computingCloud computing vs grid computing
Cloud computing vs grid computing8neutron8
 
Mobile os by waqas
Mobile os by waqasMobile os by waqas
Mobile os by waqas8neutron8
 

More from 8neutron8 (8)

String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,
 
Amortized
AmortizedAmortized
Amortized
 
Cloud computing by amazon
Cloud computing by amazonCloud computing by amazon
Cloud computing by amazon
 
Max flow problem and push relabel algorithem
Max flow problem and push relabel algorithemMax flow problem and push relabel algorithem
Max flow problem and push relabel algorithem
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation
 
Cloud computing vs grid computing
Cloud computing vs grid computingCloud computing vs grid computing
Cloud computing vs grid computing
 
Mobile os by waqas
Mobile os by waqasMobile os by waqas
Mobile os by waqas
 
Qos in wlan
Qos in wlanQos in wlan
Qos in wlan
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

QoS in WLAN

  • 1. QoS In WLAN BY WAQAS SHEHZAD FAST NU PAKISTAN
  • 2. Outline  Introduction  QoS Parameters.  802.11 medium access control schemes (MAC).  802.11e medium access control schemes (MAC).  Conclusion.  Reference.
  • 3. Introduction  What is 802.11?  802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology.  802.11 Standards.  1997 - 802.11 up to 2Mbps (900MHZ).  1999 - 802.11b 2.4GHZ and up to 11Mbps.  1999 – 802.11a 5GHZ and up to 54Mbps.  200x – 802.11g 2.4GHZ and up to 54Mbps.  200x – 802.11e for QoS.
  • 4. Quality of Service (QoS)  QoS is the capability to provide resource assurance in a network.  QoS Parameters: Bandwidth. Delay.(how long it takes for a bit of data to travel across the network from one node or endpoint to another.) Packet loss rate. Jitter.
  • 5. QoS in TP link wireless router upload stream Download
  • 6. IEEE 802.11e HCF Controlled Channel Access Enhanced DCF Channel Access
  • 7. 802.11 medium access control schemes (MAC). There are two basic medium access control (MAC) modes:  Distributed Coordination Function (DCF).  Point Coordination Function (PCF).
  • 8. Distributed Coordination Function (DCF)  Contention-Based.  Based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm.  Designed for a best-effort service.  Supports Asynchronous transmission.
  • 9. Limitation of Distributed Coordination Function (DCF)  Does not provide any QoS guarantees.  Does not support real-time application.  Designed for equal priorities.  Does not support the concept of differentiating frames with different user priorities.
  • 10. Point Coordination Function (PCF)  Contention free-based.  Uses a centralized polling scheme.  Differentiation Considered based on priority.  Supports synchronous transmission. .
  • 11. Limitation of Point Coordination Function (PCF)  poor QoS performance.  Uses a simple round-robin algorithm, which can not handle the various QoS requirements.  Transmission time of the polled stations is unknown.
  • 12. Hybrid Coordination Function (HCF) There are two methods of channel access:  Enhanced DCF channel access (EDCA).  HCF controlled channel access (HCCA).
  • 13. Enhanced DCF Channel Access (EDCA)  Contention-Based channel access(many users to use the same radio channel without pre-coordination).  Provides service differentiation.  Classifies the traffic into 8 different classes.  Each station has 4 access categories to provide service differentiation.
  • 14. EDCA Priority Access Designation Category (AC) (Informative) 0 0 Best Effort 1 0 Best Effort 2 0 Best Effort 3 1 Video Probe 4 2 Video 5 2 Video 6 3 Voice 7 3 Voice
  • 15. HCF Controlled Channel Access ( HCCA)  Provides Guaranteed Services with a much higher probability than EDCA.  Combines the advantages of PCF and DCF.  Coordinates the traffic in any fashion (not just round- robin).
  • 16. Conclusion  The IEEE 802.11 wireless LAN (WLAN) has become one of the most widely used wireless technologies in these days.  The 802.11 standards can not provide any QoS guarantees due to poor performance.  The 802.11e offers QoS support to time- sensitive applications, such as, audio and video communications.