Wireless communication is one of the fastest-growing technologies.
The demand for connecting devices without the use of cables is increasing everywhere.
Wireless LANs can be found on college campuses, in office buildings, and in many public areas
Hamdard University Bangladesh provides an introduction to IEEE 802.11 wireless LAN specifications. It defines two types of MAC sublayer services and describes the distribution coordination function which allows stations to transmit if the medium is idle or wait until the current transmission is complete if busy. It also discusses the point coordination function implemented in infrastructure networks which uses repetition intervals for contention-free transmissions.
This includes description about what is ATM, its definition, layers, applications, working procedure, format type, available data bit rates, necessity of ATM, benefits & difference between Internet & ATM Network.
An Ethernet frame contains 6 segments: the preamble, destination and source addresses, type/length field, data/payload, and frame check sequence. It can carry higher-level network protocols like IP packets. The frame always refers to the physical transmission medium, while a packet can be transmitted over different mediums. Jumbo frames are larger than the standard 1500 byte frame size and introduce VLAN tagging to identify specific VLANs and prioritize traffic between interconnected devices.
There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
Bluetooth is a wireless technology standard used for exchanging data over short distances between devices like mobile phones, laptops, headphones, and other electronic devices. It uses short-wavelength UHF radio waves in the industrial, scientific and medical (ISM) band from 2.4 to 2.485 GHz. Bluetooth architecture defines two network types: piconets, which can have up to 8 connected devices, and scatternets, which allow connection between multiple piconets. Bluetooth uses a layered protocol stack including physical, baseband, and logical link control and adaptation protocol (L2CAP) layers.
Dynamic routing is necessary for large networks to automatically update routing tables when network changes occur. However, dynamic routing introduces security problems that need to be addressed. The document discusses static and dynamic routing, routing tables, common routing algorithms, and the need for a new secure routing algorithm that can adapt to topology changes while protecting sensitive network information from hackers.
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
Hamdard University Bangladesh provides an introduction to IEEE 802.11 wireless LAN specifications. It defines two types of MAC sublayer services and describes the distribution coordination function which allows stations to transmit if the medium is idle or wait until the current transmission is complete if busy. It also discusses the point coordination function implemented in infrastructure networks which uses repetition intervals for contention-free transmissions.
This includes description about what is ATM, its definition, layers, applications, working procedure, format type, available data bit rates, necessity of ATM, benefits & difference between Internet & ATM Network.
An Ethernet frame contains 6 segments: the preamble, destination and source addresses, type/length field, data/payload, and frame check sequence. It can carry higher-level network protocols like IP packets. The frame always refers to the physical transmission medium, while a packet can be transmitted over different mediums. Jumbo frames are larger than the standard 1500 byte frame size and introduce VLAN tagging to identify specific VLANs and prioritize traffic between interconnected devices.
There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
Bluetooth is a wireless technology standard used for exchanging data over short distances between devices like mobile phones, laptops, headphones, and other electronic devices. It uses short-wavelength UHF radio waves in the industrial, scientific and medical (ISM) band from 2.4 to 2.485 GHz. Bluetooth architecture defines two network types: piconets, which can have up to 8 connected devices, and scatternets, which allow connection between multiple piconets. Bluetooth uses a layered protocol stack including physical, baseband, and logical link control and adaptation protocol (L2CAP) layers.
Dynamic routing is necessary for large networks to automatically update routing tables when network changes occur. However, dynamic routing introduces security problems that need to be addressed. The document discusses static and dynamic routing, routing tables, common routing algorithms, and the need for a new secure routing algorithm that can adapt to topology changes while protecting sensitive network information from hackers.
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
This document provides an introduction to the IEEE 802.11 wireless LAN standard. It outlines the standard's architecture including components like stations, basic service sets, extended service sets, and access points. It describes the medium access control sublayer which uses distributed coordination function and point coordination function to provide reliable data delivery and fair medium sharing. It also briefly discusses the physical layer and typical wireless LAN products.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
- A switch is a multi-input, multi-output device that transfers packets from an input to one or more outputs, allowing links to be interconnected to form a larger network.
- There are two main types of switching: circuit switching establishes a dedicated end-to-end path before information transfer, while packet switching involves intermediate nodes storing incoming data blocks and retransmitting them along the path to the destination.
- X.25 is a widely used packet switching protocol that defines how a terminal connects to a packet network and how packets are exchanged over that network using devices like modems and packet switches.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
The document summarizes several IEEE 802 standards for local area networks (LANs):
- IEEE 802 defines the LLC and MAC sublayers for LANs. IEEE 802.3 specifies Ethernet LANs using CSMA/CD. IEEE 802.5 specifies Token Ring LANs.
- IEEE 802.3 Ethernet uses CSMA/CD where computers listen for traffic before transmitting and can detect collisions.
- IEEE 802.5 Token Ring LANs use a token passing protocol where a token circulates and only the computer holding the token can transmit.
Frame Relay is a virtual circuit wide-area network technology designed in the late 1980s that operates at the physical and data link layers. It allows for bursty data transmission and higher transmission speeds than traditional WANs. Frame Relay uses virtual circuits identified by a Data Link Connection Identifier (DLCI) to transmit data between nodes. It supports both permanent virtual circuits (PVCs) and switched virtual circuits (SVCs). Asynchronous Transfer Mode (ATM) is a network protocol that transmits data in fixed length cells over virtual paths and circuits to provide connection-oriented services between endpoints.
Here are the solutions to the examples:
Example 21.5:
Let f(x) = x^3 - 3x^2 + 2x. Then,
f'(x) = 3x^2 - 6x + 2.
Example 21.6:
Let f(x) = 5x - 3. Then,
f'(x) = 5.
Example 21.7:
Let f(x) = sqrt(x). Then,
f'(x) = 1/(2sqrt(x)).
This chapter discusses high-speed local area networks (LANs) that have emerged to support the increasing computing power and data storage needs of modern networks. It describes technologies like Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet that operate at speeds of 100 Mbps, 1 Gbps, and 10 Gbps respectively over twisted pair and fiber cables. It also discusses Fibre Channel, a high-speed network technology that connects storage devices and provides higher performance than traditional Ethernet networks. Bridges, switches, hubs, and routers are covered as methods to interconnect multiple LANs and networks at different speeds.
Packet switching involves dividing data into packets that are transmitted through a network independently and reassembled at the destination. The X.25 protocol, developed in the 1960s, was one of the first standards used for packet switching networks. It establishes virtual circuits between nodes to transmit packets reliably while providing billing based on connection time. While widely used historically, X.25 has limitations for modern high-speed networks due to its overhead and lower transmission speeds compared to newer protocols like ATM and Frame Relay.
SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODELHamna Shahzad
- LAN switching operates at layers 2, 3, and 4 of the OSI model. Layer 2 switching provides hardware-based bridging and low latency. Layer 3 switching determines paths based on logical addressing. Layer 4 switching allows prioritizing data traffic by application for quality of service.
- Fast Ethernet provides data transmission at 100 megabits per second, compared to regular Ethernet which transmits at 10 megabits per second. Fast Ethernet uses category 5 or higher cables and a switch architecture.
- Ethernet operates at the data link and physical layers of the OSI model. The MAC sublayer prepares data for transmission and the LLC sublayer provides independence from physical hardware and communicates with upper layers.
Ec8004 wireless networks unit 1 hiperlan 2HemalathaR31
HIPERLAN2 is a wireless network standard that operates at 5GHz, offering data rates up to 54Mbps. It supports quality of service, security, and mobility. There are two modes of operation: centralized, where devices connect through an access point, and direct, for device-to-device connections. The protocol stack includes physical, data link control, and convergence layers to interface with different network protocols like Ethernet, Firewire, and ATM. Handovers between access points can be done at the radio or network level.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
The document discusses the 8251A USART chip, which can be used for both asynchronous and synchronous serial communication. It describes the basic components and functions of the 8251A chip, including its transmitter and receiver sections that convert parallel to serial data and vice versa. The document also explains the differences between asynchronous and synchronous serial communication and covers various control signals and registers used by the 8251A for data transfer and interfacing with external devices like modems.
The document discusses routing protocols in mobile ad hoc networks. It describes the characteristics of ad hoc networks and why routing is different compared to traditional networks due to factors like host mobility and dynamic topology. The document categorizes and explains examples of different types of routing protocols including table-driven, on-demand, and hybrid protocols. It provides examples of specific protocols like DSDV, AODV, DSR, and ZRP and compares their key aspects.
The SONET standard includes four functional layers
They correspond to both the physical and the data link layers
Path layer
Line Layer
Section Layer
Photonic Layer
The document discusses several routing protocols for mobile ad hoc networks:
- DSR allows nodes to cache and share routing information for more efficient routing but has larger packet headers due to source routing. AODV uses only next hop information, keeping routing tables smaller.
- Both protocols use route discovery and maintenance, but AODV proactively refreshes routes while DSR reacts to failures. AODV also uses sequence numbers to prevent loops and choose fresher routes.
- Overall, DSR is better for networks where routes change infrequently while AODV scales better and maintains only active routes, at the cost of higher routing overhead during route discovery. Security remains a challenge for both protocols.
The document discusses IEEE 802.11 standards for wireless LANs. It describes the formation of the IEEE 802.11 working group in 1990 to develop wireless LAN MAC and physical specifications. It then summarizes key IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, and more recent standards. It provides an overview of IEEE 802.11 architecture including the basic service set, extended service set, and distribution system. It also discusses services provided at the MAC layer such as reliable data delivery, access control, and security.
IEEE 802.11 defines wireless local area networks. It uses CSMA/CA for media access and includes encryption. Wireless networks can operate in ad-hoc mode with no base station or in infrastructure mode with an access point. Infrastructure networks can connect multiple basic service sets to extend the network. Stations can have no, basic, or extended mobility between networks. Physical layer standards include FHSS, DSSS, OFDM, and their variants.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
This document provides an introduction to the IEEE 802.11 wireless LAN standard. It outlines the standard's architecture including components like stations, basic service sets, extended service sets, and access points. It describes the medium access control sublayer which uses distributed coordination function and point coordination function to provide reliable data delivery and fair medium sharing. It also briefly discusses the physical layer and typical wireless LAN products.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
- A switch is a multi-input, multi-output device that transfers packets from an input to one or more outputs, allowing links to be interconnected to form a larger network.
- There are two main types of switching: circuit switching establishes a dedicated end-to-end path before information transfer, while packet switching involves intermediate nodes storing incoming data blocks and retransmitting them along the path to the destination.
- X.25 is a widely used packet switching protocol that defines how a terminal connects to a packet network and how packets are exchanged over that network using devices like modems and packet switches.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
The document summarizes several IEEE 802 standards for local area networks (LANs):
- IEEE 802 defines the LLC and MAC sublayers for LANs. IEEE 802.3 specifies Ethernet LANs using CSMA/CD. IEEE 802.5 specifies Token Ring LANs.
- IEEE 802.3 Ethernet uses CSMA/CD where computers listen for traffic before transmitting and can detect collisions.
- IEEE 802.5 Token Ring LANs use a token passing protocol where a token circulates and only the computer holding the token can transmit.
Frame Relay is a virtual circuit wide-area network technology designed in the late 1980s that operates at the physical and data link layers. It allows for bursty data transmission and higher transmission speeds than traditional WANs. Frame Relay uses virtual circuits identified by a Data Link Connection Identifier (DLCI) to transmit data between nodes. It supports both permanent virtual circuits (PVCs) and switched virtual circuits (SVCs). Asynchronous Transfer Mode (ATM) is a network protocol that transmits data in fixed length cells over virtual paths and circuits to provide connection-oriented services between endpoints.
Here are the solutions to the examples:
Example 21.5:
Let f(x) = x^3 - 3x^2 + 2x. Then,
f'(x) = 3x^2 - 6x + 2.
Example 21.6:
Let f(x) = 5x - 3. Then,
f'(x) = 5.
Example 21.7:
Let f(x) = sqrt(x). Then,
f'(x) = 1/(2sqrt(x)).
This chapter discusses high-speed local area networks (LANs) that have emerged to support the increasing computing power and data storage needs of modern networks. It describes technologies like Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet that operate at speeds of 100 Mbps, 1 Gbps, and 10 Gbps respectively over twisted pair and fiber cables. It also discusses Fibre Channel, a high-speed network technology that connects storage devices and provides higher performance than traditional Ethernet networks. Bridges, switches, hubs, and routers are covered as methods to interconnect multiple LANs and networks at different speeds.
Packet switching involves dividing data into packets that are transmitted through a network independently and reassembled at the destination. The X.25 protocol, developed in the 1960s, was one of the first standards used for packet switching networks. It establishes virtual circuits between nodes to transmit packets reliably while providing billing based on connection time. While widely used historically, X.25 has limitations for modern high-speed networks due to its overhead and lower transmission speeds compared to newer protocols like ATM and Frame Relay.
SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODELHamna Shahzad
- LAN switching operates at layers 2, 3, and 4 of the OSI model. Layer 2 switching provides hardware-based bridging and low latency. Layer 3 switching determines paths based on logical addressing. Layer 4 switching allows prioritizing data traffic by application for quality of service.
- Fast Ethernet provides data transmission at 100 megabits per second, compared to regular Ethernet which transmits at 10 megabits per second. Fast Ethernet uses category 5 or higher cables and a switch architecture.
- Ethernet operates at the data link and physical layers of the OSI model. The MAC sublayer prepares data for transmission and the LLC sublayer provides independence from physical hardware and communicates with upper layers.
Ec8004 wireless networks unit 1 hiperlan 2HemalathaR31
HIPERLAN2 is a wireless network standard that operates at 5GHz, offering data rates up to 54Mbps. It supports quality of service, security, and mobility. There are two modes of operation: centralized, where devices connect through an access point, and direct, for device-to-device connections. The protocol stack includes physical, data link control, and convergence layers to interface with different network protocols like Ethernet, Firewire, and ATM. Handovers between access points can be done at the radio or network level.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
The document discusses the 8251A USART chip, which can be used for both asynchronous and synchronous serial communication. It describes the basic components and functions of the 8251A chip, including its transmitter and receiver sections that convert parallel to serial data and vice versa. The document also explains the differences between asynchronous and synchronous serial communication and covers various control signals and registers used by the 8251A for data transfer and interfacing with external devices like modems.
The document discusses routing protocols in mobile ad hoc networks. It describes the characteristics of ad hoc networks and why routing is different compared to traditional networks due to factors like host mobility and dynamic topology. The document categorizes and explains examples of different types of routing protocols including table-driven, on-demand, and hybrid protocols. It provides examples of specific protocols like DSDV, AODV, DSR, and ZRP and compares their key aspects.
The SONET standard includes four functional layers
They correspond to both the physical and the data link layers
Path layer
Line Layer
Section Layer
Photonic Layer
The document discusses several routing protocols for mobile ad hoc networks:
- DSR allows nodes to cache and share routing information for more efficient routing but has larger packet headers due to source routing. AODV uses only next hop information, keeping routing tables smaller.
- Both protocols use route discovery and maintenance, but AODV proactively refreshes routes while DSR reacts to failures. AODV also uses sequence numbers to prevent loops and choose fresher routes.
- Overall, DSR is better for networks where routes change infrequently while AODV scales better and maintains only active routes, at the cost of higher routing overhead during route discovery. Security remains a challenge for both protocols.
The document discusses IEEE 802.11 standards for wireless LANs. It describes the formation of the IEEE 802.11 working group in 1990 to develop wireless LAN MAC and physical specifications. It then summarizes key IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, and more recent standards. It provides an overview of IEEE 802.11 architecture including the basic service set, extended service set, and distribution system. It also discusses services provided at the MAC layer such as reliable data delivery, access control, and security.
IEEE 802.11 defines wireless local area networks. It uses CSMA/CA for media access and includes encryption. Wireless networks can operate in ad-hoc mode with no base station or in infrastructure mode with an access point. Infrastructure networks can connect multiple basic service sets to extend the network. Stations can have no, basic, or extended mobility between networks. Physical layer standards include FHSS, DSSS, OFDM, and their variants.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
A hub is a networking device that connects multiple devices on a local area network (LAN). It receives data packets through one port and broadcasts them to all other ports so all connected devices can see the packets. Hubs operate in half duplex mode and have no bandwidth management or collision detection. Switches are more advanced devices that can connect more devices than hubs. Switches have buffers and port-to-MAC address tables that allow them to send frames to specific ports faster than hubs. Routers connect multiple networks like LANs and WANs. Routers use IP addresses to route packets between networks and can run routing protocols to dynamically learn routes.
Network devices like hubs, switches, and routers connect computers in a network and help manage traffic flow. Hubs broadcast all received data to all ports but have limited bandwidth. Switches can connect more devices than hubs and have features like VLANs. Routers connect different networks and use IP addresses to direct traffic. Other devices like firewalls, VPNs, and IDS/IPS provide network security functions.
Ethernet protocols refer to the family of local-area network (LAN) standards covered by IEEE 802.3. Ethernet networks can operate in either half-duplex or full-duplex mode and support data rates of 10 Mbps, 100 Mbps, 1000 Mbps, and 10 Gbps. The basic elements of an Ethernet system are the physical medium, medium access control rules, and Ethernet frames. Ethernet frames contain fields for source and destination addresses, length/type, data, and error checking.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
Ethernet is a family of local area network (LAN) protocols that was first developed in 1976. It uses bus or star topologies and supports data transfer rates of 10/100/1000 Mbps. Fast Ethernet was developed to support higher speeds of 100 Mbps, while Gigabit Ethernet supports 1000 Mbps. Ethernet uses CSMA/CD to handle simultaneous transmission demands in half-duplex mode, while full-duplex mode allows simultaneous transmission in both directions. Token ring is another common LAN protocol that uses a token passing mechanism to control access instead of CSMA/CD.
- Wireless LANs use either wired or wireless infrastructure to connect computing devices within a local area. Wireless LANs provide flexibility, portability, mobility and ease of installation compared to wired LANs.
- The IEEE 802.11 standard defines the physical and data link layers for wireless LANs. It addresses issues like power management, security, and bandwidth that are important for wireless networks.
- The MAC layer uses either a contention-based distributed coordination function (DCF) or contention-free point coordination function (PCF). DCF uses CSMA/CA for channel access while PCF uses polling for contention-free access.
Ensure that only reliable networks are set up in your systems by listening to our short Webinar teaching you all about the basics of industrial ethernet communications and computer networking. Starting from the ground up, this presentation covers the basics of how network connections work, and how one computer talks to another.
CN 5151(15) Module I part 1.3 21072020.pdfADARSHN40
This document provides an overview of computer networks and wireless local area networks (WLANs). It discusses the TCP/IP model and layers, Ethernet protocols, wired and wireless LAN architectures and their differences. Wireless LAN characteristics like attenuation, interference and multipath propagation are described. The document also covers wireless LAN access control using CSMA/CA, the IEEE 802.11 project, services like BSS and ESS. Key components of a WLAN like the MAC sublayer, DCF, PCF, and common LAN connecting devices are summarized.
The document discusses IEEE standards for local area networks (LANs) including Ethernet LANs, Token Ring LANs, and wireless LANs. It describes the IEEE 802 standards family, common LAN topologies and cabling, how CSMA/CD and token protocols work, and comparisons of Ethernet and Token Ring technologies. It also outlines wireless LAN specifications including 802.11, 802.11a, 802.11b, and 802.11g.
Computer Communication Networks-Wireless LANKrishna Nanda
Wireless LANs allow hosts to connect to a network without being physically connected via cables. They use radio waves to transmit data through the air. Some key differences between wired and wireless LANs include the mobility of hosts in wireless LANs and the use of access points to connect wireless LANs to wired networks. Wireless LANs also face challenges from signal attenuation, interference, and multipath propagation that wired LANs do not. The IEEE 802.11 standard defines the specifications for wireless LANs, including using basic service sets and extended service sets to connect multiple wireless networks, and employing carrier sense multiple access with collision avoidance for medium access control.
802.11 wireless LANs provide network connectivity over wireless media using access points that act as bridges between wireless and wired networks. Access points are connected to the wired network and have antennas to provide wireless connectivity. The range of wireless connectivity depends on structural hindrances and the access point's antenna gain. Multiple access points with overlapping ranges can service larger areas. Common 802.11 standards include 802.11b, 802.11a, and 802.11g.
RUNNING HEAD: Integrative Network Design Project
Integrative Network Design Project
Student Name
Institute
Date
Class
Explain the network’s fundamental characteristics and components.
KFF Network Design Kudler Fine Foods (KFF) utilizes a direct transport topology comprising of a fundamental run of the link made of an eliminator at every end. The recording server, workstations, and peripherals are all joined with the direct link. Under the structural engineering of network utilized, it is anything but difficult to interface fringe or a PC to the straight transport, and it spares expenses included in obtaining links (Cisco Inc., 2000). Nonetheless, there are high information exchange rates because of utilization of Ethernet yet in the event that the direct link breaks, it stops the whole network. KFF's network permits imparting of assets, for example, printer, modems, and CD-ROM, which makes it less expensive to set up the network and save money on expenses. Additionally, arranged PCs have the capacity to impart concentrated key PC projects, for example, stock spreadsheets permitting clients to have the same program instead of duplicates of the project thus they can deal with the network all the while. Moreover, the network backings robotized unattended reinforcement of substance and assets that make it simple to reinforcement fundamental records without squandering time. Utilization of Ethernet in KFF guarantees that PCs listen to the link before transmitting information through the network.
Evaluate the current network topology
KFF utilizes an outdated network topology that ensures the hindrance of complete breakdown on the off chance that the spine straight link breaks. The Bus topology is constrained to obliging just a couple of PC and fringe parts and if a part falls flat, then the whole string fizzles. In this sort of network, it is difficult to focus the source reason for an issue in the event that it happens accordingly tedious as far as the issue distinguishing proof and determination. Nonetheless, the transport network topology appreciates quick, constant information correspondence and straightforward remote checking and administration of parts. The outline is shabby and simple to arrange. Regarding dependability, the transport topology is not dependable by any means. It emerges from information transmission style where information is engendered in the manifestation of electrical heartbeats. Fundamentally, when a hub transmits a progression of electrical heartbeats, the beats go in all headings along the bearer link and they keep going until they discover a part to assimilate them, or they debilitate in such a way, to the point that they are imperceptible. On the off chance that a sign experiences the end of a link, it bobs back until it is ingested. In this way, from transmission, information signs are transferred crosswise over transportation medium and are relied upon to go to both closures of the transport conse.
This document provides an overview of Ethernet network fundamentals, including:
- The OSI model layers that Ethernet operates in (physical and data link layers)
- Key components and functions of Ethernet including frames, addressing, and the CSMA/CD media access method
- The evolution of Ethernet from early implementations using coaxial cable to modern switched networks using fiber optics and speeds of 1Gbps+
- How MAC addresses are used to uniquely identify devices on an Ethernet network
The Collections Framework (java.util)- Collections overview, Collection Interfaces, The Collection classes- Array List, Linked List, Hash Set, Tree Set, Priority Queue, Array Deque. Accessing a Collection via an Iterator, Using an Iterator, The For-Each alternative, Map Interfaces and Classes, Comparators, Collection algorithms, Arrays, The Legacy Classes and Interfaces- Dictionary, Hashtable ,Properties, Stack, Vector More Utility classes, String Tokenizer, Bit Set, Date, Calendar, Random, Formatter, Scanner
The document discusses Java programming concepts of exception handling and multithreading. It covers exception types, try/catch/throw/throws/finally clauses, creating custom exceptions, and the Java thread model for creating and synchronizing threads. The document also provides example code and discusses checked and unchecked exceptions, nested try blocks, and inter-thread communication in Java.
This document provides an overview of packages, interfaces, and stream-based I/O in Java. It defines a package, discusses access protection and importing packages. Interfaces are introduced as a way to achieve multiple inheritance in Java. Key characteristics of interfaces like not allowing implementation and only containing abstract methods are described. The relationship between interfaces and abstract classes is compared. Common interfaces like Comparable are explained. Finally, stream-based I/O concepts like character streams, reading/writing files and serialization are listed as topics to be covered. Universities questions on these topics are also provided.
Object-Oriented Thinking- A way of viewing world – Agents and Communities, messages and methods, Responsibilities, Classes and Instances, Class Hierarchies- Inheritance, Method binding, Overriding and Exceptions, Summary of Object-Oriented concepts. Java buzzwords, An Overview of Java, Data types, Variables and Arrays, operators, expressions, control statements, Introducing classes, Methods and Classes, String handling.
Inheritance– Inheritance concept, Inheritance basics, Member access, Constructors, Creating Multilevel hierarchy, super uses, using final with inheritance, Polymorphism-ad hoc polymorphism, pure polymorphism, method overriding, abstract classes, Object class, forms of inheritance specialization, specification, construction, extension, limitation, combination, benefits of inheritance, costs of inheritance
JSP
The Anatomy of a JSP Page, JSP Processing, Declarations, Directives, Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and session for session tracking, connecting to database in JSP.
Servlet
Common Gateway Interface (CGI), Lifecycle of a Servlet, deploying a servlet, The Servlet API, Reading Servlet parameters, Reading Initialization parameters, Handling Http Request & Responses, Using Cookies and Sessions, connecting to a database using JDBC.
Introduction to XML, Defining XML tags, their attributes and values, Document Type Definition, XML Schemas, Document Object Model, XHTML Parsing XML Data - DOM and SAX Parsers in java.
Introduction to PHP: Declaring variables, data types, arrays, strings, operators, expressions, control structures, functions, Reading data from web form controls like text boxes, radio buttons, lists etc., Handling File Uploads, Connecting to database (MySQL as reference), executing simple queries, handling results, Handling sessions and cookies File Handling in PHP: File operations like opening, closing, reading, writing, appending, deleting etc. on text and binary files, listing directories
Machine-Independent Optimizations: The Principal Sources of Optimization, Introduction to Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial Redundancy Elimination, Loops in Flow Graphs
Run-Time Environments: Storage organization, Stack Allocation of Space, Access to Nonlocal Data on the Stack, Heap Management, Introduction to Garbage Collection, Introduction to Trace-Based Collection. Code Generation: Issues in the Design of a Code Generator, The Target Language, Addresses in the Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code Generator, Peephole Optimization, Register Allocation and Assignment, Dynamic Programming Code-Generation
Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for SDD's, Applications of Syntax-Directed Translation, Syntax-Directed Translation Schemes, and Implementing L-Attributed SDD's. Intermediate-Code Generation: Variants of Syntax Trees, Three-Address Code, Types and Declarations, Type Checking, Control Flow, Back patching, Switch-Statements
This document provides an overview of syntax analysis in compiler design. It discusses context-free grammars, top-down parsing including recursive descent and LL(1) parsing, and bottom-up parsing including LR parsing. It describes the key concepts of context-free grammars, ambiguous and unambiguous grammars. It explains top-down parsing as constructing a parse tree from the root node down and bottom-up parsing as building the tree from the leaf nodes up. It discusses the closure and goto operations used in LR parsing and describes the differences between LR(0), SLR, CLR, and LALR parsing techniques.
Introduction: Language Processors, the structure of a compiler, the science of building a compiler, programming language basics.
Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of Tokens, The Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based Pattern Matchers
The Secure Inter-branch Payment Transactions case study describes the current electronic payment system used by General Bank of India to transfer funds between branches, which utilizes a central server but lacks strong security. Improvements are needed to add encryption, digital signatures for non-repudiation, and a public key infrastructure to securely distribute keys. Cryptographic toolkits and smart cards could also be incorporated into the system to enhance security of financial transactions transmitted over the private network.
This document provides an overview of a university course on Cryptography and Network Security. It begins with the course syllabus, which outlines topics like security concepts, cryptography concepts and techniques, and types of security attacks. It then discusses key security concepts such as security services, security mechanisms, security attacks, and models for network and access security. It provides examples of security services like authentication, access control, and data confidentiality. It also describes security mechanisms and different classes of security attacks. The document concludes by listing reference books, online videos, related courses, tutorials, and sample multiple choice and problems related to cryptography and network security.
More from Jyothishmathi Institute of Technology and Science Karimnagar (20)
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
1. Wireless LANs
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of technology
and Science, karimnagar
2. ◼ Wireless communication is one of the fastest-
growing technologies.
◼ The demand for connecting devices without the use
of cables is increasing everywhere.
◼ Wireless LANs can be found on college campuses,
in office buildings, and in many public areas.
3. ◼ There are two promising wireless
technologies for LANs:
◼ IEEE 802.11 wireless LANs, sometimes called
wireless Ethernet
◼ Bluetooth, a technology for small wireless
LANs.
4. IEEE 802.11
IEEE has defined the specifications for a wireless
LAN, called IEEE 802.11
Architecture
MAC Sublayer
Topics discussed in this section:
5. Architecture
◼ The IEEE 802.11 standard defines two kinds of
architecture services:
➢ Basic service set (BSS)
➢ Extended service set (ESS).
6. Basic Service Set (BSS)
◼ IEEE 802.11 defines the Basic Service Set
(BSS) as the building block of a wireless
LAN.
◼ A Basic Service Set is made of mobile
wireless stations and an optional central base
station, known as the Access Point (AP).
◼ A BSS without an AP is called an adhoc
network ; a BSS with an AP is called an
infrastructure network.
7. A BSS without an AP is called an ad hoc
network;
a BSS with an AP is called an
infrastructure network.
Note
9. Extended Service Set
◼ An extended service set (ESS) is made up of two or
more BSSs with APs.
◼ In this case, the BSSs are connected through a
distribution system, which is usually a wired LAN.
◼ The distribution system connects the APs in the
BSSs.
◼ Note that the extended service set uses two types of
stations: mobile stations and stationary stations.
◼ The mobile stations are normal stations inside a
BSS.
◼ The stationary stations are AP stations that are part
of a wired LAN.
11. ◼ When BSSs are connected, the stations within
reach of one another can communicate
without the use of an AP.
◼ However, communication between two
stations in two different BSSs usually occurs
via two APs.
12. MAC Sub layer
◼ IEEE 802.11 defines two MAC sub layers:
Distributed Coordination Function (DCF)
Point Coordination Function (PCF).
◼ Figure below shows the relationship between
the two MAC sub layers, the LLC sub layer,
and the physical layer
14. Distributed Coordination Function
◼ One of the two protocols defined by IEEE
802.11 at the MAC sub layer is called the distributed
coordination function (DCF). DCF uses CSMA/CA
as the access method.
◼ DCF requires a station wishing to transmit to listen
for the channel status for a DIFS interval.
◼ In a network where a number of stations contend
for the wireless medium, if multiple stations sense
the channel busy and defer their access, they will
also virtually simultaneously wait for the channel
become idle and then try to seize the channel.
15. ◼ As a result, collisions may occur.
◼ In order to avoid such collisions, DCF also
specifies random back off, which forces a
station to defer its access to the channel for
an extra period.
◼ DCF also has an optional virtual carrier sense
mechanism that exchanges short Request-to-send
(RTS) and Clear-to-send (CTS) frames between
source and destination stations during the intervals
between the data frame transmissions.
16. ◼ DCF includes a positive acknowledge
scheme, which means that if a frame is
successfully received by the destination it is
addressed to, the destination needs to send an
ACK frame to notify the source of the
successful reception
17. Point Coordination Function (PCF).
◼ The point coordination function (PCF) is an
optional access method that can be implemented in
an infrastructure network.
◼ It is implemented on top of the DCF and is use
mostly for time-sensitive transmission.
◼ PCF has a centralized, contention-free polling
access method. The AP performs polling for stations
that are capable of being polled. The stations are
polled one after another, sending any data they have
to the AP.
19. ◼ Frame control field: The FC field is 2 bytes
long and defines the type of frame and some
control information.
◼ Duration field. This field is usually of 2 bytes
and defines the duration of the transmission
time of frame in micro seconds.
20. Addresses
◼ There are four address fields, each 6 bytes
long. The meaning of each address field are
◼ Address 1 always refers to the address of next
device .
◼ Address 2 always refers to the address of
previous device
◼ Address 3 always refers to the address of final
destination
◼ Address 4 always refers to the address of
source
21. ◼ Sequence control. This field defines the
sequence number of the frame to be used in
flow control.
◼ Frame body(data). This field, which can be
between 0 and 2312 bytes, contains
information based on the FC field.
◼ FCS. The FCS field is 4 bytes long and
contains a CRC-32 error detection sequence.
22. Types of frames
◼ A wireless LAN defined by IEEE 802.11 has
three categories of frames:
◼ Management frames
◼ Control frames
◼ Data frames.
23. Management Frames
◼ Management frames are used for the initial
communication between stations and access
points.
◼ Functions of this of frames are
➢ Request
➢ Response
➢ Authentication
➢ Re association
24. Control Frames
◼ Control frames are used for sending and
acknowledging frames.
➢ Request To Send
➢ Clear To Send
➢ Ack
Data Frames
Data frames are used for carrying actual data
25. BLUETOOTH
➢Bluetooth is a wireless LAN technology designed to
connect devices of different functions such as telephones,
notebooks, computers, cameras, printers, coffee makers,
and so on.
➢A Bluetooth LAN is an adhoc network, which means
that the network is formed spontaneously.
Architecture
Bluetooth Layers
Topics discussed in this section:
27. piconet
◼ A Bluetooth network is called a piconet, or a small
net.
◼ A piconet can have up to eight stations, one of which
is called the primary; the rest are called secondaries.
◼ All the secondary stations synchronize their clocks
with the primary.
◼ Note that a piconet can have only one primary
station.
◼ The communication between the primary and the
secondary can be one-to-one or one-to-many.
29. Scatternet
◼ Piconets can be combined to form what is called a
scatternet.
◼ A secondary station in one piconet can be the
primary in another piconet.
◼ This station can receive messages from the primary
in the first piconet (as a secondary) and, acting as a
primary, deliver them to secondary's in the second
piconet.
◼ A station can be a member of two piconets
31. Bluetooth Layers
◼ Bluetooth uses several layers those are
➢ Radio layer (physical layer)
➢ Base Band layer(data link layer)
➢ Middleware layer
➢ Application layer
32.
33. Radio layer
◼ The radio layer is roughly equivalent to the
physical layer of the Internet model.
◼ Bluetooth devices are low-power and have a
range of 10m with a frequency band of 2.4
GHz.
◼ This frequency band is divided into 79
channels of 1 MHz each.
34. ◼ The main function of radio layer is modulation
that is done using GFSK
(Gaussian frequency shift keying)
Gaussian frequency-shift keying (GFSK) is a type of frequency
shift keying modulation that uses a Gaussian filter to smooth
positive/negative frequency deviations, which represent a
binary 1 or 0.
◼ Bluetooth also uses the frequency-hopping
spread spectrum (FHSS) method in the radio
layer to avoid interference from other devices
or other networks.
35. Baseband Layer
◼ The baseband layer is roughly equivalent to the MAC sub
layer in LANs.
◼ The access method used is TDMA
◼ The primary and secondary communicate with each other
using time slots. The length of a time slot is 625
microsecond.
◼ This means that during this time a sender sends a frame to a
secondary, or a secondary sends a frame to the primary.
Note that the communication is only between the primary and
a secondary; secondary's cannot communicate directly with
one another.
36. Physical Links
◼ In base band layer the transmission of frames
is done using a logical channel called link
◼ Two types of links can be created between a
primary and a secondary:
➢ SCO (synchronous connection-oriented link)
➢ ACL(asynchronous connectionless link)
37. SCO (synchronous connection-oriented link)
◼ This type of radio link used for voice data.
◼ It is a point to point link i.e. link between
master and slave by reserving specific slots at
regular intervals
◼ SCQ is used forward error correction
mechanism to provide reliable transmission.
38. ACL(asynchronous connectionless link)
◼ It is a point to multi point link i.e a link
between a single master and all the slave in
the piconet.
◼ This link is used to transfer the data to and
from the above layer i.e L2CAP layer
◼ Since there is no connection between the
nodes there is a possibility of lost of frames
and might require retransmission.
39. L2CAP (Logical Link Control and Adaptation Protocol)
◼ It is used for data exchange on an ACL link.
◼ The L2CAP has specific duties:
➢ Multiplexing
➢ Segmentation And Reassembly,
➢ Quality Of Service (Qos)
➢ Group Management.
40. Multiplexing
◼ The L2CAP can do multiplexing.
◼ At the sender site, it accepts data from one of the
upper-layer protocols, frames them, and delivers
them to the baseband layer.
◼ At the receiver site, it accepts a frame from the
baseband layer, extracts the data, and delivers them
to the appropriate upper layer.
41. Segmentation and Reassembly
◼ The L2CAP divides these large frames into
segments and adds extra information to
define the location of the segments in the
original frame.
◼ The L2CAP segments the frame at the source
and reassembles them at the destination.
42. Quality Of Service (Qos)
◼ Bluetooth allows the stations to define a
quality-of-service level
◼ Qos is the idea that transmission rates, error
rates, can be measured, improved, and, to
some extent, guaranteed in advance.
43. Group Management
◼ Another functionality of L2CAP is to allow
devices to create a type of logical addressing
between themselves.
◼ This is similar to multicasting. For example,
two or three secondary devices can be part of
a multicast group to receive data from the
primary.
44. Link Manager Protocol
◼ This protocol is responsible for carrying out
link setup between the Bluetooth devices.
◼ It is also capable of controlling and
negotiating every aspect of the link between
master and slave.
◼ Functions of LMP are
➢ Authentication
➢ Pairing
➢ Encryption
➢ Synchronization
45. Middleware layer
◼ The layer above the data link layer is middle
ware layer
◼ This layer consists of the following protocols
➢ RFCOMM(Radio Frequency Communication)
➢ Service discovery protocol
➢ Telephony control service protocol
46. RFCOMM
◼ The Bluetooth protocol RFCOMM is a simple
set of transport protocol, made on top of the
L2CAP protocol, providing serial ports (up to
sixty simultaneous connections to a Bluetooth
device at a time).
◼ RFCOMM is sometimes called serial port
emulation.
47. Service discovery protocol
◼ The Bluetooth devices are supposed to work together
creating an adhoc network.
◼ There may be certain Bluetooth devices which wants to
provide service to other Bluetooth devices in its range.
◼ For this purpose Service Discovery Protocol (SDP) is used.
◼ The devices which provides services should have installed
SDP server on them.
◼ The devices which wants to take those services becomes SDP
client
◼ The SDP defines only discovery of services.
◼ The services discovered by clients are cached by them.
48. Telephony control service protocol
◼ It is a bit oriented protocol, defines the call
control signalling for the establishment of
voice calls between Bluetooth devices.
49. Application layer
◼ The top most layer protocol stack is the
application layer that consists of applications
(management applications) and profiles
(Management Application is the process of managing the
operation, maintenance, versioning and upgrading of
an application throughout its lifecycle)
◼ Profiles are associated with usage model used
by users for connection purpose.
50. Some of the profiles are
◼ Advanced Audio Distribution Profile (A2DP)
◼ Audio/Video Remote Control Profile
◼ Basic Printing Profile (BPP)
◼ Cordless Telephony Profile
◼ Fax Profile (FAX)
◼ File Transfer Profile
◼ Headset Profile (HSP)
◼ SIM Access Profile