The document discusses the 802.11 MAC protocol and mobility management in wireless networks. It describes the CSMA/CA protocol used in 802.11, including carrier sensing, random backoff, and acknowledgements. It also covers mobility management principles like home and foreign agents, care-of addresses, and indirect routing using tunneling between home and foreign agents. Triangle routing is identified as an issue when a mobile node visits a correspondent's network.
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...MNIT Jaipur
IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 14, NO. 1, FEBRUARY 1998
PPT ON Wireless Communications and a Priority
Access Protocol for Multiple Mobile
Terminals in Factory Automation
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
A Virtual Circuit is a circuit used in transportation of data over a packet switch networks.
Virtual Circuit appears as if there is a physical path established between and source and destination so that all packets(data) can be routed over that path during the transmission
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...MNIT Jaipur
IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 14, NO. 1, FEBRUARY 1998
PPT ON Wireless Communications and a Priority
Access Protocol for Multiple Mobile
Terminals in Factory Automation
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
A Virtual Circuit is a circuit used in transportation of data over a packet switch networks.
Virtual Circuit appears as if there is a physical path established between and source and destination so that all packets(data) can be routed over that path during the transmission
Multiple Access Control Protocol allows several terminals connected to the same multi-point transmission medium (Broadcast network ) to transmit over it and to share its capacity.
Examples of shared physical media are wireless networks, bus networks, ring networks and point-to-point links operating in half-duplex mode.
These slides cover a topic on X.25, Frame relay and ATM in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
Multiple Access Control Protocol allows several terminals connected to the same multi-point transmission medium (Broadcast network ) to transmit over it and to share its capacity.
Examples of shared physical media are wireless networks, bus networks, ring networks and point-to-point links operating in half-duplex mode.
These slides cover a topic on X.25, Frame relay and ATM in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
For a college course at Coastline Community College taught by Sam Bowne. Details at https://samsclass.info/125/125_F17.shtml
Based on: "CISSP Study Guide, Third Edition"; by Eric Conrad, Seth Misenar, Joshua Feldman; ISBN-10: 0128024372
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2. The 802.11 MAC Protocol
• 3 classes of multiple access protocol
1. Channel partitioning
2. Random Access
3. Taking Turns
• Random access was chosen which is know as CSMA with collision avoidance
(CSMA/CA)
• CSMA : carrier sense multiple access
3. Ethernet Vs 802.11(aka Wifi)
• Ethernet collision detection
• An Ethernet station listens to the channel as it transmits. If, while transmitting, it
detects that another station is also transmitting, it aborts its transmission and tries to
transmit again after waiting a small, random amount of time
• 802.11 MAC doesn’t implement CD ( collision detection)
• For CD , ability to send and receive at same time is required which is costly in 802.11
adapter
• Even if it is build; due to hidden terminal all collisions will not be detected
4. 802.11 MAC
• once a station begins to transmit a frame, it transmits the frame in its entirety
• Link layer acknowledgment
• Receiver will send an ACK after a short period of time known as Short Inter-frame
Spacing (SIFS)
• If the transmitting station does not receive an acknowledgment within a given amount
of time, it assumes that an error has occurred and retransmits the frame
• If an ACK is not received after some fixed number of retransmissions, the transmitting
station gives up and discards the frame
5.
6. 802.11 CSMA/CA protocol
1. If station sense channel idle; it will transmit after a short period of time
Distributed Inter-frame Space (DIFS)
2. Otherwise, the station chooses a random backoff value. Counts down this
values when channel is idle, if channel is busy value will remain frozen
3. When value counter is zero ( channel is idle) transmit entire frame and wait
for ACK
4. If ACK received , start process for second frame from step 2. If not
received station chooses a backoff value with larger interval
7. Why DIFS
• Why not immediate action when channel is idle
• Compare strategy with Ethernet Collision detection
10. Issues with RTS
• Collision can occur on RTS
• Delay will added in the system
• RTS should only be used for long data frames.
• In practice, each wireless station can set an RTS threshold such that the
RTS/CTS sequence is used only when the frame is longer than the threshold
12. Bluetooth
• to replace the cables used on mobile devices with radio frequency waves
• Each Bluetooth device comprises a 9x9 mm chip which enables it to
communicate with other
• Bluetooth uses the 2.45 GHz frequency band
• A Bluetooth piconet is a collection of devices connected via Bluetooth
technology in an ad hoc fashion
16. Mobility management Principles
• If a node can maintain its IP then mobility becomes invisible from the
application standpoint
• Example of an adult living at different places at different times
17. Terminologies
• the permanent home of a mobile node (such as a laptop or smartphone) is known
as the home network
• the entity within the home network that performs the mobility management
functions is known as the home agent
• The network in which the mobile node is currently residing is known as the foreign
(or visited) network
• the entity within the foreign network that helps the mobile node with the mobility
management functions discussed below is known as a foreign agent
• A correspondent is the entity wishing to communicate with the mobile node
18.
19. Mobility management
• How network will know about mobile node’s current address
• COA ( care of address) will be created by foreign agent
• Foreign agent will inform home agent
• Sometimes mobile node acts as foreign agent (DHCP protocol)
• How data will be forwarded to mobile node from correspondent
20.
21. Indirect Routing summary
• A mobile-node–to–foreign-agent protocol. The mobile node will register with the foreign agent when
attaching to the foreign network. Similarly, a mobile node will deregister with the foreign agent
when it leaves the foreign network.
• A foreign-agent–to–home-agent registration protocol. The foreign agent will register the mobile node’s
COA with the home agent. A foreign agent need not explicitly deregister a COA when a
mobile node leaves its network, because the subsequent registration of a new COA, when the
mobile node moves to a new network, will take care of this.
• A home-agent datagram encapsulation protocol. Encapsulation and forwarding of the
correspondent’s original datagram within a datagram addressed to the COA.
• A foreign-agent decapsulation protocol. Extraction of the correspondent’s original datagram from
the encapsulating datagram, and the forwarding of the original datagram to the mobile node.
22. Triangle routing problem
• Imagine a scenario where mobile node visiting correspondent network
• Direct routing is the solution
• Correspondent first learns about COA of mobile node from home agent
23.
24. Mobile Routing
• Mobile user location protocol
• Mobile node move from one foreign network to other
• Anchor Foreign agent
• the foreign agent in that foreign network where the mobile node was first found