The document discusses key enhancements in 802.11n including:
- Increased throughput through wider channel bandwidth of 40MHz, higher order modulation like 64QAM, and multiple-input multiple-output (MIMO) with up to 4 antennas.
- MAC layer improvements such as aggregate MAC protocol data units (A-MPDU) and aggregate MAC service data units (A-MSDU) that bundle frames to improve efficiency.
- Modulation and coding scheme (MCS) indexes that specify data rates up to 600Mbps depending on configuration.
Enhanced Data rates for Global Evolution (EDGE)Ramrao Desai
Mobile users continue to demand higher data rates. With the continued growth in cellular services, laptop computer use and the Internet, wireless network providers are beginning to pay an increasing amount of attention to packet data networks. Enhanced Global Packet Radio Service (EGPRS) offers a substantial improvement in performance and capacity over existing GPRS services, in return for a relatively minimal additional investment. EGPRS, commonly called EDGE, achieves these enhancements to the GPRS system primarily by implementing changes to the Physical layer and to the Medium Access Control/Radio Link Control (MAC/RLC) layer. The significant improvements are a new modulation technique, additional modulation coding schemes, a combined Link Adaptation and Incremental Redundancy technique, re-segmentation of erroneously received packets, and a larger transmission window size.
Enhanced Data rates for Global Evolution (EDGE)Ramrao Desai
Mobile users continue to demand higher data rates. With the continued growth in cellular services, laptop computer use and the Internet, wireless network providers are beginning to pay an increasing amount of attention to packet data networks. Enhanced Global Packet Radio Service (EGPRS) offers a substantial improvement in performance and capacity over existing GPRS services, in return for a relatively minimal additional investment. EGPRS, commonly called EDGE, achieves these enhancements to the GPRS system primarily by implementing changes to the Physical layer and to the Medium Access Control/Radio Link Control (MAC/RLC) layer. The significant improvements are a new modulation technique, additional modulation coding schemes, a combined Link Adaptation and Incremental Redundancy technique, re-segmentation of erroneously received packets, and a larger transmission window size.
Physical channel - Each timeslot on a carrier is referred to as a physical channel. Per carrier there are 8 physical channels.
Logical channel - Variety of information is transmitted between the MS and BTS. There are different logical channels depending on the information sent. The logical channels are of two types
Traffic channel
Control channel
BCH Channels
BCCH( Broadcast Control Channel )
Downlink only
Broadcasts general information of the serving cell called System Information
BCCH is transmitted on timeslot zero of BCCH carrier
Read only by idle mobile at least once every 30 secs.
SCH( Synchronisation Channel )
Downlink only
Carries information for frame synchronisation. Contains TDMA frame number and BSIC.
FCCH( Frequency Correction Channel )
Downlink only.
Enables MS to synchronise to the frequency.
Also helps mobiles of the ncells to locate TS 0 of BCCH carrier.
RACH( Random Access Channel )
Uplink only
Used by the MS to access the Network.
AGCH( Access Grant Channel )
Downlink only
Used by the network to assign a signalling channel upon successfull decoding of access bursts.
PCH( Paging Channel )
Downlink only.
Used by the Network to contact the MS.
This documents will cover basic LTE principles along with some brief impression about LTE features. Additionally, LTE Link Budget, LTE Coverage & Capacity Planning and Cell Radius calculation methodology have been depicted comprehensively in this document.
Here you are an interesting explanation about HSPA Technology. The High Speed packet Access is the combination of two technologies, one of the downlink and the other for the uplink that can be built onto the existing 3G UMTS or W-CDMA technology to provide increased data transfer speeds.
The original 3G UMTS / W-CDMA standard provided a maximum download speed of 384 kbps.
Introduction
Channel Configuration
Idle Mode Operation
Protocols
Radio resources
Measurements
Power Control
HO process
Intelligent Underlay Overlay
Handover Support for Coverage Enhanchements
The extended cell
Dynamic Hotspot
Dual band GSM/DCS Network Operation
Half Rate
HSCSD
Engineer EMERSON EDUARDO RODRIGUES PRESENTA UNA NUEVA VERSION
THERE ONE NEW ONE PRESENTATION FOR 2G AND 3G ENGINEERING FOR LTE AND PSCORE ENGINEER
ITS VERY SUITABLE FOR YOUR RESEARCH AT ALL LEVELS OF RF ENGINEERING AND PS CS
Neighboring Wi-Fi networks, RF noise sources, and indoor and outdoor coverage patterns can all impact mobile device performance on WLANs. This session will give you a better understanding of radio coverage patterns for different types of antennas and covers related essentials in the Wi-Fi standard. Join us also to learn more about 802.11ac, multi-user MIMO and transmit beamforming with Wave 2, and more.
Physical channel - Each timeslot on a carrier is referred to as a physical channel. Per carrier there are 8 physical channels.
Logical channel - Variety of information is transmitted between the MS and BTS. There are different logical channels depending on the information sent. The logical channels are of two types
Traffic channel
Control channel
BCH Channels
BCCH( Broadcast Control Channel )
Downlink only
Broadcasts general information of the serving cell called System Information
BCCH is transmitted on timeslot zero of BCCH carrier
Read only by idle mobile at least once every 30 secs.
SCH( Synchronisation Channel )
Downlink only
Carries information for frame synchronisation. Contains TDMA frame number and BSIC.
FCCH( Frequency Correction Channel )
Downlink only.
Enables MS to synchronise to the frequency.
Also helps mobiles of the ncells to locate TS 0 of BCCH carrier.
RACH( Random Access Channel )
Uplink only
Used by the MS to access the Network.
AGCH( Access Grant Channel )
Downlink only
Used by the network to assign a signalling channel upon successfull decoding of access bursts.
PCH( Paging Channel )
Downlink only.
Used by the Network to contact the MS.
This documents will cover basic LTE principles along with some brief impression about LTE features. Additionally, LTE Link Budget, LTE Coverage & Capacity Planning and Cell Radius calculation methodology have been depicted comprehensively in this document.
Here you are an interesting explanation about HSPA Technology. The High Speed packet Access is the combination of two technologies, one of the downlink and the other for the uplink that can be built onto the existing 3G UMTS or W-CDMA technology to provide increased data transfer speeds.
The original 3G UMTS / W-CDMA standard provided a maximum download speed of 384 kbps.
Introduction
Channel Configuration
Idle Mode Operation
Protocols
Radio resources
Measurements
Power Control
HO process
Intelligent Underlay Overlay
Handover Support for Coverage Enhanchements
The extended cell
Dynamic Hotspot
Dual band GSM/DCS Network Operation
Half Rate
HSCSD
Engineer EMERSON EDUARDO RODRIGUES PRESENTA UNA NUEVA VERSION
THERE ONE NEW ONE PRESENTATION FOR 2G AND 3G ENGINEERING FOR LTE AND PSCORE ENGINEER
ITS VERY SUITABLE FOR YOUR RESEARCH AT ALL LEVELS OF RF ENGINEERING AND PS CS
Neighboring Wi-Fi networks, RF noise sources, and indoor and outdoor coverage patterns can all impact mobile device performance on WLANs. This session will give you a better understanding of radio coverage patterns for different types of antennas and covers related essentials in the Wi-Fi standard. Join us also to learn more about 802.11ac, multi-user MIMO and transmit beamforming with Wave 2, and more.
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docxjessiehampson
MAT 510 – Homework Assignment
Homework Assignment 6
Due in Week 9 and worth 30 points
Suppose the number of equipment sales and service contracts that a store sold during the last six (6) months for treadmills and exercise bikes was as follows:
Equipment Sales and Service Contracts Sold
Treadmill
Exercise Bike
Total Sold
185
123
Service Contracts
67
55
The store can only sell a service contract on a new piece of equipment. Of the 185 treadmills sold, 67 included a service contract and 118 did not.
Complete the following questions in the space provided below:
1. Construct a 95 percent confidence interval for the difference between the proportions of service contracts sold on treadmills versus exercise bikes.
2. Is there a major difference between the two pieces of equipment? Why or why not?
Type your answers below and submit this file in Week 9 of the online course shell:
802.11 THROUGHPUT
comp40660 Assignment 1, February 2020
This assignment is worth 18% of the overall grade
Motivation
• Build a simple model of 802.11 frame exchange for TCP
and UDP, using OFDM of 802.11a and 802.11g
• The model will approximate the actual throughput of the
network
• RTS/CTS mechanism is enabled
• No contention
• Demonstration of the calculation for 802.11a – UDP case;
work on TCP case in lab.
• Assignment will be to modify for the .11g/n/ac/ax case for
both TCP and UDP.
802.11 Model
• Basic transactional model – 2 different transaction types, namely
UDP and TCP.
• Any 802.11 transmission of data (from higher layer) requires an
acknowledgement (ACK) by the .11 MAC.
• Each TCP / UDP packet is encapsulated in a single 802.11 frame.
Transport
Network
Data Link
Physical
Transport
Network
Data Link
PhysicalBits
Frame
Packet
Segment
802.11 Frame Exchange
UDP Case
• No guarantee of delivery
• Suitable for real-time applications such as VoIP, VoD
• UDP data encapsulated into 802.11 frame and
transmitted. Receiving station transmits 802.11 ACK.
Server Client
UDP
802.11 Frame Exchange
TCP Case
• Reliable delivery service guaranteeing that all bytes are
received and in correct order through TCP ACKs
• How is this different from the UDP case?
TCP
ACK
Server Client
Data Transmission
• 802.11 uses different inter-frame spaces:
• SIFS (Short Interframe Space)
• High-priority transmissions can begin once SIFS has elapsed
• ACK, RTS, CTS
• DIFS (DCF Interframe Space)
• Minimum idle time for contention-based services
• Stations can have access to the medium if it has been free for
a period longer than DIFS
Packet Headers
• 1500 bytes packet (TCP/UDP) is encapsulated:
• MAC header = 34 bytes
• SNAP LLC header = 8 bytes
• 3 bytes LLC (logical link control) header
• 5 bytes SNAP (sub-network access protocol) header
=> Total size = 1542 bytes
802.11a
• Amendment to the IEEE 802.11 specification
• 1999
• 5Ghz band
• Maximum data rate: 54 Mbps
• OFDM (Orthogonal Frequency Division.
The final thesis defense presentation for my master's project. The purpose of this thesis was to compare alternative wireless links for transfer of data from sink motes of remote wireless sensor networks to a central repository. A few different protocol stacks to be implemented in the WSN (Wireless Sensor Network) uplink gateway and along with them a few implementation environments based on open source software and low-power hardware were discussed. To facilitate measurements and experimental validation, some of the alternatives have been implemented. Experiments have been made using two of the amateur radio bands, the 144 MHz band (VHF) and the 433 MHz band (UHF). The parameters studied include throughput, range, power-requirements, portability and compatibility with standards.
Using different protocol stacks, different bands and sometimes different hardware 5 solutions were designed, implemented, tested and experimented with. Namely these solutions are called Radiotftp, Radiotftp_process, Radiotunnel, Soundmodem and APRX in this thesis.
After the implementation phase, there was an open-field experimentation to measure the aforementioned parameters. The tests were conducted in Riddarholmen, Stockholm of Sweden. These open-field experiments helped us obtain real-life measurements about power, throughput, stability etc. Experiments were conducted in a range of from a minimum of 2 meters to a maximum of 2.1 kilometers with some of the solutions.
In the end, some of these solutions proved themselves to be viable for the purpose of data communications for remote wireless sensor networks. Radiotftp gave the best throughput in both bands where it proved itself to be difficult to develop further applications. Radiotftp_process removed the necessity for a Linux running gateway machine but it was unable to work with faster baud rates. Radiotunnel opened up the path for a range of network applications to use radio links, but it also proved that it was unstable. On the other hand Soundmodem and APRX which were based on standard and open-source software proved that they were stable but rather slow. It was proven that every approach to problem has its advantages and disadvantages from different aspects such as throughput, range, power-requirements, portability and compatibility.
Presented virtually by Andy Sutton, Principal Network Architect, BT Technology on 06 Aug 2020.
Andy provides an update and review of the transformational plans, capabilities and outcomes from 5G deployments in the UK. 5G networks are already enabling a step change in the range and capability of innovative applications from IoT to robotics. That pace of change is due to accelerate as 5G moves from its initial enhanced mobile broadband phase to deliver ultra-reliable and low latency communications along with massive machine type connectivity.
*** SHARED WITH PERMISSION ***
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Contents
Key PHY Level 802.11n Features
Key PHY Changes which accounts for high throughput
20MHz and 40MHz bandwidth transmission
MCS rates
Short Guard Interval (400ns)
IEEE 802.11n MIMO OFDM
MAC level enhancements
A-MPDU
Block ACK
A-MSDU
Long NAV Protection
RIFS
IEs for 802.11n
3. HT: High Throughput
A-MPDU : Aggregate MAC Protocol Data Unit
A-MSDU : Aggregate MAC Service Data Unit
MCS : Modulation and Coding Scheme
RIFS : Reduced Inter frame Space
BA : Block Ack
L-LTF : Non-HT Long Training Field
L-STF : Non-HT Short Training Field
L-SIG : Non-HT Signal Field
HT-SIG : HT Signal Field
HT-GF-STF : HT Greenfield Short training field
Acronyms
4. Bandwidth expansion
Use of 4 more sub-carriers in 20MHz, increase rate by 8%
Maximum code rate increased to rate 5/6
increase data rate by 11% over .11a/g code
Channel Bonding
use 40Mhz channel and 108 data carriers increases rate by a factor of 2.25
Reduced Inter frame Spacing (RIFS)
Allows for a 2 use interval between successive transmissions from the same device
Short Guard Interval
Optional shortening of GI from 800 nsec to 400 nsec
Results in data rate increase of 11%
Some of the KEY PHY Changes
5. 3 modes of operation in 802.11n (distinguished by PLCP header)
Non-HT (Legacy)
Mixed Mode (mandatory)
Legacy portion of the preamble provides built in PHY protection
Allows mixture of legacy and 11n packets in one network
Avoids hidden node issues
However, the preamble length is increased
Greenfield Mode (Optional)
No Backward compatibility
Short and more efficient PLCP header
802.11n: Modes of Operation
6. PLCP header for different Modes
LEGACY COMPATIABLE
New in 11n
8. SiSo vs MiMo
Spatial Multiplexing
Independent paths between multiple antennas can be used to much greater effect than simply for
diversity to overcome RF loss
Spatial multiplexing uses independent spatial paths to send independent streams of information at
same time over the same frequencies
Streams will become combined as pass across channel
Receiver will separate and decode
9. Multiple Antenna Techniques
Adding antennas can increase capacity even though
antennas transmit and receive on same frequency band
simultaneously
Changes fundamental relationship between power and
capacity per second per Hz
2 techniques can be used to take advantage of multiple
streams.
Spatial Diversity
Spatial diversity techniques increase reliability and range
by sending/receiving redundant streams in parallel along
different spatial paths between transmit and receive
antennas
Use of extra paths improves reliability because unlikely all
of the paths will be degraded at the same time
Spatial diversity can also improve range and some
performance increase (gather larger amount of signal at
receiver)
802.11n PHY Layer Spatial Multiplexing
10. Modulation Technique:
Quadrature Amplitude Modulation (QAM)
The creation of symbols that are some combination of amplitude
and phase can carry the concept of transmitting more bits per symbol further.
This method is called quadrature amplitude modulation (QAM).
For example:
8-QAM uses four carrier phases plus two amplitude levels to transmit 3 bits per symbol.
Other popular variations are 16QAM, 64QAM, and 256QAM,
which transmit 4, 6, and 8 bits per symbol respectively.
18. Inter frame spacing(Time parameters)
Short interframe space (SIFS)
The SIFS is used for the highest-priority transmissions, such as RTS/CTS frames and positive
acknowledgments.
PCF interframe space (PIFS)
It is used by the PCF during contention-free operation. Stations with data to transmit in the
contention-free period can transmit after the PIFS has elapsed and preempt any contention-
based traffic.
DCF interframe space (DIFS)
The DIFS is the minimum medium idle time for contention-based services. Stations may have
immediate access to the medium if it has been free for a period longer than the DIFS.
19. Contention-Based Access
If the medium has been idle for longer than the DIFS, transmission can begin Immediately.
If the medium is busy, the station must wait for the channel to become idle.
802.11 If access is deferred, the station waits for the medium to become idle for the DIFS and prepares
for the exponential back-off procedure.
20. General MAC Frame
MAC Address of
wireless host AP RX
this frame
MAC Address of
wireless host AP TX
this frame.
Used only in AD-
HOC mode..
23. Beacon IE
Packet Info
Packet Number: 1
Flags: 0x00000000
Status: 0x00000000
Packet Length: 166
Timestamp: 12:20:21.404043500 01/09/2014
Data Rate: 2 1.0 Mbps
Channel: 11 2462MHz 802.11b
Signal Level: 100%
Signal dBm: -45
Noise Level: 100%
Noise dBm: -51
802.11 MAC Header
Version: 0 [0 Mask 0x03]
Type: %00 Management [0]
Subtype: %1000 Beacon [0]
Frame Control Flags: %00000000 [1]
0... .... Non-strict order
.0.. .... Non-Protected Frame
..0. .... No More Data
...0 .... Power Management - active mode
.... 0... This is not a Re-Transmission
.... .0.. Last or Unfragmented Frame
.... ..0. Not an Exit from the Distribution System
.... ...0 Not to the Distribution System
Duration: 0 Microseconds [2-3]
Destination: FF:FF:FF:FF:FF:FF [0-5]
Source: 00:A0:C6:E9:C1:F5 [6-11]
BSSID: 00:A0:C6:E9:C1:F5 [12-17]
Seq Number: 111 [18-19 Mask 0xFFF0]
Frag Number: 0 [18 Mask 0x0F]
802.11 Management - Beacon
Timestamp: 4198784 Microseconds [20-27]
Beacon Interval: 100 [28-29]
24. Capability Info: %0000010000100001 [30-31]
0....... ........ Immediate Block Ack Not Allowed
.0...... ........ Delayed Block Ack Not Allowed
..0..... ........ DSSS-OFDM is Not Allowed
...0.... ........ No Radio Measurement
....0... ........ APSD is not supported
.....1.. ........ G Mode Short Slot Time [9 microseconds]
......0. ........ QoS is Not Supported
.......0 ........ Spectrum Mgmt Disabled
........ 0....... Channel Agility Not Used
........ .0...... PBCC Not Allowed
........ ..1..... Short Preamble
........ ...0.... Privacy Disabled
........ ....0... CF Poll Not Requested
........ .....0.. CF Not Pollable
........ ......0. Not an IBSS Type Network
........ .......1 ESS Type Network
SSID
Element ID: 0 SSID [32]
Length: 10 [33]
SSID: Arun_kumar
Supported Rates
Element ID: 1 Supported Rates [44]
Length: 8 [45]
Supported Rate: 1.0 Mbps (BSS Basic Rate)
Supported Rate: 2.0 Mbps (BSS Basic Rate)
Supported Rate: 5.5 Mbps (BSS Basic Rate)
Supported Rate: 6.0 Mbps (Not BSS Basic Rate)
Supported Rate: 9.0 Mbps (Not BSS Basic Rate)
Supported Rate: 11.0 Mbps (BSS Basic Rate)
Supported Rate: 12.0 Mbps (Not BSS Basic Rate)
Supported Rate: 18.0 Mbps (Not BSS Basic Rate)
25. Aggregate-MSDU (A-MSDU)
All sub frames shares the common MAC header, AMSDU Frames considered as a single MPDU by the PHY-
Layer.
No check sum for individual sub frame, re-TX of complete sub frame is not possible.
An A-MSDU consists of multiple sub frames. Each sub frame of an AMSDU
has a sub header (Destination address, Source Address, Length), MSDU, and padding bytes.
26. All the sub frames share a common MAC header and frame check sequence (FCS)
which is calculated over all the sub frames and a common MAC header and then appended as the trailer.
Since there is no checksum for the individual sub frames, selective retransmission of corrupted sub frames is
not possible.
sub frames have the same sequence number & traffic identifier (TID) [2-3].
The maximum length of an A-MSDU frame can be 3839 or 7955 bytes.
This capability information is exchanged during the time of association.
Aggregate-MSDU (A-MSDU)
27. Aggregate-MPDU (A-MPDU)
First 4 bits in delimiters are reserved & currently not used.
MPDU length sub-field consist of 12 bits that are used for representing the length of current MPDU.
CRC calculation include reserved & length sub field.
Unique pattern is used to find next delimiter with minimal, computation is case of complete delimiter.
Padding append at end of each MPDU to make size a multiple of 4-bytes and padding bytes not necessary for
last MPDU.
Appending at the end of each
MPDU. Make size multiples of
4-bytes.
28. Aggregate-MPDU (A-MPDU)
In noisy environment it yields poor performance due to the lack of an individual FCS for each sub-frame.
On the other hand, A-MPDU is robust against errors due to the presence of individual CRC per MPDU and the
aggregated frame size can be up to 64 KB.
Advantage:
A-MSDU is very effective in ideal channel conditions due to lesser protocol overheads.