尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
CSC 4315
(WIRELESS NETWORKS AND
PROTOCOLS)
LECTURE 5
Department of Maths and Computer-
Science
Faculty of Natural and Applied Science
BY
DR. BABANGIDA ALBABA
AND
UMAR DANJUMA MAIWADA
WIRELESS NETWORKS
 Wireless network is a network set up by using
radio signal frequency to communicate among
computers and other network devices. Sometimes
it's also referred to as WiFi network or WLAN. This
network is getting popular nowadays due to easy
to setup feature and no cabling involved.
 A wireless network is a computer network that
uses wireless data connections between network
nodes. Wireless networking is a method by which
homes, telecommunications networks and business
installations avoid the costly process of introducing
cables into a building, or as a connection between
various equipment locations. Wireless
telecommunications networks are generally
implemented and administered using radio
2
3
WIRELESS STANDARDS FOR DIFFERENT
NETWORK TYPES
4
WIRELESS PERSONAL AREA NETWORK
 Wireless Personal Area Network (WPAN) is a
computer network used for communication among
computer devices close to one person, typically a few
meters. PAN’s can be used for communication among
the personal devices themselves (intrapersonal
communication), or for connecting to a higher level
network and the Internet. PANs may be wired with
computer buses such as USB and FireWire.
 Common Wireless PAN technology standards include.
 Bluetooth (an industrial specification known as IEEE
802.15.1).
 HomeRF (developed by the Home Radio Frequency
Working Group)
 Infrared (developed by the Infrared Data Association
5
6
COMPARISON OF WPAN TECHNOLOGY
STANDARDS
7
WIRELESS LOCAL AREA NETWORK
 Wireless Local Area Network (WLAN) uses radio
communication to accomplish the same functionality as
a wired LAN i.e. connecting two or more computer
devices within a single room, building or site. WLANs
can have one of 3 architectures: Ad-hoc, Infrastructure
based, or Mesh network.
 An ad-hoc wireless network is a casual network in which
wireless devices talk directly to each other without the use
of an access point. An ad-hoc network can spring up
between two laptops in a coffee shop.
 In an infrastructure-mode wireless network, access
points connected to the wired network act as a bridge to
wireless clients. All wireless access points are connected to
the wired network and all wireless traffic travels to the wired
network on the way to its destination.
 Mesh networks use “smart” access points, which act as
8
9
ACCESS POINT
 An access point is a station that transmits and
receives data (sometimes referred to as a
transceiver).
 An access point connects users to other users
within the network and also can serve as the point
of interconnection between the WLAN and a fixed
wire network.
10
WIRELESS ACCESS POINT
 a wireless access point (WAP), or more generally just
access point (AP), is a networking hardware device
that allows other Wi-Fi devices to connect to a wired
network.
 Wireless Access Point (WAP) is a networking
hardware device that allows a Wi-Fi compliant device to
either:
 connect via Ethernet to a non wireless router and 'turn it into'
a wireless signal.
 connect via Ethernet to a wireless router, to provide a brand
new wireless signal.
 The WAP can also be an integral component of the
router itself i.e. a router can be a access point but an
access point cannot be a router.
 When an infrastructure-based WLAN expands to consist
of multiple access points on one logical network, it is
11
12
IEEE 802.11 WLAN STANDARDS
 These standards come from the Institute of
Electrical and Electronics Engineers (IEEE), which
only sets the specifications for the standards—it
doesn’t test individual wireless products for
compliance to these standards. That is normally
done by an organization called the Wi-Fi Alliance.
 The 2.4-GHz frequency band is appealing it is free.
But this also means there’s no central entity to
coordinate frequency use. Interference with other
2.4-GHz devices (e.g. baby monitor, and medical
equipment) can be a problem especially in urban
environments and apartment buildings. 13
14
WLAN PERFORMANCE
The problem of interference with nearby devices is extremely
variable. One network can experience serious slowdowns in an
environment that seems very similar to another wireless network
that’s operating perfectly.
 Most wireless vendors offer a software program that allows you
to monitor signal strength and connection speed. One way to
test for interference is to place an access point in your office,
insert a wireless card in your laptop, and then roam around to
evaluate the strength of the signal. This can reveal areas for
access points that offer strongest signal and fastest connection.
 Another way to minimize interference is to simply remove or
reposition the devices that cause it. Keep devices such as
microwave ovens at least six feet from access points. If you’re
having significant interference problems with the 2.4-GHz band,
it may be worthwhile to switch to 5-GHz.
 Some buildings provide special obstacles to wireless
transmission. For example solid stone walls or brick buildings
can interfere with wireless transmission. For this reason, a
15
CARRIER SENSE MULTIPLE ACCESS (CSMA)
 Carrier Sense Multiple Access (CSMA) is a
network protocol that listens to or senses network
signals on the carrier/medium before transmitting
any data.
 In order to avoid (or reduce) the possibility of
interference, the carrier sense multiple access
(CSMA) protocol was originally implemented is
used in WLAN network interface cards.
 With CSMA, a transmitter attempts to detect the
presence of a carrier signal from another node
before attempting to transmit. If a carrier is sensed,
the node waits for the transmission in progress to
end before initiating its own transmission.
16
17
18
CARRIER SENSE MULTIPLE ACCESS
COLLISION AVOIDANCE (CSMA/CA)
 Carrier-sense multiple access with collision
avoidance (CSMA/CA) in computer networking, is
a network multiple access method in which carrier
sensing is used, but nodes attempt to avoid
collisions by beginning transmission only after the
channel is sensed to be "idle".
 Carrier Sense Multiple Access/with Collision
Avoidance (CSMA/CA) is a network contention
protocol used for carrier transmission in networks
using the 802.11 standard. CSMA/CA increases
network traffic as it requires sending out a signal to
the network even before transmitting any real data.
 CSMA/CA has been used in a variety of wired
communication systems, it is particularly beneficial
in a wireless LAN due to a common problem of
19
LIMITATIONS OF CSMA/CA
 With CSMA alone, WLAN’s still experience two
major problems termed the Hidden Node and
Exposed Node Problems.
20
CSMA WITH COLLISION AVOIDANCE
(CSMA/CA)
 CSMA/CA uses control packets to improve network
performance
 As usual, all nodes sense carrier (physically) before
transmission. If channel is idle, a node uses control
packets (RTS and CTS) to set up communication
 All other nodes that hear the CTS broadcast know
that the sender will be busy for the indicated duration
21
22
CARRIER SENSE MULTIPLE ACCESS
COLLISION DETECTION (CSMA/CD)
 Carrier sense multiple access with collision detection or
CSMA/CD is a protocol (or rule) used by computer ethernet
networks. ... When this collision occurs, the computers
stop sending information, wait for a random amount of time,
and then check before resending the information.
 This is used in combination with collision detection in which
a transmitting station detects collisions by sensing
transmissions from other stations while it is transmitting a
frame.
 When this collision condition is detected, the station stops
transmitting that frame, transmits a jam signal, and then
waits for a random time interval before trying to resend the
frame.
 CSMA/CD is a modification of pure carrier-sense multiple
access (CSMA). CSMA/CD is used to improve CSMA
performance by terminating transmission as soon as a
23
WIRELESS METROPOLITAN AREA NETWORK
 Wireless metropolitan area networks (WMANs)
enable users to establish wireless connections
between multiple locations within a metropolitan
area (e.g., between multiple office buildings in a city
or on a university campus), without the high cost of
laying fiber or copper cabling and leasing lines.
 WMANs can also serve as backups for wired
networks, should the primary leased lines for wired
networks become unavailable. WMANs use either
radio waves or infrared light to transmit data.
24
25
WIMAX
 WiMAX (Worldwide Interoperability for Microwave
Access) is a family of wireless broadband
communication standards based on the IEEE 802.16 set
of standards, which provide multiple physical layer
(PHY) and Media Access Control (MAC) options.
 WiMAX is a family of wireless broadband
communication standards based on the IEEE 802.16 set
of standards, which provide multiple physical layer and
Media Access Control options.
 WiMAX refers to interoperable implementations of the
IEEE 802.16 family of wireless-networks standards
ratified by the WiMAX Forum. (Similarly, Wi-Fi refers to
interoperable implementations of the IEEE 802.11
Wireless LAN standards certified by the Wi-Fi Alliance.)
WiMAX Forum certification allows vendors to sell fixed
or mobile products as WiMAX certified, thus ensuring a
26
WMAN STANDARDS
 The major WMAN standards are: HiperMAN,
HiperACCESS, and 802.16 (more commonly known as
WiMAX). In practical terms, WiMAX would operate similar to
WiFi but at higher speeds, over greater distances and for a
greater number of users.
 A WiMAX system consists of two parts:
o A WiMAX tower, which is similar in concept to a cell-phone tower.
A single WiMAX tower can provide coverage to a very large area -
- as big as 3,000 square miles (~8,000 square km).
o A WiMAX receiver, which could be a small box or PCMCIA card,
or they could be built into a laptop the way WiFi access is today.
 A WiMAX tower station can connect directly to the Internet
using a highbandwidth, wired connection (for example, a T3
line). It can also connect to another WiMAX tower using a
line-of-sight, microwave link. This connection to a second
tower (often referred to as a backhaul), along with the
ability of a single tower to cover up to 3,000 square miles, is
what allows WiMAX to provide coverage to remote rural
areas.
27
TYPES OF WMAN
 There are two basic types of WMANs: Back haul
and Last mile.
 Back haul is an option for enterprises that can't afford
to install or lease fiber to connect their facilities over a
large campus or city.
 Last mile is used as an alternative to residential
broadband DSL/cable modem or Fibre. It is also handy
for temporary networks, such as large construction sites
or areas where network service is disrupted.
28
29
QUESTIONS
THANK YOU FOR YOUR ATTENTION !!!
30

More Related Content

What's hot

CCNA Report
CCNA ReportCCNA Report
CCNA Report
Abhishek Parihari
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
Vignesh kumar
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
Aniruddha Chakrabarti
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
Zigbee
ZigbeeZigbee
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
balu008
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
Nb iot presentation
Nb iot presentationNb iot presentation
Nb iot presentation
manoj pradhan
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
Damian Parniewicz
 
WiMAX
WiMAXWiMAX
Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)
Amarjeetsingh Thakur
 
Module 01 introduction to mobile computing (1)
Module 01   introduction to mobile computing (1)Module 01   introduction to mobile computing (1)
Module 01 introduction to mobile computing (1)
JIGNESH PATEL
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
Claisse Martinez
 
IPv6
IPv6IPv6
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
SHUBHAM MORGAONKAR
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
Vipul Kumar Maurya
 

What's hot (20)

CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Zigbee
ZigbeeZigbee
Zigbee
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
Nb iot presentation
Nb iot presentationNb iot presentation
Nb iot presentation
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
WiMAX
WiMAXWiMAX
WiMAX
 
Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)
 
Module 01 introduction to mobile computing (1)
Module 01   introduction to mobile computing (1)Module 01   introduction to mobile computing (1)
Module 01 introduction to mobile computing (1)
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
IPv6
IPv6IPv6
IPv6
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 

Similar to 0 lecture 5 wp wireless protocol

wifi-technology
 wifi-technology wifi-technology
wifi-technology
tardeep
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
NoorNawaz12
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
Sweta Kumari Barnwal
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Waleed Zafar
 
Unit 3
Unit 3Unit 3
Types of Network
Types of NetworkTypes of Network
Types of Network
Avishek Kar
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
computer network
computer networkcomputer network
computer network
RedHeart11
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
ijistjournal
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
ijistjournal
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Joe Christensen
 
Wi max by yogijicreations
Wi max by yogijicreationsWi max by yogijicreations
Wi max by yogijicreations
Yogiji Creations
 
Build Small Wireless LAN -CISCO ppt.pptx
Build Small Wireless LAN -CISCO ppt.pptxBuild Small Wireless LAN -CISCO ppt.pptx
Build Small Wireless LAN -CISCO ppt.pptx
MohammedAbdi44
 
Ccna
CcnaCcna

Similar to 0 lecture 5 wp wireless protocol (20)

wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Unit 3
Unit 3Unit 3
Unit 3
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
computer network
computer networkcomputer network
computer network
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Wi max by yogijicreations
Wi max by yogijicreationsWi max by yogijicreations
Wi max by yogijicreations
 
Build Small Wireless LAN -CISCO ppt.pptx
Build Small Wireless LAN -CISCO ppt.pptxBuild Small Wireless LAN -CISCO ppt.pptx
Build Small Wireless LAN -CISCO ppt.pptx
 
Ccna
CcnaCcna
Ccna
 

More from umardanjumamaiwada

Seminar Information Protection & Computer Security (Cryptography).pptx
Seminar Information Protection & Computer Security  (Cryptography).pptxSeminar Information Protection & Computer Security  (Cryptography).pptx
Seminar Information Protection & Computer Security (Cryptography).pptx
umardanjumamaiwada
 
Oop using JAVA
Oop using JAVAOop using JAVA
Oop using JAVA
umardanjumamaiwada
 
C++
C++ C++
Computer hardware
Computer hardware Computer hardware
Computer hardware
umardanjumamaiwada
 
2javascript web programming with JAVA script
2javascript web programming with JAVA script2javascript web programming with JAVA script
2javascript web programming with JAVA script
umardanjumamaiwada
 
1 web programming
1 web programming1 web programming
1 web programming
umardanjumamaiwada
 
0 csc 3311 slide internet programming
0 csc 3311 slide internet programming0 csc 3311 slide internet programming
0 csc 3311 slide internet programming
umardanjumamaiwada
 
0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol
umardanjumamaiwada
 
0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol
umardanjumamaiwada
 
0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol
umardanjumamaiwada
 
0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol
umardanjumamaiwada
 
0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol
umardanjumamaiwada
 
lecture 5
 lecture 5 lecture 5
lecture 5
umardanjumamaiwada
 
lecture 4
 lecture 4 lecture 4
lecture 4
umardanjumamaiwada
 
lecture 3
 lecture 3  lecture 3
lecture 3
umardanjumamaiwada
 
lecture 2
 lecture 2 lecture 2
lecture 2
umardanjumamaiwada
 
lecture 1
 lecture 1 lecture 1
lecture 1
umardanjumamaiwada
 
lecture 6
 lecture 6 lecture 6
lecture 6
umardanjumamaiwada
 
lecture 5
 lecture 5 lecture 5
lecture 5
umardanjumamaiwada
 
lecture 4
 lecture 4 lecture 4
lecture 4
umardanjumamaiwada
 

More from umardanjumamaiwada (20)

Seminar Information Protection & Computer Security (Cryptography).pptx
Seminar Information Protection & Computer Security  (Cryptography).pptxSeminar Information Protection & Computer Security  (Cryptography).pptx
Seminar Information Protection & Computer Security (Cryptography).pptx
 
Oop using JAVA
Oop using JAVAOop using JAVA
Oop using JAVA
 
C++
C++ C++
C++
 
Computer hardware
Computer hardware Computer hardware
Computer hardware
 
2javascript web programming with JAVA script
2javascript web programming with JAVA script2javascript web programming with JAVA script
2javascript web programming with JAVA script
 
1 web programming
1 web programming1 web programming
1 web programming
 
0 csc 3311 slide internet programming
0 csc 3311 slide internet programming0 csc 3311 slide internet programming
0 csc 3311 slide internet programming
 
0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol
 
0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol0 lecture 4 wp wireless protocol
0 lecture 4 wp wireless protocol
 
0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol0 lecture 3 wp wireless protocol
0 lecture 3 wp wireless protocol
 
0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol0 lecture 2 wp wireless protocol
0 lecture 2 wp wireless protocol
 
0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol0 lecture 1 wp wireless protocol
0 lecture 1 wp wireless protocol
 
lecture 5
 lecture 5 lecture 5
lecture 5
 
lecture 4
 lecture 4 lecture 4
lecture 4
 
lecture 3
 lecture 3  lecture 3
lecture 3
 
lecture 2
 lecture 2 lecture 2
lecture 2
 
lecture 1
 lecture 1 lecture 1
lecture 1
 
lecture 6
 lecture 6 lecture 6
lecture 6
 
lecture 5
 lecture 5 lecture 5
lecture 5
 
lecture 4
 lecture 4 lecture 4
lecture 4
 

Recently uploaded

Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
PJ Caposey
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
Celine George
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
Friends of African Village Libraries
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Non-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech ProfessionalsNon-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech Professionals
MattVassar1
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
Infosec
 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Catherine Dela Cruz
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
RuchiRathor2
 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
roshanranjit222
 

Recently uploaded (20)

Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Non-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech ProfessionalsNon-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech Professionals
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
 

0 lecture 5 wp wireless protocol

  • 1. CSC 4315 (WIRELESS NETWORKS AND PROTOCOLS) LECTURE 5 Department of Maths and Computer- Science Faculty of Natural and Applied Science BY DR. BABANGIDA ALBABA AND UMAR DANJUMA MAIWADA
  • 2. WIRELESS NETWORKS  Wireless network is a network set up by using radio signal frequency to communicate among computers and other network devices. Sometimes it's also referred to as WiFi network or WLAN. This network is getting popular nowadays due to easy to setup feature and no cabling involved.  A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio 2
  • 3. 3
  • 4. WIRELESS STANDARDS FOR DIFFERENT NETWORK TYPES 4
  • 5. WIRELESS PERSONAL AREA NETWORK  Wireless Personal Area Network (WPAN) is a computer network used for communication among computer devices close to one person, typically a few meters. PAN’s can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet. PANs may be wired with computer buses such as USB and FireWire.  Common Wireless PAN technology standards include.  Bluetooth (an industrial specification known as IEEE 802.15.1).  HomeRF (developed by the Home Radio Frequency Working Group)  Infrared (developed by the Infrared Data Association 5
  • 6. 6
  • 7. COMPARISON OF WPAN TECHNOLOGY STANDARDS 7
  • 8. WIRELESS LOCAL AREA NETWORK  Wireless Local Area Network (WLAN) uses radio communication to accomplish the same functionality as a wired LAN i.e. connecting two or more computer devices within a single room, building or site. WLANs can have one of 3 architectures: Ad-hoc, Infrastructure based, or Mesh network.  An ad-hoc wireless network is a casual network in which wireless devices talk directly to each other without the use of an access point. An ad-hoc network can spring up between two laptops in a coffee shop.  In an infrastructure-mode wireless network, access points connected to the wired network act as a bridge to wireless clients. All wireless access points are connected to the wired network and all wireless traffic travels to the wired network on the way to its destination.  Mesh networks use “smart” access points, which act as 8
  • 9. 9
  • 10. ACCESS POINT  An access point is a station that transmits and receives data (sometimes referred to as a transceiver).  An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. 10
  • 11. WIRELESS ACCESS POINT  a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network.  Wireless Access Point (WAP) is a networking hardware device that allows a Wi-Fi compliant device to either:  connect via Ethernet to a non wireless router and 'turn it into' a wireless signal.  connect via Ethernet to a wireless router, to provide a brand new wireless signal.  The WAP can also be an integral component of the router itself i.e. a router can be a access point but an access point cannot be a router.  When an infrastructure-based WLAN expands to consist of multiple access points on one logical network, it is 11
  • 12. 12
  • 13. IEEE 802.11 WLAN STANDARDS  These standards come from the Institute of Electrical and Electronics Engineers (IEEE), which only sets the specifications for the standards—it doesn’t test individual wireless products for compliance to these standards. That is normally done by an organization called the Wi-Fi Alliance.  The 2.4-GHz frequency band is appealing it is free. But this also means there’s no central entity to coordinate frequency use. Interference with other 2.4-GHz devices (e.g. baby monitor, and medical equipment) can be a problem especially in urban environments and apartment buildings. 13
  • 14. 14
  • 15. WLAN PERFORMANCE The problem of interference with nearby devices is extremely variable. One network can experience serious slowdowns in an environment that seems very similar to another wireless network that’s operating perfectly.  Most wireless vendors offer a software program that allows you to monitor signal strength and connection speed. One way to test for interference is to place an access point in your office, insert a wireless card in your laptop, and then roam around to evaluate the strength of the signal. This can reveal areas for access points that offer strongest signal and fastest connection.  Another way to minimize interference is to simply remove or reposition the devices that cause it. Keep devices such as microwave ovens at least six feet from access points. If you’re having significant interference problems with the 2.4-GHz band, it may be worthwhile to switch to 5-GHz.  Some buildings provide special obstacles to wireless transmission. For example solid stone walls or brick buildings can interfere with wireless transmission. For this reason, a 15
  • 16. CARRIER SENSE MULTIPLE ACCESS (CSMA)  Carrier Sense Multiple Access (CSMA) is a network protocol that listens to or senses network signals on the carrier/medium before transmitting any data.  In order to avoid (or reduce) the possibility of interference, the carrier sense multiple access (CSMA) protocol was originally implemented is used in WLAN network interface cards.  With CSMA, a transmitter attempts to detect the presence of a carrier signal from another node before attempting to transmit. If a carrier is sensed, the node waits for the transmission in progress to end before initiating its own transmission. 16
  • 17. 17
  • 18. 18
  • 19. CARRIER SENSE MULTIPLE ACCESS COLLISION AVOIDANCE (CSMA/CA)  Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle".  Carrier Sense Multiple Access/with Collision Avoidance (CSMA/CA) is a network contention protocol used for carrier transmission in networks using the 802.11 standard. CSMA/CA increases network traffic as it requires sending out a signal to the network even before transmitting any real data.  CSMA/CA has been used in a variety of wired communication systems, it is particularly beneficial in a wireless LAN due to a common problem of 19
  • 20. LIMITATIONS OF CSMA/CA  With CSMA alone, WLAN’s still experience two major problems termed the Hidden Node and Exposed Node Problems. 20
  • 21. CSMA WITH COLLISION AVOIDANCE (CSMA/CA)  CSMA/CA uses control packets to improve network performance  As usual, all nodes sense carrier (physically) before transmission. If channel is idle, a node uses control packets (RTS and CTS) to set up communication  All other nodes that hear the CTS broadcast know that the sender will be busy for the indicated duration 21
  • 22. 22
  • 23. CARRIER SENSE MULTIPLE ACCESS COLLISION DETECTION (CSMA/CD)  Carrier sense multiple access with collision detection or CSMA/CD is a protocol (or rule) used by computer ethernet networks. ... When this collision occurs, the computers stop sending information, wait for a random amount of time, and then check before resending the information.  This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame.  When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.  CSMA/CD is a modification of pure carrier-sense multiple access (CSMA). CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a 23
  • 24. WIRELESS METROPOLITAN AREA NETWORK  Wireless metropolitan area networks (WMANs) enable users to establish wireless connections between multiple locations within a metropolitan area (e.g., between multiple office buildings in a city or on a university campus), without the high cost of laying fiber or copper cabling and leasing lines.  WMANs can also serve as backups for wired networks, should the primary leased lines for wired networks become unavailable. WMANs use either radio waves or infrared light to transmit data. 24
  • 25. 25
  • 26. WIMAX  WiMAX (Worldwide Interoperability for Microwave Access) is a family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options.  WiMAX is a family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer and Media Access Control options.  WiMAX refers to interoperable implementations of the IEEE 802.16 family of wireless-networks standards ratified by the WiMAX Forum. (Similarly, Wi-Fi refers to interoperable implementations of the IEEE 802.11 Wireless LAN standards certified by the Wi-Fi Alliance.) WiMAX Forum certification allows vendors to sell fixed or mobile products as WiMAX certified, thus ensuring a 26
  • 27. WMAN STANDARDS  The major WMAN standards are: HiperMAN, HiperACCESS, and 802.16 (more commonly known as WiMAX). In practical terms, WiMAX would operate similar to WiFi but at higher speeds, over greater distances and for a greater number of users.  A WiMAX system consists of two parts: o A WiMAX tower, which is similar in concept to a cell-phone tower. A single WiMAX tower can provide coverage to a very large area - - as big as 3,000 square miles (~8,000 square km). o A WiMAX receiver, which could be a small box or PCMCIA card, or they could be built into a laptop the way WiFi access is today.  A WiMAX tower station can connect directly to the Internet using a highbandwidth, wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a line-of-sight, microwave link. This connection to a second tower (often referred to as a backhaul), along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural areas. 27
  • 28. TYPES OF WMAN  There are two basic types of WMANs: Back haul and Last mile.  Back haul is an option for enterprises that can't afford to install or lease fiber to connect their facilities over a large campus or city.  Last mile is used as an alternative to residential broadband DSL/cable modem or Fibre. It is also handy for temporary networks, such as large construction sites or areas where network service is disrupted. 28
  • 29. 29
  • 30. QUESTIONS THANK YOU FOR YOUR ATTENTION !!! 30
  翻译: