F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers.

Slides:



Advertisements
Similar presentations
Networks: Wireless LANs1 Wireless Local Area Networks.
Advertisements

Ethernet, Wireless LAN. Ethernet Frame Format (a) DIX Ethernet, (b) IEEE
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Introduction to Wireless Networking Medium Access Module-06 Jerry Bernardini Community College of Rhode Island 5/8/2015Wireless Networking J. Bernardini1.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Technology CSE Network Technology CSE3020 Week 9.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking So we talked about wired networks. What about wireless?
Networks: Wireless LANs1 Wireless Local Area Networks.
Wireless Local Area Networks
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Voice Traffic Performance over Wireless LAN using the Point Coordination Function Wei Supervisor: Prof. Sven-Gustav Häggman Instructor: Researcher Michael.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Lecture #2 Chapter 14 Wireless LANs.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
1 Kyung Hee University Chapter 15 Wireless LANs. 2 Kyung Hee University IEEE 802 Standards Working Groups WiMAX, an acronym that stands for Worldwide.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Chapter 04 IEEE Media Access Control
CWNA Guide to Wireless LANs, Second Edition
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Planning and Analyzing Wireless LAN
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Media Access Methods MAC Functionality CSMA/CA with ACK
Chapter 15 Wireless LANs.
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers

Q UESTION 1 1. Which of the following service sets can use distributed coordination function (DCF) mode? Choose all that apply. A. BSS B. IBSS C. ESS D. IESS

Q UESTION 2 2. Which of the following service sets can use point coordination function (PCF) mode? Choose all that apply. A. BSS B. IBSS C. ESS D. IESS

Q UESTION 3 3. You have a large number of users on one access point and collisions are becoming a problem, causing reduced throughput. Some of the users are developers that do a significant amount of large file transfers during the day. Which RTS/CTS setting would best fix this problem? A. On B. Off C. On with threshold

Q UESTION 4 4. Which one of the following is an advantage to using point coordination function (PCF) mode over distributed coordination mode (DCF)? A. PCF has a lower overhead than using DCF B. PCF can be used in and IBSS while DCF cannot C. PCF uses CSMA/CA while DCF does not D. PCF provides a given level of QoS

Q UESTION 5 5. After a client station sends a data packet to another client station, the receiving station replies with an acknowledgement after which interframe space? A. IFS B. SIFS C. PIFS D. DIFS

Q UESTION 6 6. Why is the CSMA/CA protocol used in order to avoid collisions in a wireless LAN? A. PCF mode requires use of a polling mechanism B. The overhead of sending acknowledgements is high C. All clients must acknowledge packets received while they're asleep D. It is not possible to detect collisions on a wireless LAN

Q UESTION 7 7. End stations will broadcast a _______ when actively scanning for access points on the network. A. Beacon management frame B. Superframe C. Probe request frame D. Request to send

Q UESTION 8 8. PIFS are only used during the communications of a wireless LAN when which of the following have occurred? A. The network is in point coordination function mode B. The access point has been configured to use RTS/CTS C. The access point has been configured to use CSMA/CD D. The network is configured for fragmentation

Q UESTION 9 9. You have just finished installing your first wireless LAN with b equipment rated at 11 Mbps. After testing the throughput of the clients, you find your actual throughput is only 5.5 Mbps. What is the likely cause of this throughput? A. Wireless LANs use RTS/CTS by default B. Wireless LANs use the CSMA/CA protocol C. Use of PCF is reducing network throughput D. DRS has caused all of the clients to decrease their data rates

Q UESTION You have just finished installing your first wireless LAN with b equipment rated at 11 Mbps. After testing the throughput of the clients you find your actual throughput is only 5.5 Mbps. What can you change to get 11Mbps throughput? A. Turn off RTS/CTS B. Move all of the clients closer to the access point C. Turn up the power on the access point D. Purchase another access point and co-locate both together

Q UESTION b devices use what type of modulation at 11 Mbps? A. BPSK B. DPSK C. QPSK D. CCK

Q UESTION a devices use what type of modulation at 24 Mbps? A. BPSK B. 16QAM C. OFDM D. CCK

Q UESTION If the sending station on a wireless LAN does not receive an ACK, the sending station assumes which one of the following? A. The receiving station is sleeping B. The receiving station is a hidden node C. There was a collision D. That RTS/CTS is turned on

Q UESTION Modulation is which of one of the following? A. The process by which digital data is modified to become RF data B. The process of adding data to a carrier by altering the amplitude, frequency, or phase of the carrier in a controlled manner C. The process of propagating an RF signal through the airwaves D. The means by which RF signals are received and processed by RF antennas

Q UESTION Which one of the following is not part of a superframe? A. Beacon B. Beacon Free Period C. Contention Free Period D. Contention Period

Q UESTION A superframe is used when which of the following is true? Choose all that apply A. The access point has been configured for point coordination function mode B. When beacons are disabled in the access point C. The wireless clients have been configured to announce to the access point that they are pollable D. The access point has been configured for distributed coordination function mode

Q UESTION What is the purpose of the superframe? A. To increase the throughput of all wireless LANs B. To ensure QoS for all voice and video applications running on wireless LANs C. To ensure that PCF- and DCF-mode clients do not communicate within the same wireless LAN D. To allow fair co-existence between PCF- and DCF- mode clients on the network

Q UESTION The acronym CCA stands for which one of the following? A. Close Client Association B. Clear Current Authentication C. Clear Channel Assessment D. Clean Channel Association E. Calculate Clear Assessment

Q UESTION The Network Allocation Vector (NAV) acts as: A. A timer on the station B. A navigational feature for RF signal propagation C. A location discovery tool for wireless LANs D. A tool for allocating the bandwidth of a wireless LAN

Q UESTION Using RTS/CTS allows wireless stations to do which of the following? A. Broadcast their intent to send data across the network to the receiving station B. Send their packets across the network at the maximum rated speed of the network C. Eliminate hidden nodes on the network D. Diagnose and reduce high overhead between stations