Group 3 Characterization of Wireless: Network layer and above.

Slides:



Advertisements
Similar presentations
Bluetooth and Wi-Fi Kane Hartley.
Advertisements

Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
Transmission technology William Kemp. Infrared Infrared data travels in shorter (near infrared waves). These waves enable data to be sent and receive.
Wi-Fi Technology.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
1 CSCD 439/539 Wireless Networks and Security Lecture 1 Overview Fall 2007.
Mobile Commerce and Ubiquitous Computing
Dell Mini 5 Danny Quach MIS 304. What is the Mini 5? The Mini 5 is Dell’s version of a tablet computer currently under development. It is the hybrid of.
Android An open handset alliance project Janice Garcia September 18, 2008 MIS 304.
Wireless UTC Jess Williams Wireless Network Administrator Robbie Reel Network Operations Manager Christopher Howard Senior Network Engineer.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Moving USB …beyond the desktop TM at Wireless Coexistence Conference, San Jose, CA powered by ExtremeUSB.
Mobile Computing in Society Jared Sutherland CIS 497
The PC Evolution  Began in the late 1970’s with the development of 4 bit and 8 bit microprocessors  Market penetration started with the MAC and IBM PC.
Moving USB …beyond the desktop TM at 2007, Nice France powered by ExtremeUSB.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
TEW-812DRU Training. TEW-812DRU AC1750 Dual Band Wireless Router.
INTRODUCTION TO MOBILE COMPUTING. MOBILE COMPUTING  Mobile computing is the act of interacting with a computer through the use of a mobile device. 
2006 vs Domain% of Exam 1.0 Personal Computer Components 21% 2.0 Laptop and Portable Devices 11% 3.0 Operating Systems 21% 4.0 Printers.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
TASK A PowerPoint presentation informing you upon: Wi-Fi, 3G, WAP, Bluetooth.
Infrared is used on mobile phones and barcode scanners and in photography. On a phone infrared is used to send and receive data from one phone to another,
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
This is my contact No and this number search with google and learn my videos
Chapter 7 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Networks, Telecommunications, and Mobile Technology.
VIT UNIVERSITY :: VELLORE
Specification section 6.2. What do you need to learn? The application and advantages/disadvantages of the following digital media and new technology in.
Wireless Communication Methods
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
General Status  Analyze various options for connecting to the robot  Develop requirements for each connection  Check example projects o Videos with.
Security system Control panel Motion sensor Door sensor Shutter sensor Smoke detector Emergency switch Siren Automatic mobile calling.
Game Play. The Smiths want to be able to play games The Smiths want to play games with each other and with friends outside the house. What are your own.
IEEE MSC April, 2009 AVB Device Discovery, Connection and Control SG Draft 1 A Device Discovery, Connection Management and Control Protocol for P1722 based.
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Mobile Multimedia and VoIP Prof. Henning Schulzrinne Andrea Forte · Matthew Mintz-Habib · Takehiro Kawata · Jonathan Lennox · Anshuman Rawat · Ron Shacham.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
INTRUDUCTION Today's networks have a significant impact on our lives - changing the way we live, work, and play. Computer networks - and in a larger context.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Doc:IEEE /0150r0 Submission May 2000 Carlos Rios, 3Com Proposed Application: Wireless Home Networks.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Wireless Body Area Networks (WBAN) 6137-Algorithms in Network Theory 2013.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NUR IZZATI BINTI AHMED AZMAN TSK 1.
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
TECHNOLOGY IN ACTION. Chapter 8 Digital Devices and Media: Managing a Digital Lifestyle.
NTC 362 Week 2 DQ 5 Wireless security today must go beyond computers, as Bluetooth is available in many devices. What can you do to help protect your Bluetooth.
Understand how a router works and its purpose
Projects.
Wireless USB.
WELCOME Mobile Applications Testing
Software Mr. Singh.
115A Multimedia Room.
TV Whitespace Common Functions across IEEE Tutorial
Lectures Computer networking تمرین 3 نمره. پژوهش عملیاتی 2 نمره.
PREPARED BY: RIDDHI PATEL (09CE085)
3.3 Mobile Digital Communication
Wireless Networking At MIT
Wrap Up CSE 5236: Mobile Application Development
Presentation transcript:

Group 3 Characterization of Wireless: Network layer and above

Wired vs Wireless Compare wired to wireless behavior –Applications different? –Changes user behavior? How much delay people willing to pay for convenience of wireless?

Broader measurement Comparable measurement studies –Across wide variety of environments –Across several places, several times What is common across all apps, all places, all times? What is different?

Cross layers How do you correlate measurements of low-layer behavior with behavior of higher-level protocols or of users? In what ways do chipset, firmware version, driver version, OS, affect behavior of network (transport, network, MAC layers)

New applications Today: –WiFi laptops Tomorrow: –VoIP devices –Home/entertainment Multimedia (networked video player, cameras, …) Gaming devices –Embedded devices Security cameras, door locks Building control systems

Beyond WiFi How do our measurement studies apply to bluetooth, , …. How can our tools apply to studies of those networks?