Free Essay

A New Integrated Control Algorithm for Ieee 802.11g Standards

In:

Submitted By yeyuan129
Words 3037
Pages 13
A New Integrated Control Algorithm for IEEE 802.11g Standards
Qian Liu, Yongxin Yan
International School Beijing University of Posts and Telecommunications Beijing, China e-mail: ee08b050@bupt.edu.cn, ee08b044@bupt.edu.cn
Abstract—Wi-Fi (Wireless Fidelity) mainly adopts IEEE 802.11g standards. And a binary exponential backoff algorithm is adopted to prevent channel collision, which also introduces reduction of the performance of the network. In this paper, an integrated control mechanism (ICM) is proposed which combines a centrally controlled approach and a distributed access mechanism to control the behavior of the system. Through this mechanism, backoff is eliminated from transmission mode, which can significantly enhance the performance of the system. Through theoretical analysis and simulation, the new mechanism can improve the throughput and reduce delay and packet loss rate. According to the results of simulation, with ICM, the throughput can have an improvement of 83.3% and the packet loss rate remains at 0 under appropriate conditions. Keywords-Wi-Fi, integrated control mechanism, centrally control, distributed access

Jing Tu, Bainan Xia
International School Beijing University of Posts and Telecommunications Beijing, China e-mail: ee08b253@bupt.edu.cn, ee08b217@bupt.edu.cn Many experts have proposed different algorithms and approaches to improve the performance of Wi-Fi. Souvik Sen, Romit Roy Choudhury and Srihari Nelakuditi transformed the contention from time domain to frequency domain using subcarrier and multiple antennas. It migrates from backoff operation to frequency domain so that backoff time is greatly reduced to one OFDM symbol time. [1] Ma Dan and Wen Jun proposed dynamic optimization algorithm based on the conflict weight by replacing the accurate measurement of the number of competition terminals with average collision count and introducing conflict weights into DCF. [2] There are many other proposals, like adaptive backoff and implicit pipelining. However, all these improve performance of Wi-Fi based on a common assumption, the application of DCF. And no matter how many improvements they have made, backoff cannot be eliminated completely. [3] II. BACKGROUND Instead of using distributed coordination function alone, we innovatively combine centrally controlled approach and distributed access mechanism together to regulate the entire system’s behavior, in which case backoff does not exist in competing for the channel. The way we realize that is the flexible use of CTS control frame. The traditional RTS/CTS mechanism is applied in this way: nodes that want to send packets send a RTS to Access Point (AP) firstly and the AP returns a broadcast CTS with the address of the node that is allowed to send packet stored in the Receiver Address (RA) field. So node can determine whether to start to send packet by comparing the RA field with its own address. That is the basic fundamental principle of RTS/CTS mechanism. [4] In our approach, only CTS control frame is needed to announce the node to send packet, which transfers the original two-way handshaking to one-way. The principle is similar. In every AP, there is a list of sequenced nodes it controls. The way nodes are sequenced is based on random number generation to guarantee fairness. When it's time for certain node, let say, N1, to send packet, the AP sends a broadcast CTS with the address of node N1 stored in the RA field. And after N1 receives the CTS, it will know it can use the channel now and then start to send packet. Thus, no backoff is necessary to avoid contention because the channel of certain duration exclusively belongs to certain node to use. Because the order and the utilization

I.

INTRODUCTION

Wi-Fi (Wireless Fidelity) is very popular and useful in WLAN communication since it was put forward. Among the IEEE 802.11 standards, 802.11b is the original standard designed to support Wi-Fi. And 802.11g and 802.11a were proposed afterwards to improve the performance of Wi-Fi with new concepts and techniques. Nowadays, 802.11g has become the most important standard for Wi-Fi, which also has backwards compatibility with 802.11b. Although various techniques are applied in 802.11g, e.g. OFDM and DSSS, to greatly improve the communication speed, one stubborn problem embedded in Wi-Fi has not been resolved yet. In Wi-Fi, to prevent collision caused by concurrent transmission, one mechanism called Distributed Coordination Function (DCF) is adopted. DCF has one important characteristic, that is, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. This protocol introduces a binary exponential backoff mechanism which causes the underutilization of media and the waste of resources including time and bandwidth, especially at high transmission rate. Another technique used in Wi-Fi is Request-To-Send/Clear-To-Send (RTS/CTS) mechanism, which involves a two-way handshaking behavior to allow nodes to access the media. This mechanism leads to delay in transmission process. Because of these two mechanisms, performance of Wi-Fi, including throughput and delay, does not meet the expectations of people.

are determined by access point, this is a centrally controlled approach. As for new node to access the media, it has to advertise itself to the access point to let AP add it to the list. And this is realized by the use of RTS control frame, the only process RTS is used with the possibility contention and backoff may happen. This is a distributed access mechanism. Since our approach is a combination of centrally controlled mechanism and distributed access mechanism, it is an integrated control mechanism (ICM). Next, we will describe our approach in details. III. NEW ALGORITHM Since access point is the core of centrally controlled approach, we focus on the behavior of AP to explain this innovative mechanism. We ideally divide the behavior of AP into two modes, access mode and transmission mode. The former is for the newly-coming nodes to add to the list of AP. The latter is for the nodes existing in the list of AP to send packet. These two modes happen alternately in the behavior of AP. And one access mode and one transmission mode constitute a period of AP’s behavior. Next, they are introduced separately. A. Access Mode At the initial stage, no nodes exist in the list of AP. So AP has to special broadcast CTS with specific address stored in the RA field to announce all the nodes that they can advertise themselves to AP now. When nodes receive the CTS, they will return with a RTS to tell the AP that they want to access the media. When the AP receives the RTS, it will put the node sending the RTS to the first place of the list and enter into the transmission mode. If there are two or more nodes needing to access the media concurrently, the RTS they send to AP will get corrupted. At this time, AP will ignore the corrupted RTS and enter into the transmission mode directly without adding any node to the list. If the node does not receive a normal

broadcast CTS for it immediately (explained later), the node knows it does not obtain the access to the media and it will generate a random number, v, in a range, let say, [1, M]. The random number indicates the next time the node tries to access the media. When the node receives v special broadcast CTSs from AP, it tries to access the media again. B. Transmission Mode AP selects the first node, let say, N0, from the node list and sends normal broadcast CTS with address of N0 stored in the RA field. After comparing the address in RA with its own address, N0 knows it’s time for it to send packet and other nodes just ignore the CTS. If N0 has packet(s) to send, it will send a packet of data to AP along with a randomly generated number in a range. If N0 still has another packet to send, the range of the random number is [0, 2n-1]. If this is the last packet, the range is [2n, 2n+m-1]. If AP successfully receives the data packet, it will send an ACK back to N0. And the number received with the data replaces the original value of N0. If N0 is a newly-added node from last access mode, the number is the value of N0. According to the amount of value of each node in the list, AP reorders the nodes. And then a new normal broadcast CTS with the address of the first node in the new list stored in the RA field is sent out for another packet transmission. If N0 has no packet to send, it will send an empty data packet along with a randomly generated number in a range, [2n, 2n+m-1]. Similarly, AP sends back an ACK if the empty data packet is received successfully. And the number with the packet replaces the original value of N0. A new ordering of nodes happens and a new normal broadcast CTS with the address of the first node in the new list stored in the RA field is sent out for another packet transmission. Sending normal CTS, waiting SIFS, receiving data packet and sending ACK constitute a cycle of transmission (Shown in Fig1). And one transmission mode contains several such cycles. When the transmission mode ends, AP enters into a new access mode to accept new nodes.

Figure 1. Access procedure in the new mechanism

The different settings of the ranges of randomly generated number with data packet and empty data packet

enforce the node with no data to send to be ordered to the end of the list in AP. And when a node sends a certain

number of empty data packets, it is removed from the list. To enter the list of AP again, it needs to wait for the access mode and retry. IV. EVALUATION According to the description of our integrated control mechanism, it can be easily seen that our approach eliminates the possibility of backoff in transmission mode and thus saves channel resources and enhances the overall throughput. Although contention may happen in access mode, it is still a great improvement compared with the original contention all the time. The reduction from twoway handshaking to one-way handshaking simplifies the transmission process. All these will result in an enhancement of performance of Wi-Fi. Besides, we can have a high control over the entire network by setting several key values, like M, n, m mentioned above. Hence, the system based on ICM is a highly controllable system with high performance. Next, simulation about this approach and a comparison between it and the original mechanism are introduced. V. SIMULATION AND COMPARISION To validate our new mechanism, we use MATLAB to simulate the performance, including throughput, system delay, and packet loss rate, of the network under our mechanism with different parameter settings. Besides, we compare it with the performance of the network under the original old mechanism to examine the improvement. A. Standard Parameter Value Variables
Scale of users Average data length(DATA) A Packet Max waiting time(LIMIT) Sending data request period(NEXT) Waiting period of access retry Random range for data packet Random range for blank packet

In Fig. 2, the overall throughputs of the network under new mechanism and old mechanism with different intervals of sending packet are presented. When the number of nodes is small, throughput is likely to increase as the number of nodes increases. But the speed of increasing under new mechanism is larger than that under old mechanism. When the number of nodes increases to some extent, the throughput will remain stable, in which case the throughput of the new mechanism have an improvement of 83.3% compared with throughput of the old mechanism. When we change the interval of sending a packet, the same conclusion can be obtained from the comparison between new mechanism and old mechanism. Besides, the smaller the interval of sending a packet, the faster the throughput reaches its peak.

Figure 3. Throughputs of new VS old by changing packet size

Range
0-50 19500/29500/9500 byte 50/100/400 ms 0-2 seconds 1-4T(default T=100ms) 0-1024 1025-2048

Constants
Data rate Control bit rate Length of ACK message Length of SIFs message in time Physical header length in time Mac header length Max packet length (Ethernet)

Value
54Mbps[5] 11Mbps 112 bit 10 us[6] 192 us[7] 224 bit 1500 byte[8]

In Fig. 3, we still simulate the trend of throughputs of new mechanism and old mechanism but with different sizes of packets. No matter how large the packet is, the throughput of the new mechanism is always larger than those of the old mechanism with the same size of packet. And the improvement is nearly 90% when the packet is 9500-byte long. Under the same mechanism, the throughput has slight difference with different sizes of packets. When the packet is large, the throughput is a bit larger than small packet.

B. Results of simulation

Figure 4. Average Delay new VS old by changing intervals

Figure 2. Throughputs of new VS old by changing intervals

Fig 4 plots the trend of the change of system delay as the number of nodes increases under different mechanisms and different intervals of sending packet. When the interval of sending packet is large, say 100ms or 50 ms, the system delay of the new mechanism is always smaller than that of the old mechanism. Although system delay tends to increase with increasing nodes, the slope of the new mechanism is flatter than the slope of the old mechanism,

which proves a better performance. When the interval of sending packet is small, say 10 ms, the system delay of the new mechanism is larger than that of the old mechanism in the case of a few nodes. However, when the nodes of the network increase, the system delay of the new mechanism becomes smaller than that of the old mechanism because of its relative flat slope.

whether a packet is lost. From Fig. 6, we can find out that when the timing value is large, say 400 ms or 100 ms, the packet loss rate remains at 0.00%. But when the timing value is reduced to 50 ms, some packets become lost when the number of nodes exceeds 50 and the trend of the increase of packet loss rate is rather fast. Referring to the old mechanism, the packet loss rate starts to increase from 0 when the number of nodes only reaches 18 and suffers a slow increasing afterwards. Therefore, our new mechanism performs better than the old mechanism in packet loss rate when the timing value determining whether a packet is lost is large. VI. CONCLUSION The binary exponential backoff algorithm used by DCF causes underutilization of channel and waste of resources in spite of the advantages it brings. Our integrated control mechanism flexibly applies CTS control frame and innovatively let access point determine the order of nodes to transmit packets, which eliminates backoff in transmission mode. Although contention and backoff may exist in the access mode, it does not influence the whole performance too much. And the results of simulation prove the superiority of the new mechanism over the old mechanism. The overall throughput of the network under new mechanism has an improvement of 83.3% compared with the old one. And the packet nearly suffers a loss rate of 0 under appropriate conditions. Although some drawbacks exist in our new mechanism which we will solve in future work, the ICM provides a great improvement to the performance of the network compared with the old mechanism. REFERENCES
[1] Sakurai,T. and Vu,H.L,“MAC Access Delay of IEEE 802.11 DCF” Wireless Communications, IEEE Transactions on, 2007, 6(5), p1702-1710 Wu Ruixiao and Liu Qian “A Novel Centrally Controlled Channel Access MAC Protocol for 802.11 Wireless Networks”. 2010 walking paper MIAO Yi,FENG Hao-ran. “Energy-efficient reduced collision MAC for wireless sensor networks“.Computer Engineering and Applications,2010,46(35):97-100. Feng Haoran and Zhao Qianchuang, “Modeling a typical enhanced 802. 11 DCF-based protocol DIDD in nonsaturated conditions“,Tsinghua Univ(Sci&Tech), 2009, Vol 49,No.1 pp157150 Listen (on the frequency domain) before you talk Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi Research and optimize in IEEE802.11 MAC protocol. Ma Dan, Wen Jun WU Ya-jun, HU Ai-qun, SONG Yu-bo,” Design and Implementation of WLAN Protocol Analysis System” Computer Engineering, 2008.11, Vol 34, No.22, pp 140-142 H. S. Chhaya and S. Gupta, “Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol,” Proc. IEEE Symp. Wireless Networks,, IEEE Press, Dec. 2007, pp. 217-234, doi:10.1109/SCIS.2007.357670.

Figure 5. Packet loss rate of new VS old by changing intervals

To examine the influence of the new mechanism to packet loss rate, we plot the relationship between the packet loss rate and the number of nodes under different mechanisms and different intervals of sending packet in Fig. 5. With the same interval of sending packets, the packet loss rate of the new mechanism is obviously smaller than that of the old mechanism. Especially when the number of nodes gets large, the packet loss rate of the old mechanism becomes intolerable while the packet loss rate of the new mechanism keeps small (no more than 0.10%). When the interval of sending packet is large, say 100 ms or 50 ms, the packet loss rate of the new mechanism stays at 0.00%, which indicates a big improvement compared with the old mechanism. When the interval of sending packet becomes small, say 10 ms, the packet loss rate of the new mechanism becomes larger than 0.00% when the nodes increase, but no more than 0.10%. From this result, we can conclude that our new mechanism provides a great improvement to packet loss rate.

[2]

[3]

[4]

[5] [6] [7]

[8] Figure 6. Packet loss rate of new VS old by changing timing values

Further, we examine the performance of packet loss rate under different timing value which determines

Similar Documents

Free Essay

Kamazon Project

...C.T.I. Kamazon Network Project Richard Gibson-Project Manager Marvin Pierre-Accounting Raven Hamilton-Marketing Morgan Worthman-Research Victor Calderon-Engineering Company Agenda * Company Biography * Team Members * Roles/Responsibilities * Project Scope * Deliverables * Assumptions * Risk Assessment * Proposed Network Design * Proposed Schedule * Statement of Work * Cost Assessment * Vendor Information * References * Q&A Company Biography The Critical Thinkers Incorporated group was established in 2006, and since that time has tirelessly worked out detailed plans to improve upon innovative ways to set up company network systems. Our goal is always to meet the company needs as required, as well as, designing a system that has back up fail safe options and also as being very secure. We have held standing contracts with major companies, as well as small business. We are located on 104 Industrial Drive, Suite 200, The Woodlands, Texas 77385. CTI members are as follows: Richard Gibson, Marvin Pierre, Raven Hamilton, Morgan Worthman, and Victor Calderon. Biography/Roles Richard Gibson Graduated from ITT Technical Institute & University Of Houston Project Manger/SNA Systems Network Administrator Degree ...

Words: 2724 - Pages: 11

Premium Essay

Intel Guide

...WiFi Link 4965AGN Wireless WiFi Link 4965AG_ PRO/Wireless 3945ABG Network Connection PRO/Wireless 3945_BG Network Connection With your WiFi network card, you can access WiFi networks, share files or printers, or even share your Internet connection. All of these features can be explored using a WiFi network in your home or office. This WiFi network solution is designed for both home and business use. Additional users and features can be added as your networking needs grow and change. Depending on the model of your Intel WiFi adapter, your adapter is compatible with 802.11a, 802.11b, 802.11g, and 802.11n (draft 2.0) wireless standards. Operating at 5 GHz or 2.4 GHz frequency at data rates of up to 450 Mbps, you can now connect your computer to existing high-speed networks that use multiple access points within large or small environments. Your WiFi adapter maintains automatic data rate control according to the access point location and signal strength to achieve the fastest possible connection. All of your wireless network connections are easily managed by the WiFi connection utility. Profiles that are set up through the WiFi connection utility provide enhanced security measures with 802.1X network authentication. Table of Contents Use the Intel® PROSet/Wireless WiFi Connection Utility Connect to a Network Use Wi-Fi Protected Setup* Use Profiles Set up Security WiFi Network Overview Administrator Tool Create Administrator Packages Create...

Words: 75784 - Pages: 304

Premium Essay

Third Generation Wireless Standard

...3G Unit-1: GPRS & EDGE General Packet Radio Service (GPRS) General Packet Radio Service (GPRS) is a mobile data service available to users of GSM mobile phones. It is often described as "2.5G", that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, by using unused TDMA channels in the GSM network. Originally there was some thought to extend GPRS to cover other standards, but instead those networks are being converted to use the GSM standard, so that is the only kind of network where GPRS is in use. GPRS is integrated into GSM standards releases starting with Release 97 and onwards. First it was standardised by ETSI but now that effort has been handed onto the 3GPP. GPRS is different from the older Circuit Switched Data (or CSD) connection included in GSM standards releases before Release 97 (from 1997, the year the standard was feature frozen). In CSD, a data connection establishes a circuit, and reserves the full bandwidth of that circuit during the lifetime of the connection. GPRS is packet-switched which means that multiple users share the same transmission channel, only transmitting when they have data to send. This means that the total available bandwidth can be immediately dedicated to those users who are actually sending at any given moment, providing higher utilization where users only send or receive data intermittently. Web browsing, receiving e-mails as they arrive and instant...

Words: 18564 - Pages: 75

Free Essay

Radio Frequency (Rf) Interference Analysis and Optimization

...October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul Haque Assistant Professor Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Internal) Dr. Subrata Kumer Aditya Professor Department of Applied Physics, Electronics and Communication Engineering University of Dhaka ---------------------(External) ii ABSTRACT Wireless Local Area Network (WLAN) applications are new, fast...

Words: 18928 - Pages: 76

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212

Free Essay

Yeszcxzxxvzxcvxzc

...Cisco Router Guide For teleworkers, small offices, small to medium-sized businesses, and enterprise branch and head offices Cisco Integrated Services Routers: Cisco 860, 880, 890, 1800 (fixed), 1800 (modular), 1900, 2800, 2900, 3800, 3900 Series; Cisco Aggregation Routers: Cisco 7200, 7301, 7304, ASR 1000, 7600, Catalyst 6500 Series Summer 2010 V.6 Cisco Router Guide For Medium-sized Businesses, Enterprise Branches, Head Offices, and the Service Provider Edge This is your guide to Cisco® Services Aggregation Routers and Cisco Integrated Services Routers, the broadest and most versatile portfolio of products for enabling the deployment of multiple advanced services. Cisco is the worldwide leader in networking systems for organizations of all sizes, offering solutions that fully support enterprise-wide deployment of networked business applications. A foundation of the Intelligent Information Network, Cisco routers provide high availability, comprehensive security, integrated wireless, ease of management, and advanced Quality of Service (QoS) for today’s most demanding network services, including IP communications, video, customer relationship management, financial transactions, and other real-time applications. This guide shows how Cisco Services Aggregation Routers and Cisco Integrated Services Routers enable you to meet your current and future needs with modular designs, allowing incremental migration as your business and network requirements change. In this guide,...

Words: 32978 - Pages: 132

Premium Essay

Unknown

...Medical Device Networking for Smarter Healthcare: Part 3 Next-Generation WLAN Deployments in Hospitals Lantronix, Inc. 167 Technology Drive Irvine, CA 92618 Tel: +1 (800) 422-7055 Fax: +1 (949) 450-7232 www.lantronix.com Medical Device Networking for Smarter Healthcare: Part 3 of 4 Contents Introduction..................................................................................................................................................... 3 Wireless Roll-outs........................................................................................................................................... 5 Medical Device Connectivity / Mobile Carts .......................................................................................... 5 Handheld Devices .................................................................................................................................... 6 Computer-based Physician Order Entry (CPOE)..................................................................................... 7 Next-Generation Wireless Applications ......................................................................................................... 7 Location-based Services .......................................................................................................................... 7 Voice-over-WLAN .................................................................................................................................. 8 Internet/Intranet...

Words: 4973 - Pages: 20

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Free Essay

Test

...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...

Words: 46505 - Pages: 187

Premium Essay

Sscp Study Notes

...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...

Words: 17808 - Pages: 72

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Free Essay

Study Guide

...Chapter 12 WLAN Troubleshooting IN ThIs chApTer, you WILL LeArN AbouT The foLLoWINg: ÛÛ Layer 2 retransmissions NÛ RF interference Multipath Adjacent cell interference Low SNR Mismatched power settings Near/far Hidden node NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ 802.11 coverage considerations NÛ Dynamic rate switching Roaming Layer 3 roaming Co-channel interference Channel reuse/multiple channel architecture Single channel architecture Capacity vs. coverage Oversized coverage cells Physical environment NÛ NÛ NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ Voice vs. data ÛÛ Performance ÛÛ Weather Copyright © 2009 John Wiley & Sons, Inc. Diagnostic methods that are used to troubleshoot wired 802.3 networks should also be applied when troubleshooting a wireless local area network (WLAN). A bottoms-up approach to analyzing the OSI reference model layers also applies to wireless networking. A wireless networking administrator should always try to first determine whether problems exist at layer 1 and layer 2. As with most networking technologies, most problems usually exist at the Physical layer. Simple layer 1 problems such as nonpowered access points or client card driver problems are often the root cause of connectivity or performance issues. Because WLANs use radio frequencies to deliver data, troubleshooting a WLAN offers many unique layer 1 challenges not found in a typical wired environment. The bulk of this chapter discusses the numerous potential problems...

Words: 16450 - Pages: 66

Premium Essay

Test

...security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current hardware and software, inventory of current APs, wireless devices, ports, stations and their...

Words: 18577 - Pages: 75

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Premium Essay

Case Covad

...36865_02 12/5/2005 9:55:49 Page 51 CHAPTER 2 TE C H N O L O G Y IN F R A S T R UC TURE: THE IN T E R N E T AN D THE WO R L D W I D E WEB LEARNING OBJECTIVES In this chapter, you will learn about: ● The origin, growth, and current structure of the Internet ● How packet-switched networks are combined to form the Internet ● How Internet protocols and Internet addressing work ● The history and use of markup languages on the Web, including SGML, HTML, and XML ● How HTML tags and links work on the World Wide Web ● The differences among internets, intranets, and extranets ● Options for connecting to the Internet, including cost and bandwidth factors ● Internet2 and the Semantic Web INTRODUCTION Many business executives made the statement “the Internet changes everything” during the late 1990s. One of the first people to say those words publicly was John Chambers, CEO of Cisco Systems, in a speech at a computer industry trade show in 1996. For his company, the Internet did indeed change 36865_02 10/7/2005 16:35:28 Page 52 everything. Cisco, founded in 1984, grew rapidly to become one of the largest and most profitable 52 companies in the world by 2000. Cisco designs, manufactures, and sells computer networking devices. In this chapter, you will learn about these devices and how they make up the Internet. Cisco’s earnings grew as telecommunications companies purchased the company’s products to build...

Words: 24308 - Pages: 98