SlideShare uma empresa Scribd logo
1 de 96
IEEE 802.11s implementation for multimedia campus networking Sikkim Manipal Institute Of Technology Jan 2008 – Jun 2008
Why, What ,How?
Wireless Mesh Networks IEEE 802.11s ,[object Object],[object Object],[object Object],[object Object],[object Object]
Classical 802.11 WLAN
WLAN with mesh
Why Mesh? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes Of WMN ,[object Object],[object Object],[object Object]
Infrastructure/Backbone WMNs
Client WMNs
Hybrid WMNs
Comparison with existing technologies
Mesh vs. Ad-Hoc Networks ,[object Object],[object Object],[object Object],[object Object],Ad-Hoc Networks WMN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mesh vs. Sensor Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],Wireless Sensor Networks WMN ,[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN Coverage 802.11 WMN Wiring Costs Low High Number of APs As needed Twice as many Cost of APs High Low Bandwidth Good Very Good
Mesh Implementation Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Marginal S/N ,[object Object],[object Object],[object Object],[object Object],[object Object]
Long bursts of interference Bursty noise might corrupt packets without affecting S/N measurements A B
Short bursts of interference (802.11) A B Outcome depends on relative signal levels When a nearby AP sends a packet, we lose a packet.
Multi-path interference Reflection is a delayed and attenuated copy of the signal A B B
SOFTWARE & HARDWARE DEVELOPMENT
HARDWARE  DEVELOPMENT
HORN ANTENNA
PARABOLIC REFLECTOR ,[object Object]
CAT5 CABLE
i Pod Touch
Wireless Settings For iPod
WIRELESS ROUTER
What is a router? ,[object Object]
LINKSYS WRT54G
 
WRT54G Series  Router Specification
LINKSYS WRT54GL version 1.1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MS WINDOWS
LINUX—UBUNTU GUTSY RIBBON
WI FI RADAR
DEVELOPMENT PLATFORM MATLAB AND SIMULINK
What is VoIP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VoIP Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why VoIP? ,[object Object],[object Object]
VoIP Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft Windows Netmeeting
 
 
 
TRAFFIC MONITORING
PRTG Traffic Grapher ,[object Object]
[object Object],TRAFFIC MONITORING  GRAPH-1
TRAFFIC MONITORING  GRAPH-2
NETWORK  TRAFFIC TOP  PROTOCOLS
Network Traffic Table
Wireless Site Survey Netstumbler
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Graph- SNR vs Time
Netstumbler Window Showing network details
FIRMWARE ,[object Object],[object Object],[object Object],[object Object]
OPEN WRT FIRMWARE
OPEN WRT FIRMWARE ,[object Object],[object Object],[object Object]
 
 
 
FREIFUNK FIRMWARE
FREIFUNK FIRMWARE ,[object Object],[object Object],[object Object]
CONFIGURTION OF A MESH NODE
FREIFUNK FIRMWARE LAN Settings
System Settings
MAD WI FI FIRMWARE
MAD WIFI FIRMWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
TOMATO FIRMWARE
TOMATO FIRMWARE ,[object Object],[object Object],[object Object]
Supported Devices ,[object Object],[object Object],[object Object]
Upgrading The Firmware ,[object Object],[object Object],[object Object],[object Object]
Menus in Tomato  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STATUS- DEVICE LIST
STATUS OVERVIEW
STATUS OVERVIEW
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless( continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STATUS OVERVIEW   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bandwidth Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BANDWIDTH REAL TIME
TOOLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOOLS-PING
TOOLS-TRACE
TOOLS-WIRELESS SURVEY
QoS( Quality Of Service) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Restriction ,[object Object]
 
ADMINISTRATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object]
Thank You

Mais conteúdo relacionado

Mais procurados

336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.pptssuserefc414
 
Software defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriSoftware defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriVahid Sadri
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesJustyna Bak
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Agreeta Sharma
 
VoLTE KPI Performance Explained
VoLTE KPI Performance ExplainedVoLTE KPI Performance Explained
VoLTE KPI Performance ExplainedVikas Shokeen
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beBryan Len
 
Transmission Media Forouzan.ppt
Transmission Media Forouzan.pptTransmission Media Forouzan.ppt
Transmission Media Forouzan.pptAkhilChandran84
 
WCDMA Air Interface
WCDMA Air InterfaceWCDMA Air Interface
WCDMA Air InterfaceSujeet Kumar
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design3G4G
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH ProcedureAalekh Jain
 

Mais procurados (20)

336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
csma ca
 csma ca csma ca
csma ca
 
Software defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriSoftware defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadri
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
 
Chapter05
Chapter05Chapter05
Chapter05
 
IEEE 802.1 x
IEEE 802.1 xIEEE 802.1 x
IEEE 802.1 x
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
VoLTE KPI Performance Explained
VoLTE KPI Performance ExplainedVoLTE KPI Performance Explained
VoLTE KPI Performance Explained
 
Thesis of sdh
Thesis of sdhThesis of sdh
Thesis of sdh
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11be
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol
 
Transmission Media Forouzan.ppt
Transmission Media Forouzan.pptTransmission Media Forouzan.ppt
Transmission Media Forouzan.ppt
 
WCDMA Air Interface
WCDMA Air InterfaceWCDMA Air Interface
WCDMA Air Interface
 
Getting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
DHCP
DHCPDHCP
DHCP
 

Destaque

Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routingAbhishek Kona
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentationIftach Ian Amit
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)Jyoti Yadav
 
MobiMESH: Mesh Evolution
MobiMESH: Mesh EvolutionMobiMESH: Mesh Evolution
MobiMESH: Mesh Evolutionacapone
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Olpcpresentation
OlpcpresentationOlpcpresentation
Olpcpresentationwdb
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkRohit Das
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamicsAir-Fi
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...VK2MB
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi InfographicBenjamin Eggerstedt
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky FannyCarl Ford
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-resultsMichal Jarski
 

Destaque (20)

Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
 
MobiMESH: Mesh Evolution
MobiMESH: Mesh EvolutionMobiMESH: Mesh Evolution
MobiMESH: Mesh Evolution
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Olpcpresentation
OlpcpresentationOlpcpresentation
Olpcpresentation
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh Network
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamics
 
Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
Wifi presentation
Wifi presentation Wifi presentation
Wifi presentation
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
 
Wi fi
Wi fiWi fi
Wi fi
 

Semelhante a IEEE 802.11s - Wireless Mesh Network

BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)Diwakar Singh
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUNArun Franco
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxShehanMarasinghe1
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
OpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpen Networking Summits
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 

Semelhante a IEEE 802.11s - Wireless Mesh Network (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Darsh
DarshDarsh
Darsh
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
OpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless Infrastructure
 
Ccna report
Ccna reportCcna report
Ccna report
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 

Mais de Arunabh Mishra

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Arunabh Mishra
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing Arunabh Mishra
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focusArunabh Mishra
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments Arunabh Mishra
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsArunabh Mishra
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case StudyArunabh Mishra
 
Synergy between manet and biological swarm systems
Synergy between  manet and biological swarm systemsSynergy between  manet and biological swarm systems
Synergy between manet and biological swarm systemsArunabh Mishra
 

Mais de Arunabh Mishra (10)

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing
 
Coffee 101
Coffee 101Coffee 101
Coffee 101
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focus
 
What is ai ?
What is ai ?What is ai ?
What is ai ?
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile robotics
 
I beacons 101
I beacons 101I beacons 101
I beacons 101
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case Study
 
Synergy between manet and biological swarm systems
Synergy between  manet and biological swarm systemsSynergy between  manet and biological swarm systems
Synergy between manet and biological swarm systems
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

IEEE 802.11s - Wireless Mesh Network

Notas do Editor

  1. Now let’s talk about interference Previous slide covered non-bursty weak interference Make this not look like directional antennas (broadcasts, waves) Distance, trees attenuate signal Delivery probability depends in part on signal-to-noise ratio P(delivery) = f(S/N) Perhaps many Roofnet node pairs have S/N corresponding to intermediate delivery probabilities Mention S/N measurements calibrated in the lab Replace hypothesis slides w/ pictures Mention s/n reported by the card Don’t #2 make it sound so definite Qualify the second point Mention ‘textbook model of ber’
  2. We’ve eliminated the possibility that we’re losing bursts of packets We’ve narrowed the possibilities enough that we know we’re losing packets individiually “ the important special case” Start the explanation of this hypothesis here Why two phases? Mention it’s all beacons, constant, 8 APs XXX Roofnet shares its 802.11 channel with the rest of Cambridge XXX Other 802.11 traffic could corrupt our traffic at a time-scale of individual packets, without affecting our S/N measurements (xxx what’s the experiment?)