SlideShare a Scribd company logo
1 of 16
QoS In WLAN

       BY
 WAQAS SHEHZAD
FAST NU PAKISTAN
Outline


 Introduction
 QoS Parameters.
 802.11 medium access control schemes
  (MAC).
 802.11e medium access control schemes
  (MAC).
 Conclusion.
 Reference.
Introduction

 What is 802.11?
 802.11 refers to a family of specifications
    developed by the IEEE for wireless LAN
    technology.
   802.11 Standards.
   1997 - 802.11 up to 2Mbps (900MHZ).
   1999 - 802.11b 2.4GHZ and up to 11Mbps.
   1999 – 802.11a 5GHZ and up to 54Mbps.
   200x – 802.11g 2.4GHZ and up to 54Mbps.
   200x – 802.11e for QoS.
Quality of Service (QoS)

   QoS is the capability to provide resource
    assurance in a network.
   QoS Parameters:
    Bandwidth.
    Delay.(how long it takes for a bit of data to travel
    across the network from one node or endpoint to
    another.)
    Packet loss rate.
    Jitter.
QoS in TP link wireless router



upload stream

   Download
IEEE 802.11e




               HCF Controlled Channel
               Access




                 Enhanced DCF Channel
                 Access
802.11 medium access control schemes (MAC).



   There are two basic medium
     access control (MAC) modes:
    Distributed Coordination
     Function (DCF).
    Point Coordination Function
     (PCF).
Distributed Coordination Function (DCF)


 Contention-Based.
 Based on Carrier Sense Multiple Access with
  Collision Avoidance (CSMA/CA) algorithm.
 Designed for a best-effort service.
 Supports Asynchronous transmission.
Limitation of Distributed Coordination Function
                      (DCF)

 Does not provide any QoS guarantees.
 Does not support real-time application.
 Designed for equal priorities.
 Does not support the concept of differentiating
 frames with different user priorities.
Point Coordination Function (PCF)


 Contention free-based.
 Uses a centralized polling scheme.
 Differentiation Considered based on priority.
 Supports synchronous transmission.
.
Limitation of Point Coordination Function (PCF)


   poor QoS performance.
   Uses a simple round-robin
    algorithm, which can not handle the
    various QoS requirements.
   Transmission time of the polled
    stations is unknown.
Hybrid Coordination Function (HCF)



There are two methods of channel
  access:
 Enhanced DCF channel access (EDCA).
 HCF controlled channel access
  (HCCA).
Enhanced DCF Channel Access (EDCA)


 Contention-Based channel access(many
  users to use the same radio channel
  without pre-coordination).
 Provides service differentiation.
 Classifies the traffic into 8 different
  classes.
 Each station has 4 access categories to
  provide service differentiation.
EDCA


    Priority      Access            Designation
               Category (AC)        (Informative)

0              0               Best Effort
1              0               Best Effort
2              0               Best Effort
3              1               Video Probe
4              2               Video
5              2               Video
6              3               Voice
7              3               Voice
HCF Controlled Channel Access ( HCCA)



 Provides Guaranteed Services with a
  much higher probability than EDCA.
 Combines the advantages of PCF and
  DCF.
 Coordinates the traffic in any fashion
  (not just round- robin).
Conclusion


 The IEEE 802.11 wireless LAN (WLAN) has
  become one of the most widely used wireless
  technologies in these days.
 The 802.11 standards can not provide any
  QoS guarantees due to poor performance.
 The 802.11e offers QoS support to time-
  sensitive applications, such as, audio and
  video communications.

More Related Content

What's hot

Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingIJARIIT
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)IAESIJEECS
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesDhrumil Panchal
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesDheryta Jaisinghani
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerMahdi Ahmed Jama
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04daniel ayalew
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansTutun Juhana
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stackAmi Prakash
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 

What's hot (17)

Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwarding
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC Layer
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
Wlan systems
Wlan systemsWlan systems
Wlan systems
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 

Similar to QoS in WLAN Explained: Parameters, 802.11 & 802.11e MAC Schemes

An2418881897
An2418881897An2418881897
An2418881897IJMER
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Mumbai Academisc
 
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...IDES Editor
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATIONDaisyWatson5
 
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLA NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLIAEME Publication
 

Similar to QoS in WLAN Explained: Parameters, 802.11 & 802.11e MAC Schemes (20)

An2418881897
An2418881897An2418881897
An2418881897
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Seminar
SeminarSeminar
Seminar
 
Qos wlan
Qos wlanQos wlan
Qos wlan
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
 
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
Darsh
DarshDarsh
Darsh
 
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
WiMAX AND WLAN NETWORKS FOR VOICE OVER IP APPLICATION
 
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLA NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOL
 

More from 8neutron8

String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,8neutron8
 
Cloud computing by amazon
Cloud computing by amazonCloud computing by amazon
Cloud computing by amazon8neutron8
 
Max flow problem and push relabel algorithem
Max flow problem and push relabel algorithemMax flow problem and push relabel algorithem
Max flow problem and push relabel algorithem8neutron8
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation8neutron8
 
Cloud computing vs grid computing
Cloud computing vs grid computingCloud computing vs grid computing
Cloud computing vs grid computing8neutron8
 
Mobile os by waqas
Mobile os by waqasMobile os by waqas
Mobile os by waqas8neutron8
 

More from 8neutron8 (8)

String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,
 
Amortized
AmortizedAmortized
Amortized
 
Cloud computing by amazon
Cloud computing by amazonCloud computing by amazon
Cloud computing by amazon
 
Max flow problem and push relabel algorithem
Max flow problem and push relabel algorithemMax flow problem and push relabel algorithem
Max flow problem and push relabel algorithem
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation
 
Cloud computing vs grid computing
Cloud computing vs grid computingCloud computing vs grid computing
Cloud computing vs grid computing
 
Mobile os by waqas
Mobile os by waqasMobile os by waqas
Mobile os by waqas
 
Qos in wlan
Qos in wlanQos in wlan
Qos in wlan
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

QoS in WLAN Explained: Parameters, 802.11 & 802.11e MAC Schemes

  • 1. QoS In WLAN BY WAQAS SHEHZAD FAST NU PAKISTAN
  • 2. Outline  Introduction  QoS Parameters.  802.11 medium access control schemes (MAC).  802.11e medium access control schemes (MAC).  Conclusion.  Reference.
  • 3. Introduction  What is 802.11?  802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology.  802.11 Standards.  1997 - 802.11 up to 2Mbps (900MHZ).  1999 - 802.11b 2.4GHZ and up to 11Mbps.  1999 – 802.11a 5GHZ and up to 54Mbps.  200x – 802.11g 2.4GHZ and up to 54Mbps.  200x – 802.11e for QoS.
  • 4. Quality of Service (QoS)  QoS is the capability to provide resource assurance in a network.  QoS Parameters: Bandwidth. Delay.(how long it takes for a bit of data to travel across the network from one node or endpoint to another.) Packet loss rate. Jitter.
  • 5. QoS in TP link wireless router upload stream Download
  • 6. IEEE 802.11e HCF Controlled Channel Access Enhanced DCF Channel Access
  • 7. 802.11 medium access control schemes (MAC). There are two basic medium access control (MAC) modes:  Distributed Coordination Function (DCF).  Point Coordination Function (PCF).
  • 8. Distributed Coordination Function (DCF)  Contention-Based.  Based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm.  Designed for a best-effort service.  Supports Asynchronous transmission.
  • 9. Limitation of Distributed Coordination Function (DCF)  Does not provide any QoS guarantees.  Does not support real-time application.  Designed for equal priorities.  Does not support the concept of differentiating frames with different user priorities.
  • 10. Point Coordination Function (PCF)  Contention free-based.  Uses a centralized polling scheme.  Differentiation Considered based on priority.  Supports synchronous transmission. .
  • 11. Limitation of Point Coordination Function (PCF)  poor QoS performance.  Uses a simple round-robin algorithm, which can not handle the various QoS requirements.  Transmission time of the polled stations is unknown.
  • 12. Hybrid Coordination Function (HCF) There are two methods of channel access:  Enhanced DCF channel access (EDCA).  HCF controlled channel access (HCCA).
  • 13. Enhanced DCF Channel Access (EDCA)  Contention-Based channel access(many users to use the same radio channel without pre-coordination).  Provides service differentiation.  Classifies the traffic into 8 different classes.  Each station has 4 access categories to provide service differentiation.
  • 14. EDCA Priority Access Designation Category (AC) (Informative) 0 0 Best Effort 1 0 Best Effort 2 0 Best Effort 3 1 Video Probe 4 2 Video 5 2 Video 6 3 Voice 7 3 Voice
  • 15. HCF Controlled Channel Access ( HCCA)  Provides Guaranteed Services with a much higher probability than EDCA.  Combines the advantages of PCF and DCF.  Coordinates the traffic in any fashion (not just round- robin).
  • 16. Conclusion  The IEEE 802.11 wireless LAN (WLAN) has become one of the most widely used wireless technologies in these days.  The 802.11 standards can not provide any QoS guarantees due to poor performance.  The 802.11e offers QoS support to time- sensitive applications, such as, audio and video communications.