SlideShare a Scribd company logo
1 of 19
Device to device communications
with Wi-Fi Direct : An Overview

Under The Guidance of:
Dr. D. G. Savakar Sir

Presented By:
Ashutosh Kumar Jha (2BL09CS009)
CONTENTS
 Introduction

 Wi-Fi Direct: A Technical Overview
•
•
•
•
•

Architecture
Group Formation
Security
Layer Two Service Discovery
Power Saving

 Conclusion
 References
INTRODUCTION
 Wi-Fi Direct , defined by the Wi-Fi Alliance aimed at enhancing direct

device to device communications in Wi-Fi.

 Directly data transfer with reduced setup.
 Setup generally consists of bringing two Wi-Fi Direct devices together and
then triggering a "pairing" between them

 Given the wide adoption of Wi-Fi in many kinds of devices, a natural way
for the technology to progress is to target device to device connectivity, i.e.
without requiring the presence of an Access Point (AP), traditionally provided
by other technologies.
 By taking this decision, Wi-Fi Direct immediately inherits all the enhanced QoS,
power saving, and security mechanisms developed for the Wi-Fi infrastructure
mode in the past years.
 Wi-Fi Direct builds upon the successful IEEE 802.11 infrastructure mode and
lets devices negotiate who will take over the AP-like functionalities
 Wi-Fi Direct being a recent specification, its deployment is still on a very early
stage
WI-FI Direct: A Technical Overview
In a typical Wi-Fi network, clients discover and associate to WLANs, which are
created and announced by Access Points (APs).
In this way, a device unambiguously behaves either as an AP or as a client, each
of these roles involving a different set of functionality.

In Wi-Fi Direct these roles are specified as dynamic, and hence a Wi-Fi Direct
device has to implement both the role of a client and the role of an AP
(sometimes referred to as Soft- AP).
These roles are therefore logical roles that could even be executed imultaneously
by the same device either by time sharing the channel or using different
frequencies.
ARCHITECTURE
•The first group is created by a mobile phone sharing its 3G connection
with two laptops; for this first group, the phone is acting as P2P GO
while the two laptops behave as P2P Clients.
•In order to extend the network, one of the laptops establishes a second
P2P Group with a printer; for this second group, the laptop acts as P2P
GO.
•In order to act both as P2P Client and as P2P GO the laptop will
typically alternate between the two roles by time-sharing the Wi-Fi
interface.
•The case of a laptop accessing the Internet through a legacy
infrastructure AP while at the same time streaming content to a TV
set by establishing a P2P Group, where the laptop acts as P2P GO.
•The P2P GO is required to run a Dynamic Host Configuration
Protocol (DHCP) server to provide P2P Clients with IP addresses.
•Finally, Wi-Fi Direct does not allow transferring the role of P2P
GO within a P2P Group.

•In this way, if the P2P GO leaves the P2P Group then the group is
torn down, and has to be re-established using some of the specified
procedures.
GROUP FORMATION

There are several ways in which two devices can establish a P2P Group.
Here we describe three group formation cases, namely,

Standard

Autonomous

Persistent
A. P2P STANDARD GROUP FORMATION

Involves four phase:
1. Discovery
2. GO Negotiation
3. WPS provisioning
4. Address configuration phase
B. P2P AUTONOMOUS GROUP FORMATION

Involves Three phase:
1. Discovery
2. WPS provisioning
3. Address configuration phase
C. P2P PERSISTENT GROUP FORMATION

Involves four phase:
1. Discovery
2. GO Negotiation
3. WPS provisioning
4. Address configuration phase
SECURITY

Security provisioning starts after discovery of devices has taken place.
Wi-Fi Direct devices are required to implement Wi-Fi Protected Setup (WPS)
to support a secure connection with minimal user intervention.
Following WPS terminology, the P2P GO is required to implement an internal
Registrar, and the P2P Client is required to implement an Enrollee.
In particular, WPS allows to establish a secure connection by, e.g., introducing
a PIN in the P2P Client, or pushing a button in the two P2P Devices
The operation of WPS is composed of two parts. In the first part, denoted as
“Phase 1” ,the internal Registrar is in charge of generating and issuing the
network credentials, i.e., security keys, to the Enrollee.
WPS is based on WPA-2 security and uses Advanced Encryption Standard
(AES)-CCMP as cipher, and a randomly generated Pre-Shared Key (PSK)
for mutual authentication.
In the second part, depicted as “Phase 2” in Figure 2, the Enrollee (P2P
Client) disassociates and reconnects using its new Authentication
credentials.
In this way, if two devices already have the required network credentials
(this is the case in the Persistent group formation), there is no need to trigger
the first phase, and they can directly perform the authentication.
LINK TWO SERVICE DISCOVERY
A salient feature of Wi-Fi Direct is the ability to support service
discovery at the link layer.
 In this way, prior to the establishment of a P2P Group, P2P Devices can
exchange queries to discover the set of available services and, based on
this, decide whether to continue the group formation or not.
GAS is a layer two query/response protocol implemented through the use
of public action frames, that allows two non-associated 802.11 devices to
exchange queries belonging to a higher layer protocol (e.g. a service
discovery protocol).
 GAS is implemented by means of a generic container that provides
fragmentation and re- assembly, and allows the recipient device to identify
the higher layer protocol being transported
POWER SAVING
Using Wi-Fi Direct, battery-constrained devices may typically act as P2P
GO (soft-AP), and therefore energy efficiency is of capital importance.
In order to support energy savings for the AP, Wi-Fi Direct defines two
new power saving mechanisms:

OPS

• Opportunistic Power
Save protocol

NoA

• Notice of Absence
protocol
CONCLUSION
The widespread adoption of Wi-Fi in new classes of smaller devices has
made the need for ad hoc networking much more important. Even without a
central Wi-Fi hub or router, it would be useful for a laptop computer to be
able to wirelessly connect to a local printer.
Another use for Wi-Fi Direct is to provide a wireless connection to
peripherals.
Wireless mice, keyboards, remote controls, headsets, speakers, displays
and many other functions can be implemented with Wi-Fi Direct.
Google announced Wi-fi Direct support in Android 4.0 in October, 2011.
The Galaxy Nexus(released November 2011) was the first Android device
to ship with Google's implementation of this feature.
The Galaxy Nexus, an Android 4.0 phone with native Wi-Fi Direct
Here comes your footer  Page 17
REFERENCES
[1] IEEE 802.11z-2010 - Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) specifications Amendment 7: Extensions to Direct-Link
Setup (DLS).
[2] Jin-Shyan Lee; Yu-Wei Su; Chung-Chou Shen, A Comparative Study of
Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi, Industrial Electronics
Society, 2007. IECON 2007.
[3] Wi-Fi Alliance, P2P Technical Group, Wi-Fi Peer-to-Peer (P2P) Technical
Specification v1.0, December 2009.
[4] D. Camps-Mur, X. Perez-Costa, S. Sallent-Ribes, Designing en-ergy efficient
Access Points with Wi-Fi Direct, Computer Networks, September 2011.
Thank You
now

Any Queries

Presented By:
Ashutosh Kumar Jha
USN- 2BL09CS009
Dept. Computer Science & Engineering,
BLDEA’s V.P Dr. P.G.H Colg of Engg &Tech.

More Related Content

What's hot

What's hot (20)

Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
PoE Power Introduction
PoE Power IntroductionPoE Power Introduction
PoE Power Introduction
 
Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here... Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here...
 
Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
WiGig PPT
WiGig PPTWiGig PPT
WiGig PPT
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Wifi
WifiWifi
Wifi
 
IEEE 802.11ax
IEEE 802.11axIEEE 802.11ax
IEEE 802.11ax
 

Viewers also liked

Wifi Direct Based Chat And File Transfer Android Application
Wifi Direct Based Chat And File Transfer Android ApplicationWifi Direct Based Chat And File Transfer Android Application
Wifi Direct Based Chat And File Transfer Android ApplicationNitin Bhasin
 
WiFi direct
WiFi directWiFi direct
WiFi directRoy Chen
 
Wifi direct p2p app
Wifi direct p2p appWifi direct p2p app
Wifi direct p2p appgeniushkg
 
Wifi chat code explaination
Wifi chat code explainationWifi chat code explaination
Wifi chat code explainationgeniushkg
 
Como compartir en tu Tv
Como compartir en tu TvComo compartir en tu Tv
Como compartir en tu TvAntonio Reales
 
A project report on chat application
A project report on chat applicationA project report on chat application
A project report on chat applicationKumar Gaurav
 
BoscoChat(A Free Wi-Fi Chat Room in Android)
BoscoChat(A Free Wi-Fi Chat Room in Android)BoscoChat(A Free Wi-Fi Chat Room in Android)
BoscoChat(A Free Wi-Fi Chat Room in Android)Samaresh Debbarma
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesskumartarget
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...Tokyo University of Science
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communicationSharu Sparky
 
Boscochat- A free Wi-Fi ChatRoom in android final documentation
Boscochat- A free Wi-Fi ChatRoom in android final documentationBoscochat- A free Wi-Fi ChatRoom in android final documentation
Boscochat- A free Wi-Fi ChatRoom in android final documentationSamaresh Debbarma
 
project
projectproject
projectdnraj
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONAtul Kushwaha
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 

Viewers also liked (20)

Wifi Direct Based Chat And File Transfer Android Application
Wifi Direct Based Chat And File Transfer Android ApplicationWifi Direct Based Chat And File Transfer Android Application
Wifi Direct Based Chat And File Transfer Android Application
 
WiFi direct
WiFi directWiFi direct
WiFi direct
 
Wifi direct p2p app
Wifi direct p2p appWifi direct p2p app
Wifi direct p2p app
 
Wi fi direct
Wi fi direct Wi fi direct
Wi fi direct
 
Wifi chat code explaination
Wifi chat code explainationWifi chat code explaination
Wifi chat code explaination
 
Como compartir en tu Tv
Como compartir en tu TvComo compartir en tu Tv
Como compartir en tu Tv
 
A project report on chat application
A project report on chat applicationA project report on chat application
A project report on chat application
 
BoscoChat(A Free Wi-Fi Chat Room in Android)
BoscoChat(A Free Wi-Fi Chat Room in Android)BoscoChat(A Free Wi-Fi Chat Room in Android)
BoscoChat(A Free Wi-Fi Chat Room in Android)
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
 
Boscochat- A free Wi-Fi ChatRoom in android final documentation
Boscochat- A free Wi-Fi ChatRoom in android final documentationBoscochat- A free Wi-Fi ChatRoom in android final documentation
Boscochat- A free Wi-Fi ChatRoom in android final documentation
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
Multi user chat system using java
Multi user chat system using javaMulti user chat system using java
Multi user chat system using java
 
Cellular V2X
Cellular V2XCellular V2X
Cellular V2X
 
Chat application
Chat applicationChat application
Chat application
 
project
projectproject
project
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATION
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 

Similar to Wi-Fi Direct

MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSIJCSEA Journal
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSIJCSEA Journal
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSIJCSEA Journal
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSIJCSEA Journal
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSIJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksCisco Service Provider
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-corewarchitect
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object frameworkijscai
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Cisco Service Provider Mobility
 
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtubeShahinAlam930521
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?Michal Jarski
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technologyferasfarag
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperAerohive Networks
 
Wi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser AppWi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser AppAnand Sekar
 

Similar to Wi-Fi Direct (20)

MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
 
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPSMULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
MULTI-PATH LIVE VIDEO STREAMING OVER WI-FI DIRECT MULTI-GROUPS
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access Networks
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object framework
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
Final project report
Final project reportFinal project report
Final project report
 
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtube
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Wi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser AppWi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser App
 
Wi fi
Wi fiWi fi
Wi fi
 
Open stackatlantagrouppolicy
Open stackatlantagrouppolicyOpen stackatlantagrouppolicy
Open stackatlantagrouppolicy
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Wi-Fi Direct

  • 1. Device to device communications with Wi-Fi Direct : An Overview Under The Guidance of: Dr. D. G. Savakar Sir Presented By: Ashutosh Kumar Jha (2BL09CS009)
  • 2. CONTENTS  Introduction  Wi-Fi Direct: A Technical Overview • • • • • Architecture Group Formation Security Layer Two Service Discovery Power Saving  Conclusion  References
  • 3. INTRODUCTION  Wi-Fi Direct , defined by the Wi-Fi Alliance aimed at enhancing direct device to device communications in Wi-Fi.  Directly data transfer with reduced setup.  Setup generally consists of bringing two Wi-Fi Direct devices together and then triggering a "pairing" between them  Given the wide adoption of Wi-Fi in many kinds of devices, a natural way for the technology to progress is to target device to device connectivity, i.e. without requiring the presence of an Access Point (AP), traditionally provided by other technologies.
  • 4.  By taking this decision, Wi-Fi Direct immediately inherits all the enhanced QoS, power saving, and security mechanisms developed for the Wi-Fi infrastructure mode in the past years.  Wi-Fi Direct builds upon the successful IEEE 802.11 infrastructure mode and lets devices negotiate who will take over the AP-like functionalities  Wi-Fi Direct being a recent specification, its deployment is still on a very early stage
  • 5. WI-FI Direct: A Technical Overview In a typical Wi-Fi network, clients discover and associate to WLANs, which are created and announced by Access Points (APs). In this way, a device unambiguously behaves either as an AP or as a client, each of these roles involving a different set of functionality. In Wi-Fi Direct these roles are specified as dynamic, and hence a Wi-Fi Direct device has to implement both the role of a client and the role of an AP (sometimes referred to as Soft- AP). These roles are therefore logical roles that could even be executed imultaneously by the same device either by time sharing the channel or using different frequencies.
  • 7. •The first group is created by a mobile phone sharing its 3G connection with two laptops; for this first group, the phone is acting as P2P GO while the two laptops behave as P2P Clients. •In order to extend the network, one of the laptops establishes a second P2P Group with a printer; for this second group, the laptop acts as P2P GO. •In order to act both as P2P Client and as P2P GO the laptop will typically alternate between the two roles by time-sharing the Wi-Fi interface. •The case of a laptop accessing the Internet through a legacy infrastructure AP while at the same time streaming content to a TV set by establishing a P2P Group, where the laptop acts as P2P GO. •The P2P GO is required to run a Dynamic Host Configuration Protocol (DHCP) server to provide P2P Clients with IP addresses. •Finally, Wi-Fi Direct does not allow transferring the role of P2P GO within a P2P Group. •In this way, if the P2P GO leaves the P2P Group then the group is torn down, and has to be re-established using some of the specified procedures.
  • 8. GROUP FORMATION There are several ways in which two devices can establish a P2P Group. Here we describe three group formation cases, namely, Standard Autonomous Persistent
  • 9. A. P2P STANDARD GROUP FORMATION Involves four phase: 1. Discovery 2. GO Negotiation 3. WPS provisioning 4. Address configuration phase
  • 10. B. P2P AUTONOMOUS GROUP FORMATION Involves Three phase: 1. Discovery 2. WPS provisioning 3. Address configuration phase
  • 11. C. P2P PERSISTENT GROUP FORMATION Involves four phase: 1. Discovery 2. GO Negotiation 3. WPS provisioning 4. Address configuration phase
  • 12. SECURITY Security provisioning starts after discovery of devices has taken place. Wi-Fi Direct devices are required to implement Wi-Fi Protected Setup (WPS) to support a secure connection with minimal user intervention. Following WPS terminology, the P2P GO is required to implement an internal Registrar, and the P2P Client is required to implement an Enrollee. In particular, WPS allows to establish a secure connection by, e.g., introducing a PIN in the P2P Client, or pushing a button in the two P2P Devices The operation of WPS is composed of two parts. In the first part, denoted as “Phase 1” ,the internal Registrar is in charge of generating and issuing the network credentials, i.e., security keys, to the Enrollee.
  • 13. WPS is based on WPA-2 security and uses Advanced Encryption Standard (AES)-CCMP as cipher, and a randomly generated Pre-Shared Key (PSK) for mutual authentication. In the second part, depicted as “Phase 2” in Figure 2, the Enrollee (P2P Client) disassociates and reconnects using its new Authentication credentials. In this way, if two devices already have the required network credentials (this is the case in the Persistent group formation), there is no need to trigger the first phase, and they can directly perform the authentication.
  • 14. LINK TWO SERVICE DISCOVERY A salient feature of Wi-Fi Direct is the ability to support service discovery at the link layer.  In this way, prior to the establishment of a P2P Group, P2P Devices can exchange queries to discover the set of available services and, based on this, decide whether to continue the group formation or not. GAS is a layer two query/response protocol implemented through the use of public action frames, that allows two non-associated 802.11 devices to exchange queries belonging to a higher layer protocol (e.g. a service discovery protocol).  GAS is implemented by means of a generic container that provides fragmentation and re- assembly, and allows the recipient device to identify the higher layer protocol being transported
  • 15. POWER SAVING Using Wi-Fi Direct, battery-constrained devices may typically act as P2P GO (soft-AP), and therefore energy efficiency is of capital importance. In order to support energy savings for the AP, Wi-Fi Direct defines two new power saving mechanisms: OPS • Opportunistic Power Save protocol NoA • Notice of Absence protocol
  • 16. CONCLUSION The widespread adoption of Wi-Fi in new classes of smaller devices has made the need for ad hoc networking much more important. Even without a central Wi-Fi hub or router, it would be useful for a laptop computer to be able to wirelessly connect to a local printer. Another use for Wi-Fi Direct is to provide a wireless connection to peripherals. Wireless mice, keyboards, remote controls, headsets, speakers, displays and many other functions can be implemented with Wi-Fi Direct. Google announced Wi-fi Direct support in Android 4.0 in October, 2011. The Galaxy Nexus(released November 2011) was the first Android device to ship with Google's implementation of this feature.
  • 17. The Galaxy Nexus, an Android 4.0 phone with native Wi-Fi Direct Here comes your footer  Page 17
  • 18. REFERENCES [1] IEEE 802.11z-2010 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 7: Extensions to Direct-Link Setup (DLS). [2] Jin-Shyan Lee; Yu-Wei Su; Chung-Chou Shen, A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi, Industrial Electronics Society, 2007. IECON 2007. [3] Wi-Fi Alliance, P2P Technical Group, Wi-Fi Peer-to-Peer (P2P) Technical Specification v1.0, December 2009. [4] D. Camps-Mur, X. Perez-Costa, S. Sallent-Ribes, Designing en-ergy efficient Access Points with Wi-Fi Direct, Computer Networks, September 2011.
  • 19. Thank You now Any Queries Presented By: Ashutosh Kumar Jha USN- 2BL09CS009 Dept. Computer Science & Engineering, BLDEA’s V.P Dr. P.G.H Colg of Engg &Tech.