SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 521
OVERVIEW OF WIRELESS NETWORK CONTROL PROTOCOL IN
SMART PHONE DEVICES
P.L.Ramteke1
, D.N.Choudhary2
1
Associate Professor, HVPM’s College of Engineering & Technology, Amravati, Maharashtra State [INDIA]
2
Professor & Head, Department of Information Technology, Jawaharlal Darda Institute of Engineering & Technology,
Yavatmal, Maharashtra State [INDIA], 1
pl_ramteke@rediffmail.com, 2
dnchaudhari2007@rediffmail.com
Abstract
The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are
popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all
applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with
server management, Information Technology organizations begins the process of centralizing servers. It used with architecture
principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced
services in addition to just raw connectivity, distributed processing is required both for scalability ability and services, network
support continuously increase the level of throughputs etc. Wireless LAN product architectures have evolved from single autonomous
access points to systems, consisting of a centralized Access Controller and Wireless Termination Points.
The basic goal of centralized control architectures is to move access control, including user authentication and authorization,
mobility & radio management, from one access point to centralized controller. The Wireless network Control Protocol allows for
access and control of large-scale wireless local area networks. It can allows management of these networks, Control and
Provisioning of Wireless Access Points In computer networking, a wireless access point is a device that allows wireless devices to
connect to wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router via a wired network,
and can relay data between the wireless devices such as computers or printers and wired devices on the network
Keywords: Wireless network control protocol, Wireless LAN, Wireless Transaction Protocol, Media Access Control
-------------------------------------------------------------------*****--------------------------------------------------------------------
1. INTRODUCTION
Today wireless local area networks have great popularity but
incompatible designs and solutions. Control and Provisioning
of Wireless Access Points is a standard, interoperable protocol
that enables controller to manage a collection of wireless
access points The Control and Provisioning of Wireless
Access Points architecture taxonomy describes major
variations of these designs. This protocol differentiates
between data traffic and control traffic. The control messages
are transmitted in a Datagram Transport Layer Security tunnel.
The ability to interface with other devices using different
wireless protocols could be used for remote sensing or
instrument control. The camera can even potentially be used
for direct data acquisition. Vodafone Wireless Innovation
Project was compact
Microscopes that interface with a cell-phone camera. There is
also nano sensor-based detector for airborne chemicals that
plugs into an iPhone. Although envisioned for field use, these
devices highlight the possibilities of the technology. Wireless
Network Control Protocol recognizes the major architecture
designs and presents common platform on which WLAN
entities of different designs can be accommodated. This
enables interoperability among wireless termination points and
WLAN access controllers of distinct architecture designs.
Therefore Wireless network Control Protocol allows for cost-
effective wireless local area network expansions. It can also
accommodate future developments in Wide LAN
technologies. Figure 1 illustrates Wireless network Control
Protocol operational structure in which distinct control
elements are utilized for Local Media Access Control and
Split MAC WTPs.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 522
Logical Groups
Logical Groups
Figure 1 Wireless Local Area Network Control Protocol configuration
Wireless network Control Protocol also addresses the
increasing trend of shared infrastructure. Its management
needs to distinguish and isolate control for the different logical
groups sharing single physical WLAN. WiCoP manages
WLANs through a series of tunnels that separate traffic based
on logical groups. The WiCoP operational structure is shown
in Figure 1.Each WTP uses number of tunnels to distinguish
and separate traffic for control and for each logical group.
The protocol allows for managing WLANs in a manner
consistent with the logical groups that share the physical
infrastructure. Wireless network LAN Control Protocol
operates control tunnels and logical group tunnels between the
Access Control and two types of Media Access Control
Wireless Termination Points. MAC is a unique identifier
assigned to network interfaces for communications on the
physical network segment. Logically, MAC addresses are used
in the Media Access Control protocol sub-layer of the OSI
reference model. MAC addresses are most often assigned by
the manufacturer of a network interface card and are stored in
its hardware, the card's read-only memory, or some other
firmware mechanism. If assigned by the manufacturer, MAC
address usually encodes the manufacturer's registered
identification number. The control tunnels are used to
transport messages dealing with configuration, monitoring,
and management of Wireless Transaction Protocols. The
logical group tunnels serve to separate traffic among each of
logical groups constituting physical WTP.
2. PROTOCOL OVERVIEW
The Wireless network Control Protocol focuses on enabling
interoperability in shared infrastructure WLANs. It is designed
for use with different wireless technologies. The state machine
for WiCoP is illustrated in Figure 2.
Access
Control
Local
MAC
WTP
Split
MAC
WTP
Control Tunnel
Logical Group A
Logical Group
B
Logical Group
C
A
B
C
2
1
Control Tunnel
Logical Group 1
Logical Group 2
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 523
A A
V
V
Fig.2 State machine for Wireless network control protocol
The Capabilities Exchange state represents initial protocol
exchange between WTP and AC. In WTP state determines
possible ACs from which it can receive management services.
The Connection state represents the creation of a security
infrastructure between a WTP and AC An AC in this state
determines the capabilities of the WTP and the WTP's
compatibility with management services. This involves mutual
authentication and the establishment of secure connection
between WiCoP entities. The Configuration state represents
exchange of long-term operational parameters and settings
between WTP and AC. A WTP in this state receives
configuration information to operate consistently within
WLAN managed by AC. An AC in this state provides
configuration information to WTP based on the WTP's
capabilities and network policies involved. The Operation
state represents the active exchange of WiCoP monitoring
and management messages. WTPs send regular status updates
to and receive corresponding management instructions from
the AC.This state involves firmware and configuration updates
arising from changes in network conditions and administrative
policies.WiCoP Format: Separate packets are used by WiCoP
for control and data message transfer between AC and WTPs.
A common header is used for both types of packets in which
a single-bit flag distinguishes between them. WiCoP Header:
Figure 3 illustrates the WiCoP common header for control and
data packets.
0 7 15 23 31
----|-------|-------|-------|-------|-------|----------
Version |M|D|C|R|E|F|L| | Reserve |-----------
----+-+-+-+-+-+-+-+-+---------------
Fragment ID | Fragment No. | Length |----------
---+---------------+----------------------
Figure 3: Wi CoP Header Version Field
This field indicates the protocol version.'M' Field: The
MAC-type field, 'M', distinguishes between Local MAC
WTPs and Split MAC WTPs. It is used to efficiently realize
interoperability between WTPs of the two different designs.
A '0' value indicates WiCoP exchanges with Split MAC
WTP while a '1' value indicates WiCoP exchanges with Local
MAC WTP.
'D ‘Field: the differentiator field,’D ‘, is used to distinguish
between WTP variants within a type of WTP design. The
CAPWAP Architecture illustrates that Split MAC design
allows encryption/decryption to be performed at either the
WTP or the AC. WiCoP acknowledges these major variants
and accommodates them using ‘D’ field in MAC WTP, the
'D' field is used to indicate conjunction with the 'M' field. For
a Split location of encryption/decryption while for a Local
MAC WTP.
'C' Field: This field distinguishes between a WiCoP control
and WiCoP data packet. Each type of information is tunneled
separately across the WiCoP tunnel interfaces between WTPs
and the AC. A '0' value for the 'C' field indicates a data
packet; while a '1' value indicates a control packet. The 'C'
field is also used to assign WiCoP packets to distinct data
and control tunnels between the AC and WTP.
'R' Field: The retransmission field, 'R', is used to differentiate
between first & subsequent transmissions of WiCoP packets.
The 'R' field is used for critical WiCoP packets such as those
relating to security key exchanges. A '0' value for the 'R'
field indicates the first transmission of a WiCoP packet;
while a '1' value indicates retransmission.
'E ‘Field: the encryption field, 'E', is used to indicate if the
WiCoP packet is encrypted between the AC and WTPs. The
'E' field is used for those WiCoP packets that are exchanged
during initialization. A '0' value indicates the WiCoP packet
is unencrypted, while a '1' value indicates the packet is
encrypted.
Initialization Exchange
Capabilities
Connection
Configuration
Operation
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 524
'F' Field: The fragmentation field indicates if the packet is a
fragment of larger packet. A '0' value indicates a non-
fragmented packet while ‘1’ value indicates a fragmented
packet. The 'F', 'L', ‘Fragment ID’, and 'Fragment No.' fields
are used together.
'L' Field: This field is used to indicate the last fragment of a
larger packet. It is only valid when the 'F' field has a '1' value.
A '0' value for the 'L' field indicates the last fragment of a
larger packet while '1' value indicates an intermediate
fragment of a larger packet.
Fragment ID Field: The Fragment ID identifies the larger
packet that has been fragmented. It is used to distinguish
between fragments of different large packets. This field is
valid only when the 'F' field has '1' value. The 'F', 'L',
'Fragment ID', and 'Fragment No.' fields are used together.
Fragment No. Field: The fragment number field identifies the
sequence of fragments of larger packet. The value of
Fragment No. field is incremented for each fragment of
larger packet so as to show the order of fragments. This field
is valid only when the 'F' field has a '1' value. The 'F', 'L',
'Fragment ID', and 'Fragment No.' fields are used together.
3. WiCoP DATA PACKET
WiCoP data packets include the WiCoP common header
followed by a payload. Data packets are used to distinguish
traffic from control when both control and data paths are
identical. Such scenario would involve data traffic of WTPs
traversing the AC. However, given diversity of large-scale
WLAN deployments, there are scenarios in which data and
control paths are distinct. WiCoP can be used in both cases.
4. ACTIVE PRESENCE TIMER
The Active Presence Timer is used by each WiCoP entity AC
and WTPs to verify the presence of each other. The absence
of a reply to Feedback message within the expiration of the
Active Presence Timer indicates the corresponding entity is
inactive. Contingency operations such as reset are used in this
case. The value of Active Presence Timer ranges from 10 to
300 seconds with a default value of 30 seconds.
5. WiCoP PROCESS
The processes of the Wireless LAN Control Protocol are
described in this section with respect to the operational state in
which they occur.
5.1. Initialization:
The Initialization state represents the initial conditions of
WiCoP entities. WTPs and ACs in this state are powered
on, run hardware self-check tests, and reset network
interfaces. State transition: Initialization Capabilities
Exchange WTP: Automatically upon detecting an active
network interface AC: Upon receiving a Capabilities message
from a WTP
5.2. Capabilities Exchange:
The Capabilities Exchange state allows WTPs to first find an
AC and then to exchange capabilities information with it.
WiCoP is designed to control WLANs with both Local MAC
and Split MAC WTPs. The differences in their respective
functional characteristics are determined in this state. The
WTP first broadcasts Capabilities message as soon as it
transitions from its Initialization state. The Capabilities
message serves to discover ACs and contains information on
its identity and capabilities. The AC receiving message
transitions from its Initialization state. It examines
compatibility with respect to the WTP type, its capabilities,
and responds with an appropriate Capabilities Response
message.
6. OPERATIONAL EFFICIENCY
The fact that WiCoP requires a single operation to distinguish
and manage WTPs of different designs makes it operationally
efficient. Because WiCoP assigns dedicated classification bits
in the common header, an AC needs to parse incoming packets
only once to determine particular manner in which it is to be
processed. Without dedicated classifications in the common
header, an AC would have to perform lookup after parsing
every incoming packet, which would result in delaying
processing. The scale and sensitivity of large- scale
deployments require that WLAN control protocols be efficient
in operation.
6.1. Semantic Efficiency: In certain cases, WiCoP
combines utilities in a single operation. One particular case is
that of statistics and activity feedback. Here, WTPs regularly
send a single Feedback message containing statistics and
other state information, which also acts as an implicit keep
alive mechanism. This helps to reduce the number of
message exchanges and also simplifies protocol
implementation. Similarly, the Capabilities messages serve
the purpose of finding ACs as well as informing them of
WTP capabilities and design.
SUMMARY AND CONCLUSION
WiCoP includes trigger for suitable authentication mechanism.
The Wireless LAN Control Protocol presents solution for
managing large-scale WLANs with diverse elements. It
addresses the challenges presented in CAPWAP Problem
Statement and realizes the requirements of CAPWAP
Objectives. WiCoP enables integral control of Split MAC and
Local MAC WTPs by defining appropriate differentiators
within the protocol message exchanges and processes. It
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 525
addresses architecture designs in which authenticator and
encryption points are located on distinct entities. In doing so,
WiCoP realizes the interoperability objective and its benefits.
WiCoP also addresses shared WLAN deployments by
configuring and managing WTPs on logical group basis. It is
further provisioned to separate control and data traffic within
WLANs. So, the protocol addresses the objectives of logical
groups and traffic separation. Architecture designs in which
authentication is performed at the AC and encryption at WTPs
can be exposed to the threat of replay attacks.
ACKNOWLEDGEMENTS
The authors are thankful of researcher for their contribution in
wireless networking and protocol who help and motivate us to
contribute our work in this area.
REFERENCES
[1] Yang, L., Zerfos, P., and E. Sadot, "Architecture
Taxonomy for Control and Provisioning of wireless Access
Points (CAPWAP)", RFC 4118, June 2005.
[2] Govindan, S., Ed., Cheng, H., Yao, ZH., Zhou, WH., and
L. Yang, "Objectives for Control and Provisioning of
Wireless Access Points (CAPWAP)", RFC 4564, July 2006.
[3] O'Hara, B., Calhoun, P., and J. Kempf, "Configuration and
Provisioning for Wireless Access Points (CAPWAP)
Problem Statement", RFC 3990, February 2005.
[4]http://www.nature.com/nmeth/journal/v7/n2/full/nmeth021
0-87.html
[5] Allman, M., Paxson, V. and W. Stevens, "TCP Congestion
Control", RFC 2581, April 1999.
[6] Jacobson, V., Braden, R. "TCP Extensions for High
Performance", RFC 1323, May 1992.
[7] Mathis, M., Mahdavi, J., Floyd, S. "TCP Selective
Acknowledgment Options", , October 1996.
[8] Allman, M., Floyd, S. and C. Partridge, "Increasing TCP's
Initial Window", October 2002.
[9] Dawkins, S., Montenegro, G., Kojo, M. and V. Magret,
"End-to-end Performance Implications of Slow Links", BCP
48, RFC 3150, July 2001.
[10] Mogul, J. and S. Deering, "Path MTU Discovery", RFC
1191, November 1990.
[11] Knowles, S., "IESG Advice from Experience with Path
MTU Discovery", RFC 1435, March 1993.
[12] McCann, J., Deering, S. and J. Mogul, "Path MTU
Discovery for IP version ",August 1996.
[13] Ramakrishnan, K., Floyd, S. and D. Black, The Addition
of Explicit Congestion notification (ECN) to IP", RFC 3168,
September 2001.
[14] Allman, M., Balakrishnan, H. and S. Floyd, "Enhancing
TCP's Loss Recovery Using Limited Transmit", RFC 3042,
January 2001.
[15] Paxson, V. and M. Allman, "Computing TCP's
Retransmission Timer", November 2000.
[16] Hannu, H., Jonsson, L-E., Hakenberg, R., Koren, T., Le,
K., Liu, Z., Martensson, A., "RObust Header Compression
Framework and four profiles:, July 2001.
[17] Degermark, M., Nordgren, B. and S. Pink, "IP Header
Compression", RFC 2507, February 1999.
[18] Postel, J., "Transmission Control Protocol DARPA
Internet Program Protocol Specification", STD 7, RFC 793,
September 1981.
[19] Floyd, S. and T. Henderson, "The NewReno Modification
to TCP's Fast Recovery Algorithm", April 1999.
[20] Bormann, C., "Robust Header Compression (ROHC) over
PPP", RFC 3241, April 2002.
BIOGRAPHIES
P.L.Ramteke is working as a Associate Professor & Head at
Information Technology Department. He is expertise in
modeling and simulation, Mobile technology and software
Engineering.
D.N.Choudhary is Professor & Heat at IT Departnet at
JDIT’s College of Engineering & Technology, Yavatmal.He is
Ph.D. Supervisor & expert in Data Mining, Mobile Computing

Weitere ähnliche Inhalte

Was ist angesagt?

Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...iosrjce
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16eSimona Halunga
 
Unit 3 it6601 presentation
Unit 3 it6601 presentationUnit 3 it6601 presentation
Unit 3 it6601 presentationraja744
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
 
Bus Data Acquisition and Remote Monitoring System Using Gsm & Can
Bus Data Acquisition and Remote Monitoring System Using Gsm & CanBus Data Acquisition and Remote Monitoring System Using Gsm & Can
Bus Data Acquisition and Remote Monitoring System Using Gsm & CanIOSR Journals
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layerDeepak John
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...TELKOMNIKA JOURNAL
 
Building a metro ethernet network to deliver high bandwidth internet protocol...
Building a metro ethernet network to deliver high bandwidth internet protocol...Building a metro ethernet network to deliver high bandwidth internet protocol...
Building a metro ethernet network to deliver high bandwidth internet protocol...IRJET Journal
 
Vehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area NetworkVehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area NetworkIRJET Journal
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networksIAEME Publication
 

Was ist angesagt? (20)

Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...
 
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
 
Unit 3 it6601 presentation
Unit 3 it6601 presentationUnit 3 it6601 presentation
Unit 3 it6601 presentation
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
 
K NX system DDIS
K NX system DDIS K NX system DDIS
K NX system DDIS
 
Bus Data Acquisition and Remote Monitoring System Using Gsm & Can
Bus Data Acquisition and Remote Monitoring System Using Gsm & CanBus Data Acquisition and Remote Monitoring System Using Gsm & Can
Bus Data Acquisition and Remote Monitoring System Using Gsm & Can
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
Mobility management
Mobility managementMobility management
Mobility management
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
 
Lect4
Lect4Lect4
Lect4
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...
 
Building a metro ethernet network to deliver high bandwidth internet protocol...
Building a metro ethernet network to deliver high bandwidth internet protocol...Building a metro ethernet network to deliver high bandwidth internet protocol...
Building a metro ethernet network to deliver high bandwidth internet protocol...
 
Vehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area NetworkVehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area Network
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
It2402 mobile communication unit3
It2402 mobile communication unit3It2402 mobile communication unit3
It2402 mobile communication unit3
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networks
 
Ch7
Ch7Ch7
Ch7
 

Andere mochten auch

Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...eSAT Publishing House
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Publishing House
 
Impact assessment of factors affecting information technology projects in riv...
Impact assessment of factors affecting information technology projects in riv...Impact assessment of factors affecting information technology projects in riv...
Impact assessment of factors affecting information technology projects in riv...eSAT Publishing House
 
“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”eSAT Publishing House
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Review on “service granularity in service oriented
Review on “service granularity in service orientedReview on “service granularity in service oriented
Review on “service granularity in service orientedeSAT Publishing House
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
Effect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryEffect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryeSAT Publishing House
 
Operating and emission characterstics of a novel
Operating and emission characterstics of a novelOperating and emission characterstics of a novel
Operating and emission characterstics of a noveleSAT Publishing House
 
Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmseSAT Publishing House
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo systemeSAT Publishing House
 
A fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelsA fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelseSAT Publishing House
 
Non invasive modalities of neurocognitive science
Non invasive modalities of neurocognitive scienceNon invasive modalities of neurocognitive science
Non invasive modalities of neurocognitive scienceeSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
 
Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...eSAT Publishing House
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateeSAT Publishing House
 
A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...eSAT Publishing House
 
Enhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computingEnhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computingeSAT Publishing House
 
Flexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayFlexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayeSAT Publishing House
 

Andere mochten auch (20)

Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Impact assessment of factors affecting information technology projects in riv...
Impact assessment of factors affecting information technology projects in riv...Impact assessment of factors affecting information technology projects in riv...
Impact assessment of factors affecting information technology projects in riv...
 
“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Review on “service granularity in service oriented
Review on “service granularity in service orientedReview on “service granularity in service oriented
Review on “service granularity in service oriented
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Effect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryEffect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonry
 
Operating and emission characterstics of a novel
Operating and emission characterstics of a novelOperating and emission characterstics of a novel
Operating and emission characterstics of a novel
 
Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin films
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
A fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelsA fusion of soft expert set and matrix models
A fusion of soft expert set and matrix models
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
Non invasive modalities of neurocognitive science
Non invasive modalities of neurocognitive scienceNon invasive modalities of neurocognitive science
Non invasive modalities of neurocognitive science
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...Analytical study and implementation of digital excitation system for diesel g...
Analytical study and implementation of digital excitation system for diesel g...
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plate
 
A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...A novel method for detecting and characterizing low velocity impact (lvi) in ...
A novel method for detecting and characterizing low velocity impact (lvi) in ...
 
Enhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computingEnhanced equally distributed load balancing algorithm for cloud computing
Enhanced equally distributed load balancing algorithm for cloud computing
 
Flexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayFlexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one way
 

Ähnlich wie Overview of Wireless Network Control Protocol in Smart Phones

A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Journals
 
Interfacing omni flow computer to remote operation controller (roc) remote te...
Interfacing omni flow computer to remote operation controller (roc) remote te...Interfacing omni flow computer to remote operation controller (roc) remote te...
Interfacing omni flow computer to remote operation controller (roc) remote te...eSAT Journals
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
 
Gsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automationGsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automationeSAT Journals
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for ioteSAT Publishing House
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study IRJET Journal
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialeSAT Publishing House
 
Optimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous robotOptimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous roboteSAT Publishing House
 
Zigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsZigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsgoodgood
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking moduleeSAT Journals
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network eSAT Publishing House
 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...eSAT Journals
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksEricsson
 

Ähnlich wie Overview of Wireless Network Control Protocol in Smart Phones (20)

A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
Interfacing omni flow computer to remote operation controller (roc) remote te...
Interfacing omni flow computer to remote operation controller (roc) remote te...Interfacing omni flow computer to remote operation controller (roc) remote te...
Interfacing omni flow computer to remote operation controller (roc) remote te...
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
Gsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automationGsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automation
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iot
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrial
 
Optimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous robotOptimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous robot
 
Zigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsZigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applications
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
A servey on wireless mesh networking module
A servey on wireless mesh networking moduleA servey on wireless mesh networking module
A servey on wireless mesh networking module
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motor
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary Networks
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Kürzlich hochgeladen

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Kürzlich hochgeladen (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

Overview of Wireless Network Control Protocol in Smart Phones

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 521 OVERVIEW OF WIRELESS NETWORK CONTROL PROTOCOL IN SMART PHONE DEVICES P.L.Ramteke1 , D.N.Choudhary2 1 Associate Professor, HVPM’s College of Engineering & Technology, Amravati, Maharashtra State [INDIA] 2 Professor & Head, Department of Information Technology, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, Maharashtra State [INDIA], 1 pl_ramteke@rediffmail.com, 2 dnchaudhari2007@rediffmail.com Abstract The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with server management, Information Technology organizations begins the process of centralizing servers. It used with architecture principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced services in addition to just raw connectivity, distributed processing is required both for scalability ability and services, network support continuously increase the level of throughputs etc. Wireless LAN product architectures have evolved from single autonomous access points to systems, consisting of a centralized Access Controller and Wireless Termination Points. The basic goal of centralized control architectures is to move access control, including user authentication and authorization, mobility & radio management, from one access point to centralized controller. The Wireless network Control Protocol allows for access and control of large-scale wireless local area networks. It can allows management of these networks, Control and Provisioning of Wireless Access Points In computer networking, a wireless access point is a device that allows wireless devices to connect to wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router via a wired network, and can relay data between the wireless devices such as computers or printers and wired devices on the network Keywords: Wireless network control protocol, Wireless LAN, Wireless Transaction Protocol, Media Access Control -------------------------------------------------------------------*****-------------------------------------------------------------------- 1. INTRODUCTION Today wireless local area networks have great popularity but incompatible designs and solutions. Control and Provisioning of Wireless Access Points is a standard, interoperable protocol that enables controller to manage a collection of wireless access points The Control and Provisioning of Wireless Access Points architecture taxonomy describes major variations of these designs. This protocol differentiates between data traffic and control traffic. The control messages are transmitted in a Datagram Transport Layer Security tunnel. The ability to interface with other devices using different wireless protocols could be used for remote sensing or instrument control. The camera can even potentially be used for direct data acquisition. Vodafone Wireless Innovation Project was compact Microscopes that interface with a cell-phone camera. There is also nano sensor-based detector for airborne chemicals that plugs into an iPhone. Although envisioned for field use, these devices highlight the possibilities of the technology. Wireless Network Control Protocol recognizes the major architecture designs and presents common platform on which WLAN entities of different designs can be accommodated. This enables interoperability among wireless termination points and WLAN access controllers of distinct architecture designs. Therefore Wireless network Control Protocol allows for cost- effective wireless local area network expansions. It can also accommodate future developments in Wide LAN technologies. Figure 1 illustrates Wireless network Control Protocol operational structure in which distinct control elements are utilized for Local Media Access Control and Split MAC WTPs.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 522 Logical Groups Logical Groups Figure 1 Wireless Local Area Network Control Protocol configuration Wireless network Control Protocol also addresses the increasing trend of shared infrastructure. Its management needs to distinguish and isolate control for the different logical groups sharing single physical WLAN. WiCoP manages WLANs through a series of tunnels that separate traffic based on logical groups. The WiCoP operational structure is shown in Figure 1.Each WTP uses number of tunnels to distinguish and separate traffic for control and for each logical group. The protocol allows for managing WLANs in a manner consistent with the logical groups that share the physical infrastructure. Wireless network LAN Control Protocol operates control tunnels and logical group tunnels between the Access Control and two types of Media Access Control Wireless Termination Points. MAC is a unique identifier assigned to network interfaces for communications on the physical network segment. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model. MAC addresses are most often assigned by the manufacturer of a network interface card and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, MAC address usually encodes the manufacturer's registered identification number. The control tunnels are used to transport messages dealing with configuration, monitoring, and management of Wireless Transaction Protocols. The logical group tunnels serve to separate traffic among each of logical groups constituting physical WTP. 2. PROTOCOL OVERVIEW The Wireless network Control Protocol focuses on enabling interoperability in shared infrastructure WLANs. It is designed for use with different wireless technologies. The state machine for WiCoP is illustrated in Figure 2. Access Control Local MAC WTP Split MAC WTP Control Tunnel Logical Group A Logical Group B Logical Group C A B C 2 1 Control Tunnel Logical Group 1 Logical Group 2
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 523 A A V V Fig.2 State machine for Wireless network control protocol The Capabilities Exchange state represents initial protocol exchange between WTP and AC. In WTP state determines possible ACs from which it can receive management services. The Connection state represents the creation of a security infrastructure between a WTP and AC An AC in this state determines the capabilities of the WTP and the WTP's compatibility with management services. This involves mutual authentication and the establishment of secure connection between WiCoP entities. The Configuration state represents exchange of long-term operational parameters and settings between WTP and AC. A WTP in this state receives configuration information to operate consistently within WLAN managed by AC. An AC in this state provides configuration information to WTP based on the WTP's capabilities and network policies involved. The Operation state represents the active exchange of WiCoP monitoring and management messages. WTPs send regular status updates to and receive corresponding management instructions from the AC.This state involves firmware and configuration updates arising from changes in network conditions and administrative policies.WiCoP Format: Separate packets are used by WiCoP for control and data message transfer between AC and WTPs. A common header is used for both types of packets in which a single-bit flag distinguishes between them. WiCoP Header: Figure 3 illustrates the WiCoP common header for control and data packets. 0 7 15 23 31 ----|-------|-------|-------|-------|-------|---------- Version |M|D|C|R|E|F|L| | Reserve |----------- ----+-+-+-+-+-+-+-+-+--------------- Fragment ID | Fragment No. | Length |---------- ---+---------------+---------------------- Figure 3: Wi CoP Header Version Field This field indicates the protocol version.'M' Field: The MAC-type field, 'M', distinguishes between Local MAC WTPs and Split MAC WTPs. It is used to efficiently realize interoperability between WTPs of the two different designs. A '0' value indicates WiCoP exchanges with Split MAC WTP while a '1' value indicates WiCoP exchanges with Local MAC WTP. 'D ‘Field: the differentiator field,’D ‘, is used to distinguish between WTP variants within a type of WTP design. The CAPWAP Architecture illustrates that Split MAC design allows encryption/decryption to be performed at either the WTP or the AC. WiCoP acknowledges these major variants and accommodates them using ‘D’ field in MAC WTP, the 'D' field is used to indicate conjunction with the 'M' field. For a Split location of encryption/decryption while for a Local MAC WTP. 'C' Field: This field distinguishes between a WiCoP control and WiCoP data packet. Each type of information is tunneled separately across the WiCoP tunnel interfaces between WTPs and the AC. A '0' value for the 'C' field indicates a data packet; while a '1' value indicates a control packet. The 'C' field is also used to assign WiCoP packets to distinct data and control tunnels between the AC and WTP. 'R' Field: The retransmission field, 'R', is used to differentiate between first & subsequent transmissions of WiCoP packets. The 'R' field is used for critical WiCoP packets such as those relating to security key exchanges. A '0' value for the 'R' field indicates the first transmission of a WiCoP packet; while a '1' value indicates retransmission. 'E ‘Field: the encryption field, 'E', is used to indicate if the WiCoP packet is encrypted between the AC and WTPs. The 'E' field is used for those WiCoP packets that are exchanged during initialization. A '0' value indicates the WiCoP packet is unencrypted, while a '1' value indicates the packet is encrypted. Initialization Exchange Capabilities Connection Configuration Operation
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 524 'F' Field: The fragmentation field indicates if the packet is a fragment of larger packet. A '0' value indicates a non- fragmented packet while ‘1’ value indicates a fragmented packet. The 'F', 'L', ‘Fragment ID’, and 'Fragment No.' fields are used together. 'L' Field: This field is used to indicate the last fragment of a larger packet. It is only valid when the 'F' field has a '1' value. A '0' value for the 'L' field indicates the last fragment of a larger packet while '1' value indicates an intermediate fragment of a larger packet. Fragment ID Field: The Fragment ID identifies the larger packet that has been fragmented. It is used to distinguish between fragments of different large packets. This field is valid only when the 'F' field has '1' value. The 'F', 'L', 'Fragment ID', and 'Fragment No.' fields are used together. Fragment No. Field: The fragment number field identifies the sequence of fragments of larger packet. The value of Fragment No. field is incremented for each fragment of larger packet so as to show the order of fragments. This field is valid only when the 'F' field has a '1' value. The 'F', 'L', 'Fragment ID', and 'Fragment No.' fields are used together. 3. WiCoP DATA PACKET WiCoP data packets include the WiCoP common header followed by a payload. Data packets are used to distinguish traffic from control when both control and data paths are identical. Such scenario would involve data traffic of WTPs traversing the AC. However, given diversity of large-scale WLAN deployments, there are scenarios in which data and control paths are distinct. WiCoP can be used in both cases. 4. ACTIVE PRESENCE TIMER The Active Presence Timer is used by each WiCoP entity AC and WTPs to verify the presence of each other. The absence of a reply to Feedback message within the expiration of the Active Presence Timer indicates the corresponding entity is inactive. Contingency operations such as reset are used in this case. The value of Active Presence Timer ranges from 10 to 300 seconds with a default value of 30 seconds. 5. WiCoP PROCESS The processes of the Wireless LAN Control Protocol are described in this section with respect to the operational state in which they occur. 5.1. Initialization: The Initialization state represents the initial conditions of WiCoP entities. WTPs and ACs in this state are powered on, run hardware self-check tests, and reset network interfaces. State transition: Initialization Capabilities Exchange WTP: Automatically upon detecting an active network interface AC: Upon receiving a Capabilities message from a WTP 5.2. Capabilities Exchange: The Capabilities Exchange state allows WTPs to first find an AC and then to exchange capabilities information with it. WiCoP is designed to control WLANs with both Local MAC and Split MAC WTPs. The differences in their respective functional characteristics are determined in this state. The WTP first broadcasts Capabilities message as soon as it transitions from its Initialization state. The Capabilities message serves to discover ACs and contains information on its identity and capabilities. The AC receiving message transitions from its Initialization state. It examines compatibility with respect to the WTP type, its capabilities, and responds with an appropriate Capabilities Response message. 6. OPERATIONAL EFFICIENCY The fact that WiCoP requires a single operation to distinguish and manage WTPs of different designs makes it operationally efficient. Because WiCoP assigns dedicated classification bits in the common header, an AC needs to parse incoming packets only once to determine particular manner in which it is to be processed. Without dedicated classifications in the common header, an AC would have to perform lookup after parsing every incoming packet, which would result in delaying processing. The scale and sensitivity of large- scale deployments require that WLAN control protocols be efficient in operation. 6.1. Semantic Efficiency: In certain cases, WiCoP combines utilities in a single operation. One particular case is that of statistics and activity feedback. Here, WTPs regularly send a single Feedback message containing statistics and other state information, which also acts as an implicit keep alive mechanism. This helps to reduce the number of message exchanges and also simplifies protocol implementation. Similarly, the Capabilities messages serve the purpose of finding ACs as well as informing them of WTP capabilities and design. SUMMARY AND CONCLUSION WiCoP includes trigger for suitable authentication mechanism. The Wireless LAN Control Protocol presents solution for managing large-scale WLANs with diverse elements. It addresses the challenges presented in CAPWAP Problem Statement and realizes the requirements of CAPWAP Objectives. WiCoP enables integral control of Split MAC and Local MAC WTPs by defining appropriate differentiators within the protocol message exchanges and processes. It
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 04 | Dec-2012, Available @ http://www.ijret.org 525 addresses architecture designs in which authenticator and encryption points are located on distinct entities. In doing so, WiCoP realizes the interoperability objective and its benefits. WiCoP also addresses shared WLAN deployments by configuring and managing WTPs on logical group basis. It is further provisioned to separate control and data traffic within WLANs. So, the protocol addresses the objectives of logical groups and traffic separation. Architecture designs in which authentication is performed at the AC and encryption at WTPs can be exposed to the threat of replay attacks. ACKNOWLEDGEMENTS The authors are thankful of researcher for their contribution in wireless networking and protocol who help and motivate us to contribute our work in this area. REFERENCES [1] Yang, L., Zerfos, P., and E. Sadot, "Architecture Taxonomy for Control and Provisioning of wireless Access Points (CAPWAP)", RFC 4118, June 2005. [2] Govindan, S., Ed., Cheng, H., Yao, ZH., Zhou, WH., and L. Yang, "Objectives for Control and Provisioning of Wireless Access Points (CAPWAP)", RFC 4564, July 2006. [3] O'Hara, B., Calhoun, P., and J. Kempf, "Configuration and Provisioning for Wireless Access Points (CAPWAP) Problem Statement", RFC 3990, February 2005. [4]http://www.nature.com/nmeth/journal/v7/n2/full/nmeth021 0-87.html [5] Allman, M., Paxson, V. and W. Stevens, "TCP Congestion Control", RFC 2581, April 1999. [6] Jacobson, V., Braden, R. "TCP Extensions for High Performance", RFC 1323, May 1992. [7] Mathis, M., Mahdavi, J., Floyd, S. "TCP Selective Acknowledgment Options", , October 1996. [8] Allman, M., Floyd, S. and C. Partridge, "Increasing TCP's Initial Window", October 2002. [9] Dawkins, S., Montenegro, G., Kojo, M. and V. Magret, "End-to-end Performance Implications of Slow Links", BCP 48, RFC 3150, July 2001. [10] Mogul, J. and S. Deering, "Path MTU Discovery", RFC 1191, November 1990. [11] Knowles, S., "IESG Advice from Experience with Path MTU Discovery", RFC 1435, March 1993. [12] McCann, J., Deering, S. and J. Mogul, "Path MTU Discovery for IP version ",August 1996. [13] Ramakrishnan, K., Floyd, S. and D. Black, The Addition of Explicit Congestion notification (ECN) to IP", RFC 3168, September 2001. [14] Allman, M., Balakrishnan, H. and S. Floyd, "Enhancing TCP's Loss Recovery Using Limited Transmit", RFC 3042, January 2001. [15] Paxson, V. and M. Allman, "Computing TCP's Retransmission Timer", November 2000. [16] Hannu, H., Jonsson, L-E., Hakenberg, R., Koren, T., Le, K., Liu, Z., Martensson, A., "RObust Header Compression Framework and four profiles:, July 2001. [17] Degermark, M., Nordgren, B. and S. Pink, "IP Header Compression", RFC 2507, February 1999. [18] Postel, J., "Transmission Control Protocol DARPA Internet Program Protocol Specification", STD 7, RFC 793, September 1981. [19] Floyd, S. and T. Henderson, "The NewReno Modification to TCP's Fast Recovery Algorithm", April 1999. [20] Bormann, C., "Robust Header Compression (ROHC) over PPP", RFC 3241, April 2002. BIOGRAPHIES P.L.Ramteke is working as a Associate Professor & Head at Information Technology Department. He is expertise in modeling and simulation, Mobile technology and software Engineering. D.N.Choudhary is Professor & Heat at IT Departnet at JDIT’s College of Engineering & Technology, Yavatmal.He is Ph.D. Supervisor & expert in Data Mining, Mobile Computing