SlideShare ist ein Scribd-Unternehmen logo
1 von 15
WiFi Direct technology
A technical report
Angelos Alevizopoulos
WiFi Direct technology
Device to Device (D2D) communication
 D2D communication in cellular networks is defined
as direct communication between two User
Equipments (UEs) without the information passes
through the Base Station (BS) or core network
 Primarily designed for reducing traffic of the cellular
infrastructure and then offloads it to UEs
 D2D can associate with network infrastructure to
exchange control functions like synchronization,
session setup, resource allocation, routing
WiFi Direct technology
D2D communication
WAN + WLAN D2D
(LTE + WiFi Direct)
WLAN D2D
(WiFi Direct, Bluetooth)
WAN D2D
(3GPP LTE D2D)
Picture 1. D2D communication https://goo.gl/38EbrM
WiFi Direct technology
Background
 Defined by the Wi-Fi Alliance also known as WiFi Peer-
to-Peer
 2009 : WiFi Direct specification introduced
 Coverage range of about 200 m and maximum data rate
up to 250Mbit/s as traditional WiFi
 Working in the unlicensed 2.4 GHz Industrial, Scientific,
and Medical (ISM) band
 Allows devices to talk to each other without the need for
wireless Access Point (AP)
WiFi Direct technology
versus Bluetooth 4.0
Properties WiFi Direct Bluetooth 4.0
Low Energy (BLE)
Bit Rate 250 Mbps 25 Mbps
Range 200 m 50 m
Set-Up Time = 1 s <0.003 s
Security AES 256-bit AES 128-bit
Backwards Compatibility All wireless protocols Not compatible
Power Short battery life Low Energy consumption
Standardization Body WiFi Alliance Bluetooth SIG
WiFi Direct technology
Technical overview
 WiFi Direct device has to implement both the role of a
P2P Client and the role of an AP namely Group Owner
(P2P GO)
 All group members are able to communicate with each
other by exchanging messages relayed by the GO
 The main procedure of communication configuration is
device discovery, role negotiation, service discovery,
security provisioning and power saving
WiFi Direct technology
Group formation
Picture 3. Group formation https://goo.gl/DGtlUx
1. Discovery
2. Role negotiation
3. WPA2 Provisioning
4. Connected
Device detection
Service detection
Group creation
Power management
WiFi Direct technology
Layer two service discovery
 Allowing devices to discover available services prior to
establishing a P2P Group
 Devices can broadcast the services that they provide,
which helps other devices discover suitable peers more
easily
 Enables higher layer service advertisement protocols
such as Bonjour and Universal Plug and Play (UPnP)
 Service discovery queries transported to data link layer
using the Generic AdvertiSement protocol (GAS)
WiFi Direct technology
Concurrent operation
 A P2P Device can operate concurrently with a
WLAN (infrastructure network)
 The concurrent operation requires a device to
support multiple MAC entities that handles different
transport channels
 Allowing devices to maintain simultaneous
connections to different Wi-Fi Direct networks
WiFi Direct technology
Application expectations
https://goo.gl/WVHNeS
WiFi Direct technology
Miracast
WiFi Direct technology
Miracast topology
https://goo.gl/Lt57l4
WiFi Direct technology
Security provisioning and encryption
 Wi-Fi Direct supports secure communication using
WPA2 encryption
 AES-Counter Mode CBC-MAC Protocol (CCMP)
as the encryption cipher
 Uses a randomly generated Pre-Shared Key (PSK)
for mutual authentication
WiFi Direct technology
Power management
 P2P power management supports power save
mechanisms for P2P Group Owners and P2P Clients
 Power saving capabilities critical in portable devices
like mobile phones
 Use of protocol schemes Opportunistic Power
Save and Notice of Absence that allows the P2P
GO to be absent for defined periods
.

Weitere ähnliche Inhalte

Was ist angesagt?

Virtual Network Computing
Virtual Network ComputingVirtual Network Computing
Virtual Network Computing
rojalina nanda
 
Gigabit Passive Optical Network Presentation
Gigabit Passive Optical Network PresentationGigabit Passive Optical Network Presentation
Gigabit Passive Optical Network Presentation
Anthony Helton
 

Was ist angesagt? (20)

drone technology
drone technologydrone technology
drone technology
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
VoWifi 02 - VoWifi architecture overview (pdf ppt)
VoWifi 02 - VoWifi architecture overview (pdf ppt)VoWifi 02 - VoWifi architecture overview (pdf ppt)
VoWifi 02 - VoWifi architecture overview (pdf ppt)
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
 
Virtual Network Computing
Virtual Network ComputingVirtual Network Computing
Virtual Network Computing
 
OpenVirtex (OVX) Tutorial
OpenVirtex (OVX) TutorialOpenVirtex (OVX) Tutorial
OpenVirtex (OVX) Tutorial
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
What are razor pages?
What are razor pages?What are razor pages?
What are razor pages?
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
Introductionto SDN
Introductionto SDN Introductionto SDN
Introductionto SDN
 
Wi fi
Wi fiWi fi
Wi fi
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Customising QGroundControl
Customising QGroundControlCustomising QGroundControl
Customising QGroundControl
 
Wi vi
Wi viWi vi
Wi vi
 
Data Center Interconnect
Data Center InterconnectData Center Interconnect
Data Center Interconnect
 
Gigabit Passive Optical Network Presentation
Gigabit Passive Optical Network PresentationGigabit Passive Optical Network Presentation
Gigabit Passive Optical Network Presentation
 
Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overview
 
Network Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialNetwork Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorial
 

Ähnlich wie Wifi direct technology a technical report

The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
Muhd Airil
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
adolphoyonker
 

Ähnlich wie Wifi direct technology a technical report (20)

The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Comm-seminar
Comm-seminarComm-seminar
Comm-seminar
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access Networks
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
 
5 g technology
5 g technology5 g technology
5 g technology
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
 
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIA CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
4 g technology in digital
4 g technology in digital4 g technology in digital
4 g technology in digital
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
ICTL
ICTLICTL
ICTL
 

Mehr von Angelos Alevizopoulos

Mehr von Angelos Alevizopoulos (7)

ΕΥΦΥΗ SIEM (Security Information Event Management)
ΕΥΦΥΗ SIEM (Security Information Event Management)ΕΥΦΥΗ SIEM (Security Information Event Management)
ΕΥΦΥΗ SIEM (Security Information Event Management)
 
SNORT IDS Use Case - Συστήματα προσδιορισμού εισβολέων ανοιχτού κώδικα
SNORT IDS Use Case - Συστήματα προσδιορισμού εισβολέων ανοιχτού κώδικαSNORT IDS Use Case - Συστήματα προσδιορισμού εισβολέων ανοιχτού κώδικα
SNORT IDS Use Case - Συστήματα προσδιορισμού εισβολέων ανοιχτού κώδικα
 
Στρατηγική Κοινωνικής Δικτύωσης για το κατάστημα κοσμημάτων Βελώνης - Social ...
Στρατηγική Κοινωνικής Δικτύωσης για το κατάστημα κοσμημάτων Βελώνης - Social ...Στρατηγική Κοινωνικής Δικτύωσης για το κατάστημα κοσμημάτων Βελώνης - Social ...
Στρατηγική Κοινωνικής Δικτύωσης για το κατάστημα κοσμημάτων Βελώνης - Social ...
 
Tα κοινωνικά μέσα ενημέρωσης ως μια πλατφόρμα επικοινωνίας σε περιβάλλον κρίσ...
Tα κοινωνικά μέσα ενημέρωσης ως μια πλατφόρμα επικοινωνίας σε περιβάλλον κρίσ...Tα κοινωνικά μέσα ενημέρωσης ως μια πλατφόρμα επικοινωνίας σε περιβάλλον κρίσ...
Tα κοινωνικά μέσα ενημέρωσης ως μια πλατφόρμα επικοινωνίας σε περιβάλλον κρίσ...
 
Machine Learning: Regression with Conjugate Gradient and Levenberg Marquardt ...
Machine Learning: Regression with Conjugate Gradient and Levenberg Marquardt ...Machine Learning: Regression with Conjugate Gradient and Levenberg Marquardt ...
Machine Learning: Regression with Conjugate Gradient and Levenberg Marquardt ...
 
Modeling Hospital Information System with OWL and quering with SPARQL (Greek ...
Modeling Hospital Information System with OWL and quering with SPARQL (Greek ...Modeling Hospital Information System with OWL and quering with SPARQL (Greek ...
Modeling Hospital Information System with OWL and quering with SPARQL (Greek ...
 
The wireless techology SigFox - A technical report
The wireless techology SigFox - A technical reportThe wireless techology SigFox - A technical report
The wireless techology SigFox - A technical report
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Wifi direct technology a technical report

  • 1. WiFi Direct technology A technical report Angelos Alevizopoulos
  • 2. WiFi Direct technology Device to Device (D2D) communication  D2D communication in cellular networks is defined as direct communication between two User Equipments (UEs) without the information passes through the Base Station (BS) or core network  Primarily designed for reducing traffic of the cellular infrastructure and then offloads it to UEs  D2D can associate with network infrastructure to exchange control functions like synchronization, session setup, resource allocation, routing
  • 3. WiFi Direct technology D2D communication WAN + WLAN D2D (LTE + WiFi Direct) WLAN D2D (WiFi Direct, Bluetooth) WAN D2D (3GPP LTE D2D) Picture 1. D2D communication https://goo.gl/38EbrM
  • 4. WiFi Direct technology Background  Defined by the Wi-Fi Alliance also known as WiFi Peer- to-Peer  2009 : WiFi Direct specification introduced  Coverage range of about 200 m and maximum data rate up to 250Mbit/s as traditional WiFi  Working in the unlicensed 2.4 GHz Industrial, Scientific, and Medical (ISM) band  Allows devices to talk to each other without the need for wireless Access Point (AP)
  • 5. WiFi Direct technology versus Bluetooth 4.0 Properties WiFi Direct Bluetooth 4.0 Low Energy (BLE) Bit Rate 250 Mbps 25 Mbps Range 200 m 50 m Set-Up Time = 1 s <0.003 s Security AES 256-bit AES 128-bit Backwards Compatibility All wireless protocols Not compatible Power Short battery life Low Energy consumption Standardization Body WiFi Alliance Bluetooth SIG
  • 6. WiFi Direct technology Technical overview  WiFi Direct device has to implement both the role of a P2P Client and the role of an AP namely Group Owner (P2P GO)  All group members are able to communicate with each other by exchanging messages relayed by the GO  The main procedure of communication configuration is device discovery, role negotiation, service discovery, security provisioning and power saving
  • 7. WiFi Direct technology Group formation Picture 3. Group formation https://goo.gl/DGtlUx 1. Discovery 2. Role negotiation 3. WPA2 Provisioning 4. Connected Device detection Service detection Group creation Power management
  • 8. WiFi Direct technology Layer two service discovery  Allowing devices to discover available services prior to establishing a P2P Group  Devices can broadcast the services that they provide, which helps other devices discover suitable peers more easily  Enables higher layer service advertisement protocols such as Bonjour and Universal Plug and Play (UPnP)  Service discovery queries transported to data link layer using the Generic AdvertiSement protocol (GAS)
  • 9. WiFi Direct technology Concurrent operation  A P2P Device can operate concurrently with a WLAN (infrastructure network)  The concurrent operation requires a device to support multiple MAC entities that handles different transport channels  Allowing devices to maintain simultaneous connections to different Wi-Fi Direct networks
  • 10. WiFi Direct technology Application expectations https://goo.gl/WVHNeS
  • 12. WiFi Direct technology Miracast topology https://goo.gl/Lt57l4
  • 13. WiFi Direct technology Security provisioning and encryption  Wi-Fi Direct supports secure communication using WPA2 encryption  AES-Counter Mode CBC-MAC Protocol (CCMP) as the encryption cipher  Uses a randomly generated Pre-Shared Key (PSK) for mutual authentication
  • 14. WiFi Direct technology Power management  P2P power management supports power save mechanisms for P2P Group Owners and P2P Clients  Power saving capabilities critical in portable devices like mobile phones  Use of protocol schemes Opportunistic Power Save and Notice of Absence that allows the P2P GO to be absent for defined periods
  • 15. .

Hinweis der Redaktion

  1. Using WIFI DIRECT we can send images, files or different data between devices ( as we did in Bluetooth) with fast speed and wide range. while Miracast is used to share our screen to the WIFI Displays i.e. from our device screen to large WIFI enabled TV screens. Miracast is also using the WIFI Direct technology for making connection between device and the Displays. Wi-Fi Direct is used to complete these initial steps to connect the two devices. In subsequent sessions, the two devices recognize that they are paired without repeating these steps.