Computer Networks Laboratory TECHNION - IsraelDepartment of Electrical Engineering institute of engine room ( tissue cover Students : Tzafrir Sharon TzourSupervisor : Nadav Lavi Table of contents get goal 3Wireless local area internet .4802 .11 communications communications protocol 4AVAYA a ccess point .5The opening point properties .5SNMP protocol .6Microsoft .NET develop slit .7SQL - grammatical constructiond query language .7Create a simple web exertion .9Wireless LAN anxiety web application .21Database structure .21Application br structure .22 approach shoting the portal point 26Appendixes .27Application enactment .27webform1 .27webform3 .28webform2 .31avaya .cs .49snmp .cs .501 . Project goalThe wireless profit is highly dynamic , the deem of examplers in each penetration point is changing on the whole th e judgment of conviction and therefore those kinds of electronic networks requires a powerful caution tool that gives the network bus the capability to control the network in truly time from anywhereThe project goal was to pillowcase a web application (using Microsoft .NET environment ) that leave solo provide easy gate for network heed to the network managerThe application implys 3 modulesMain application - this module includes the network manager interface such as the login window , go forr management functions and get to Point management functionsDatabase interface - this module deals with the access to the database using SQLAccess point material body - this module deals with the access to the Access Points in to get or set the Access Point properties using the SNMP protocolLater on , a detailed business relationship on each of these modules testament be given2 . Wireless LAN2 .1 . 802 .11 protocolThe 802 .
11 protocol is defined for a wireless LAN (Local field of honor Network and is based on a carrellular architecture in which the network is divided into cells where each cell (called a prefatorial Service Cell (BSS ) is controlled by a base fuel called an Access Point (APThe basic access mechanism enforced in the protocol is a toter Sence Multiple Access with Collision Avoidance (CSMA /CA . The CSMA protocol works as follows : if a come out wishes to transmit cultivation with it network , it senses the sensitive . In study the medium is work (another spot in the network is currently transmittal data then the aim will delay its contagion assembly ups to a later time Otherwise , the medium is ratio nalize and the station is allowed to transmit the desired informationThe problem with the CSMA protocol is the case where a collision guides A collision may pass if two different stations sense the medium as free and begin to transmit information . For this purpose , we use a collision avoidance mechanism : a station willing to transmit senses the medium . If the medium is busy , it defers its beg . Otherwise , it sends an RTS (Request To Transmit ) which includes the source , destination and the duration of the traffic . If the medium is free then the destination station will respond with a packet called CTS (Clear To Send ) which will include the same duration information and once the source station receives this...If you want to get a full essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.