SlideShare una empresa de Scribd logo
1 de 96
IEEE 802.11s implementation for multimedia campus networking Sikkim Manipal Institute Of Technology Jan 2008 – Jun 2008
Why, What ,How?
Wireless Mesh Networks IEEE 802.11s ,[object Object],[object Object],[object Object],[object Object],[object Object]
Classical 802.11 WLAN
WLAN with mesh
Why Mesh? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modes Of WMN ,[object Object],[object Object],[object Object]
Infrastructure/Backbone WMNs
Client WMNs
Hybrid WMNs
Comparison with existing technologies
Mesh vs. Ad-Hoc Networks ,[object Object],[object Object],[object Object],[object Object],Ad-Hoc Networks WMN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mesh vs. Sensor Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],Wireless Sensor Networks WMN ,[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN Coverage 802.11 WMN Wiring Costs Low High Number of APs As needed Twice as many Cost of APs High Low Bandwidth Good Very Good
Mesh Implementation Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Marginal S/N ,[object Object],[object Object],[object Object],[object Object],[object Object]
Long bursts of interference Bursty noise might corrupt packets without affecting S/N measurements A B
Short bursts of interference (802.11) A B Outcome depends on relative signal levels When a nearby AP sends a packet, we lose a packet.
Multi-path interference Reflection is a delayed and attenuated copy of the signal A B B
SOFTWARE & HARDWARE DEVELOPMENT
HARDWARE  DEVELOPMENT
HORN ANTENNA
PARABOLIC REFLECTOR ,[object Object]
CAT5 CABLE
i Pod Touch
Wireless Settings For iPod
WIRELESS ROUTER
What is a router? ,[object Object]
LINKSYS WRT54G
 
WRT54G Series  Router Specification
LINKSYS WRT54GL version 1.1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MS WINDOWS
LINUX—UBUNTU GUTSY RIBBON
WI FI RADAR
DEVELOPMENT PLATFORM MATLAB AND SIMULINK
What is VoIP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VoIP Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why VoIP? ,[object Object],[object Object]
VoIP Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft Windows Netmeeting
 
 
 
TRAFFIC MONITORING
PRTG Traffic Grapher ,[object Object]
[object Object],TRAFFIC MONITORING  GRAPH-1
TRAFFIC MONITORING  GRAPH-2
NETWORK  TRAFFIC TOP  PROTOCOLS
Network Traffic Table
Wireless Site Survey Netstumbler
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Graph- SNR vs Time
Netstumbler Window Showing network details
FIRMWARE ,[object Object],[object Object],[object Object],[object Object]
OPEN WRT FIRMWARE
OPEN WRT FIRMWARE ,[object Object],[object Object],[object Object]
 
 
 
FREIFUNK FIRMWARE
FREIFUNK FIRMWARE ,[object Object],[object Object],[object Object]
CONFIGURTION OF A MESH NODE
FREIFUNK FIRMWARE LAN Settings
System Settings
MAD WI FI FIRMWARE
MAD WIFI FIRMWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
TOMATO FIRMWARE
TOMATO FIRMWARE ,[object Object],[object Object],[object Object]
Supported Devices ,[object Object],[object Object],[object Object]
Upgrading The Firmware ,[object Object],[object Object],[object Object],[object Object]
Menus in Tomato  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STATUS- DEVICE LIST
STATUS OVERVIEW
STATUS OVERVIEW
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless( continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STATUS OVERVIEW   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bandwidth Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BANDWIDTH REAL TIME
TOOLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOOLS-PING
TOOLS-TRACE
TOOLS-WIRELESS SURVEY
QoS( Quality Of Service) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Restriction ,[object Object]
 
ADMINISTRATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object]
Thank You

Más contenido relacionado

La actualidad más candente

Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 

La actualidad más candente (20)

HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
FDDI
FDDIFDDI
FDDI
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamental
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Dsl
DslDsl
Dsl
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Switch & hub
Switch & hubSwitch & hub
Switch & hub
 
Network devices
Network devicesNetwork devices
Network devices
 
Carrier Ethernet - What and Why
Carrier Ethernet - What and Why  Carrier Ethernet - What and Why
Carrier Ethernet - What and Why
 

Destacado

Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
Iftach Ian Amit
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
Jyoti Yadav
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Olpcpresentation
OlpcpresentationOlpcpresentation
Olpcpresentation
wdb
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
lyndyv
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
Carl Ford
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
Michal Jarski
 

Destacado (20)

Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
 
MobiMESH: Mesh Evolution
MobiMESH: Mesh EvolutionMobiMESH: Mesh Evolution
MobiMESH: Mesh Evolution
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Olpcpresentation
OlpcpresentationOlpcpresentation
Olpcpresentation
 
Learning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh NetworkLearning Automata with Wireless Mesh Network
Learning Automata with Wireless Mesh Network
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamics
 
Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic
 
Mlinarsky Fanny
Mlinarsky FannyMlinarsky Fanny
Mlinarsky Fanny
 
Wifi presentation
Wifi presentation Wifi presentation
Wifi presentation
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
 
Wi fi
Wi fiWi fi
Wi fi
 

Similar a IEEE 802.11s - Wireless Mesh Network

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
pmuthumca51
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
Arun Franco
 

Similar a IEEE 802.11s - Wireless Mesh Network (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Darsh
DarshDarsh
Darsh
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
OpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless InfrastructureOpenRadio - Virtualizing Cellular Wireless Infrastructure
OpenRadio - Virtualizing Cellular Wireless Infrastructure
 
Ccna report
Ccna reportCcna report
Ccna report
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 

Más de Arunabh Mishra

Más de Arunabh Mishra (10)

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing
 
Coffee 101
Coffee 101Coffee 101
Coffee 101
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focus
 
What is ai ?
What is ai ?What is ai ?
What is ai ?
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile robotics
 
I beacons 101
I beacons 101I beacons 101
I beacons 101
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case Study
 
Synergy between manet and biological swarm systems
Synergy between  manet and biological swarm systemsSynergy between  manet and biological swarm systems
Synergy between manet and biological swarm systems
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

IEEE 802.11s - Wireless Mesh Network

Notas del editor

  1. Now let’s talk about interference Previous slide covered non-bursty weak interference Make this not look like directional antennas (broadcasts, waves) Distance, trees attenuate signal Delivery probability depends in part on signal-to-noise ratio P(delivery) = f(S/N) Perhaps many Roofnet node pairs have S/N corresponding to intermediate delivery probabilities Mention S/N measurements calibrated in the lab Replace hypothesis slides w/ pictures Mention s/n reported by the card Don’t #2 make it sound so definite Qualify the second point Mention ‘textbook model of ber’
  2. We’ve eliminated the possibility that we’re losing bursts of packets We’ve narrowed the possibilities enough that we know we’re losing packets individiually “ the important special case” Start the explanation of this hypothesis here Why two phases? Mention it’s all beacons, constant, 8 APs XXX Roofnet shares its 802.11 channel with the rest of Cambridge XXX Other 802.11 traffic could corrupt our traffic at a time-scale of individual packets, without affecting our S/N measurements (xxx what’s the experiment?)