
154
Chapter 8: IEEE 802.11e and VoWLAN Issues
AirMagnet Laptop Wireless LAN Policy Reference Guide
a) the amount of time a station senses the channel to be
idle before backoff or transmission.
b) the length of the contention window for the backoff.
c) the duration a station may transmit after it acquires the
channel.
• HCF Controlled Channel Access (HCCA): This mechanism
allows reservation of transmission opportunities (TXOPs:
Time intervals in which the QSTA can transmit frames) with
the Hybrid Co-ordinator (HC: co-located with the QAP). A
QSTA requests the HC for TXOPs - both for its own transmis-
sions as well as transmissions from the QAP to itself. The
request is initiated by the Station Management Entity (SME)
of the QSTA. Based on the admission control policy, if the
request is accepted, the HC schedules TXOPs for both the
QAP and the QSTA. For transmissions from the QSTA, the
HC polls the QSTA based on the parameters supplied by the
QSTA at the time of its request. For transmissions to the
QSTA, the QAP directly obtains TXOPs from the collocated
HC and delivers the queued frames to the QSTA, again
based on the parameters supplied by the QSTA.
Figure 8-1: MAC frame format
VoWLAN, an extension of VoIP, is considered to be the next killer
application for WLANs. The various components are:
• a wi-fi enabled phone
• an access point to which the phone will associate
• at upper layers, a PBX system that may connect to a public
telephone network (or the communication could be through
the Internet).
The two most important issues that need to considered in a VoWLAN
deployment are:
• capacity: number of phones or concurrent calls per cell
Laptop Wireless LAN Policy Reference Guide.book Page 154 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...