WiFi的MAC控制

合集下载

Mac命令行使用技巧查看和修改网络WiFi设置

Mac命令行使用技巧查看和修改网络WiFi设置

Mac命令行使用技巧查看和修改网络WiFi设置在Mac电脑上,我们通常使用图形界面来进行网络WiFi设置。

不过,命令行也提供了一些强大的工具和技巧,来查看和修改网络WiFi 设置。

本文将介绍如何使用Mac命令行来进行这些操作。

一、查看当前连接的WiFi网络要查看当前连接的WiFi网络,我们可以使用命令"networksetup -getcurrentwifi"。

打开终端,输入以下命令:```networksetup -getcurrentwifi```执行该命令后,将会显示当前连接的WiFi网络的名称。

二、查看可用的WiFi网络列表要查看可用的WiFi网络列表,我们可以使用命令"airport -s"。

打开终端,输入以下命令:```airport -s```执行该命令后,系统会扫描附近的WiFi网络,并显示可用网络的详细信息,包括网络名称、信号强度、加密方式等。

三、连接到WiFi网络要连接到特定的WiFi网络,我们可以使用命令"networksetup -setairportnetwork"。

打开终端,输入以下命令:```networksetup -setairportnetwork en0 WiFi名称密码```其中,en0是无线网卡的接口名称,可以通过命令"networksetup -listallhardwareports"来查看。

四、查看WiFi网络详细信息要查看WiFi网络的详细信息,我们可以使用命令"networksetup -getairportnetwork"。

打开终端,输入以下命令:```networksetup -getairportnetwork en0```执行该命令后,系统将显示当前连接的WiFi网络的详细信息,包括网络名称、信号强度、频率、通道等。

五、修改WiFi网络设置要修改WiFi网络的设置,我们可以使用命令"networksetup -setairportpower"和"networksetup -setairportnetwork"。

路由器的MAC地址过滤与访问控制设置

路由器的MAC地址过滤与访问控制设置

路由器的MAC地址过滤与访问控制设置随着互联网的迅速发展,家庭和企业中的网络规模不断扩大,网络安全问题也变得越来越重要。

为了保护网络免受未经授权的访问和攻击,许多路由器都提供了MAC地址过滤和访问控制设置功能。

本文将介绍MAC地址过滤和访问控制设置的作用、原理以及如何在路由器上进行配置。

一、MAC地址过滤MAC地址(Media Access Control Address)是网络设备(如电脑、手机、路由器等)的唯一标识。

MAC地址过滤是一种基于硬件地址的访问控制方法,可以限制特定设备对网络的访问。

1.1 过滤有效MAC地址在路由器上设置MAC地址过滤,可以仅允许已知的MAC地址设备进行网络访问,其他设备将被阻止。

这样可以有效防止未经授权的设备接入网络,提高网络的安全性。

1.2 阻止无效MAC地址有时,网络管理员可能会通过设置黑名单,阻止特定MAC地址设备的访问。

例如,某些特定MAC地址设备可能存在漏洞或安全风险,为了保护网络的安全,可以将这些设备的MAC地址添加到黑名单中,阻止其访问网络。

二、访问控制设置除了MAC地址过滤,路由器还可以提供更细粒度的访问控制设置,以根据不同的需求和安全级别控制设备的访问权限。

2.1 IP地址过滤除了MAC地址过滤外,路由器还支持对设备的IP地址进行过滤。

通过配置IP地址过滤规则,可以根据设备的IP地址范围或指定的IP地址,限制或允许设备对网络的访问。

2.2 端口过滤某些情况下,网络管理员可能需要根据设备使用的端口或协议进行访问控制。

路由器提供了端口过滤功能,可以根据设备使用的端口号或协议类型,限制或允许设备对网络的访问。

例如,可以限制某个设备只能访问特定的端口或协议,以增加网络的安全性。

2.3 访问时间控制为了进一步提高网络的安全性和管理效果,路由器还提供了访问时间控制设置功能。

通过配置访问时间控制规则,网络管理员可以根据不同的时间段,限制或允许设备对网络的访问。

如何在Mac系统中设置计算机的默认无线网络

如何在Mac系统中设置计算机的默认无线网络

如何在Mac系统中设置计算机的默认无线网络当我们使用Mac电脑时,无线网络连接是必不可少的。

然而,有时我们可能需要更改默认无线网络,以便自动连接到我们更常用或更可靠的网络。

在本文中,将介绍如何在Mac系统中设置计算机的默认无线网络,以便您可以更方便地连接到网络。

1. 打开网络首选项首先,点击屏幕右上角的无线网络图标,在弹出的下拉菜单中选择“打开网络首选项”。

这将打开“网络”菜单。

2. 选择高级选项在网络菜单中,点击右下方的“高级”按钮。

这将打开网络首选项的高级选项。

3. 定位无线网络列表在高级选项卡中,您可以找到“Wi-Fi”选项卡,并显示当前可用的无线网络列表。

这是您可以设置默认网络的地方。

4. 设置默认网络在无线网络列表中,找到您想要设置为默认的网络并将其拖动到列表的顶部。

拖动后,您会看到该网络被放置在其他网络之前,表示它已成为默认网络。

5. 删除不需要的网络如果您想删除列表中的某个网络,只需选中该网络并点击“-”按钮。

这将从列表中删除该网络,并且您的计算机将不再自动连接到该网络。

6. 点击确定保存更改在完成设置默认网络和删除不需要网络后,点击“确定”按钮以保存更改。

您的计算机将立即开始使用新的默认无线网络。

通过按照上述步骤,您可以轻松地在Mac系统中设置计算机的默认无线网络。

无论您身处何地,只需启动计算机即可自动连接到您最常用和可靠的网络,提供更便利的上网体验。

这是一个简单而有效的方法,无需任何专业知识或复杂的设置。

现在,您可以在Mac系统中轻松地管理和更改默认无线网络。

享受更稳定和便利的网络连接吧!。

路由器怎么设置mac地址

路由器怎么设置mac地址
静态ip分两种一种是长期固定分配给一台计算机或路由使用的ip地址一般光纤网络或者是通过光纤或网线连接在一起的域会采用固定ip
路由器怎么设置mac地址
路由器怎么设置mac地址,有哪些具的*作步骤呢?下面小编就为你分享一些路由器怎么设置mac地址的方法吧!
1、首先192.168.1.1 输入用户名密码,进入路由!
投诉
2、进入路由后选中无线设置下的无线MAC地址过滤。
3点击添加新条目。
4、怎么查看MAC地址呢?
点击开始》》运行》》输入cmd》》ipconfig/all
5、输入MAC和描述 点击保存,然后选上“禁止列表中生效规则之外的MAC地址访问本无线网络” 点击启动过滤。
6、这样就只有添加MAC地址的电脑/手机可以访问无线网络了

Mac系统的网络设置与连接技巧

Mac系统的网络设置与连接技巧

Mac系统的网络设置与连接技巧Mac系统是一款功能强大的操作系统,网络设置和连接是使用Mac电脑的基本操作之一。

在本文中,将介绍一些Mac系统的网络设置和连接技巧,帮助您更好地配置和优化您的网络连接。

一、Wi-Fi网络设置1. 打开系统偏好设置:点击屏幕左上角的苹果图标,选择“系统偏好设置”。

2. 进入网络设置:在系统偏好设置窗口中,点击“网络”图标。

3. 选择Wi-Fi选项:在网络设置窗口左侧列表中,选择“Wi-Fi”选项。

4. 连接Wi-Fi网络:在右侧的Wi-Fi网络列表中,选择您要连接的网络,并输入网络密码。

5. 自动连接可用网络:勾选“自动连接可用网络”选项,以便下次自动连接已知Wi-Fi网络。

二、以太网连接设置1. 打开系统偏好设置:点击屏幕左上角的苹果图标,选择“系统偏好设置”。

2. 进入网络设置:在系统偏好设置窗口中,点击“网络”图标。

3. 选择以太网选项:在网络设置窗口左侧列表中,选择“以太网”选项。

4. 连接以太网网络:在右侧的“配置IPv4”下拉菜单中,选择“使用DHCP”以获得自动网络配置。

5. 自定义以太网连接:如果您需要手动配置以太网连接,可以选择“手动”并输入相关网络信息。

三、网络高级设置1. 打开系统偏好设置:点击屏幕左上角的苹果图标,选择“系统偏好设置”。

2. 进入网络设置:在系统偏好设置窗口中,点击“网络”图标。

3. 选择高级设置:在网络设置窗口中,点击“高级”按钮。

4. 配置DNS服务器:在高级设置窗口的“DNS”选项卡中,可以手动配置首选和备用的DNS服务器地址。

5. 配置代理服务器:在高级设置窗口的“代理”选项卡中,可以设置Web代理、安全Web代理和FTP代理。

四、连接网络打印机1. 打开系统偏好设置:点击屏幕左上角的苹果图标,选择“系统偏好设置”。

2. 进入打印机设置:在系统偏好设置窗口中,点击“打印机与扫描仪”图标。

3. 添加网络打印机:点击“+”按钮,选择“添加打印机或扫描仪”。

Q5.如何设置无线MACac地址访问权限

Q5.如何设置无线MACac地址访问权限

Q:如何设置无线MAC地址访问权限?
标签:mac访问权限、禁止某台/某几台设备连接、允许某台/某几台设备连接
A:非常感谢您对极路由的支持!为了能更好的控制连接路由器的设备,除了wifi密码限制外还可以通过mac进行对连接路由器的设备进行管理。

具体操作方法如下图:
第二步:输入路由器密码,登录路由器后台。

码即可)
第三步:点击高级设置
第四步:
第五步:
看第七
第八步:
附录1:如果想取消对已设置的mac访问权限的设定关闭此功能即可。

操作方法如下图所示:
1)点击无线mac地址访问控制开关
2)确定状态如下图所以即可。

备注:如果关闭无线mac访问控制功能并设置之后,之前设置的资料会全部清空,再开启的时候需要重新填写mac地址,如有必要请关闭之前备份之前填写的mac地址!(保存关闭无线mac控制后,原来的mac记录会保存,会在后续版本里面支持)
附录2:如果不知道自己设备的mac地址或者可以以看下面操作
1)把自己的所有设备全部链接到路由器并进入路由器后台设置页面(如不知如何操作可参考上面第一步和第二步),点击已有x台设备连接到路由器。

2txt
附录3:如果想禁止连接路由器此时已连接路由器可以直接按照一下方法操作,简单有效!1)进入路由器后台设置页面(如不知如何操作可参考上面第一步和第二步),点击已有x 台设备连接到路由器。

2)mac地址就会自动
填写到高级设置→无线mac如不清楚。

Mac系统中的网络和WiFi设置

Mac系统中的网络和WiFi设置

Mac系统中的网络和WiFi设置在Mac系统中,网络和WiFi设置是非常重要的一项功能。

正确配置和管理网络设置可以确保您的设备能够与外部世界连接并正常运行。

本文将介绍Mac系统中网络和WiFi设置的相关内容,以帮助读者更好地了解和使用。

一、网络设置在Mac系统中,您可以通过以下步骤来配置网络设置:1. 点击屏幕顶部的苹果图标,然后选择“系统偏好设置”。

2. 在系统偏好设置窗口中,点击“网络”图标。

在“网络”窗口中,您可以看到当前连接的网络接口(如Wi-Fi、以太网等),以及其他可用的网络接口。

您可以选择所需的网络接口,并对其进行设置。

1.1 Wi-Fi设置对于Wi-Fi网络设置,您可以按照以下步骤进行:1. 在“网络”窗口中,选择“Wi-Fi”选项卡。

2. 在可用的Wi-Fi网络列表中,选择您要连接的网络,并点击“连接”按钮。

如果您的Wi-Fi网络有密码保护,系统将要求您输入密码。

确保输入正确的密码后,点击“加入”。

1.2 以太网设置对于以太网(有线网络)设置,您可以按照以下步骤进行:1. 在“网络”窗口中,选择“以太网”选项卡。

2. 点击“高级”按钮,进入以太网高级设置。

在以太网高级设置中,您可以设置IPv4和IPv6地址、DNS服务器、代理等。

根据您的网络需求,进行相应的设置。

二、高级网络设置除了基本的网络设置外,Mac系统还提供了一些高级网络设置选项。

2.1 配置IPv4和IPv6地址在“网络”窗口中,选择相关的网络接口(如Wi-Fi或以太网),并点击“高级”按钮。

在“TCP/IP”选项卡中,您可以手动配置IPv4和IPv6地址。

例如,您可以选择使用静态IP地址,或者自动获取地址。

2.2 DNS设置DNS(域名系统)负责将网址解析为IP地址,以便设备能够访问所需的网站或服务。

在“网络”窗口中,选择相关的网络接口,并点击“高级”按钮。

在“DNS”选项卡中,您可以手动配置首选DNS服务器和备用DNS服务器。

无线局域网mac层的接入控制机制

无线局域网mac层的接入控制机制

无线局域网mac层的接入控制机制
无线局域网MAC层的接入控制机制是一种特殊的网络技术,它可以满足移动计算机或
移动节点(例如移动终端)接入到无线局域网络中的相关接入控制机制。

无线局域网MAC
层的接入控制机制主要用于无线网络的控制,其主要作用是管理无线网络中的移动节点,
保证无线网络通信的有效性,从而提升网络的性能和质量。

无线局域网MAC层的接入控制机制主要由网关、接入服务器和移动节点三部分组成。

网关是无线局域网的核心组件,它具有管理和调度网络上所有移动节点的功能,通过它来
保证节点之间的高效通信;而接入服务器则具有维护节点注册表等一些控制机制的功能,
将节点的接入信息和控制信息进行统一的管理;移动节点则指的是移动计算机或无线设备,它们将获取IP地址并传输数据,因此无线网络的正常运行需要各个移动节点的配合。

无线局域网MAC层的接入控制机制主要有两种:隐式和显式控制机制。

隐式控制机制
是指,网关通过报文将其维护的移动节点自动以某种规则(隐式规则)进行连接、分配资
源和管理;显式控制机制则是指,网管根据控制流程来实现对节点行为的监督,确保节点
有效地连接并发送数据。

无线局域网MAC层的接入控制机制为无线局域网的控制和管理提供了重要的基础,可
以有效地提高其网络性能及服务质量,保证其通信网络的正常工作,从而使企业通过无线
网络更加高效地实现服务使用和共享。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A Novel Implementation of the IEEE802.11Medium Access ControlSamareh Samadi∗,Ahmad Golmohammadi∗,Abumoslem Jannesari∗, Mohammad Reza Movahedi∗,Babak Khalaj†and Shahrokh Ghaemmaghami∗∗Electronics Research Center,†Electrical Engineering Department,Sharif University of Technology,Tehran,IranE-mail:samareh.samadi@,golmohammadia@,jannesari@ut.ac.ir,movahedi@,khalaj@,ghaemmag@Abstract—This work presents some new optimization ap-proaches to implementation of Medium Access Control(MAC) layer of IEEE802.11wireless networking protocol using general purpose DSP and gate array systems.Optimization starts at design level.The hardware/software partitioning of the MAC’s architecture is optimized in the sense of minimal implementation burden,while maintaining the system’s functionalities and perfor-mance.The proposed partitioning and implementation technique obviates the use of any Real Time Operating System(RTOS), which leads to a simple,high speed,and low memory structure of the MAC’s software.Also,solutions such as using hash tables and pipeline processing are given and employed to gain a higher speed.The software section is implemented on the popular, low price DSP of TI’s C54processor,whereas the hardware implementation is realized using Virtex2vp30from Xilinx.I.I NTRODUCTIONThe development of the IEEE802.11standard has resulted in a widespread adoption of local wireless area networking in recent years[3].The IEEE802.11specifies both physical (PHY)and medium access control(MAC)layers[10].The 802.11MAC layer provides functionalities to allow for reliable data delivery to the upper layers over the wireless medium with data rates up to54Mbit/sec[4].It specifies how a computer on the wireless network gains access to receive and transmit data and,once communication is established,how the link is maintained.The basic medium access control method used in the802.11standard is Carrier Sense Multiple Access(CSMA) with collision avoidance[3].Although IEEE802.11Wireless LAN(WLAN)is an ex-cellent solution for the broadband wireless networking,it lacks some capabilities.As a result,many efforts have been made to improve IEEE802.11standard,such as enhancing synchronization method[2]and throughput enhancement[9]. Testing these algorithms requires portable design of the MAC layer,which can be upgraded easily.Different approaches to design and implementation of an IEEE802.11MAC have been introduced previously.Some of them presented a System-on-Chip implementation of the MAC layer[3].Others imple-mented the MAC layer with embedded systems[1,5,10],which focused on designflow,MAC hardware implementation and co-verification of the system.0This project is supported in part by Iran Telecommunication Research Center(ITRC)under contract T/500/12645.In this work,we address the design and implementation of the entire MAC layer using some optimization methods that results in low memory,high speed and easy implementation system.There are different design methodologies for the implementation of the MAC functions,which may be entirely developed in software[7].This is the mostflexible approach for MAC design,but accurate timing requirements are difficult to fulfill.On the other hand,MAC functions can be fully per-formed by using dedicated hardware,at the expense of costly design and poorflexibility.Henceforth,our proposed solutions are given to be something between these two extremes and address both hardware and software implementations[1].As a result,the hardware/software partitioning is the most important step at design level.We start the optimization at design level and partition the functionalities between hardware and software,considering the ability of each part,and try to optimize both parts simultaneously.HW/SW partitioning used here gives us the ability of the optimization of the SW part,which leads to a realization with just two parallel processes.This approach results in a simple implementation and obviates the use of any RTOS.This is while the RTOS is usually used for MAC implementation,because it handles many parallel functions. Optimization of hardware using a pipeline design leads to a faster implementation.Also,using some optimization methods like using hash table,assembly functions and static memory instead of many dynamic memory allocations results in high speed implementation.This paper is organized as follows.An overview of the implementation is presented in section II.System architecture and hardware/software partitioning is explained in section III. Software and hardware implementations are described in sec-tion IV and section V,respectively.Simulation and Verification methods are discussed in section VI and conclusion and plans for future work are given in section VII.II.MAC L AYER I MPLEMENTATION F LOWThe MAC802.11layer controls the transmission of user data into the air[6],so it is expected to be a many inputs/outputs system with many states.In IEEE802.11 standard,the MAC protocol is described with a high levellanguage,called the Specification and Description Language (SDL),which is a set of extendedfinite state machines.Thefirst step in our MAC implementation is to establish a detailed simulation model of the IEEE802.11protocol using SDL.This model is used to verify functional correctness of our implementation.On the other hand,it gives a good sense about the MAC functionality.Description of the MAC usinga high-level language such as SDL provides good portability[10],because SDL tools create Cfiles that can be compiled and executed independently.The SDL model has been designed and simulated us-ing SDL-RT of Real Time Developer Studio released by PragmaDev.The advantage of the software is the simplicity of importing Cfiles.Therefore,design,implementation and optimization can be done in SDL-RT,simultaneously. Next,we execute Cfiles generated by the SDL on some processors and then,based on profiling information obtained from the C implementation and analysis of the real-time requirements specified in the standard,conduct HW/SW par-titioning of our model.Afterfinalizing HW/SW partitioning, we go back to SDL model and simulate hardware and software parts,and also optimize the design of each part.Thefinal stage,we optimize Cfiles of the software part for the DSP,and use the hardware diagrams for the implementa-tion on FPGA.III.S YSTEM A RCHITECTURE AND H ARDWARE/S OFTWAREP ARTITIONINGThe most time critical interval in MAC802.11a is a Short Inter-Frame Space(SIFS)that is equal to16µs.The SIFS is the time taken from the reception of the last PPDU symbol to the transmission of thefirst symbol of the response PPDU [5].So,we have16µs shared by PHY(physical layer)and MAC of the802.11system.According to previous works and the characteristics of the PHY,the MAC layer must carry out the specified tasks in around4µs of the whole16µs interval.The tasks that must be done in SIFS are receiving data and preparing acknowledgement(Ack)frame or receiving request to send(RTS)and preparing clear to send(CTS) frame.To meet this timing requirement and based on timing measurements from the C implementation,we need both receiving and transmitting functions to reside in hardware. Receiving frames include cyclic redundancy check(CRC) and address check,and checking the frame response type. Transmission includes CRC generation and interfacing with PHY.Also channel access mechanism and backoff procedure are implemented in hardware because of their slot timing that is equal to9µs for802.11a.This is while non-critical timing functions,including frame formatting,fragmentation, frame buffering,defragmentation,and network management are implemented in software.The software part of the MAC is implemented on a high speed DSP processor,TMS320VC5416(160MIPS),that is equipped with a host ing the DSP host port,the DSP works as a Dual-port RAM with the FPGA processor.Hence, the DSP spends no time for I/O and just uses itsinternalFig.1.MAC System Architecture.TABLE IM EMORY SIZE OF DIFFERENT RTOSRTOS ROM(KB)RAM(KB)Additional Total Memory(KB) LynxOS256115371ThreadX15217Win-CE6267201346C Executive20323RTLinux 1.5MB4MB 5.5MBRAM that increments the speed of the DSP proceedings.The hardware section is implemented on the Virtex2vp30FF1152, which can be used to implement the whole PHY as well.The hardware MAC uses the PCI interface to exchange information with the PC(Figure1).IV.S OFTWARE I MPLEMENTATIONAs a result of HW/SW partitioning,SW includes many functions that should be handled concurrently.Thefirst idea is to use an RTOS to implement parallel processes of the MAC(see[1,8,10]).Using RTOS increases the size of memory needed for implementation of software,because it occupies at least17k according to table I.Our DSP internal memory is 128K,which means that the smallest RTOS would occupy 13%of memory.Also,using RTOS increases the time of processing,because it switches between processes to run them all.The metric,which is used most frequently to compare RTOS performance,is context switch latency.Context or task switch time purports to be an indicator of RTOS efficiency. This metric simply measures the amount of time that an RTOS spends to save the context of a certain task-that is to put its registers and stack pointer into a control block-and load the context of another task from a second control block.Table II shows the context switch time for some RTOS’s.Figure2 illustrates the data given in table II and shows the effect of context switch time on the speed of execution of two parallel tasks.Typically,ThreadX is the best solution but,as mentioned before,it occupies13%of the memory.Also the number of parallel processes infirst design that is compatible with the SDL diagrams given in IEEE802.11MAC standard is 21,where16number of them are implemented in software. According to table II,for each process,0.5µs is taken by ThreadX that is8µs for16processes that could make problems in timing of transmission of data.Depth analysis of MAC layer functionalities leads to the fact that the functionality of MAC software contains two main processes that should not run sequentially.Other processes could be merged to one of these two main processes.The main idea is that managing functions like authentication,Fig.2.Reduction of speed,using different RTOS’s in presence of two parallel tasks.Fig.3.MAC Software Diagram.association,etc.all contain sending a frame and waiting for a specific response,so all functionalities of MAC include transmission and reception functions.Transmission includes functions needed to manage the network,such as scan, join,association and authentication and functions needed for transmitting a frame to hardware MAC and then to PHY, like frame formatting and fragmentation.Reception includes defragmentation,detection the type of frame and delivering the confirmation signals and received signals to upper layer. In this way,we do not need to use any RTOS,because we can implement transmission function in the main routine and reception,as an interrupt service routine.So,we have simplified and optimized the designed SDL and combined the processes and tested again all functionalities.Figure3shows transmission and reception responsibilities.In the next step,we have implemented a test program in visual C,testing transmission and reception parts of software. Then,we optimize the codes and correct memory leakages using rational tools.Optimization includes using hash table in ignore duplicated frames unit of receive function.This unit saves each received frame in a table and,whenever receivesTABLE IIC ONTEXT S WITCH T IMERTOS Processor Context Switch Time(µs) LynxOS Motorola Power PC233MHz2ThreadX Power PC200MHz0.5QNX Pentium200MHz2Win-CE Pentium200MHz34.4VxWorks Power PC7410100MHz18.4RTLinux Intel Celeron M600MHz 5.8DSP/BIOS C5402 2.2a frame with retry bit equals to one,searches the table to find out if the frame is duplicated.This search,according to the size of frame table,could be a time consuming function. Also,a similar search is carried out in power save monitor in the Access Point(AP)that checks the addresses of receiving frames tofind out if they have been associated.Apparently, using hash table helps much in power save monitor,too. The Cfiles are loaded to the DSP.The most time consuming procedures in software part are fragmentation and defragmen-tation.By choosing the worst case,we have done profiling for transmission of2304bytes frame that must be fragmented to 256byte frames.First profiling results were1.3msec for frag-mentation and1.2msec for defragmentation that is equal to12 Mbit/sec.After optimization with some changes significantly, reducing the number of memory allocations by using static variables,and using assembly versions of some functions like memcopy,the execution time reaches the standard rate(54 Mbit/sec).V.H ARDWARE I MPLEMENTATIONThe structure of hardware MAC is given infigure4.It con-tainsfive parts.Transmission unit performs backoff procedure, accessing to channel,and sending frames to PHY.Reception unit is responsible for receiving correct frames and checking CRC and addresses.All timers are implemented in hardware and are activated with control unit.Beacon module makes beacon frames and controls sending and receiving beacon frames in Ad-Hoc network and also in AP in infrastructure network.It also performs synchronization using time information in receiving beacons.The most complicated part in Hardware is the control unit.This module includes interfacing with PCI and DSP.In addition,it controls the execution of each module of hardware. Signals interfacing between FPGA and DSP are Address BUS from FPGA to DSP,Data BUS bidirectional,and interrupts from FPGA to DSP and vice versa.Interfacing with PCI and DSP is performed using buffers. The PCI side uses two buffers one for transmitting data from user,TX-Buf,and the other one RX-Buf,for receiving data from DSP that must be delivered to the user.In the DSP side,we implement six buffers.Data2Send buffer,which isfilled with the control unit when TX-Buf is full,and the DSP uses it to make MAC frame from data and fragments and sends it to the MAC hardware to be sent to PHY.Data2HW buffer includes fragments of data made by the DSP and is sent to the PHY.Control unit receives an interrupt from the DSP to send the data in Data2HW buffer to the PHY.Three buffers,Data2DSP1-3,are reserved for data received with the MAC hardware.This point of interface is very important because we cannot control coming frames,so we use three buffers to save the previous frames and change the buffer to receive a new frame,if any.Here,we use pipeline processing.After validating a frame including address and CRC check,the control unit prompts the DSP by an interrupt to receive the frame.If the DSP is reading previous buffer, the control unit writes the coming frame in other buffer andFig.4.MAC Hardware DiagramFig.5.SDL diagram of test system of MACwaits until the end of the DSP task,and then activates the DSP interrupt st buffer,DSP2User,is due to the frame that is prepared for delivering to the user,which is the output of receiver routine in software.The control unit must copy the frame in DSP2User buffer to RX-Buf and activate the interrupt of the PCI.VI.S IMULATION AND V ERIFICATIONThe MAC simulation is ultimated at the SDL level.As shown infigure5,we implement models for LLC(Appli-cation),PHY and channel(PHY)and test all functionalities of implemented MAC(time critical functions cannot be eval-uated).Also,we used two stations to build an independent network and transmit data.We initially setup the network with a station and send the scan signal and join signal to the other station,and send afile from one station to another using fragmentation and RTS/CTS.Then,an AP is implemented in SDL and tested an infrastructure network.In the second step,we run Cfiles of software part in Visual Studio and write a test function for testing both transmit and receive functions in a program.As mentioned in section IV, receiver must be executed in interrupt service routine,and actually it cannot be tested till HW and SW connected to each other.As it is necessary to test software routines independent from the hardware,we test the body of interrupt service routine as a function to call.We write the transmit outputs to afile and run the receive function with proper inputs made from transmit output.Also,in each step that the software must get an answer from hardware,we make the answers and pass them on to the function.In the third step,we implement hardware and test each block with test vectors,and then test all blocks together using PHY and MAC models implemented in hardware.In the fourth step,we implement a routine in hardware to interface with software and test hardware and software with a model of the PHY.VII.C ONCLUSIONSIn this work,we have presented new optimization ap-proaches to the implementation of IEEE802.11MAC using a general purpose DSP(TMS320VC5416)and a gate array system(Virtex2vp30).The proposed hardware/software par-titioning scheme results in minimal implementation burden and obviates the use of any RTOS that led to high speed and low memory ing optimizations in software implementation,ing hash table,assembly functions,and reducing memory allocations,we have increased the speed of execution.The use of pipeline processing in hardware, also improved the overall system performance.At thefinal stage,we developed a prototype for IEEE802.11MAC layer with high modularity that can easily be upgraded.In future, proposed enhancement algorithms such as Quality of Service (QoS),network security functions,and synchronization algo-rithms can be used to improve the system performance.R EFERENCES[1] A.Jian,F.Ren,G.Li,et al,“The Design of an IEEE802.11WLANHardware MAC,”7th International Conference on Solid-State and Inte-grated Circuits Technology,V olume2,18-21Oct.2004Page(s):1380-1383vol.2[2]Dong Zhou and Ten-Hwang Lai,”Analysis and Implementation of Scal-able Clock Synchronization Protocols in IEEE802.11Ad Hoc Networks,”Mobile Ad-hoc and Sensor Systems,IEEE International Conference on 25-27Oct.2004Page(s):255-263[3]G.Panic, D.Dietterle,Z.Stamenkovic and K.Tittelbach-Helmrich,“A System-on-Chip Implementation of the IEEE802.11a MAC Layer,”Proceedings of the Euromicro Symposium on Digital System Design (DSD’03),2003.[4]IEEE P802.11a/D7.0,“Part11:Wireless LAN Medium Access Control(MAC)and Physical Layer(PHY)specifications,”July1999.[5]IL-Gu LEE,Seung-Beom LEE and Sin-Chong Park,”Effective co-verification of IEEE802.11a MAC/PHY combining emulation and simulation technology,”Proceedings of the38th Annual Simposium (ANSS’05),2005.[6]M.S.Gast,“802.11Wireless Networks The Definitive Guide,”1st ed.,O’REILLY,2002.[7]T.Shono,H.Shiba,Y.Shirato,et al,”Performance of IEEE802.11Wireless LAN Implemented on Software Defined Radio with Hybrid Programmable Architecture,”IEEE International Conference on Com-munications,ICC’03,V olume3,2003,Page(s):2035-2040.[8]Y.Kim,H.Jung,H.H.Lee,and K.R.Cho,“MAC Implementation forIEEE802.11Wireless LAN,”ATM(ICATM2001)and High Speed Intel-ligent Internet Symposium,2001,Joint4th IEEE International Conference on22-25April2001Page(s):191-195[9]Y.Kim,S.Choi,K.Jang,and H.Hwang,“Throughput Enhancementof IEEE802.11WLAN via Frame Aggregation,”Vehicular Technology Conference,,2004,Page(s):3030-3034V ol.4.[10]Y.LIU and B.LIU,”MAC implementation with Embedded System,”ASIC,Proceedings.5th International Conference on V olume2,21-24Oct.2003Page(s):757-760V ol.2。

相关文档
最新文档