Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
|
|
- Clifford Skinner
- 8 years ago
- Views:
Transcription
1 Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales, Sydney, Australia. 2 Department of Computer Engineering Mahanakorn University of Technology 51 Cheum-Sampam Rd, Nong Chok, Bangkok 10530, Thailand. w.lila@ee.unsw.edu.au. a.seneviratne@unsw.edu.au Abstract Wireless home networking is being addressed by numerous groups such as the HomeRF working group, and the Bluetooth consortium. Of these, Bluetooth technology promises a wider acceptance in term of home networking in the near future. The potential of easily embedding Bluetooth technology in communication devices, computing devices and home appliances make it a more attractive alternative to SWAP[I]. Although the layer up to the data link layer has been standardized by the Bluetooth consortium, how complete home networking solutions can be realized, is still not clear. This paper addresses this aspect, and proposes a way to establish complete home network deploying Bluetooth technology of 721 Kbps provided by Bluetooth is adequate for most data exchanges in a home environment. Finally, voice can also be supported at 64 Kbits per second. Even though, the operating frequency band is at 2.4GHz, the unlicensed band Industrial Scientific-Medical(ISM), Bluetooth still provides means to cope with several unpredictable sources of interference such as cordless phones and microwave ovens. Frequency-hop spread spectrum techniques are applied with a high hopping rate and short packet lengths (1600 hop/s for single slot packets) for noise immunity. Thus Bluetooth technology is quite suitable for a home wireless-networking environment. 1. Introduction In the future, houses will be fully instrumented, which will enable the occupants obtain and process information from the instrument for control, security and management purposes. For example, the status of the heating system, whether it is turned on or off or, the status of the home security system should be able to be monitored remotely. Furthermore, it will provide the infrastructure for connecting the conventional computers and peripheral devices that will be common in households. This scenario is schematically shown in Fig. 1 However, the success of such a system depends significantly on ability of the instruments to be networked at low cost. It is anticipated that Bluetooth will provide this networking capability for a number of reasons. Firstly, Bluetooth devices are small, provides wireless connectivity, and are low cost. Secondly, due to its powerful communication ability, it facilitates easy information exchange. Thirdly, it enables the creation, and modification of network in real time. This enables the network to be set up easily. In addition, the bandwidth Figure 1: Home scenario Despite all its advantages, at present, the Bluetooth specification only covers up to the link layer. Higher layer protocols which are required for intra and inter-piconet communication have not been defined. This severely limits the flexibility of the Bluetooth networks that can be realized. However, if a protocol can be specified for fully supporting intra and inter-piconet communication, the realization of home wireless networks will become $ IEEE 48 1
2 significantly easier. In this paper we present such a protocol and illustrates its viability. 2. Piconets and Scatternets Bluetooth units that are within the range of each other can set up ad hoc connections. Devices can share a channel and form a piconet. One device becomes a master regulating traffic between the other devices attached to that piconet. The devices other than the master are regarded as slaves. This master-slave configuration introduces a number of restrictions. Furthermore, slaves can not establish a connection themselves, only the master can make connections. Each piconet generates its own hop sequence using the master identity and clock. Two types of links have been defined which allows the support of voice and data services. Synchronous connection-oriented (SCO) links aimed at supporting voice services reserve two consecutive slots at fixed intervals. Asynchronous connectionless (ACL) links aimed at supporting data services use a master unit directed polling scheme. This is schematically shown in Figure 2. Maser Slave1 Slave2 Figure 2: SCO and ACL links in a piconet with one master and two slaves As mentioned earlier, units that share the same area and are within range of one another can establish ad hoc connections between themselves. This is used for the formation of a scatternet, a group of piconets. Intercommunication between piconets in a scatternet is provided on a time division multiplex basis. That is, a unit can sequentially participate in different piconets, however can only be active in one piconet at a time This is shown in Figure 3. Figure 3: An example of a scatternet 3. Bluetooth Home Network Architecture Since Bluetooth has been designed as short-range radio interfacing, normally a range of 10 meters, and a maximum of eight active devices can be attached to a piconet. The home networks however need a much larger coverage than 10 meters and also may be required to support more than 8 active devices. Thus, a scatternet, which is d.esigned for a home network, need to overcome these restrictions of standard Bluetooth scatternets. Bluetooth provides flexibility in establishing an ad hoc network. 'Thus the formation of scatternet can be quite complex. This leads to numerous problems. Firstly, in term of communication, routing protocol between piconets becomes complicated. Secondly, the number of hops and communication delay become unpredictable. To ovwcome these drawbacks we propose the method specifying the formation of scatternet in a particular fashion. The proposal is to use of a two level piconet hierarchy when forming a scatternet. The level 1 piconets are used for communication among themselves. To distinguish them from standard piconets we refer to them as personal area networks (PANs). The level 2 piconet is primarily used for providing interconnectivity (routing) of PANs. To distinguish this we refer to it as a routing area network (RAN). A slave in each PAN is also a slave of its RAN. These slaves act as gateways, between the PANs and their respective RANs and are called the gateway slaves. In PANs devices that act as the master and gateway slave are fixed. The other nodes can be mobile devices. The master of the RAN acts as a router and have to be fixed devices as well. This two level Bluetooth home network architecture is depicted in Figure
3 The first field, COM (Communication Type) selects the type of communication. The types of communication supported are shown in Table 1. Figure 4: Bluetooth Home Network Architecture The Network is initially created as a RAN. The master node of the RAN will elect its slaves and assigns them an address. This address becomes the Piconet Addresses (PA) of that node. The slave member nodes of the RAN will be in a parked state, and will wait for a page from the master of PAN it belongs to. In addition to the above, each slave of a PAN is given a number as Device Address (DA). The combination of PA and DA are used in routing protocol in order to uniquely indicate a source and destination node in a packet header. 4 Routing Protocol Routing protocol for Bluetooth scatternets has already been proposed [2]. This protocol is suitable for short lived and small sized network. However, as explained earlier, home networks will have a longer life-time and will be larger in size. Therefore, the protocol proposed in [2] cannot be used.. To overcome this we proposed the use of new protocol. The operation of the protocols is described in section Protocol Header Format The header format of the proposal protocol is shown as Figure 5. It consists of 2 byte layer 3 header with 8 fields Table 1 : Communication in proposed architecture l+l Meaning Reserved PAN-PAN Not used The second field is the M (Master Flag). This defines whether the packet is of a master node within the destination network. If this bit is set, the master of a PAN in destination network will treat received packet as its own. The third field is the SW(Switch Flag). This is used for switching between PANS and RANs. When Switch Flag is set, it is switched from PAN to a RAN or vice versa, i.e. - any slave which receives the packet, will automatically pass it to either the RAN or PAN its connected. If it is not set, the packet belongs to the receiving slave. The fourth field, the Destination Piconet Address (DPA), used for indicating which piconet is to be routed. The fifth field, the Destination Device Address (DDA) indicates the address of the destination node within given piconet defined by DPA. In case of value is zero, means PAN broadcasting. The sixth field, the Source Piconet Address (SPA) indicating to the received devices which piconet transmitted the packet. The seventh field, the Source Device Address (SDA) indicates the originating device within given piconet defined by SPA. SPA-SDA and DPA-DDA, are used to specify a unique source and destination node. Finally, the payload is the information from higher layer such as application functions, control information and so on. 4.2 Protocol Operation Figure 5: Packet Header Format Two modes of communications are supported in our proposed architecture: intra-piconet referred as PAN communication, and inter-piconet referred as PAN-PAN communication. Both unicast and broadcast communication will be supported. Similarly to other protocols, a destination device address (DDA) zero is 483
4 used for broadcasts, and non zeros DDA's are used for unicast communications PAN or Intra-Piconet communication All nodes in a piconet, can communicate with each other. However, all traffic is driven by the master node,. Thus, the master-slave communication requires only one hop. Whereas slave-slave communication will requires two hops, none from the slave-to the master, and another from the master to the slave. The this mode of PAN communication is shown in Figure 6. maximum hops for a PAN-PAN communication is 6 hops as shown in Figure 7. In Figure 7, a notation of Slave#m/n, is used, where m is the address of piconet, assigned by the master RAN node, and n is the address of device assigned by the master PAN node. The term of X in tables is the unspecified meaning or don't care term. \ PAN#4/ PANM Figure 6: An example of PAN communication Table 2: the packet header of PAN communication Figure 7: An example of PAN-PAN communication Table 3: The packet header of PAN-PAN communication Pih shvcni t ~~ata Mater to Slaven2 COM M SW DPA DDA SPA SDA 11 n I I 2 I I o I) n I 2 I I I Path 1 COM 1 M I SW I DPA I DDA I SPA I SDA I Let us assume that slave #1 in Figure 6 wants to send packets to slave#:! which is within the same piconet. First, slave#l creates packet header as shown in the first row of Table 2. It will first put its own piconet and device address in the SPA and SDA respectively. COM is defined as 0 to indicate intra PAN communication. DPA is same as SPA, and 1 implies that the source and destination node are in same piconet. DDA, 2, informs the master the identity of the destination node. M is set to zero to indicate that it is slave-slave communication, with the master acting as a switching node. When a packet is transmitted by the master, the SW flag is assigned by it as follows. If the COM field is 0 that means the destination node is within its piconet, the SW flag will be set to zero. Otherwise it will be set to 1. Receiving slave nodes, will only look at the SW flag. If it is zero, slave will treat packets as its own PAN-PAN or Inter-piconet communication The traffic between piconets is regulated by a RAN master node as well as by a PAN master node. The I I Assume that slave#l of PAN#l wants to send the packets to slave#3 of PAN#3. The operation of the protocol along each hop is summarized in Table 3. The first row of Table 1. shows a COM field 2, as it's a PAN- PAN communication packet. M is zero because the to the destination is not the master node. DDA and DPA are set to 3 as they indicate destination node and the destination piconet. ]?inally, SDA and SPA are set to 1, as they indicate source node and originating piconet. When the packet is received by the master node of PAN1 it first examines COM field. As COM field is set to 2, it will recognize that the received packet is not of its piconet. Therefore:, it will decrease COM field by one and alter SW to 1, and forward this packet to gateway slave. The gateway slave will check whether SW is set to 0. If it is not zero, slave node will relay the packet to the to the 484
5 master of the other piconet it is a member of, ie. the RAN. When the packet arrives at the master node of RAN, it again checks the COM field. In the case when it is non-zero, the master node decreases the COM, and forwards the packet to a slave node defined by the DPA. The slave processes the packet in a similar manner when it was received from the RAN master node. Finally, when the packet reaches the master node of the destination piconet, it will perform as PAN communication. As can be seen from Table 3, the master nodes only need a forwarding function, and the ability to compare and modify two fields, COM and SW. The COM field will be decreased by one after the packet header is processed by master nodes. SW flag will be assigned by master node to be one whenever the hop will have to change from PAN to RAN or vice versa. When the last hop is reached, this flag will have to be 0. That means the next node is the destination and no more packet forwarding is required. The gateway slave nodes simply provide switching functionality and the functionality necessary to decide whether to forward the packet or not. The forwarding decision is done using the SW field. When packets arrive, SW flag is checked. If this flag is set, the gateway slave has to switch itself to join with another piconet and send the packet to the new master, otherwise the packet is owned by receiving slaves. [2] P.Bhagwat, A.Segal1, A routing Vector Method (RVM) for Routing in Bluetooth Scatternets, Mobile Multimedia Communications, (MoMuC 99), 1999 IEEE International Workshop on 1999, pp [3] M.Kalia, S.Garg, R.Shorey, Efficient Policies for Increasing Capacity in Blutooth: An Indoor Pico-Cellular Wireless System, Vehicular Technology Conference Proceedings, V01.2,2000, pp Conclusion We have proposed method of extending the coverage of Bluetooth networks for the home networks which require wider coverage,. and the support of a larger number of nodes. This overcomes the problems of pic0 and sctternet architecture that have been proposed for Bluetooth networks, using a hierarchical network architecture. The only limitation of our architecture is that the master and salve gateway nodes, need to be fixed. We do not believe that will be a serious limitation as all devices in a home network need not be mobile. We believe this approach should be able support a greater number of nodes: at least 64 active nodes. More than nodes can be added by means of parkedunparked state seamlessly [3]. Furthermore, we can provide deterministic delays using this approach. We are in the process of simulating the operation of the proposed architecture, and the early results indicate that it provides an efficient way of providing larger coverage for Bluetooth based networks efficiently. 6 References [I J 485
Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach
Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach Wensheng Zhang, Hao Zhu, and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University University
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationNew protocol concept for wireless MIDI connections via Bluetooth
Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology
More informationWPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationScatternet - Part 1 Baseband vs. Host Stack Implementation. White paper
Scatternet - Part 1 Baseband vs. Host Stack Implementation White paper Ericsson Technology Licensing June 2004 Contents 1....Abstract 3 2.... Introduction 4 3.... Scatternet user case 5 4.... Interoperability
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationTDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationTecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationPossible Applications
FRAUNHOFER Institute for integrated circuits iis DECT Wireless Voice and Data Communications DECT stands for Digital Enhanced Cordless Telecommunication and is an accepted standard in more than 100 countries.
More informationBLUETOOTH is a low-power, open standard for implementing
Proceedings of the 39th Hawaii International Conference on System Sciences - 26 Bluetooth Discovery with Multiple Inquirers Brian S. Peterson, Rusty O. Baldwin, and Richard A. Raines Department of Electrical
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationRecent technological innovations and declining prices for personal computers (PCs) and
Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined
More informationElectromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationLIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
More informationDESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationProfessur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
More informationDesign and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationRouting Protocol for Mobile Ad-hoc Wireless Networks
86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationWireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationWi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationVHICLE-TO-VEHICLE (V2V) communication can promote
THE IEEE FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS Space Division Multiple Access (SDMA) for Robust Ad hoc Vehicle Communication Networks Soheila V. Bana, Pravin Varaiya Abstract
More informationAPPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
More informationAn Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
More informationLoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
More informationWireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
More informationCourse 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions.
Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions. 1. General view on the fixed telephone network Communication network dedicated to voice transmission;
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
More informationDynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationSBrT 299. J = J 0 + ( D(i 1,i) J 0)
VI INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM (ITS2006), SEPTEMBER 3-6, 2006, FORTALEZA-CE, BRAZIL Evaluation of Wireless Links in a Hybrid Network Structure for Mobile VoIP Services D. F. S. Santos, J.
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationLTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
More informationPerformance Evaluation of a Bluetooth Channel Estimation Algorithm
Performance Evaluation of a Bluetooth Channel Estimation Algorithm N. Golmie National Institute of Standards and Technology Gaithersburg, Maryland 2899 Abstract Since Bluetooth devices have to share the
More informationCHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
More information1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationVorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments
Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen Vorlesung Kommunikationsnetze Research Topics:
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationWhite Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationPerformance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationVersion Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.
1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.
More informationRadio Resource Allocation in GSM/GPRS Networks
Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationNetwork Security. Chapter 9 Integrating Security Services into Communication Architectures
Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationAppendix A: Basic network architecture
Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationResearch Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationSpring 2014. Final Project Report
ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca
More informationIn-Vehicle Networking
In-Vehicle Networking SAE Network classification Class A networks Low Speed (
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationPerformance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,
More information- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
More informationAdaptive RTP/UDP/IP Header Compression for VoIP over Bluetooth
Adaptive RTP/UDP/IP Header Compression for VoIP over Bluetooth Luca Marzegalli 1, Mirco Masa 2, Mario Vitiello 3 1 marze@cefriel.it, 2 masa@cefriel.it, 3 vitiello@cefriel.it CEFRIEL / Politecnico di Milano
More informationDefining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
More informationRe-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol
International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo
More informationChapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More informationWhat is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.
DECT 6.0 vs 900 MHz vs 2.4GHz vs 5.8 GHz DECT 6.0 (1.9 GHz) 900 MHz 2.4 GHz 5.8 GHz FCC approved frequency for cordless telecommunication Baby monitors, microwave oven Wi-Fi electronics (routers), wireless
More information(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
More informationWhat is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationAN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES
MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing
More informationEnvironmental Monitoring: Guide to Selecting Wireless Communication Solutions
Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity
More informationWharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004
Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract
More informationAPPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features
APPLICATION NOTE Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products Description Atmel MCU Wireless This document introduces all kinds of 2.4GHz RF products. It focuses on analysis of ZigBee
More information