Introduction to wireless systems
|
|
|
- Claude Bennett
- 9 years ago
- Views:
Transcription
1 Introduction to wireless systems Internet of Things (ex Advanced Topics in Networking) a.a. 2015/2016 Un. of Rome La Sapienza Lesson 2 Chiara Petrioli Department of Computer Science University of Rome Sapienza Italy
2 Techniques for energy efficient communications 2
3 Energy efficient communication protocols Portable devices rely on external sources of energy (batteries, solar cells) to be able to communicate Battery lifetime is limited Demanding to recharge battery operated devices after some timefor the device to remain operational; Despite improvements in battery technologies the problem has not been solved (and is not expected to be solved by better battery technology only): energy demand is increasing; users expectations in terms of device/network lifetime are increasing; Energy efficient techniques have been developed Energy consumption is a critical metric driving wireless systems design 3
4 Energy efficient communication protocols Portable devices rely on external sources of energy (batteries, solar cells) to be able to communicate Battery lifetime is limited Demanding to recharge battery operated devices after some time for the device to remain operational (finite recharging cycles); Despite improvements in battery technologies the problem has not been solved (and is not expected to be solved by better battery technology only): energy demand is increasing; users expectations in terms of device/network lifetime are increasing; Network lifetime: - Time Energy till the efficient first node techniques in the network have been dies having developed depleted its battery; Energy consumption is a critical metric driving wireless - Time systems before design the network gets disconnected or fails to perform critical tasks (e.g., coverage of an Area of Interest) 4
5 Energy efficient communication protocols Portable devices rely on external sources of energy (batteries, solar cells) to be able to communicate Battery lifetime is limited Demanding to recharge battery operated devices after some time for the device to remain operational (finite recharging cycles); Despite improvements in battery technologies the problem has not been solved (and is not expected to be solved by better battery technology only): energy demand is increasing; users expectations in terms of device/network lifetime are increasing; Energy efficient techniques have been developed Energy consumption is a critical metric driving wireless systems design 5
6 Energy efficient communication protocols Portable devices rely on external sources of energy (batteries, solar cells) to be able to communicate Energy Battery efficiency: lifetime is limited Demanding to recharge battery operated devices after some time for the device to remain operational (finite recharging cycles); - Expresses how efficiently given tasks are performed. Despite improvements in battery technologies the problem - Energy-efficient has not been communication: solved (and is energy not expected spent by to the be solved network by better per bit battery correctly technology delivered only): to the final energy demand is increasing; destination; users expectations in terms of device/network lifetime are increasing; - To be considered in combination with other E2E metrics (throughput/latency) Energy efficient techniques have been developed Energy consumption is a critical metric driving wireless systems design 6
7 Energy consumption components Laptop most energy consuming components include CPU, liquid crystal display (LCD) and wireless network interface card Toshiba 410 CDT (2001): 36% of energy consumption due to display, 21% due to CPU+memory, 18% due to wireless network interface card Around mid nineties the area of energy efficient communication moved its first steps 7
8 Energy consumption components Laptop most energy consuming components include CPU, liquid crystal display (LCD) and wireless network interface card Toshiba 410 CDT (2001): 36% of energy consumption due to display, 21% due to CPU+memory, 18% due to wireless network interface card Around mid nineties the area of energy efficient communication moved its first steps Somavat, Pavel, Shraddha Jadhav, and Vinod Namboodiri. "Accounting for the energy consumption of personal Computing including portable devices." in Proceedings of the 1st ACM International Conference on Energy-Efficient Computing and Networking,
9 Energy-efficient techniques Network-related energy consumption has two components Computing: in network data processing, data fusion and aggregation, protocol operations; Communications: Wireless transceiver consumes energy either to transmit/ receive data and control packets, or when it is idle, ready ro receive. Trade-off between computation and communication There is an inherent computing vs. communication trade-off: ü Where should the intelligence of the system be placed? Which data should be processed in network (à higher energy consumption due to computing in nodes which can be energy constrained, but à more compact data transmitted, thus lower energy consumption due to communication) and which data should instead be transmitted to higher end devices or computing systems for processing?(e.g., to the base station, to the sink, or which tasks should be offloaded to the cloud) ü Not a one fit all answer. Energy-efficient communication protocols can add overhead and computational complexity.such overhead must be accounted for in the evaluation. The objective of the energy efficient communication techniques is to optimize these trade-offs, and the trade-offs amongs different E2E performance metrics (not just energy consumption but also throughput, latency). 9
10 Energy-efficient techniques Network-related energy consumption has two components Computing: in network data processing, data fusion and aggregation, protocol operations; Communications: Wireless transceiver consumes energy either to transmit/ receive data and control packets, or when it is idle, ready ro receive. Trade-off between computation and communication Energy-efficient communication protocols can add overhead and computational complexity. There is an inherent computing vs. communication trade-off: ü Where should the intelligence of the system be placed? Which data should be processed in network (à higher energy consumption due to computing in nodes which can be energy constrained, but à more compact data transmitted, thus lower energy consumption due to communication) and which dta should instead be transmitted to higher end devices or computing systems for processing (e.g., to the base station, to the sink, or which tasks should be offloaded to the cloud?) ü Not a one fit all answer. The objective of the energy efficient communication techniques is to optimized these trade-offs, and the trade-offs amongs different E2E performance metrics (not just energy consumption but also throughput, latency). 10
11 Energy-efficient techniques General guidelines PHY: ü Power consumption is a function of the energy needed to activate the transceiver circuitry and of the emitted power à we can significantly decrease overall energy consumption in case of long range communication by applying power control (Objective: minimizing transmission energy) ü Wireless technologies can dynamically change the modulation scheme used over time. Use of high data rate modulations reduce the time needed to transmit packets, thus the associated transmission energy consumption (Objective: minimizing transmission energy) ü HW-dependent optimization and selection of HW: due to design choices standard compliant transceivers can have quite different performance in terms of energy consumption, BER and PER (Bit and Packet Error Rates). HW selection can thus significantly impact the overall system energy consumption. ü Promiscous mode: several protocols proposed for ad hoc network routing exploit the idea of operating the wireless interface card in promiscous mode (à received packets are passed to higher layers and processed even if not addressed to the node) in order to gather information over the wireless broadcast channel which can be used to optimize the protocol operations. ü Operating the wireless interface card in promiscous mode forces the interface card to stay in idle (instead of low power modes) for long periods of time, and leads to significant energy consumption due to processing of packets. Therefore, its use typically is a killer in terms of overall energy consumption. 11
12 Energy-efficient techniques General guidelines PHY: ü Power consumption is a function of the energy needed to activate the transceiver circuitry and of the emitted power à we can significantly decrease overall energy consumption in case of long range communication by applying power control (Objective: minimizing transmission energy) ü Wireless technologies can dynamically change the modulation scheme used over time. Use of high data rate modulations reduce the time needed to transmit packets, thus the associated transmission energy consumption (Objective: minimizing transmission energy) ü HW-dependent optimization and selection of HW: due to design choices standard compliant transceivers can have quite different performance in terms of energy consumption, BER and PER (Bit and Packet Error Rates). HW selection can thus significantly impact the overall system energy consumption. ü Wireless transceiver should instead be switched to a low power sleep state (where it cannot receive or transmit packets but the energy consumption is orders of magnitude lower) whenever a packet not addressed to the node or whenever information exchanged during a handshake make the node aware that the channel will be busy for the next future for transmitting packets not addressed to it ü The transceiver should switch to low power mode for the whole time interval when it knows it will not be involved in communications. This is also why destination address is the first field of the header This is also why NAV field is part of RTS/CTS handshake in IEEE
13 Energy in Radio: the Deeper Story. Tx: Sender Rx: Receiver Incoming information Channel Outgoing information Tx E elec Transmit electronics E RF Power amplifier Rx E elec Receive electronics Wireless communication subsystem consists of three components with substantially different characteristics Their relative importance depends on the transmission range of the radio 13
14 Energy-efficient techniques Tends to increase latency General guidelines MAC ü Awake/asleep schedule: Nodes alternate between high energy consuming states (awake:transmit/receive/idle) in which the transceiver is ON and packets can be transmitted/received AND states in which the transceiver is OFF, packets cannot be received or transmitted but the energy consumption is much lower. Duty cycle=t ON /(T ON +T OFF ) Two possible classes of protocols:» Synchronous: nodes exchange information to coordinate on when to wake up; periodic control message exchange ensures they know when their neighbors will wake up; a packet is transmitted to a neighbor when it is ON.» Asynchronous: Awake/asleep schedule of neighbors is unknown; No control overhead is needed to keep information updated; To ensure reliable communications a sequence of packets must be sent until the destination node wakes up and answers (overhead when a packet has to be sent) OR nodes must follow a cross-layering approach selecting one neighbors among the awake neighbors as relay. ü Nodes not involved in communication should go to sleep till current information exchange completes (Objective: avoid energy waste). ü Nodes should minimize collisions (Objective: avoid energy waste) ü Header compression: By transmitting less bits the transceiver is ON for less time (Objective: reducing transmission energy) ü Limit control information exchanged, aggregate redundant information (Objective: reducing transmission energy) 14
15 Energy-efficient techniques Tends to increase latency General guidelines MAC ü Awake/asleep schedule: Nodes alternate between high energy consuming states (awake:transmit/receive/idle) in which the transceiver is ON and packets can be transmitted/received AND states in which the transceiver is OFF, packets cannot be received or transmitted but the energy consumption is much lower. Duty cycle=t ON /(T ON +T OFF ) Two possible classes of protocols:» Synchronous: nodes exchange information to coordinate on when to wake up; periodic control message exchange ensures they know when their neighbors will wake up; a packet is transmitted to a neighbor when it is ON.» Asynchronous: Awake/asleep schedule of neighbors is unknown; No control overhead is needed to keep information updated; To ensure reliable communications a sequence of packets must be sent until the destination node wakes up and answers (overhead when a packet has to be sent) OR nodes must follow a cross-layering approach selecting one neighbors among the awake neighbors as relay. ü Nodes not involved in communication should go to sleep till current information exchange completes (Objective: avoid energy waste). ü Nodes should minimize collisions (Objective: avoid energy waste) ü Header compression: By transmitting less bits the transceiver is ON for less time (Objective: reducing transmission energy) ü Limit control information exchanged, aggregate redundant information (Objective: reducing transmission energy) 15
16 Energy-efficient techniques Tends to increase latency General guidelines MAC ü Awake/asleep schedule: Nodes alternate between high energy consuming states (awake:transmit/receive/idle) in which the transceiver is ON and packets can be transmitted/received AND states in which the transceiver is OFF, packets cannot be received or transmitted but the energy consumption is much lower. Duty cycle=t ON /(T ON +T OFF ) Two possible classes of protocols:» Synchronous: nodes exchange information to coordinate on when to wake up; periodic control message exchange ensures they know when their neighbors will wake up; a packet is transmitted to a neighbor when it is ON.» Asynchronous: Awake/asleep schedule of neighbors is unknown; No control overhead is needed to keep information updated; To ensure reliable communications a sequence of packets must be sent until the destination node wakes up and answers (overhead when a packet has to be sent) OR nodes must follow a cross-layering approach selecting one neighbors among the awake neighbors as relay. ü Nodes not involved in communication should go to sleep till current information exchange completes (Objective: avoid energy waste). ü Nodes should minimize collisions (Objective: avoid energy waste) ü Header compression: By transmitting less bits the transceiver is ON for less time (Objective: reducing transmission energy) Energy ü consumption Limit control due information to reception exchanged, is typically aggregate >> redundant than that information transmission, (Objective: as it is not possible reducing to predict transmission when a energy) packet will have to be received: ß wake-up radio 16
17 Transceiver states Transceiver can be in one of the following states tx rx idle asleep Awake and transmitting Awake and receiving Awake, neither transmitting nor receiving Asleep: the transceiver is not operational but energy consumption is low. There can be several asleep states with different subsets of the circuitry switched OFF à different time to switch to such states, but also different energy consumption. 17 There is a time and energy consumption associated to the switch which should be accounted for when designing energy efficient protocols
18 Transceiver energy consumption some examples Depend on technology, transmission range and phy layer solutions have an impact For the same type of device/technology significant changes in the energy consumption have occurred over time As designers are striving to make technology more low power Changes also occurred in the relative weight of different components of energy consumption (which has an impact on design of energy efficient protocols) Years: Message: transmitting costs >> receiving; idle cost costs significantly less, sleep mode 2-3 order of magnitudes lower Examples: ü Proxim RangeLAN2 2.4 GHz 1.6 Mbps PCMCIA card: 1.5 W in transmit, 0.75 W in receive, and 0.01 W in standby mode. ü Lucent s 15 dbm 2.4 GHz 2 Mbps Wavelan PCMCIA card: 1.82 W in transmit mode, 1.80 W in receive mode, and 0.18 W in standby mode. 18
19 Transceiver energy consumption some examples Depend on technology, transmission range and phy layer solutions have an impact For the same type of device/technology significant changes in the energy consumption have occurred over time As designers are striving to make technology more low power Changes also occurred in the relative weight of different components of energy consumption (which has an impact on design of energy efficient protocols) Years: Message: transmitting costs >> receiving; idle cost costs significantly less, sleep mode 2-3 order of magnitudes lower Examples: ü Proxim RangeLAN2 2.4 GHz 1.6 Mbps PCMCIA card: 1.5 W in transmit, 0.75 W in receive, and 0.01 W in standby mode. ü Lucent s 15 dbm 2.4 GHz 2 Mbps Wavelan PCMCIA card: 1.82 W in transmit mode, 1.80 W in receive mode, and 0.18 W in standby mode. Nowadays for many low to medium range radio technologies transmission energy consumption is comparable to reception energy consumption and comparable to that of idle mode 19
20 Transceivers energy consumption-gsm When transmission range increases the percentage of transmitted energy due to emitted power increases (data source: M. Srivastava, beginning of 2001) GSM Long range communications E RF Tx E elec Rx E elec ~ 1 km 20
21 Transceiver energy consumption- IoT technologies TmoteSky, EYES v2.0 platforms Texas Instruments Mps430 micro-controller, 16-bit RISC CPU, 8 Mhz, 10Kb RAM, 48Kb ROM, TmoteSky: fast wakeup (< 6us), integrated 12-bit ADC/ DCA converter, radio chip expansion CC2420 SPI (Zigbee bus. compliant), Light, temperature on board sensors. 2Ghz direct sequence spread spectrum (DSSS) modulation, datarate 250Kbps, on board 1 Mb serial EEPROM, EyesIFXv2: radio chip TDA5250, 868Mhz, FSK modulation, datarate 64Kbps, on board 512Kb serial EEPROM 21
22 TmoteSky Energy model CC2420 Modules Transceiver states Energy model 22
23 EYES IFXv2 Energy model Energy model Transceiver states 23
24 Energy efficient techniques General guidelines Data Link ü If channel is in a bad (deep fade) state it is convenient to delay transmissions as it is very unlikely packets will be correctly received (Objective: avoid waste) ü Energy efficient ARQ and FEC schemes have been studied to optimize energy consumption while ensuring reliable and timely communication (overhead vs. number of retransmissions tradeoff; adaptive solutions depending on load, channel, application requirements). 24
25 Energy efficient techniques General guidelines Routing ü Depending on the scenario it can be more energy efficient to transmit over a higher number of shorter links or minimize the number of hops (can you tell me when one option is better than the other? Suggestion: Long range vs. short range communication) ü Minimize the overhead associated to route discovery and maintenance ü Load balancing of the energy consumption among nodes to increase the network lifetime; ü Energy aware routing solutions which account for residual energy (and expected future availability of energy in case harvesting is an option) when selecting the best next hop relay. ü Link quality aware relay selection to avoid retransmissions. ü Relay selection which favors data fusion/aggregation. ü All the above combined ß cross layer solutions. 25
26 Power Saving Techniques In the last few years there has been a change of devices used to access the Internet From PC to smartphone Novel Phy layer and more advanced transceiver features How has the energy model been affected by changes in the device technology? Can we still make the same assumptions or are there additional components to account for? In the following the outcomes of: N. Balasubramanian, A. Balasubramanian, A. Venkataramani Energy consumption in mobile phones: A Measurement Study and Implications for Network Applications, ACM IMC Observation: Workload impacts energy consumption of typical devices (cellular-gsm/3g; WiFi) A. Garcia Saavedra, P. Serrano, A. Banchs, G. Bianchi Energy Consumption Anatomy of Devices and Its Implication on Modeling and Design in Proceedings of Co-NEXT 2012 (on WiFi) 26
27 Device and standarddependent optimizations Implementations and choices made for implementing standards make the difference: N. Balasubramanian, A. Balasubramanian, A. Venkataramani Energy consumption in mobile phones: A Measurement Study and Implications for Network Applications, ACM IMC Observation: Workload impacts energy consumption of typical devices (cellular-gsm/3g; WiFi) ü In 3G, a large fraction (nearly 60%) of the energy, referred to as the tail energy, is wasted in high-power states after the completion of a typical transfer. Typical 3G transfer HTTP request issued to a remote server 50KB download Nokia N95 27
28 Device and standarddependent optimizations Implementations and choices made for implementing standards make the difference: N. Balasubramanian, A. Balasubramanian, A. Venkataramani Energy consumption in mobile phones: A Measurement Study and Implications for Network Applications, ACM IMC Observation: Workload impacts energy consumption of typical devices (cellular-gsm/3g; WiFi) ü In 3G, a large fraction (nearly 60%) of the energy, referred to as the tail energy, is wasted in high-power states after the completion of a typical transfer. Switching back from an active state is handled by means of inactivity timers often set to a few seconds. ü Tail and ramp energies (more limited) are constants that amortize over larger transfer sizes or frequent successive transfers. 28
29 Device and standarddependent optimizations Implementations and choices made for implementing standards make the difference: N. Balasubramanian, A. Balasubramanian, A. Venkataramani Energy consumption in mobile phones: A Measurement Study and Implications for Network Applications, ACM IMC Observation: Workload impacts energy consumption of typical devices (cellular-gsm/3g; WiFi) ü In 3G, a large fraction (nearly 60%) of the energy, referred to as the tail energy, is wasted in high-power states after the completion of a typical transfer. Switching back from an active state is handled by means of inactivity timers often set to a few seconds. ü Tail and ramp energies (more limited) are constants that amortize over larger transfer sizes or frequent successive transfers. 29
30 Device and standarddependent optimizations GSM shows a different trend Lower power More significant transmission energy Less significant (even if present) tail energy effect 30
31 Solution:TailEnder Three ideas: Combine use of 3G and WiFi (with prediction of WiFi availability) For delay tolerant applications (news, s) delay transfer if tolerable delay so to transfer batches For web surfing applications design of energy-optimized prefechting techniques 31
32 Energy Consumption Anatomy- IEEE Experiments and measurements on multiple commercial devices Soekris net Atheros a/b/g Mini-PCI card, configured to use the a PHY Alix2d2 + Broadcom BCM b/g Mini-PCI card Linksys WRT54GL + Broadcom BCM b/g Mini-PCI card Checking no interference (sniffers) Measuring energy consumption with high accuracy power meters Controlled traffic generation (mgen generates UDP packets) A. Garcia Saavedra, P. Serrano, A. Banchs, G. Bianchi Energy Consumption Anatomy of Devices and Its Implication on Modeling and Design in Proceedings of Co-NEXT
33 Energy Consumption Anatomy- IEEE Baseline energy consumption has been measured Eenergy consumption of transmitting one packect without ACKs has been studied Impact on energy consumption of varying transmission power, packet length, type of modulation has been quantitatively studied 33
34 Energy Consumption IEEE Experimental results: Total power consumed by (unacknowledged) transmissions vs. airtime percentage 34
35 Energy Consumption IEEE Experimental results: Total power consumed by (unacknowledged) transmissions vs. airyime percentage 35
36 Energy Consumption IEEE Experimental results: Relationship between cross factor and traffic intensity New energy model is the ρ id is the platform specific baseline power consumption P tx is the power consumption Associated to transmission (depends on airtime, tx power Modulation) P xg (λg) is the new cross factor 36
37 Cross factor analysis New approaches are proposed for - Packet relay selection - Data compression - Data transmission (back to back) - Stack implementation 37
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
ZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Maximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.
1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Microchip Technology. February 2008 Valerio Moretto Slide 1
Microchip Technology February 2008 Valerio Moretto Slide 1 Connectivity Solutions Wired Wireless February 2008 Valerio Moretto Slide 2 Microchip Solutions More complex software Operating Systems >40 MIPS
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Adding WiFi to Your Embedded System. WPG Americas & Gainspan Titus Wandinger (WPG) & Su Li (Gainspan) April 23, 2013
Adding WiFi to Your Embedded System WPG Americas & Gainspan Titus Wandinger (WPG) & Su Li (Gainspan) April 23, 2013 Your partners for Embedded Wi-Fi Multi Market Leader 32 bit ARM MCU Leader Ultra low
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Figure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.
M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES
MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Mobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
Mac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany [email protected] January 2010 Contents
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
Drahtlose Kommunikation. Sensornetze
Drahtlose Kommunikation Sensornetze Übersicht Beispielanwendungen Sensorhardware und Netzarchitektur Herausforderungen und Methoden MAC-Layer-Fallstudie IEEE 802.15.4 Energieeffiziente MAC-Layer WSN-Programmierung
Energy Efficiency of Wireless Sensor Networks
Microwave & RF, Olivier Berder, 20/03/14 1 / 23 Energy Efficiency of Wireless Sensor Networks O. BERDER, M. GAUTIER, O. SENTIEYS, A. CARER ENSSAT, Université de Rennes1 INRIA/IRISA EPC CAIRN March 20,
-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks
-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks Andre Barroso, Utz Roedig and Cormac Sreenan Mobile & Internet Systems Laboratory, University College Cork, Ireland Email: a.barroso
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
The Energy Harvesting Tipping Point for Wireless Sensor Applications
The Energy Harvesting Tipping Point for Wireless Sensor Applications Ever since the first watermills and windmills were used to generate electricity, energy harvesting has been an attractive source of
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Surveillance System Using Wireless Sensor Networks
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA [email protected] [email protected] Abstract The
Image Transmission over IEEE 802.15.4 and ZigBee Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Tutorial. www.ccontrols.com
Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services
Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo
Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
THE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
Zigbee. Setting Standards for Energy-Efficient Control Networks. Setting Standards for Energy-Efficient Control Networks
Zigbee Setting Standards for Energy-Efficient Control Networks Setting Standards for Energy-Efficient Control Networks Setting Standards for Energy-Efficient Control Networks Sommaire Introduction... p
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application
Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application Arrian Prince-Pike A thesis submitted to Auckland University of Technology in fulfilment of the requirements for
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
Spring 2014. Final Project Report
ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan [email protected]
Use of the ZENA MiWi and P2P Packet Sniffer
Page1 Use of the ZENA MiWi and P2P Packet Sniffer 1. P2P Protocol - Reference Microchip AN1024 a. Launch the WDS application that has the Microchip ZENA Wireless Adapter 24 GHz MRF24J40 attached. The PC
Optimizing Background Email Sync on Smartphones
Optimizing Background Email Sync on Smartphones Fengyuan Xu 1,3, Yunxin Liu 1, Thomas Moscibroda 1, Ranveer Chandra 2, Long Jin 1,4, Yongguang Zhang 1, Qun Li 3 1 Microsoft Research Asia, Beijing, China
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
Supporting ZDOs with the XBee API
Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY
Ref: WhP_Rome_vA STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY WHITE PAPER Summary: This white paper shows how Structural Health Monitoring (SHM), helps to improve the quality in the construction
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
RTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Hacking US Traffic Control Systems. Cesar Cerrudo @cesarcer CTO at IOActive Labs
Hacking US Traffic Control Systems Cesar Cerrudo @cesarcer CTO at IOActive Labs 1 About me Hacker, vulnerability researcher, created novel exploitation techniques, dozens of vulnerabilities found (MS Windows,
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
LTE Evolution for Cellular IoT Ericsson & NSN
LTE Evolution for Cellular IoT Ericsson & NSN LTE Evolution for Cellular IoT Overview and introduction White Paper on M2M is geared towards low cost M2M applications Utility (electricity/gas/water) metering
Comparison of 2.4-GHz proprietary RF and Bluetooth 4.0 for HIS applications Page 1 of 6
Comparison of 2.4-GHz proprietary RF and Bluetooth 4.0 for HID applications By: Anitha TG, Applications Engineer & Sai Prashanth Chinnapalli, Applications Engineer Sr, Cypress Semiconductor Corp. With
Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
Crossroads Copenhagen
Crossroads Copenhagen 2008-04-07 Henrik Eriksen Z-Wave & ZigBee Agenda Z-Wave & ZigBee Why are these protocols interesting now Standards Protocol characteristics Network Topology Ensuring Interoperability
Testing Protocols for the Internet of Things and Coexistence with Wi Fi Networks
Testing Protocols for the Internet of Things and Coexistence with Wi Fi Networks Chiara Buratti, Andrea Stajkic, Danilo Abrignani Stefan Mijovic, Roberto Verdone DEI, Outline 1. EuWIn: Testing IoT Protocols
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
