Bluetooth Wireless Technology

Size: px
Start display at page:

Download "Bluetooth Wireless Technology"

Transcription

1 Bluetooth Wireless Technology Jamel Lynch Sr.Consultant/ Architect, IBM

2 Agenda Bluetooth Overview What is Bluetooth? What isn t Bluetooth? Bluetooth Air Interface Bluetooth Protocol Stack Bluetooth Profiles Bluetooth Security 2

3 Wireless landscape 3

4 What is Bluetooth? CABLES The term Bluetooth refers to an open specification for a technology to enable short-range wireless voice and data communications anywhere in the world. It is the fastest growing standard ever proposed. Over 2,800 companies have signed up to be adopters of the Bluetooth specification. In 1994 Ericsson initiated study to investigate the feasibility of a low power, low cost, short range radio interface between mobile phones and their accessories. Aim - eliminate cables between mobile phones and PC Cards Ericsson, Nokia, IBM,Intel, Toshiba formed a SIG. 4

5 Why is it called Bluetooth? The Origin of the Bluetooth name: Named after Herald Bluetooth, the Viking King who Christened, united and controlled Denmark and Norway in the 10th century. King of Denmark Bluetooth Wireless technology will unite mobile electronic devices of the world. 5

6 BT Specification adopted by IEEE formed a working group (802.15) to develop standards for WPAN. IEEE approved IEEE standard for PANs SIG provided BT spec 1.1 to IEEE as a candidate for an IEEE 802 WPAN. IEEE licensed wireless technology from the BT SIG. IEEE Adoption Collaboration between standards organization and SIG improve specification. Further strengthens the position of Bluetooth as the de-facto WPAN standard. Formally elevates BT from industry spec into the realm of an official industry standard. BT will be better accepted in the US once one can refer to it as an IEEE standard. 6

7 Bluetooth Industry Timeline New Feature Spec Specification BT v1.1 Core Spec 2.4GHz 721kbps BT v1.2 V1.2 Spec. Ratification Minor spec. release AFH (Adaptive Frequency Hopping) No radio HW nor driver impacts FW update only Backward compatible Ratification & Product BT v2.0 V2.0 Spec Release Major release Higher BW - MR: 2Mbps - HR: 10Mbps HW update (radio) New Profiles Ratification & Product IEEE BT v Standard Bluetooth v1.1 Ratified (MAC & Phy) IEEE future efforts abandoned Current 4Q03 1Q04 2Q04 3Q04 4Q04 1H05 2H05 7

8 Bluetooth Technology Summary Globally free spectrum 2.45 GHz, ISM band GFSK modulation Frequency Hopping (1600 hops/sec) Range 10m piconet (0dBm) 100m optional (+20dBm) Data and voice capable (1Mbps) Full duplex: 478kbps, Asymmetric 721kbps Secure Authentication 128 Encryption Limited Signal range 0 - dbm Pseudo Random hop sequence 8

9 Form factors PC Card Compact Flash USB devices Mini-PCI Secure Digital cards ultraport 9

10 What does Bluetooth provide? Provides point-to-point connections. Provides ad-hoc networking capabilities. Bluetooth specification details how the technology works. Bluetooth Profiles detail how specific applications work to ensure interoperability. 10

11 Master /Slave Bluetooth Network Topology 1 master and up to 7 slaves per piconet. scatternet is not yet supported. 11

12 Point-to-Point (Piconet) Two devices locate each other. Form a connection and transfer data. Wireless cable replacement scenario. The device that initiates the connection is called the Master. Any other devices the Master is connected to are referred to as Slaves. 12

13 Point-to-Multi-Point: The Piconet Two devices create a point-to-point connection. A third device comes into range. The new device is discovered. is added to the piconet and data can be transferred. 13

14 Point-to-Multi-Point: The Piconet Up to seven slaves can be connected to one master. Slaves cannot pass data to other slaves without sending through the master. The master defines the timing for the piconet. 14

15 Piconet-to-Piconet: The Scatternet Scatternets allow devices to be active in numerous piconets. The device can be a slave in one piconet and a master in another. It cannot be a master in two piconets! The device can act as a gateway from one piconet to another. 15

16 Identifying Bluetooth Devices lsb Each Bluetooth device is assigned a unique 48-bit MAC address by the Bluetooth SIG. This is enough addresses for 281,474,976,710,656 Bluetooth units, this should last a few years even with the optimistic predictions of the analysts! The address is split into three parts: LAP: Lower Address Part - used to generate frequency hop pattern and header sync word. UAP: Upper Address Part - used to initialise the HEC and CRC engines. NAP: Non-significant LAP [0:23] Address UAP[24:31] Part - used NAP to seed [32:47] the encryption engine. msb 16

17 Bluetooth Channels A master can create two types of logical channel with a slave device: Asynchronous Connection Less (ACL): Packet Switched System provides a reliable data connection with a best effort bandwidth; depends on radio performance and number of devices in the piconet. Synchronous Connection Oriented (SCO): Circuit Switched System provides real time unreliable connection with a guaranteed bandwidth; usually used for voice based applications. The Bluetooth connections are limited to 1Mbps across the air. This gives a theoretical maximum of ~723kbps of useable data. 17

18 What Bluetooth isn t! Bluetooth is not intended to compete with or replace b, they are complimentary technologies. The data rates, usage scenarios and fundamental ethos behind them are all different! It is unlikely to be used in corporate wireless LAN s. It is not suitable for high data rate applications. High is defined to be >600kbps this allows suitable margin for re-transmissions. Therefore, high quality video streaming is not possible. 18

19 The Air Interface and Bluetooth Baseband 19

20 The ISM Band Bluetooth uses the 2.4GHz ISM frequency band. The Industrial, Scientific and Medical (ISM) band is an unlicensed band, I.e. any one can use it provided they don t exceed certain power constraints. The 2.4GHz ISM band is unlicensed all over the world which makes Bluetooth the only completely world wide standard. Bluetooth uses the frequency range GHz. 20

21 Spectrum Usage The 2.4GHz ISM band is a free for all for anyone who wants to use it. Direct Radio waves Visible X-rays Current 100 khz 300 GHz light Extremely Ultraviolet Gamma low frequency FM radio radiation rays (ELF) MHz Very low frequency Microwaves (VLF) 300 MHz 300 GHz mediumwave radio khz Infrared longwave radio radiation kHz Frequency in hertz (Hz) khz MHz GHz The 2.4GHz ISM Band is also used by: Microwave Ovens. Digital Cordless Phones b. Home RF. Bluetooth 21

22 Overcoming Interference Due to the unrestricted nature of the ISM band, Bluetooth must overcome interference from other systems and minimise its interference on other systems. Bluetooth does this by using a Frequency Hopping Spread Spectrum (FHSS) technique. This spreads the RF power across the spectrum which reduces interference and the spectral power density. 22

23 Frequency Hopping Spread Spectrum - FHSS Bluetooth splits the spectrum up into 79 1MHz wide channels with a small guard band at each end of the whole band. The Bluetooth radio changes transmission frequency 1600 times a second. The frequency hops follow a pseudo random sequence that meets the power density requirements for the FCC and other regulatory bodies. Guard Band Guard Band Frequency, GHz

24 Hop Selection and Synchronisation One frequency hop lasts 625us, this increment is called a time slot. Each Bluetooth device has a clock circuit that counts frequency hops. The address of the master of the piconet is used to seed a frequency hop calculation algorithm. The phase of the hop sequence is defined by the Bluetooth clock of the master. Device address and clock phase information is exchanged during connection negotiation. The slave synchronises its own clock to the master s during connection so that both devices change frequency at the same time. 24

25 The Bluetooth Clock msb lsb C27 The Bluetooth Clock keeps each device synchronised to the Bluetooth slot timing. 28-bit free running clock clocked at 3.2kHz. The clock must have an accuracy of +/-20ppm. Bits of importance: C 0 : 312.5us - Twice slot rate or Inquiry rate. C 1 : 625us - Slot rate. C12 C 12 : 1.28s - Inquiry scan period. C2 C 27 : ~23.3h - Clock wraps about once per day. C1 C0 25

26 Modulation Scheme During each hop, data is transmitted using Gaussian Frequency Shift Keying, G-FSK. FSK uses two different frequencies to transmit a binary 1 or 0. For Bluetooth the two frequencies are: fc + for 1 fc - for 0 where fc = frequency of current hop and = ~157kHz 26

27 Transmission Timing A slave can only send data to the master after it has received a valid packet from the master. Masters transmit in even numbered slots and slaves respond in the next odd numbered slot. Single slot packets are less then 366us long to allow the synthesiser to retune to the next frequency hop. Master f(k + 2) 27 Slave t

28 Time Division Duplex Master and slave alternate transmitting and receiving. 28

29 Power Classes Bluetooth defines 3 power classes for devices: Class 1: 0dBm to +20dBm (1mW to 100mW). Class 2: -6dBm to +4dBm (250uW to 2.5mW). Class 3: <0dBm ( <250uW). These power classes translate in to approximate distances often used when discussing Bluetooth: Class 1: 100 Meters. Class 2: 10 Meters. Class 3: <10 Meters. 29

30 Bluetooth & b interference Bluetooth hops over the entire 2.4 GHz frequency band. Bluetooth splits the spectrum up into 79 1MHz wide channels with a small guard band at each end of the whole band. The Bluetooth radio changes transmission frequency 1600 times a second. The frequency hops follow a pseudo random sequence that meets the power density requirements for the FCC and other regulatory bodies. If there are other users in the band (802.11,Microwave, cordless phones) collisions are unavoidable. Frequency Collision Guard Band Guard Band Frequency, GHz

31 Software Protocol stack : allows devices to locate, connect and exchange data with each other. Major components of the Bluetooth protocol stack Application layer actual applications that make use of BT links. Application, APIs. Middleware layer transport protocols needed for existing and new applications to operate over BT links. SDP, RFCOMM. Transport layer composed of protocols designed to allow devices to locate and to create, configure and manage both physical and logical links that allow higher layer applications to pass data through these transport protocols. L2CAP, link manager. 31

32 Architecture and Protocol Stack Software Firmware Firmware Hardware Hardware Applications TCP/IP HID RFCOMM Data L2CAP Audio Link Manager Baseband RF Control LMP Logical Link Control & Adaptation Protocol (L2C A P ) Segmentation & Reassembly M ultiplexing QoS Link Management Protocol (LMP) Setup and Management of Baseband Connections A uthentication & S ecurity Flow control Baseband & MAC 48bit IEEE address 3 bit connection address P t-pt, P t-m pt links Power efficient modes Link Types: SCO ACL 32

33 What can you do with Bluetooth? The Bluetooth specification defines a series of profiles that aid interoperability between similar devices. The profiles describe applications and usage scenarios for common applications. Application Profile Name Serial Emulation Generic Serial Ad-hoc Network LAN Access Dial up w/ Phone DUN File transfer FTP FAX FAX Audio Headset Print HRCP 33

34 The Bluetooth Ultimate Headset Cable replacement technology Keep your hands free with the ultimate solution for the: Road Office Car Streaming MP3s 34

35 Dial Up Networking (DUN) Profile Allows wireless connection from a PC to a mobile phone for remote LAN or Internet access. Any PC should interoperate with any mobile phone in a secure fashion. Profile interoperability is tested at qualification and voluntarily at UnPlug Fests. 35

36 The Conference Table Create and share informations with your colleagues by forming small private work space Collaborative work File and resource sharing LAN connection 36

37 The Instant Postcard Send instant photos and video clips from any location Suitable for professional as well as private use GSM D-AMPS CDMA PSTN etc. 37

38 Other Profile Examples Electronic Business Card Exchange (OBEX) & P.I.M. Synchronisation Personal Area Networking (PAN) LAN Access 38

39 Bluetooth Security The BT system provides security measures both at the application layer and the application the link layer for usage protection and information confidentiality. Four different entities are used for maintaining security at the link layer A public address unique for each user Two secret keys A random number unique for each new transaction 39

40 Future Usages 40

41 Emerging Technology WLAN WWAN RFID SDR 41

42 WLAN a/b/g Technical Specifications Frequency band a GHz to 5.85 GHz b/g GHz to GHz Modulation a and g: OFDM (54Mbps) b : DBPSK,DQPSK, CCK (11Mbps) Security Data encryption: 64-bit, 128-bit, Wired Equivalency Protection (WEP) 802.1x EAP WPA CCX 42

43 Wireless LAN - Standards b Speed: 11 Mbps Uses: 2.4 GHz band Three non-overlapping channels a Speed: 54 Mbps Uses: 5 GHz band Eight nonoverlapping channels g Speed: 54 Mbps Uses: 2.4 GHz band Three non-overlapping channels h f i e Security and Authentication enhancements Modifications to comply with European regulations Protocol for interoperability between WLAN access points QoS and CoS Mechanisms 43

44 Wireless WAN Switching Technologies Circuit Switching - an electrical physical didcated path that transmits ever-fluctuating voice or data signals. A dedicated path is established through every switch and transmission line needed to connect the call before the person being called ever hears the telephone ring. Packet Switching - a virtual path for data switching. The addresses of the packets are read by the switches and routed to the approiate path. Bursts of data are sent only when needed allowing an "always on state" Wireless Access Standards Frequency Division Multiple Access (FDMA) - analog wireless transmission technology that allocates a single channel to one user at a time Time Division Multiple Access (TDMA) - digital transmission technology that allows a number of users to access a single radio-frequency (RF) channel without interference by allocating unique time slots to each user within each channel. Code Division Multiple Access (CDMA) - digital wireless spread spectrum technique allowing multiple users to share the same frequency assigning each active user an individual code 44

45 Wireless WAN W W AN connectivity requires a wireless access device and a wireless network infrastructure, provided by a wireless service carrier. Carrier - wireless service provider providing subscriber access to the network SIM (subscriber identity module - GPRS only) - authentication to service provider W ireless Access Device - device enabling access to the wireless network Mobile PC + + Mobile PC W ireless Access Device carrier The wireless access device sends and receives voice and data via radio waves with radio towers, which carry the signal to a mobile switching center, where the signal is passed on to the appropriate public or private network link. The signal can then be transferred to an organization's existing network. 45

46 Questions Personal Computing Division 46

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA

More information

Recent technological innovations and declining prices for personal computers (PCs) and

Recent technological innovations and declining prices for personal computers (PCs) and Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined

More information

Tecnologías Inalámbricas.

Tecnologías Inalámbricas. Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics

More information

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07. Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

Wireless Technologies for Automation

Wireless Technologies for Automation Wireless Technologies for Automation Prof. Dr.-Ing. Jörg F. Wollert Wireless Technologies for Automation Why using wireless communication? Pros and cons in wireless networks Embedded Wireless Hardware

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

TDM & FDM Overlays on Bluetooth

TDM & FDM Overlays on Bluetooth TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu

More information

Electromagnetic Spectrum (3kHz 300GHz)

Electromagnetic Spectrum (3kHz 300GHz) Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are

More information

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1. 1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.

More information

Wireless Local Area Networking For Device Monitoring

Wireless Local Area Networking For Device Monitoring Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters

More information

Bluetooth wireless technology basics

Bluetooth wireless technology basics Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

Mapping of Services on Bluetooth Radio Networks

Mapping of Services on Bluetooth Radio Networks Mapping of s on Bluetooth Radio Networks J. Dunlop and N. Amanquah University of Strathclyde -Department of Electronic and Electrical Engineering, Glasgow G1 1XW, Scotland Ph.: +44 141 5482081, Fax:+44

More information

Bluetooth Tutorial. Dennis Sweeney Center for Wireless Telecommunications. dsweeney@vt.edu

Bluetooth Tutorial. Dennis Sweeney Center for Wireless Telecommunications. dsweeney@vt.edu Bluetooth Tutorial Dennis Sweeney Center for Wireless Telecommunications dsweeney@vt.edu Max Robert Mobile and Portable Radio Research Group DotMobile, Inc. robert@dotmobile.net June 14, 2000 Overview

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications. DECT 6.0 vs 900 MHz vs 2.4GHz vs 5.8 GHz DECT 6.0 (1.9 GHz) 900 MHz 2.4 GHz 5.8 GHz FCC approved frequency for cordless telecommunication Baby monitors, microwave oven Wi-Fi electronics (routers), wireless

More information

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very

More information

Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping?

Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping? Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard Presentation to IEEE 802 March 11, 1996 Naftali Chayat BreezeCom 1 Why Frequency Hopping? Frequency Hopping is one of the variants

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

IEEE 802.15.1 Simulation and BER Analysis under the Interference

IEEE 802.15.1 Simulation and BER Analysis under the Interference IEEE 802.15.1 Simulation and BER Analysis under the Interference Zahir Aalam, S Vhatkar, B. K. Mishra Thakur College of Engineering & Technology, Kandivali (E), Mumbai 101, M.S. India ABSTRACT There is

More information

Whitepaper. 802.11n The Next Generation in Wireless Technology

Whitepaper. 802.11n The Next Generation in Wireless Technology Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE

More information

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao Tri-Band RF Transceivers for Dynamic Spectrum Access By Nishant Kumar and Yu-Dong Yao Presentation outline Introduction to WISELAB Active work at WISELAB Tri-band test bed Elements of the test bed Experimentation

More information

Course Duration: Course Content Course Description Course Objectives Course Requirements

Course Duration: Course Content Course Description Course Objectives Course Requirements Course: TCS 201 Telecommunication and Networks I (3 credits compulsory) Course Duration: The course shall comprise of 45hours of theory and practical classes. The theory will be taught for 30hours of 2hours

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

Wireless Products for Medical Markets

Wireless Products for Medical Markets Communication Products Division Wireless Products for Medical Markets The Value Proposition for Medical Device Manufacturers Agenda Introduction Who is SMART Bluetooth The technology and how it applies

More information

Lecture 1: Introduction

Lecture 1: Introduction Mobile Data Networks Lecturer: Victor O.K. Li EEE Department Room: CYC601D Tel.: 857 845 Email: vli@eee.hku.hk Course home page: http://www.eee.hku.hk/courses.msc/ 1 Lecture 1: Introduction Mobile data

More information

PAN networks. 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1

PAN networks. 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1 PAN networks 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 2 Elektrobit Plc. Elektrobit Group's business idea is to improve the competitiveness

More information

APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features

APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features APPLICATION NOTE Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products Description Atmel MCU Wireless This document introduces all kinds of 2.4GHz RF products. It focuses on analysis of ZigBee

More information

ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/

ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ Wireless Long Range Multi-function 7+1 AP ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ EIRP up to 2000mW WDS Bridge/Client Router/AP Router ECB3500 is a powerful, enhanced,

More information

Wireless Local Area Network

Wireless Local Area Network Wireless Local Area Network ดร. อน นต ผลเพ ม Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand iwing Lab CPE

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

XBEE 802.15.4 PROTOCOL COMPARISON

XBEE 802.15.4 PROTOCOL COMPARISON Connect with Confidence XBEE 802.15.4 PROTOCOL COMPARISON Abstract Creating wireless networks can be done using a variety of RF protocols. Some protocols are proprietary to individual vendors, others are

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

So Many Wireless Technologies Which Is the Right One for My Application?

So Many Wireless Technologies Which Is the Right One for My Application? So Many Wireless Technologies Which Is the Right One for My Application? Don P. Dickinson Senior Business Development Manager Water Sector Phoenix Contact USA Abstract Wireless technology has transformed

More information

Chapter 3: Spread Spectrum Technologies

Chapter 3: Spread Spectrum Technologies Chapter 3: Spread Spectrum Technologies Overview Comprehend the differences between, and explain the different types of spread spectrum technologies and how they relate to the IEEE 802.11 standard's PHY

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things

The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things Faculty of Electrical Engineering, Mathematics & Computer Science The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things Jermain C. Horsman B.Sc.

More information

CHAPTER. Wireless Networking

CHAPTER. Wireless Networking 11 CHAPTER Wireless Networking CHAPTER OUTLINE 11-1 Introduction 11-2 The IEEE 802.11 Wireless LAN Standard 11-3 802.11 Wireless Networking 11-4 Bluetooth, WiMAX, and RFID 11-5 Securing Wireless LANs 11-6

More information

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013 WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

Outline. IEEE 802.16 and 802.15. Background: Wireless Landscape. What is WiMAX? WiMAX Overview. Background: Wireless Technologies

Outline. IEEE 802.16 and 802.15. Background: Wireless Landscape. What is WiMAX? WiMAX Overview. Background: Wireless Technologies Outline IEEE 802.16 and 802.15 An overview An insight into IEEE 802.16 WiMAX An introduction to Bluetooth 10/6/2008 2 Background: Wireless Landscape Background: Wireless Technologies Low Cost & Complexity

More information

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2

More information

2G/3G Mobile Communication Systems

2G/3G Mobile Communication Systems 2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

11Mbps Wireless LAN PC Card. User s Manual

11Mbps Wireless LAN PC Card. User s Manual 11Mbps Wireless LAN PC Card User s Manual Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic

More information

Working With Bluetooth Devices

Working With Bluetooth Devices Working With Bluetooth Devices Preliminary 2004-06-29 Apple Computer, Inc. 2003, 2004 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication

More information

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004 Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. pmccurdy@phoenixcon.com Ira Sharp Product Specialist Phoenix

More information

Bluetooth Wireless Monitoring, Managing and Control for Inter Vehicle in Vehicular Ad-Hoc Networks

Bluetooth Wireless Monitoring, Managing and Control for Inter Vehicle in Vehicular Ad-Hoc Networks Journal of Computer Science 5 (12): 922-929, 2009 ISSN 1549-3636 2009 Science Publications Bluetooth Wireless Monitoring, Managing and Control for Inter Vehicle in Vehicular Ad-Hoc Networks Helia Mamdouhi,

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill dominicgs@gmail.com

Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill dominicgs@gmail.com Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill dominicgs@gmail.com Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp

More information

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,

More information

APPROVAL SHEET. Customer: Customer P/N: 802.11N 150M and Bluetooth 2.1+EDR. Customer. Approval

APPROVAL SHEET. Customer: Customer P/N: 802.11N 150M and Bluetooth 2.1+EDR. Customer. Approval APPROVAL SHEET Customer: Customer P/N: Description: USB WIFI +Bluetooth dongle Part No.: 802.11N 150M and Bluetooth 2.1+EDR Customer Approval Checked By Issued By 1 A.WIFI PART 1.Introduction USB WIFI

More information

Bluetooth usage with Architecture view & security measures

Bluetooth usage with Architecture view & security measures Bluetooth usage with Architecture view & security measures Savan K. Patel Assi.Professor AMPICS Dept Ganpat University Kherva, Gujarat, India Hiral R.Patel Assi.Professor Department of CS, Ganpat University

More information

Application Note AN-00126

Application Note AN-00126 Considerations for Operation within the 902-928MHz Band Application Note AN-00126 Introduction This application note is designed to give the reader a basic understanding of the legal and technical considerations

More information

Guide for wireless environments

Guide for wireless environments Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...

More information

File Transfer Using Bluetooth

File Transfer Using Bluetooth 2004:088 CIV MASTER S THESIS File Transfer Using Bluetooth MARCUS CARLSSON ERIK HOLMBERG MASTER OF SCIENCE PROGRAMME Department of Computer Science and Electrical Engineering Division of Computer Science

More information

Data sheet Wireless UART firmware version 4.02

Data sheet Wireless UART firmware version 4.02 Data sheet Wireless UART firmware version 4.02 BLUETOOTH is a trademark owned by Bluetooth SIG, Inc., U.S.A. and licensed to Free2move Rev: 22 December 2008 Table of contents 1 GENERAL INFORMATION...4

More information

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1. EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5

More information

Bluetooth Teollisuussovelluksissa BlueGiga Technologies Oy Tom Nordman

Bluetooth Teollisuussovelluksissa BlueGiga Technologies Oy Tom Nordman Bluetooth Teollisuussovelluksissa BlueGiga Technologies Oy Tom Nordman 27.8.2002 BLUEGIGA PROPRIETARY Agenda BlueGiga Technologies Bluetooth-käyttöalueet teollisuussovelluksissa Toimiiko Bluetooth teollisuusympäristössä?

More information

Bluetooth Protocol Architecture

Bluetooth Protocol Architecture Bluetooth WHITE PAPER DATE Aug 25th 99 N.B. DOCUMENT NO. 1.C.120/1.0 RESPONSIBLE Riku Mettala E-MAIL ADDRESS riku.mettala@nmp.nokia.com STATUS Bluetooth Protocol Architecture Version 1.0 This white paper

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

PHOENIX CONTACT - 03/2007

PHOENIX CONTACT - 03/2007 PSI-WL-PLUG-USB/ Bluetooth USB Adapter INTERFACE Data Sheet 103170_00_en PHOENIX CONTACT - 03/2007 Description The Bluetooth USB adapter provides an easy wireless connection between devices with a USB

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Nigerian Communications Commission

Nigerian Communications Commission Nigerian Communications Commission REGULATORY GUIDELINES FOR THE USE OF 2.4 GHz ISM BAND FOR COMMERCIAL TELECOM SERVICES Introduction The use of broadband for last mile access or for final distribution

More information

Bluetooth Enhanced Data Rate (EDR): The Wireless Evolution. Application Note

Bluetooth Enhanced Data Rate (EDR): The Wireless Evolution. Application Note Bluetooth Enhanced Data Rate (EDR): The Wireless Evolution Application Note Table of Contents Introduction........................................................1 A Brief Overview....................................................4

More information

The GSM and GPRS network T-110.300/301

The GSM and GPRS network T-110.300/301 The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic

More information

Scatternet - Part 1 Baseband vs. Host Stack Implementation. White paper

Scatternet - Part 1 Baseband vs. Host Stack Implementation. White paper Scatternet - Part 1 Baseband vs. Host Stack Implementation White paper Ericsson Technology Licensing June 2004 Contents 1....Abstract 3 2.... Introduction 4 3.... Scatternet user case 5 4.... Interoperability

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Wireless Telephone System Product Comparison

Wireless Telephone System Product Comparison TM Wireless Telephone System Product Comparison SpectraLink PCS 150E SpectraLink PCS 150E x 4 SpectraLink PCS 3000 Publication Information Toshiba America Information Systems, Inc., Telecommunication Systems

More information

Mobile Communication Systems: DECT Digital Enhanced Cordless Telecommunication

Mobile Communication Systems: DECT Digital Enhanced Cordless Telecommunication Mobile ommunication Systems: DET Digital Enhanced ordless Telecommunication Mobile ommunication: Telecommunication Systems - Jochen Schiller http://www.jochenschiller.de 1 Overview DET (Digital European

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3

Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3 Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

ECB1220R. Wireless SOHO Router/Client Bridge

ECB1220R. Wireless SOHO Router/Client Bridge Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Interference Identification Guide. Table of Contents

Interference Identification Guide. Table of Contents Interference Identification Guide This document is a guide to help IT professionals optimize the performance of wireless networks by using spectrum analysis tools to identify sources of wireless interference.

More information

Logitech Advanced 2.4 GHz Technology

Logitech Advanced 2.4 GHz Technology Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information