Wireless IP for IoT / M2M Best Practices
|
|
- Roberta Green
- 7 years ago
- Views:
Transcription
1 Wireless IP for IoT / M2M Best Practices Neo White Paper neo.aeris.com WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1
2 Let our experts lead the way Table of Contents INTRODUCTION 1 SMS 1 Wireless IP 1 BEST PRACTICES FOR WIRELESS IP IN IOT / M2M 2 Wireless IP Is Not the Same as Wired IP 2 Wireless IP Radio Modules Are Modems 2 Dueling Stacks 2 IP Session Started by the Device 3 Send Content in MT-SMS Shoulder Taps 3 UDP or TCP? 4 User Datagram Protocol (UDP) 4 Transmission Control Protocol (TCP) 4 Which Protocol to Use? 4 Data Encryption 5 ABOUT NEO 6 WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1
3 INTRODUCTION Now that you understand the basics of wireless IP for Internet of Things/Machine-to-Machine communications, you are ready to consider more advanced issues like radio modules, shoulder taps, and UDP vs. TCP. SMS The first IoT / M2M applications used Short Message Service (SMS) as their data transport methodology. While very reliable for the delivery of data, SMS is unfortunately limited to 140 eight-bit bytes (or 160 characters of seven bits) of IoT / M2M application data in every message packet transmission, in both GSM and CDMA cellular technologies. Many IoT / M2M applications require more bandwidth than SMS allows. For example, firmware updates for a remote device or content updates for a digital billboard require more data to be sent (and sent faster) than an SMS solution would allow. Finally, the cost per byte of data is significantly lower for wireless IP when compared to SMS as a transport. All of this has led to the mass adoption of wireless IP as the primary method of data transfer for IoT / M2M applications. WIRELESS IP Wireless Internet Protocol (IP) data transports are used when the amount of data to be sent per event is larger than an SMS message can contain. In 2G GSM and CDMA cellular, the IP data transport technologies are GPRS and 1xRTT. While these have slower data throughput rates compared to 3G and 4G cellular, they are sufficient for the IP transmission needs for most IoT / M2M applications. (Readers should be aware that a significant portion of 2G GSM GPRS services will be shut down in the United States at the end of 2016, so CDMA 1xRTT is the only practical option for new 2G devices.) For IoT / M2M applications requiring higher transmission rates, devices use 3G CDMA and GSM protocols such as EV-DO and HSPA (or 4G LTE in the future). Today, HSPA geographic coverage in the US does not match the EV-DO coverage, and LTE coverage is not sufficient for IoT / M2M applications. 3G radio modules are more expensive than 1xRTT modules, so they are only used when the higher transmission rates are required for a particular IoT / M2M application. WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1
4 BEST PRACTICES FOR WIRELESS IP IN IOT /M2M This section outlines the practices that will maximize the benefits of using wireless IP for IoT / M2M data transport. WIRELESS IP IS NOT THE SAME AS WIRED IP First, it is important to recognize that wireless IP data technologies are not the same as wired IP data technologies. Software developers who are accustomed to working with DSL, fiber, and cable IP services (and local-area IP networks) should not expect to apply the same practices to wireless IP devices; this will not work. Read on to learn why. WIRELESS IP RADIO MODULES ARE MODEMS Wireless IP radio modules (aka modules) are more similar to old dial-up modems that used traditional telephone lines than to the continuously connected devices used in DSL and cable IP services for example. (DSL and cable units also perform the functional equivalent of dial-up, but these are usually set to dial immediately at power-on and stay connected until power-off acting as if they were connected via a physical wire to the Internet). To establish a session, the IoT / M2M code must initiate the cellular transmission from the module using a dial-string similar to making a phone call with a dialup modem. The controller running the IoT / M2M code sends an AT command (for example, ATDT #777) to the module over a RS-232 or USB port. Using AT commands with modules is very similar to using AT commands (originally developed by Hayes Corporation) for traditional dial-up modems. After receiving the ATDT #777 command, the module originates a call using the dialed digits #777 to the Mobile Switching Center (MSC) that is serving the device in the local cellular network. The MSC interprets the digits #777 as a request to establish a data session and allows the process to continue. Readers should be aware that a significant portion of 2G GSM GPRS services are being shut down soon in the United States. The detailed mechanisms of establishing an IP session in wireless IP technologies (authorization, authentication, etc.) are not described here. It is sufficient to note that the cellular systems have the necessary equipment, protocols, and communication and control mechanisms to make it happen using relevant cellular standards. DUELING STACKS Using a Point-to-Point Protocol (PPP) session for IP data transmissions after dialing in using a module is just like using PPP on traditional dial-up modems on dial-up telephone lines. In traditional dial-up modem connections, the computer that is connected to the modem uses a PPP stack to establish an IP session to the network and remote server. This is under the control of the computer, since the user can choose whether the dial-up modem connection is used for an IP data session or with a terminal emulation program for accessing the server. Similarly, the wireless device must use a PPP stack for the IP data session to the cellular network. This is a potential source of trouble. Many manufacturers provide an IP stack in the module. However, developers writing code for their IoT / M2M applications sometimes add a separate IP stack to the firmware of their devices. When the module establishes a cellular data session with the network, both stacks may attempt to set up PPP sessions! This causes problems for device operation on the network. The cellular systems providing the end-point of the IP session may get WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 2
5 confused and assign multiple IP addresses; they may disconnect only one session when the module eventually terminates the session; the systems may reject both session attempts; etc. With the deep network visibility that we have at Neo, we see this conflict clearly as devices attempt to initiate an IP session. We have significant experience working with customers to resolve and correct this condition. Accordingly, if there are two IP stacks in the device, software developers must cleanly ensure that only one stack attempts to establish the PPP session; they must choose whether the IP stack in the module or the application is used. IP SESSION STARTED BY THE DEVICE In cellular data technologies, the session is always initiated by the module (under the control of the external IoT / M2M application code). The analogy to dial-up modem service holds true. Thus, until such an IP session is started and connected, there isn t any IP data path for a network system or server to send IP data to the device. IoT / M2M applications are generally designed with this concept in mind. However, if the network or server needs to initiate the transmission of IP data to a device, mechanisms called shoulder taps must be used to cause the device to start the actual session if it is not in a session. Typically, these shoulder taps are Mobile- Terminated SMS (MT-SMS) messages sent to the device. SEND CONTENT IN MT-SMS SHOULDER TAPS When an MT-SMS is used to shoulder-tap a device to initiate an IP data session, it is useful to send information to the device in the SMS fields, rather than simply sending an empty MT-SMS, since the length of the SMS content generally does not change its cost. For example, consider sending Absolute Time (perhaps the server time in seconds past midnight UTC ) for the remote device programming to make decisions about the time-validity of a command to take action. Remember to compensate for the (current) 15-second difference between Absolute Time UTC and CDMA time; the latter is based on Global Positioning System (GPS) time and, hence, does not correct for leap-seconds. This is even more relevant if the device has an on-board GPS system from which it receives time data. It may be useful to send the URL for the radio to connect to or IP port number to use or the protocol (such as whether the device should open a TCP session or send data via a UDP packet or use an HTTP session). Since the SMS capacity is 140 eight-bit bytes, or 160 seven-bit characters, all of the above content (including other information that is unique to the IoT / M2M application) can be sent in a single MT-SMS shoulder tap. WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 3
6 UDP OR TCP? We are often asked whether a device should transmit User Datagram Protocol (UDP) packets or use Transmission Control Protocol (TCP) streaming sessions for IoT / M2M data transport. The answer, not surprisingly, is: It depends! From the Internet Engineering Task Force (IETF) detailed definitions, let s briefly describe these two protocols to understand why one may be better than the other for certain IoT / M2M data transmissions. First, it is important to note that both UDP and TCP are used over an underlying IP connection. USER DATAGRAM PROTOCOL (UDP) The UDP format was first defined in an IETF Request for Comment specification, RFC 768. This protocol provides a procedure for applications programs to send messages to other programs with a minimum of protocol mechanism. This protocol is transaction-oriented, and delivery and duplicate protection are not guaranteed. If an application requires ordered, reliable delivery of streams of data, UDP is not the preferred protocol. The format has lower overhead than TCP i.e., fewer bytes are sent in the headers of the packets in UDP than TCP. TRANSMISSION CONTROL PROTOCOL (TCP) The TCP format was first defined in an IETF RFC specification, RFC 761. TCP is a connection-oriented, end-to-end reliable protocol and is intended for use as a highly reliable host-to-host protocol between hosts in IP networks and especially in interconnected systems of such networks. TCP requires that a connection be opened and managed for the duration of the IP data transmission. Within the protocol, transmitted and received packets are acknowledged by the device and the servers. The format has more overhead than UDP i.e., more bytes are sent in the headers of the packets in TCP than UDP. WHICH PROTOCOL TO USE? In general, the choice of UDP vs. TCP must take into account: The desired balance between the reliability of TCP and the lower cost of UDP, since UDP uses fewer bytes of overhead to transmit the same amount of application data. Today, HSPA geographic coverage in the US does not match the EV-DO coverage, and LTE coverage is not sufficient for IoT / M2M applications. The increased complexity of TCP, where the module must open a data stream to a remote host where server programs await connections. Careful design of TCP server programs to allow easy scaling as the number of deployed devices is increased. A desire for the acknowledgments provided by TCP sessions. It is important to note that these two protocols are not mutually exclusive for a given IoT / M2M application. For some communication purposes, a simple transmission of a UDP packet to a remote host may be sufficient including using independent acknowledgment packets via UDP. If an acknowledgment is expected, but not received, either side can retry intelligently (i.e., with limits on number of retries, variable delays between retries, etc.) WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 4
7 For other purposes, even in the same application, a device may open a TCP connection to a server and communicate with the higher reliability of a TCP streaming session to a program that accepts these connections and transmissions. Often, the amount of data may require the use of TCP. For example, if an application needs to transmit a large file (more than a few kilobytes), it is better to use TCP, since the consequences of an error during transmission via UDP could mean that the entire file might need a complete retransmission. DATA ENCRYPTION Should transmitted data from an IoT / M2M device be encrypted to enhance security? Let s examine the perceived need. While it is true that the radios in wireless cellular systems can be overheard, the ANSI-2000 CDMA radio protocol is secure to all but the most serious of listeners. The vast majority of individuals and entities do not have the expensive equipment needed to listen to the spread spectrum noisy CDMA transmissions. Furthermore, the cellular nature of the system also ensures that any listening to the radio in the device will necessarily be localized radio frequency (RF) transmissions from a particular cellular module do not travel more than a few miles in dense urban areas. Finally, content data encryption may require significant processor performance in the module or device to encode and decode data. This process might be beyond the capability of many IoT / M2M application devices. Based on these issues, our experiences, and use of VPNs where appropriate, we do not recommend or require applicationlevel encryption of IP data to and from the modules. WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 5
8 ABOUT NEO Neo enables any company to easily develop, launch, and manage innovative IoT / M2M solutions that require cellular connectivity while dramatically reducing the time, cost, and hassle of obtaining and operating connectivity through traditional channels. Neo is powered by Aeris. Visit neo.aeris.com or follow us on to learn how we can inspire you to create new business models and to participate in the revolution of the Internet of Things. Get in touch Copyright 2015 Aeris Communications, Inc. All Rights Reserved. neo.aeris.com 1512 WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 6
Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products
Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO
More informationThe Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial
More informationWireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More information2G, 3G, 4G... OMG! What G Is Right for IoT / M2M? Aeris White Paper. www.aeris.com
2G, 3G, 4G... OMG! What G Is Right for IoT / M2M? Aeris White Paper www.aeris.com 2G, 3G, 4G... OMG! WHAT G IS RIGHT FOR IOT / M2M? COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the
More informationGSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
More informationCMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationBLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationEnd-to-End M2M and IoT Services
End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who
More informationNokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationNokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
More informationApplications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
More informationCDMA-based network video surveillance System Solutions
1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to
More informationConfiguring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationThe Industrial Wireless Book - Articles TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS
Page 1 of 6 Print this Page Close this Window TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS Process monitoring and control for electricity distribution grids until now has been available
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationOver the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3
Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationKepware Technologies Optimizing KEPServerEX V5 Projects
Kepware Technologies Optimizing KEPServerEX V5 Projects September, 2010 Ref. 50.16 Kepware Technologies Table of Contents 1. Overview... 1 2. Factors that Affect Communication Speed... 1 2.1 Defining Bandwidth...
More informationUnderstanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationIntroduction, Rate and Latency
Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text
More informationF2103 GPRS DTU USER MANUAL
F2103 GPRS DTU USER MANUAL Add:J1-J2,3rd Floor,No.44,GuanRi Road,SoftWare Park,XiaMen,China 1 Zip Code:361008 Contents Chapter 1 Brief Introduction of Product... 3 1.1 General... 3 1.2 Product Features...
More information2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM
WHITE PAPER 2G vs 3G CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM A Quick History Lesson Back in 1995, the 2G digital wireless network was introduced, replacing the analog network launched in 1983. In
More informationEthereal: Getting Started
Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me
More informationWhite Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More information1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationRemote Serial over IP Introduction on serial connections via IP/Ethernet
Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and
More informationSierra Wireless AirCard Watcher Help for Mac OS X
Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher allows you to manage and monitor the connection between your modem and the network. With Watcher, you can: Determine signal
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationOvercoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems
Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager stanley.liu@moxa.com is a communication technology that allows data acquisition
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationThe Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003
The Evolution of 3G CDMA Wireless Networks David W. Paranchych IEEE CVT Luncheon January 21, 2003 Outline Past: cdma2000 1xRTT Present: 1xEV-DO What is it? How does it work? How well does it work? What
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationERserver. iseries. Remote Access Services: PPP connections
ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationCellular Data Communications Made Easy
Cellular Data Communications Made Easy by Peter Rysavy Published July 1, 1997, Network Computing Copyright Peter Rysavy and Network Computing All rights reserved Huge numbers of people are hitting the
More informationVoIP network planning guide
VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead
More informationCellular Networks: Background and Classical Vulnerabilities
Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More information! encor e networks TM
! encor e networks TM Revision B, March 2008 Document Part Number 15953.0001 Copyright 2008 Encore Networks, Inc. All rights reserved. BANDIT Products Wireless Access Guide For BANDIT, BANDIT IP, BANDIT
More informationWHITE PAPER. 4G: The Distributed Intelligence Revolution
WHITE PAPER 4G: The Distributed Intelligence Revolution BACKGROUND Most machine-to-machine (M2M) connectivity is hosted on 2G networks today, including many SCADA and other remote monitoring and control
More informationTCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
More informationMobile Stream USB Modem User's Guide Version 1.32 for Windows Mobile
Mobile Stream USB Modem User's Guide Version 1.32 for Windows Mobile Copyright 2006-2009 Mobile Stream. All rights reserved. No part of this USB Modem User s Guide may be reproduced, stored in a retrieval
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationTiVo Connect Automatic Machine Discovery Protocol Specification
TiVo Connect Automatic Machine Discovery Protocol Specification 1 Introduction This document describes how "machines" (TiVo DVRs and/or PCs) running TiVo Connect software automatically "discover" each
More informationComputer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More information3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
More informationManaging Mobile Devices Over Cellular Data Networks
Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR
More information01 - Introduction. Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication.
MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication Davide Eynard nternet Technology 01 - ntroduction 2 Welcome! My name is Davide Eynard davide.eynard@usi.ch This course
More information5.1 Overview of Wireless Card Activation and Configuration
encor! enetworks TM Version A.5, January 2013 2013 Encore Networks, Inc. All rights reserved. Activating a Wireless Card in a Cellular Carrier Network Wireless connections use radiofrequencies (RF) through
More informationCDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
More informationEmerging Wireless Technologies
Emerging Wireless Technologies A look into the future of wireless communications beyond 3G Forward: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements
More informationIntroduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art
More informationAeris Device Certification Process
Aeris Device Certification Process Version 1.11 April 11, 2014 Document Support Questions or comments regarding this document should be directed to Aeris Communications, Inc. 2350 College Mission Blvd,
More informationCCNA Discovery Chapter Four
CCNA Discovery Chapter Four By Chief Eng. Amna Ahmed Institute of Telecommunication amna_ahmed28@yahoo.com Modified by Vincenzo Bruno Hacklab Cosenza Chapter 4 Explain what the internet is Every day millions
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationDSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
More informationThe Economics of Cisco s nlight Multilayer Control Plane Architecture
The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationHow To Understand The Internet From A Telephone To A Computer (For A Computer)
Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationIntelligent, Functional and Effective Gateways for Small Business Applications
Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime
More informationAT&T s 2G GSM Sunset
AT&T s 2G GSM Sunset Introduction There is an incredibly difficult challenge facing the Machine-to-Machine ( M2M ) industry. In August 2012, AT&T announced that they plan to shut down 2G GSM services (including
More informationGSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2
GSM Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.2 Document Title HTTP Service AT Commands Version 1.2 Date 2015-04-13 Status Document Control ID Release GSM_HTTP_ATC_V1.2 General Notes offers
More informationNetwork Security Systems Fundamentals for ITS Professionals
Network Security Systems Fundamentals for ITS Professionals Chris Adesanya Sr. Systems Engineer Panasonic System Solutions Company adesanyac@us.panasonic.com BICSI Southeast Regional Meeting Dulles, VA
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationLesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
More informationStandard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks
Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationQuectel Cellular Engine
Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.00 Document Title HTTP Service AT Commands Version 1.00 Date 2009-07-06 Status Document Control ID Release GSM_HTTP_ATC_V1.00 General Notes offers
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationGSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1
GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes
More informationCable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
More informationBandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
More informationOverview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More information