Wireless IP for IoT / M2M Best Practices

Size: px
Start display at page:

Download "Wireless IP for IoT / M2M Best Practices"

Transcription

1 Wireless IP for IoT / M2M Best Practices Neo White Paper neo.aeris.com WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1

2 Let our experts lead the way Table of Contents INTRODUCTION 1 SMS 1 Wireless IP 1 BEST PRACTICES FOR WIRELESS IP IN IOT / M2M 2 Wireless IP Is Not the Same as Wired IP 2 Wireless IP Radio Modules Are Modems 2 Dueling Stacks 2 IP Session Started by the Device 3 Send Content in MT-SMS Shoulder Taps 3 UDP or TCP? 4 User Datagram Protocol (UDP) 4 Transmission Control Protocol (TCP) 4 Which Protocol to Use? 4 Data Encryption 5 ABOUT NEO 6 WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1

3 INTRODUCTION Now that you understand the basics of wireless IP for Internet of Things/Machine-to-Machine communications, you are ready to consider more advanced issues like radio modules, shoulder taps, and UDP vs. TCP. SMS The first IoT / M2M applications used Short Message Service (SMS) as their data transport methodology. While very reliable for the delivery of data, SMS is unfortunately limited to 140 eight-bit bytes (or 160 characters of seven bits) of IoT / M2M application data in every message packet transmission, in both GSM and CDMA cellular technologies. Many IoT / M2M applications require more bandwidth than SMS allows. For example, firmware updates for a remote device or content updates for a digital billboard require more data to be sent (and sent faster) than an SMS solution would allow. Finally, the cost per byte of data is significantly lower for wireless IP when compared to SMS as a transport. All of this has led to the mass adoption of wireless IP as the primary method of data transfer for IoT / M2M applications. WIRELESS IP Wireless Internet Protocol (IP) data transports are used when the amount of data to be sent per event is larger than an SMS message can contain. In 2G GSM and CDMA cellular, the IP data transport technologies are GPRS and 1xRTT. While these have slower data throughput rates compared to 3G and 4G cellular, they are sufficient for the IP transmission needs for most IoT / M2M applications. (Readers should be aware that a significant portion of 2G GSM GPRS services will be shut down in the United States at the end of 2016, so CDMA 1xRTT is the only practical option for new 2G devices.) For IoT / M2M applications requiring higher transmission rates, devices use 3G CDMA and GSM protocols such as EV-DO and HSPA (or 4G LTE in the future). Today, HSPA geographic coverage in the US does not match the EV-DO coverage, and LTE coverage is not sufficient for IoT / M2M applications. 3G radio modules are more expensive than 1xRTT modules, so they are only used when the higher transmission rates are required for a particular IoT / M2M application. WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1

4 BEST PRACTICES FOR WIRELESS IP IN IOT /M2M This section outlines the practices that will maximize the benefits of using wireless IP for IoT / M2M data transport. WIRELESS IP IS NOT THE SAME AS WIRED IP First, it is important to recognize that wireless IP data technologies are not the same as wired IP data technologies. Software developers who are accustomed to working with DSL, fiber, and cable IP services (and local-area IP networks) should not expect to apply the same practices to wireless IP devices; this will not work. Read on to learn why. WIRELESS IP RADIO MODULES ARE MODEMS Wireless IP radio modules (aka modules) are more similar to old dial-up modems that used traditional telephone lines than to the continuously connected devices used in DSL and cable IP services for example. (DSL and cable units also perform the functional equivalent of dial-up, but these are usually set to dial immediately at power-on and stay connected until power-off acting as if they were connected via a physical wire to the Internet). To establish a session, the IoT / M2M code must initiate the cellular transmission from the module using a dial-string similar to making a phone call with a dialup modem. The controller running the IoT / M2M code sends an AT command (for example, ATDT #777) to the module over a RS-232 or USB port. Using AT commands with modules is very similar to using AT commands (originally developed by Hayes Corporation) for traditional dial-up modems. After receiving the ATDT #777 command, the module originates a call using the dialed digits #777 to the Mobile Switching Center (MSC) that is serving the device in the local cellular network. The MSC interprets the digits #777 as a request to establish a data session and allows the process to continue. Readers should be aware that a significant portion of 2G GSM GPRS services are being shut down soon in the United States. The detailed mechanisms of establishing an IP session in wireless IP technologies (authorization, authentication, etc.) are not described here. It is sufficient to note that the cellular systems have the necessary equipment, protocols, and communication and control mechanisms to make it happen using relevant cellular standards. DUELING STACKS Using a Point-to-Point Protocol (PPP) session for IP data transmissions after dialing in using a module is just like using PPP on traditional dial-up modems on dial-up telephone lines. In traditional dial-up modem connections, the computer that is connected to the modem uses a PPP stack to establish an IP session to the network and remote server. This is under the control of the computer, since the user can choose whether the dial-up modem connection is used for an IP data session or with a terminal emulation program for accessing the server. Similarly, the wireless device must use a PPP stack for the IP data session to the cellular network. This is a potential source of trouble. Many manufacturers provide an IP stack in the module. However, developers writing code for their IoT / M2M applications sometimes add a separate IP stack to the firmware of their devices. When the module establishes a cellular data session with the network, both stacks may attempt to set up PPP sessions! This causes problems for device operation on the network. The cellular systems providing the end-point of the IP session may get WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 2

5 confused and assign multiple IP addresses; they may disconnect only one session when the module eventually terminates the session; the systems may reject both session attempts; etc. With the deep network visibility that we have at Neo, we see this conflict clearly as devices attempt to initiate an IP session. We have significant experience working with customers to resolve and correct this condition. Accordingly, if there are two IP stacks in the device, software developers must cleanly ensure that only one stack attempts to establish the PPP session; they must choose whether the IP stack in the module or the application is used. IP SESSION STARTED BY THE DEVICE In cellular data technologies, the session is always initiated by the module (under the control of the external IoT / M2M application code). The analogy to dial-up modem service holds true. Thus, until such an IP session is started and connected, there isn t any IP data path for a network system or server to send IP data to the device. IoT / M2M applications are generally designed with this concept in mind. However, if the network or server needs to initiate the transmission of IP data to a device, mechanisms called shoulder taps must be used to cause the device to start the actual session if it is not in a session. Typically, these shoulder taps are Mobile- Terminated SMS (MT-SMS) messages sent to the device. SEND CONTENT IN MT-SMS SHOULDER TAPS When an MT-SMS is used to shoulder-tap a device to initiate an IP data session, it is useful to send information to the device in the SMS fields, rather than simply sending an empty MT-SMS, since the length of the SMS content generally does not change its cost. For example, consider sending Absolute Time (perhaps the server time in seconds past midnight UTC ) for the remote device programming to make decisions about the time-validity of a command to take action. Remember to compensate for the (current) 15-second difference between Absolute Time UTC and CDMA time; the latter is based on Global Positioning System (GPS) time and, hence, does not correct for leap-seconds. This is even more relevant if the device has an on-board GPS system from which it receives time data. It may be useful to send the URL for the radio to connect to or IP port number to use or the protocol (such as whether the device should open a TCP session or send data via a UDP packet or use an HTTP session). Since the SMS capacity is 140 eight-bit bytes, or 160 seven-bit characters, all of the above content (including other information that is unique to the IoT / M2M application) can be sent in a single MT-SMS shoulder tap. WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 3

6 UDP OR TCP? We are often asked whether a device should transmit User Datagram Protocol (UDP) packets or use Transmission Control Protocol (TCP) streaming sessions for IoT / M2M data transport. The answer, not surprisingly, is: It depends! From the Internet Engineering Task Force (IETF) detailed definitions, let s briefly describe these two protocols to understand why one may be better than the other for certain IoT / M2M data transmissions. First, it is important to note that both UDP and TCP are used over an underlying IP connection. USER DATAGRAM PROTOCOL (UDP) The UDP format was first defined in an IETF Request for Comment specification, RFC 768. This protocol provides a procedure for applications programs to send messages to other programs with a minimum of protocol mechanism. This protocol is transaction-oriented, and delivery and duplicate protection are not guaranteed. If an application requires ordered, reliable delivery of streams of data, UDP is not the preferred protocol. The format has lower overhead than TCP i.e., fewer bytes are sent in the headers of the packets in UDP than TCP. TRANSMISSION CONTROL PROTOCOL (TCP) The TCP format was first defined in an IETF RFC specification, RFC 761. TCP is a connection-oriented, end-to-end reliable protocol and is intended for use as a highly reliable host-to-host protocol between hosts in IP networks and especially in interconnected systems of such networks. TCP requires that a connection be opened and managed for the duration of the IP data transmission. Within the protocol, transmitted and received packets are acknowledged by the device and the servers. The format has more overhead than UDP i.e., more bytes are sent in the headers of the packets in TCP than UDP. WHICH PROTOCOL TO USE? In general, the choice of UDP vs. TCP must take into account: The desired balance between the reliability of TCP and the lower cost of UDP, since UDP uses fewer bytes of overhead to transmit the same amount of application data. Today, HSPA geographic coverage in the US does not match the EV-DO coverage, and LTE coverage is not sufficient for IoT / M2M applications. The increased complexity of TCP, where the module must open a data stream to a remote host where server programs await connections. Careful design of TCP server programs to allow easy scaling as the number of deployed devices is increased. A desire for the acknowledgments provided by TCP sessions. It is important to note that these two protocols are not mutually exclusive for a given IoT / M2M application. For some communication purposes, a simple transmission of a UDP packet to a remote host may be sufficient including using independent acknowledgment packets via UDP. If an acknowledgment is expected, but not received, either side can retry intelligently (i.e., with limits on number of retries, variable delays between retries, etc.) WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 4

7 For other purposes, even in the same application, a device may open a TCP connection to a server and communicate with the higher reliability of a TCP streaming session to a program that accepts these connections and transmissions. Often, the amount of data may require the use of TCP. For example, if an application needs to transmit a large file (more than a few kilobytes), it is better to use TCP, since the consequences of an error during transmission via UDP could mean that the entire file might need a complete retransmission. DATA ENCRYPTION Should transmitted data from an IoT / M2M device be encrypted to enhance security? Let s examine the perceived need. While it is true that the radios in wireless cellular systems can be overheard, the ANSI-2000 CDMA radio protocol is secure to all but the most serious of listeners. The vast majority of individuals and entities do not have the expensive equipment needed to listen to the spread spectrum noisy CDMA transmissions. Furthermore, the cellular nature of the system also ensures that any listening to the radio in the device will necessarily be localized radio frequency (RF) transmissions from a particular cellular module do not travel more than a few miles in dense urban areas. Finally, content data encryption may require significant processor performance in the module or device to encode and decode data. This process might be beyond the capability of many IoT / M2M application devices. Based on these issues, our experiences, and use of VPNs where appropriate, we do not recommend or require applicationlevel encryption of IP data to and from the modules. WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 5

8 ABOUT NEO Neo enables any company to easily develop, launch, and manage innovative IoT / M2M solutions that require cellular connectivity while dramatically reducing the time, cost, and hassle of obtaining and operating connectivity through traditional channels. Neo is powered by Aeris. Visit neo.aeris.com or follow us on to learn how we can inspire you to create new business models and to participate in the revolution of the Internet of Things. Get in touch Copyright 2015 Aeris Communications, Inc. All Rights Reserved. neo.aeris.com 1512 WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 6

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

2G, 3G, 4G... OMG! What G Is Right for IoT / M2M? Aeris White Paper. www.aeris.com

2G, 3G, 4G... OMG! What G Is Right for IoT / M2M? Aeris White Paper. www.aeris.com 2G, 3G, 4G... OMG! What G Is Right for IoT / M2M? Aeris White Paper www.aeris.com 2G, 3G, 4G... OMG! WHAT G IS RIGHT FOR IOT / M2M? COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the

More information

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM v. CDMA: Technical Comparison of M2M Technologies GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE

BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

End-to-End M2M and IoT Services

End-to-End M2M and IoT Services End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)

More information

Nokia E61i Configuring connection settings

Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

CDMA-based network video surveillance System Solutions

CDMA-based network video surveillance System Solutions 1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to

More information

Configuring connection settings

Configuring connection settings Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

The Industrial Wireless Book - Articles TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS

The Industrial Wireless Book - Articles TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS Page 1 of 6 Print this Page Close this Window TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS Process monitoring and control for electricity distribution grids until now has been available

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3

Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3 Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Kepware Technologies Optimizing KEPServerEX V5 Projects

Kepware Technologies Optimizing KEPServerEX V5 Projects Kepware Technologies Optimizing KEPServerEX V5 Projects September, 2010 Ref. 50.16 Kepware Technologies Table of Contents 1. Overview... 1 2. Factors that Affect Communication Speed... 1 2.1 Defining Bandwidth...

More information

Understanding Latency in IP Telephony

Understanding Latency in IP Telephony Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

Introduction, Rate and Latency

Introduction, Rate and Latency Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text

More information

F2103 GPRS DTU USER MANUAL

F2103 GPRS DTU USER MANUAL F2103 GPRS DTU USER MANUAL Add:J1-J2,3rd Floor,No.44,GuanRi Road,SoftWare Park,XiaMen,China 1 Zip Code:361008 Contents Chapter 1 Brief Introduction of Product... 3 1.1 General... 3 1.2 Product Features...

More information

2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM

2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM WHITE PAPER 2G vs 3G CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM A Quick History Lesson Back in 1995, the 2G digital wireless network was introduced, replacing the analog network launched in 1983. In

More information

Ethereal: Getting Started

Ethereal: Getting Started Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Remote Serial over IP Introduction on serial connections via IP/Ethernet

Remote Serial over IP Introduction on serial connections via IP/Ethernet Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and

More information

Sierra Wireless AirCard Watcher Help for Mac OS X

Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher allows you to manage and monitor the connection between your modem and the network. With Watcher, you can: Determine signal

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager stanley.liu@moxa.com is a communication technology that allows data acquisition

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

The Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003

The Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003 The Evolution of 3G CDMA Wireless Networks David W. Paranchych IEEE CVT Luncheon January 21, 2003 Outline Past: cdma2000 1xRTT Present: 1xEV-DO What is it? How does it work? How well does it work? What

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

ERserver. iseries. Remote Access Services: PPP connections

ERserver. iseries. Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Cellular Data Communications Made Easy

Cellular Data Communications Made Easy Cellular Data Communications Made Easy by Peter Rysavy Published July 1, 1997, Network Computing Copyright Peter Rysavy and Network Computing All rights reserved Huge numbers of people are hitting the

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Cellular Networks: Background and Classical Vulnerabilities

Cellular Networks: Background and Classical Vulnerabilities Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

! encor e networks TM

! encor e networks TM ! encor e networks TM Revision B, March 2008 Document Part Number 15953.0001 Copyright 2008 Encore Networks, Inc. All rights reserved. BANDIT Products Wireless Access Guide For BANDIT, BANDIT IP, BANDIT

More information

WHITE PAPER. 4G: The Distributed Intelligence Revolution

WHITE PAPER. 4G: The Distributed Intelligence Revolution WHITE PAPER 4G: The Distributed Intelligence Revolution BACKGROUND Most machine-to-machine (M2M) connectivity is hosted on 2G networks today, including many SCADA and other remote monitoring and control

More information

TCP/IP Network Communication in Physical Access Control

TCP/IP Network Communication in Physical Access Control TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development

More information

Mobile Stream USB Modem User's Guide Version 1.32 for Windows Mobile

Mobile Stream USB Modem User's Guide Version 1.32 for Windows Mobile Mobile Stream USB Modem User's Guide Version 1.32 for Windows Mobile Copyright 2006-2009 Mobile Stream. All rights reserved. No part of this USB Modem User s Guide may be reproduced, stored in a retrieval

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

TiVo Connect Automatic Machine Discovery Protocol Specification

TiVo Connect Automatic Machine Discovery Protocol Specification TiVo Connect Automatic Machine Discovery Protocol Specification 1 Introduction This document describes how "machines" (TiVo DVRs and/or PCs) running TiVo Connect software automatically "discover" each

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R- MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features

More information

Managing Mobile Devices Over Cellular Data Networks

Managing Mobile Devices Over Cellular Data Networks Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR

More information

01 - Introduction. Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication.

01 - Introduction. Internet Technology. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication. MSc in Communication Sciences 2010-11 Program in Technologies for Human Communication Davide Eynard nternet Technology 01 - ntroduction 2 Welcome! My name is Davide Eynard davide.eynard@usi.ch This course

More information

5.1 Overview of Wireless Card Activation and Configuration

5.1 Overview of Wireless Card Activation and Configuration encor! enetworks TM Version A.5, January 2013 2013 Encore Networks, Inc. All rights reserved. Activating a Wireless Card in a Cellular Carrier Network Wireless connections use radiofrequencies (RF) through

More information

CDMA TECHNOLOGY. Brief Working of CDMA

CDMA TECHNOLOGY. Brief Working of CDMA CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile

More information

Emerging Wireless Technologies

Emerging Wireless Technologies Emerging Wireless Technologies A look into the future of wireless communications beyond 3G Forward: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements

More information

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art

More information

Aeris Device Certification Process

Aeris Device Certification Process Aeris Device Certification Process Version 1.11 April 11, 2014 Document Support Questions or comments regarding this document should be directed to Aeris Communications, Inc. 2350 College Mission Blvd,

More information

CCNA Discovery Chapter Four

CCNA Discovery Chapter Four CCNA Discovery Chapter Four By Chief Eng. Amna Ahmed Institute of Telecommunication amna_ahmed28@yahoo.com Modified by Vincenzo Bruno Hacklab Cosenza Chapter 4 Explain what the internet is Every day millions

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

The Economics of Cisco s nlight Multilayer Control Plane Architecture

The Economics of Cisco s nlight Multilayer Control Plane Architecture The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

How To Understand The Internet From A Telephone To A Computer (For A Computer)

How To Understand The Internet From A Telephone To A Computer (For A Computer) Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

Intelligent, Functional and Effective Gateways for Small Business Applications

Intelligent, Functional and Effective Gateways for Small Business Applications Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime

More information

AT&T s 2G GSM Sunset

AT&T s 2G GSM Sunset AT&T s 2G GSM Sunset Introduction There is an incredibly difficult challenge facing the Machine-to-Machine ( M2M ) industry. In August 2012, AT&T announced that they plan to shut down 2G GSM services (including

More information

GSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2

GSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2 GSM Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.2 Document Title HTTP Service AT Commands Version 1.2 Date 2015-04-13 Status Document Control ID Release GSM_HTTP_ATC_V1.2 General Notes offers

More information

Network Security Systems Fundamentals for ITS Professionals

Network Security Systems Fundamentals for ITS Professionals Network Security Systems Fundamentals for ITS Professionals Chris Adesanya Sr. Systems Engineer Panasonic System Solutions Company adesanyac@us.panasonic.com BICSI Southeast Regional Meeting Dulles, VA

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0 Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a

More information

Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks

Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Quectel Cellular Engine

Quectel Cellular Engine Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.00 Document Title HTTP Service AT Commands Version 1.00 Date 2009-07-06 Status Document Control ID Release GSM_HTTP_ATC_V1.00 General Notes offers

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1

GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes

More information

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information