David Tipper. Graduate Telecommunications and Networking Program. Wireless Networks. Wireless Wide Area Networks (WWANs)
|
|
|
- Rosaline Gaines
- 9 years ago
- Views:
Transcription
1 Wireless Personal Area Networks David Tipper Associate Professor Graduate Telecommunications and Networking Program University it of Pittsburgh Slides 11 Wireless Networks Wireless Wide Area Networks (WWANs) Cellular Networks : GSM, cdmaone (IS-95), UMTS, cdma2000 EV-DO Satellite Networks: Iridium, Globalstar, GPS, etc. Wireless Metro Area Networks (WMANs) IEEE WiMAX Wireless Local Area Networks (WLANs) IEEE , a, b, g, etc. (infrastructure, ad hoc, sensor) Wireless Personal Area Networks (WPANs) IEEE (Bluetooth), IrDa, Zigbee, 6LowWPAN, proprietary sensor, etc. 2
2 What is a personal area network? Origins in the BodyLAN project initiated by BBN in the early 1990s for military Networking personal devices around a solider Now networking devices around an individual sensors, cameras, handheld computers, audio devices, cell phone, printers, etc. Goal was smart technology that self configures, recognizes other units within range and provides on the fly communications Universal short-range wireless capability Use band available globally for unlicensed users Low powered medium data rate 3 Bandwidth versus Range 1000 digital video PANs a/g IrDA digital camera mp3 player keyboard mouse serial connection Bluetooth HIPERLAN b hi-fi audio Zigbee LAN applications remote control Distance in meters 4
3 Applications of WPANs Cable Replacement (a) Ad hoc connectivity (b) PSTN or the Internet Access to wired network (c) 5 Bluetooth Much of the WPAN focus today is around Bluetooth Originated by Ericsson, Nokia, IBM, Toshiba, Intel formed a WPAN special interest group (SIG) 1998 Named after King of Denmark and Norway Kong Harald Blaatand (Bluetooth), Specifies the complete system from the radio level up to the application level Protocol stack is partly in hardware and partly in software running on a microprocessor Embedded d devices Low power Low cost Uses ISM band of spectrum 6
4 IEEE Started in 1997 as a sub-group of IEEE Focused on WPANS Initial functional requirements Low power devices Range of 0-10m Low data rates ( kbps) Small sizes (0.5 cubic inches) Low cost Multiple networks in the same area Up to 16 separate devices in a PAN IEEE Took over Bluetooth standardization in 2000 Today over 2500 companies as Bluetooth SIG members Built-in Bluetooth chip shipped in more than 100 million cellular phones and laptops last year Several millions of other communication devices Cameras, headsets, microphones, keyboards etc. 7 IEEE today Task Group 1 ( ) PHY and MAC layer design for wirelessly connecting devices entering a personal operating space (POS) POS is a 10m space around a person who is stationary or in motion Task Group 2 ( ) Coexistence of WLANs and WPANs Interoperability between a WLAN and WPAN device Task Group 3 ( ) Higher data rates (> 20 Mbps) (Kodak, Cisco, Motorola) Multimedia applications like digital imaging and video UWB radios WiMedia protocol stack at higher layers Task Group 4 ( ) Low data rates and ultra low power/complexity devices for sensor networking Home automation, smart tags, interactive toys, location tracking, etc. Zigbee is now part of this group 8
5 Bluetooth Protocol Architecture Bluetooth architecture has three types of protocols 1. Core protocols Radio Baseband Link manager protocol (LMP) Logical link control and adaptation protocol (L2CAP) Service discovery protocol (SDP) 2. Cable replacement and Telephony protocols RFCOMM Telephony control specification binary (TCS BIN) 3. Adopted protocols PPP TCP/UDP/IP WAP Etc. 9 Example Protocol Stack Other WAP Applications Service Discovery SDP Telephony TCS TCP/UDP IP RFCOMM PPP Audio L2CAP = Logical Link Control and Adaptation Host Controller Interface Baseband Bluetooth Radio LMP = Link Mgt. 10
6 Bluetooth RF and Baseband Layers Operates in the same 2.4 GHz bands as IEEE b Channels are 1MHz wide (79 or 23 channels depending on country) Modulation : GFSK at 1Mbps on air Version 2.0 Enhanced Data Rate 2-level - GFSK : 2Mbps rate Error control depends on connection and rate either 1/3 convolutional coded FEC, 2/3 FEC ARQ Single chip implementation < $5 a chip 11 Employs frequency hopping spread spectrum Reduce interference with other devices Bluetooth FHSS Pseudorandom hopping 1600 hops/sec- time slot is defined as 625 microseconds Packet 1-5 time slots long TDD up/downlink System is FH/FDMA/TDD 12
7 Bluetooth Architecture Slave Slave Master Slave Scattered ad-hoc topology called a ``scatter-net A cell or piconet is defined by a Master device The master controls the frequency hopping sequence The master also controls the transmission within its piconet using a TDMA structure There is NO contention within a piconet There is interference between piconets in the same geographic space 13 Bluetooth Architecture (2) Slave Slave Master Slave Master/Slave A Slave B Slave A device can belong to several piconets A device can be the master of only one piconet A device can be the master of one piconet and slave of another piconet or a slave in different piconets 14
8 Bluetooth Architecture (3) The Master device is the device that initiates an exchange of data The Slave device is a device that responds to the Master Slaves use the frequency hopping pattern specified by the Master A slave can transmit ONLY in response to a Master A Master device can simultaneously control seven slave devices and might have up to 200 slave devices in a piconet Multiple piconets in the same geographic space interfere with each other FH-SS is used so multiple piconets can coexist in same space 15 Bluetooth Device Address Each Bluetooth device has a 48 bit IEEE 802 MAC address Called the Bluetooth Device Address (BD_ADDR) This MAC address is split into three parts The Non-significant Address Part (NAP) Used for encryption seed The Upper Address part (UAP) Used for error correction seed initialization and FH sequence generation The Lower Address Part (LAP) Used for FH sequence generation Additional address fields are used once in a piconet Active member address Address valid as long as device is active slave in a piconet Parked member address Address valid as long as a device is a parked slave in a piconet 16
9 Bluetooth connections Synchronous connection-oriented (SCO) link Circuit-switched periodic single-slot packet assignment Symmetric 64 kbps full-duplex Up to three simultaneous links from master Asynchronous connection-less (ACL) link Packet data Variable packet size (1-5 slots) Asymmetric bandwidth point to multipoint Maximum Asymmetric rate: kbps (57.6 kbps return channel) Symmetric data rates: kbps FEC/ARQ used for error control 17 Bluetooth Power Control Three classes of devices exist Class 1: 100 mw (20 dbm) (~100m) Class 2: 2.5 mw (4 dbm) (~10m) Class 3: 1 mw (0 dbm) (~1m) Mixture of devices can exist in a piconet Range of devices is subject to their class Mandatory power control is implemented Steps of 2 db to 8 db Only the power required for adequate RSS is to be used Based on feedback (closed loop) using link management protocol control commands 18
10 Clock Synchronization Each Bluetooth device has a free running clock called the native clock or CLKN A Master device uses its CLKN for timing A Slave device determines an offset from its own CLKN to synchronize to the Master The Master also uses an offset to determine the slave s clock to establish an initial connection with a slave 19 Discovering Bluetooth Devices A device wishes to discover what Bluetooth devices exist in its vicinity and what services they offer Performs an inquiry procedure It transmits a series of inquiry packets on different frequencies and awaits a response Devices scanning for inquiries use a sliding window to detect such inquiries If an inquiry is detected by a scanning device it responds with a frequency hop synchronization (FHS) packet that enables completion of a successful connection FHS contains ID and clock info If collision occurs on inquiry device implement random backoff and retries Connection is established Device that initiates connection is master in resulting piconet 20
11 Paging a device Paging is similar to inquiry except that the slave address is known Slave clock/frequency hopping pattern is known The page packet is transmitted at the expected frequency of the slave The Master sends a page train with a duration of 10 ms covering 16 frequency hops, repeat if necessary The Slave listens for its own device access code (DAC) for the duration of a scan window The Slave sends a slave response when its own DAC is heard The Master sends a master response The Slave responds to the master with its own DAC using the Master s clock included in FHS packet 21 Bluetooth connection states Standby Standby Connecting Inquiry Page Transmit Connected Active Sniff Hold Park Low power modes 22
12 Connection States (2) Standby (default) Waiting to join a piconet Inquire Discover device within range or find out unknown destination address Page Establish actual connection using device access code (DAC) Connected Actively on a piconet (master or slave) Park/Hold/Sniff (Low-power connected states) Hold mode stops traffic for a specified period of time Sniff mode reduces traffic to periodic sniff slots Park mode gives up its active member address and ceases to be a member of the piconet Active Unit participates on channel master schedule transmisisons 23 Service Discovery After inquiry or paging an ACL or SCO is set up SCO is used for telephony or audio connection If ACL connection, the Master sets up an L2CAP connection with the slave L2CAP is logical link control layer Responsible for segmenting and reassembling data packets L2CAP allows several protocols to be multiplexed over it using a Protocol and Service Multiplexer (PSM) number emulates serial port The master s service discovery client can use SDP to obtain the services that slave devices within the piconet can offer The Master can then decide what slave devices to communicate with and what services to employ 24
13 Service Discovery After inquiry or paging an ACL or SCO is set up SCO is used for telephony or audio If ACL connection, the Master sets up an L2CAP connection with the slave L2CAP is logical link control layer Responsible for segmenting and reassembling data packets L2CAP allows several protocols to be multiplexed over it using a Protocol and Service Multiplexor (PSM) number emulates serial port The master s service discovery client can use SDP to obtain the services that slave devices within the piconet can offer The Master can then decide what slave devices to communicate with and what services to employ 25 Link Manager The Link manager manages the following operations Attaching slaves to the piconet Allocates an active member address to a slave Breaks connections to slaves Establishes SCO or ACL links Changes the connection state of devices (like sniff, park or hold) Uses the Link Management Protocol (LMP) to connect between devices 27
14 Comments A device can be part of several piconets simultaneously (scatternet) This implies that the device should maintain multiple sets of clocks and timers and switch between them The throughput of the device is substantially reduced compared to what it might have if connected to a single piconet Audio part of Bluetooth specifies different codecs Supports A-law and -law for PCM Also supports DPCM RFCOMM (Radio Frequency Virtual Communications Port Emulation) Similar to RS-232 serial connections No handoffs between piconets for mobile users 28 Bluetooth Packet Fields Access code used for timing synchronization, offset compensation, paging, and inquiry Header used to identify packet type, packet numbering, slave address, error checking info and control info Payload contains ti user voice, data dt or both bth and payload header, if present 29
15 Baseband Frame Format General packet format Access code Payload Voice field: fixed length, 240 bits Data field: Payload header, body, CRC <Header: single-slot vs. multi-slot packets> 30 Packet Header Fields AM_ADDR contains active mode address of one of the slaves Type identifies type of packet Flow 1-bit flow control ARQN 1-bit acknowledgment SEQN 1-bit sequential numbering schemes Header error control (HEC) 8-bit error detection code 31
16 Slave Slave Slave Security Master Due to low radio range security threat must be in very close range Link Management Protocol layer of Bluetooth provides security and encryption services Security in piconet involves identifying device itself, not who is using device Three security mode in Bluetooth Level 1: No security Level 2: Service-level security is established after connection is made Level 3: Link-level security is performed before a connection is made 32 Authentication Authentication involves verifying that a device should be allowed to join piconet Bluetooth uses a challengeresponse strategy to confirm that other device knows a shared identical secret key Secret key entered as PIN by hand Version 1.1 improves authentication process by first confirming roles of master and slave before generating response number 34
17 Encryption Encoding communications ensures that transmissions cannot be intercepted and decoded Three encryption modes Encryption Mode 1 Nothing is encrypted Encryption Mode 2 Traffic from master to one slave is encrypted, but traffic from master to multiple slaves is not Encryption Mode 3 All traffic is encrypted Uses variable bit key (64 is default value) 35 State of Bluetooth Bluetooth shipped in over a 1 Billion devices Bluetooth challenges Reduce Cost ~$5 a port vs cable Conflicts with other devices in radio spectrum Limited security Most of the focus in the standards group is on other tasks IEEE for low power, low data rate, cheap, WPANs (Zigbee) IEEE Mesh Networking WPANs IEEE for high data rate WPANs (WiMedia) a focus is Ultra WideBand (UWB) WPANs 36
18 Standard Focus on low data rates/low power/moderate range/low complexity devices for WPAN sensor networks Took over Zigbee interest group work Data rates of 250 kb/s, 40 kb/s and 20 kb/s. Distances meters Star or Peer-to-Peer operation. Support for low latency devices. Full handshake protocol for transfer reliability. Very Low power consumption multi-year battery based lifetime Frequency Bands of Operation 16 channels in the 2.4GHz ISM* band 10 channels in the 915MHz ISM band 1 channel in the European 868MHz band. Early applications: home/factory monitoring, medical monitoring 37 ZigBee Stack Architecture 38
19 IEEE Frequency Bands 868MHz / 915MHz PHY Channel 0 Channels MHz MHz 902 MHz 928 MHz BPSK 20Kbps BPSK 40 Kbps 2.4 GHz PHY Channels MHz 2.4 GHz OQPSK 250Kbps Slide courtesy Joe Dvorak, Motorola GHz 39 IEEE PHY Packet Structure PHY Packet Fields Preamble (32 bits) synchronization Start of Packet Delimiter (8 bits) PHY Header (8 bits) PSDU length PSDU (0 to 1016 bits) Data field Preamble Start of Packet Delimiter PHY Header PHY Service Data Unit (PSDU) 6 Octets Octets Courtesy Joe Dvorak, Motorola 40
20 IEEE Device Classes Three Device Classes Full function device (FFD) Any topology Can maintain connection to multiple devices Talks to any other device PAN Coordinator (PANC) FFD responsible for starting and maintaining networks First FFD powered on in a area becomes PANC Reduced function device (RFD) Limited to star topology Talks only to a network coordinator Can not be a relay for other RFD or FFD Very simple implementation expect to transmit 0.1%-2% of the time long battery life 41 IEEE Topologies PAN Coordinator Master/slave Full function device Reduced function device 42
21 IEEE Topologies Clustered stars: basically a tree composed of multiple stars Note backbone/trunk of tree made up of FFDs Full function device Communications flow Reduced function device 43 IEEE MAC Overview Payload MAC Layer MAC Header (MHR) MAC Service Data Unit (MSDU) MAC Footer (MFR) PHY Layer Synch. Header (SHR) PHY Header (PHR) MAC Protocol Data Unit (MPDU) PHY Service Data Unit (PSDU) Uses bit static MAC addresses 4 Types of MAC Frames: Data Frame Beacon Frame from PANC defines timeslots Acknowledgment Frame MAC Command Frame CSMA/CA is used except for synchronous traffic which get guaranteed time slots Joe Dvorak, Motorola 44
22 IEEE MAC Periodic data Application defined rate (e.g. sensors) Intermittent data Application/external stimulus defined rate (e.g. light switch) Repetitive low latency data Allocation of time slots (e.g. mouse) Security Three modes: 1. Unsecured 2. Access control list mode devices only communicated with stored list of addresses 3. Secured mode Symmetric key for authentication and encryption with 4,6,8,12, 14 octets length key options Frame/message integrity (checksum like security feature) Sequential freshness frames numbered 45 Typical ZigBee-Enabled Device Design Typical design consist of RF IC and 8-bit microprocessor with peripherals connected to an application sensor or actuators 46
23 Wireless Technology Comparison Chart 34KB /14KB 3-6 A deep sleep 0.2 A Energy consumption typically support 2 packets per sec for > 1 year on AA battery IETF effort on IEEE sensor networks 6LowWPAN Transmission of IPV6 Packets over networks IETF RFC 4994 Compresses IPV6 header, TCP, ICMP, UDP to fit frame format Uses link local IPV6 addresses for local communication - PAN ID maps to IPV6 prefix Fragmentation of IP packets to fit byte MTU Supports link-layer mesh routing under IP topology Allows IP routing over a mesh of nodes Pros/Cons IP is the standard internetworking protocol IPV6 is still not widely deployed Energy effects? 48
24 WPANS High Data Rate WPANs Applications WiMedia Alliance Multimedia Streaming audio and video Interactive audio and video Data PDAs, PCs, printers Projectors USB wireless transfer Digital imaging Still image and video Camera to kiosk 49 High Speed WPANs Data Rate (Mbps) m Short 4m Distance Fast download 10m Room-range High-definition Quality of service, streaming (WPAN) technology for transmitting data Quickly Cost-effectively With low power consumption a/b/g/n Data Networking.11n promises 100m 1 Bluetooth 1 10 Range (m) 100 Source: Texas Instruments 50
25 Requirements Data rate and Range: 22 Mbps ~100m, Mbps ~50m, 480 Mbps ~2-3m QoS capable Security Quick join/unjoin Basic security/authentication Low power, cost, size, complexity Piconet, not network connectivity Connect up to 256 devices in a Piconet 51 Qualities of the MAC PAN Coordinator (PNC) Device (DEV) topology PNC assigns time for connections Commands go to and come from the PNC. Communication is peer-to-peer Quality of Service TDMA architecture with guaranteed time slots (GTSs) Security and Authentication No Security Mode Security Mode uses AES with 128 bit key Security Key for encryption key distribution Authentication Key for Challenge/Response auth. 52
26 Basic structure is the superframe 3 parts to the superframe Beacon Contention Access Period (CAP) Contention Free Period (CFP) CFP has GTSs and MTSs 53 Access methods Beacon TDMA, only sent by the PNC CAP (Contention Access Period) CSMA/CA, types of data and commands can be restricted by PNC PNC can replace the CAP with management time slots (MTSs) using slotted-aloha access. CFP (Contention Free Period) TDMA, assigned by the PNC GTSs are unidirectional 54
27 PNC selection/handover Alternate coordinators (ACs) broadcast capabilities Based on criteria, i best AC is chosen and becomes the PNC PNC begins to issue beacon PNC hands over task if more capable AC joins the piconet Exception only if security policy is verified 55 Features Commands supported: PNC selection and handover Association and disassociation Information request commands Repeater service Power management commands Device information Retransmission Request and modify GTS allocations MAC Support Peer Discovery Multi-rate support Repeater service Dynamic channel selection Power management Transmit power control 56
28 Physical Layer Characteristics 2.4 GHz band Unlicensed operation 15 MHz RF bandwidth 3 or 4 non-overlapping channels Similar to for coexistence 5 data rates Mbps with multi-bit symbols and coding Use Trellis Coded Modulation (TCM) for coding Modulation Coding Data rate Sensitivity QPSK 8 state t TCM 11 Mb/s -82 dbm DQPSk None 22 Mb/s -75 dbm 16-QAM 8 state TCM 33 Mb/s -74 dbm 32-QAM 8 state TCM 44 Mb/s -71 dbm 64-QAM 8 state TCM 55 Mb/s -68 dbm 57 Physical Layer Characteristics also for US Spectrum GHz band with ultra wideband radios (UWB) FCC requires minimum 500 MHz use for UWB Spectrum divided into fourteen 528 MHz bands Data rate Mbps with OFDM OFDM with 128 subcarriers in a band similar to a/g Current radios use a group three frequencies as a mulit-band channel that is Multi-Band OFDM is used Band Group #6 58
29 WPANs WPANS Growing number applications and type/range of devices IEEE standardization of several different scenarios/applications Bluetooth sensors (Zigbee, 6loWPAN) higher data rate WPANs including UWB Cost, power, support for application development current issues 59
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
Electromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Wireless Technologies for Automation
Wireless Technologies for Automation Prof. Dr.-Ing. Jörg F. Wollert Wireless Technologies for Automation Why using wireless communication? Pros and cons in wireless networks Embedded Wireless Hardware
Introduction to Zibgbee Technology
Introduction to Zibgbee Technology Ankur Tomar Global Technology Centre Volume 1, July 2011 1. Introduction ZigBee is the most popular industry wireless mesh networking standard for connecting sensors,
Recent technological innovations and declining prices for personal computers (PCs) and
Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined
Microchip Technology. February 2008 Valerio Moretto Slide 1
Microchip Technology February 2008 Valerio Moretto Slide 1 Connectivity Solutions Wired Wireless February 2008 Valerio Moretto Slide 2 Microchip Solutions More complex software Operating Systems >40 MIPS
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Bluetooth Wireless Technology
Bluetooth Wireless Technology Jamel Lynch Sr.Consultant/ Architect, IBM [email protected] 919 543 6421 Agenda Bluetooth Overview What is Bluetooth? What isn t Bluetooth? Bluetooth Air Interface Bluetooth
Bluetooth Tutorial. Dennis Sweeney Center for Wireless Telecommunications. [email protected]
Bluetooth Tutorial Dennis Sweeney Center for Wireless Telecommunications [email protected] Max Robert Mobile and Portable Radio Research Group DotMobile, Inc. [email protected] June 14, 2000 Overview
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
Chapter 2 Principle of Wireless Sensor Networks
Chapter 2 Principle of Wireless Sensor Networks Keywords IEEE 802.15.4 ZigBee 6LowPAN Wireless sensor networks 2.1 Introduction Wireless sensor networks are a subset of wireless networking applications,
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Wireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
Wired & Wireless LAN Connections
Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short
IPv6 Based Sensor Home Networking
KRNET 2005 IPv6 Based Sensor Home Networking KRNET 2005 Soohong Daniel Park Mobile Platform Laboratory, SAMSUNG Electronics. [email protected] KRNET 2005 2/29 Trend of Home Networking Digital World
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Introduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
Bluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
CS698T Wireless Networks: Principles and Practice
CS698T Wireless Networks: Principles and Practice Topic 10 IEEE 802.15.4 Bhaskaran Raman, Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/courses/wless-spring2007/ Personal Area Networks
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Internet of #allthethings
Internet of #allthethings GNURadio for IEEE 802.15.4 Networking Christopher Friedt Principle Embedded Firmware Engineer [email protected] [email protected] code available at http://github.com/cfriedt
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application
Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application Arrian Prince-Pike A thesis submitted to Auckland University of Technology in fulfilment of the requirements for
Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a
Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
802.16 - Usage. Wireless Broadband Networks. Need for Speed WMAN
Wireless Broadband Networks - Usage WLAN: Support of mobile devices, but low data rate for higher number of users What to do for a high number of users or even needed QoS support? Problem of the last mile
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features
APPLICATION NOTE Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products Description Atmel MCU Wireless This document introduces all kinds of 2.4GHz RF products. It focuses on analysis of ZigBee
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
PAN networks. 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1
PAN networks 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 2 Elektrobit Plc. Elektrobit Group's business idea is to improve the competitiveness
Hot Issues in Wireless Broadband Networking
Hot Issues in Wireless Broadband Networking Raj Jain Washington University in Saint Louis Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/talks/oe06.htm
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Device and Service Discovery in Bluetooth Networks
Master Thesis MEE 01-28 Device and Service Discovery in Bluetooth Networks & This thesis is presented as a part of the Master of Science degree in Electrical Engineering with emphasis on Telecommunication
Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill [email protected]
Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill [email protected] Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Maximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
IEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
Crossroads Copenhagen
Crossroads Copenhagen 2008-04-07 Henrik Eriksen Z-Wave & ZigBee Agenda Z-Wave & ZigBee Why are these protocols interesting now Standards Protocol characteristics Network Topology Ensuring Interoperability
Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA
Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA Naagesh S. Bhat Student M.S.Ramaiah School of Advanced Studies ABSTRACT The IEEE 802.15.4 is a wireless standard introduced for low power,
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
A Comparison of WirelessHART and ISA100.11a
A Comparison of WirelessHART and ISA100.11a by Mark Nixon Emerson Process Management 1100 W. Louis Henna Blvd., Bldg I Round Rock, TX, USA 78681-7430 [email protected] ABSTRACT The technology advancements
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Introduction to Wireless Communications and Networks
Introduction to Wireless Communications and Networks Tongtong Li Dept. Electrical and Computer Engineering East Lansing, MI 48824 [email protected] 1 Outline Overview of a Communication System Digital
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015
Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers
Routing Protocol for Mobile Ad-hoc Wireless Networks
86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical
PM0237 Programming manual
Programming manual BlueNRG, BlueNRG-MS stacks programming guidelines Introduction Note: The main purpose of this document is to provide a developer with some reference programming guidelines about how
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
SBrT 299. J = J 0 + ( D(i 1,i) J 0)
VI INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM (ITS2006), SEPTEMBER 3-6, 2006, FORTALEZA-CE, BRAZIL Evaluation of Wireless Links in a Hybrid Network Structure for Mobile VoIP Services D. F. S. Santos, J.
LIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Draft
Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Draft April 2007 Author Ken Masica Lawrence Livermore National Laboratory LAWRENCE LIVERMORE NATIONAL
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
ARIB STD-T64-C.S0042 v1.0 Circuit-Switched Video Conferencing Services
ARIB STD-T-C.S00 v.0 Circuit-Switched Video Conferencing Services Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T for Related Industrial Property Rights. Refer to "Notice" in the
Mapping of Services on Bluetooth Radio Networks
Mapping of s on Bluetooth Radio Networks J. Dunlop and N. Amanquah University of Strathclyde -Department of Electronic and Electrical Engineering, Glasgow G1 1XW, Scotland Ph.: +44 141 5482081, Fax:+44
11 Internet of Things (IoT) Protocols You Need to Know About
11 Internet of Things (IoT) Protocols You Need to Know About by RS Components There exists an almost bewildering choice of connectivity options for electronics engineers and application developers working
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt [email protected] 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
