Protocolo IEEE Sergio Scaglia SASE Agosto 2012
|
|
|
- Megan Griffin
- 9 years ago
- Views:
Transcription
1 Protocolo IEEE SASE Agosto 2012
2 IEEE standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE Protocol Overview Hardware implementation specs 2
3 Physical Layer Communication Fundamentals over Wireless Channels Introduction Electromagnetic waves propagate in free space between a transmitter and a receiver (transceivers). Wireless channels are an unguided medium (in contrast with wired channels, where signals are propagated through the wire). 3
4 Physical Layer Communication Fundamentals over Wireless Channels Frequency Allocation In RF-based systems, the carrier frequency determines the propagation characteristics (for example, obstacles penetration). 4
5 Physical Layer Communication Fundamentals over Wireless Channels Frequency Band Since a single frequency (carrier) does not provide communication capacity, a Frequency Band is assigned. When the carrier is modulated, multiple frequencies around the carrier conform a band. The range of radio frequencies is subject to Regulation, to avoid unwanted interference between different users and systems. 5
6 Physical Layer Communication Fundamentals over Wireless Channels ISM license-free band ISM (Industrial, Scientific and Medical) band is unlicensed (although some restrictions apply). 6
7 Physical Layer Communication Fundamentals over Wireless Channels ISM license-free band - Considerations Interference: Since many systems share same bands, robustness is needed to avoid interference (more complicated modulation schemes need to be used). Antenna Efficiency: Defined as the ratio of Radiated Power to the Total Input Power. Antennas efficiency decreases as the ratio of antenna dimension to wavelength decreases. Thus, more energy must be spent. 7
8 Physical Layer Communication Fundamentals over Wireless Channels Modulation - Demodulation In order to transmit information, the carrier is modulated (data is encoded). The receiver demodulates the carrier, obtaining the transmitted information. This process will generate a band of frequencies centered in the carrier frequency. Since the carrier is a sinusoidal, different parameters can be used to encode data; Amplitude Frequency Phase 8
9 Physical Layer Communication Fundamentals over Wireless Channels Speed of Data Transmission Digital Communications Digital Data exchange sequence of symbols Symbols come from a finite alphabet (channel alphabet). Modulation process symbols from channel alphabet are mapped to one of a finite number of waveforms of the same finite length (symbol duration). Examples: Binary modulation two different waveforms 2 symbols 1 bit (0 1). 8-ary modulation 8 different waveforms 8 symbols 1 group of 3 bits. Speed of Data Transmission/Modulation: Symbol rate: inverse of the symbol duration (also called bit rate for binary modulation). Data rate: bit per seconds the modulator can accepts for transmission (for binary modulation symbol rate = data rate). For m-ary modulation; Data rate = Symbol rate x Nb of bits encoded in a single waveform. 9
10 Physical Layer Communication Fundamentals over Wireless Channels Modulation schemes (Keying) Carrier representation: 10
11 Physical Layer Communication Fundamentals over Wireless Channels Modulation schemes (Keying) (cont.) ASK, FSK and PSK can be used as they are or in combination. Common schemes: OOK (On-Off-Keying); special ASK where zeros are mapped to no signal at all (switching off the transmitter). BPSK (2 phases) and QPSK (4 phases) DPSK (difference between successive phases) QAM: ASK + PSK 11
12 Physical Layer Communication Fundamentals over Wireless Channels Wave Propagation effects and noise Physical phenomena distort the original transmitted waveform at the receiver Bit errors. 12
13 Physical Layer Communication Fundamentals over Wireless Channels Attenuation results in Path Loss 13
14 Physical Layer Communication Fundamentals over Wireless Channels Distortion effects: Non Line-Of-Sight paths 14
15 Physical Layer Communication Fundamentals over Wireless Channels Noise and Interference 15
16 Physical Layer Communication Fundamentals over Wireless Channels Symbols and bit errors 16
17 Physical Layer Communication Fundamentals over Wireless Channels Examples for SINR BEP mappings 17
18 Physical Layer Communication Fundamentals over Wireless Channels Spread-spectrum communications Spread-spectrum systems reduce the effects of narrowband noise/interference providing and increased robustness against multipath effects. Bandwidth occupied is much larger than that would be really needed to transmit the given user data. More complex receiver operation compared to conventional modulation schemes. 18
19 Physical Layer Communication Fundamentals over Wireless Channels DSSS (Direct Sequence Spread Spectrum) Used in IEEE and IEEE Transmission of data bit of duration tb is replaced by transmission of a finite chip sequence; c = c1 c2 cn with ci ϵ {0, 1} if Logical 1 c1 c2 cn (where ci is the logical inverse of ci) if Logical 0 Each chip ci has duration ti = tb / n, where n is the spreading factor or gain. Proper design of the chip sequences (pseudo-random sequences) cancels delayed version of the chip sequence, reducing multipath fading effects. Each chip is modulated with BPSK or QPSK. 19
20 Physical Layer Communication Fundamentals over Wireless Channels FHSS (Frequency Hopping Spread Spectrum) Used in Bluetooth Available spectrum is subdivided into a number of equal-sized sub-bands or channels. Bluetooth divides their spectrum in the 2.4GHz range into 78 sub-bands 1-MHz wide. User data is always transmitted within one channel at a time; it s bandwidth is thus limited. All nodes in the network hop synchronously through the channels according to a prespecified schedule. Different networks can share the same geographic area by using nonoverlapping hopping schedules. 20
21 Physical Layer Communication Fundamentals over Wireless Channels Packet transmission and synchronization The PHY layer provides services to the MAC layer. MAC layer uses packets or frames as the basic unit of transmission. A frame has a structure. From the PHY layer perspective, a frame is just a block of bits. It s function is to modulate and demodulate the carrier with the provided block of bits (frame). The receiver, at the PHY layer, must know certain properties of an incoming waveform to make sense of it and detect a frame (frequency, phase, start and end of bits/symbols, and start and end of frames). In other words; it need to be in sync with the transmitter! Carrier processing involves use of oscillators and local clocks. Several factors (fabrication process, temperature differences, aging effects, etc) deviate oscillators frequencies from their nominal values. This drift is expressed in ppm (parts per millions). 21
22 Physical Layer Communication Fundamentals over Wireless Channels Synchronization To compensate the drift, the receiver has to extract synchronization information from incoming waveform. Synchronization levels: Carrier synchronization Bit/symbol synchronization Frame synchronization 22
23 Physical Layer Communication Fundamentals over Wireless Channels Synchronization example 23
24 IEEE standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE Protocol Overview Hardware implementation specs 24
25 MAC Layer Fundamentals of (wireless) MAC Protocols Introduction Main Task: it regulates the access of a number of nodes to a shared medium. Performance Requirements: delay, throughput, low overhead, fairness, and (for wireless) energy conservation. Overhead can result from per-packet (frame headers and trailers), collisions ( retransmissions), or exchange of extra control packets. It inherits all the well-known problems of the underlying PHY layer, in this case using a Wireless medium; time-variable, high error rates, fading, path loss, attenuation, etc. 25
26 MAC Layer Fundamentals of (wireless) MAC Protocols Hidden-terminal problem 26
27 MAC Layer Fundamentals of (wireless) MAC Protocols Hidden-terminal problem (solution) 27
28 MAC Layer Fundamentals of (wireless) MAC Protocols Exposed-terminal problem 28
29 MAC Layer IEEE MAC Overview Energy saving requirements in wireless MAC protocols Transceivers can be in one of the four states: transmitting, receiving, idling, or sleeping. Energy problems: Collision Overhearing Protocol overhead (per-packet or control frames) Idle listening 29
30 MAC Layer IEEE MAC Overview Energy savings approach Wakeup period Listen period Sleep period 30
31 MAC Layer (wireless) MAC Protocols Different Approaches Common approaches: Contention-based protocols Scheduled-based protocols Less used approaches: Frequency division Code division 31
32 MAC Layer Contention-based protocols CSMA (Carrier Sense Multiple Access) C: busy && max trials A: indicate failure C: no CTS && max trials A: indicate failure C: no ACK && max trials A: indicate failure C: Condition A: Action Idle C: -- Ran A: trials = 0 Random delay m C: timeout A: -- Listen C: idle A: send RTS await CTS C: got CTS A: send Data await ACK C: got ACK A: indicate success Idle C: busy && trials<max A: indicate failure BackOff C: no CTS && trials<max A: indicate failure C: no ACK && trials<max A: indicate failure 32
33 MAC Layer Schedule-based protocol Overview Communication is scheduled in advance No contention No overhearing Time is divided into slotted frames (TDMA) Dedicated slot for transmission (no contention) Low power period when no transmission is expected 33
34 IEEE standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE Protocol Overview Hardware implementation specs 34
35 IEEE standard Introduction Released by IEEE in October Revisions in 2006, 2007, and It covers the PHY and MAC layers of low-rate WPAN. It s targeted for WSN, Home Automation, Home Networking, etc. Used by Zigbee (it adds Network construction, security and app. Services). Targeted Application Requirements: Low-to-medium bit rates (up to few hundreds of kbps) Moderate delays Maximize energy savings 35
36 IEEE standard PHY Layer Introduction (The MAC protocol uses only one channel at a time) 36
37 IEEE standard MAC Layer Overview Star and peer-to-peer topologies Optional frame structure Association CSMA-CA channel access mechanism Packet validation and message rejection Optional guaranteed time slots Guaranteed packet delivery Facilitates low-power operation Security 37
38 IEEE standard MAC Layer Device Classes Full function device (FFD) Any topology PAN coordinator capable Talks to any other device Implements complete protocol set Reduced function device (RFD) Limited to star topology or end-device in a peer-to-peer network. Cannot become a PAN coordinator Very simple implementation Reduced protocol set 38
39 IEEE standard MAC Layer Definitions Network Device: An RFD or FFD implementation containing an IEEE medium access control and physical interface to the wireless medium. Coordinator: An FFD with network device functionality that provides coordination and other services to the network. PAN Coordinator: A coordinator that is the principal controller of the PAN. A network has exactly one PAN coordinator. 39
40 IEEE standard MAC Layer Star topology 40
41 IEEE standard MAC Layer Peer-to-Peer topology 41
42 IEEE standard MAC Layer Combined topology 42
43 IEEE standard MAC Layer Nodes Associations A Device must be associated with a Coordinator (FFD) (forming a Star Network) Coordinators can operate in a peer-to-peer fashion, and multiple Coordinators can form a PAN. The PAN is identified with a 16-bit PAN Identifier. One of the Coordinators is designated as a PAN Coordinator. 43
44 IEEE standard MAC Layer Coordinator Tasks It manages a list of associated devices It allocates short addresses to its devices (All IEEE nodes have a 64-bit device address. When device associates with a coordinator, it may request a 16-bit (short) address for subsequent communications between device and coordinator) In Beaconed mode, it regularly transmit Beacon frames. It exchanges data packets with devices and with peer coordinators. 44
45 IEEE standard MAC Layer Addressing All devices have 64 bit IEEE addresses Short addresses can be allocated Addressing modes: Network + device identifier (star) Source/destination identifier (peer-peer) 45
46 IEEE standard MAC Layer Coordinator-Device communication (Beaconed mode) The Coordinator of a Star Network operating in Beaconed mode organizes channel access and data transfer using a Superframe structure. The Coordinator starts each Superframe by sending a frame beacon packet. All superframes have the same length The frame beacon includes a superframe specification (details). Superframe is divided into an Active period and Inactive period (optional) Active period is subdivided into 16 time slots. First slot is beacon frame. Remaining slots conforms the Contention Access Period (CAP) followed by the Guaranteed Time Slot (GTS) max. seven. Coordinators are active during the Active period. Devices are active only in GTS (during the assigned slot) Devices are active during CAP, only if they have something to transmit. 46
47 IEEE standard MAC Layer Frame Structure 47
48 IEEE standard MAC Layer Frame Structure 48
49 IEEE standard MAC Layer GTS management Devices send Request packets during the CAP (including how many time slots are desired and a flag indicating transmit or receive slot) Coordinator answers the request in two steps: A) It sends an ACK for the request. B1) If it has sufficient resources to allocate the request, it inserts an appropriate GTS descriptor in the next beacon frame. This descriptor specifies the short address of the requesting device and the number of slots and position in the GTS area, the device can use for data exchange. B2) If no resources are available, the Coordinator can allocate less slots or no slots at all (indicated by an invalid time slot). Once the Device finish with the data exchange, it should deallocate the allocated slots, or the Coordinator can deallocate them if needed (low resources, higher priorities, etc) or discover the device is not longer using the assigned slots. 49
50 IEEE standard MAC Layer Data transfer using CAP If the full transaction (data packet, acknowledge and InterFrame Spaces) doesn t fit in the allocated slots, the CAP area need to be used. Devices transmit data using slotted CSMA (next slide). If a Coordinator has data to transmit for a Device, it includes the Device address in the Pending Address Field of the Beacon frame. This way, the addressed Device knows there is data for it and generates a Data request packet during the CAP using the slotted CSMA. 50
51 IEEE standard MAC Layer Slotted CSMA-CA protocol Since there is no RTS/CTS mechanism, a BackOff period (random delays) is used to reduce the probability of collissions (CSMA with Collision Avoidance). The Time Slots making up the CAP are subdivided into smaller time slots, called BackOff Periods (length of 20 symbol times). 51
52 IEEE standard MAC Layer Slotted CSMA-CA protocol Algorithm NB = 0; CW = 2 BE = macminbe Await next backoff Period boundary Random Delay for r bacoff periods Perform CCA on Backoff period boundary NB = Nb of Backoffs CW = Size of current Congestion Window BE = Current Backoff exponent CCA = Clear Channel Assessment (check if Idle ) r = random from Interval [0, 2^BE-1] NB = NB+1; CW = 2 BE = min(be+1,amaxbe) N Channel Idle? Y CW = CW-1 N Y Failure Success NB > maxnb? CW = 0? (Transmitted) Y N 52
53 IEEE standard MAC Layer Non-Beaconed mode The Coordinator does not send beacon frames nor is there any GTS mechanism (lack of sync. using the beacon). Since there is no sync., Devices transmit packets using unslotted CSMA-CA. Devices can be switched off following their own sleep schedule, but Coordinators need to be active all the time. 53
54 IEEE standard MAC Layer General Frame Structure 54
55 IEEE standard MAC Layer General MAC Frame Format 55
56 IEEE standard MAC Layer Beacon Frame Format 56
57 IEEE standard MAC Layer MAC Command Frame Format 57
58 IEEE standard MAC Layer Data and ACK Frame Format 58
59 IEEE standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE Protocol Overview Hardware implementation specs 59
60 Hardware Implementation TI CC2520 DataSheet Key Features 60
61 Hardware Implementation TI CC2520 DataSheet Description 61
62
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
CS698T Wireless Networks: Principles and Practice
CS698T Wireless Networks: Principles and Practice Topic 10 IEEE 802.15.4 Bhaskaran Raman, Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/courses/wless-spring2007/ Personal Area Networks
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
Chapter 2 Principle of Wireless Sensor Networks
Chapter 2 Principle of Wireless Sensor Networks Keywords IEEE 802.15.4 ZigBee 6LowPAN Wireless sensor networks 2.1 Introduction Wireless sensor networks are a subset of wireless networking applications,
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Wireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: [email protected] Ilangko Balasingham 2 2 The
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application
Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application Arrian Prince-Pike A thesis submitted to Auckland University of Technology in fulfilment of the requirements for
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Mac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany [email protected] January 2010 Contents
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
A Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
Introduction to Zibgbee Technology
Introduction to Zibgbee Technology Ankur Tomar Global Technology Centre Volume 1, July 2011 1. Introduction ZigBee is the most popular industry wireless mesh networking standard for connecting sensors,
Chapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System
Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
Chapter 3: Spread Spectrum Technologies
Chapter 3: Spread Spectrum Technologies Overview Comprehend the differences between, and explain the different types of spread spectrum technologies and how they relate to the IEEE 802.11 standard's PHY
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features
APPLICATION NOTE Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products Description Atmel MCU Wireless This document introduces all kinds of 2.4GHz RF products. It focuses on analysis of ZigBee
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
How To Understand The Theory Of Time Division Duplexing
Multiple Access Techniques Dr. Francis LAU Dr. Francis CM Lau, Associate Professor, EIE, PolyU Content Introduction Frequency Division Multiple Access Time Division Multiple Access Code Division Multiple
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Revision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
GTER 26 tudo o que você. quer saber sobre 802.11n
GTER 26 tudo o que você (não) quer saber sobre 802.11n Luiz Eduardo Dos Santos CISSP CWNE CEH GISP GCIH Sr. Systems & Security Engineer Americas hello agenda evolution of wi-fi what makes 11n what actually
Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping?
Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard Presentation to IEEE 802 March 11, 1996 Naftali Chayat BreezeCom 1 Why Frequency Hopping? Frequency Hopping is one of the variants
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch
DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods
Random Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Medium Access Control (MAC) and Wireless LANs
Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic
TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
EECC694 - Shaaban. Transmission Channel
The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
Mobile Ad Hoc Networks
Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
Mobile Communications Chapter 2: Wireless Transmission
Mobile Communications Chapter 2: Wireless Transmission Frequencies Signals Antennas Signal propagation Multiplexing Spread spectrum Modulation Cellular systems Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES
MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
Open-ZB: an open-source implementation of the IEEE 802.15.4/ZigBee protocol stack on TinyOS
Open-ZB: an open-source implementation of the IEEE 802.15.4/ZigBee protocol stack on TinyOS André Cunha 1, Anis Koubâa 1,2, Ricardo Severino 1, Mário Alves 1 1 IPP-HURRAY! Research Group, Polytechnic Institute
M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.
M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z
IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
Data Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
Internet of Things. Exam June 24
Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light
Wireless Local Area Networks and the 802.11 Standard
Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...
Implementing Digital Wireless Systems. And an FCC update
Implementing Digital Wireless Systems And an FCC update Spectrum Repacking Here We Go Again: The FCC is reallocating 600 MHz Frequencies for Wireless Mics 30-45 MHz (8-m HF) 174-250 MHz (VHF) 450-960 MHz
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Draft
Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Draft April 2007 Author Ken Masica Lawrence Livermore National Laboratory LAWRENCE LIVERMORE NATIONAL
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
Implementation of Digital Signal Processing: Some Background on GFSK Modulation
Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering [email protected] Version 4 (February 7, 2013)
Lecture 1: Introduction
Mobile Data Networks Lecturer: Victor O.K. Li EEE Department Room: CYC601D Tel.: 857 845 Email: [email protected] Course home page: http://www.eee.hku.hk/courses.msc/ 1 Lecture 1: Introduction Mobile data
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA
Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA Naagesh S. Bhat Student M.S.Ramaiah School of Advanced Studies ABSTRACT The IEEE 802.15.4 is a wireless standard introduced for low power,
Throughput Modeling in IEEE 802.11 WLAN-based Wireless Networks
Throughput Modeling in IEEE 82.11 WLAN-based Wireless Networks Kirill Ermolov Aalto University Espoo, Finland [email protected] Abstract Wireless Local Area Networks (WLANs) are nowadays the most
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY Sunil Kumar 1, Vineet S. Raghavan 2 and Jing Deng 3 1 Electrical and Computer Engineering Department, Clarkson University, Potsdam,
IEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
