Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building
|
|
- Alison Craig
- 5 years ago
- Views:
Transcription
1 Radio Networks Office: 3 rd floor, Main Building 1
2 Wireless Body Area Networks (WBAN) and IEEE Standard 2
3 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Physical (PHY) Layer 3. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 3
4 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Physical (PHY) Layer 3. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 4
5 Wireless Body Area Networks (WBANs) WBAN: Collection of nodes placed on, or inside, the human body (but not limited to). Nodes have sensing and/or actuating and communication capabilities. Applications: Medical: monitoring vital parameters, hearing aids, cardiac implant, etc. Sport/Fitness: rehabilitation, motion capture, monitoring parameters; Entertainment: consumer electronics (audio/video streaming, interactive gaming), personal item tracking. WiserBAN EU Project: realizes a miniaturized and ultra-low power RF microsystem, for medical and multimedia applications. 5
6 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Network Topology 3. Physical (PHY) Layer 4. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 6
7 Standard IEEE (final release, Feb. 2012) Different applications leads to different technical requirements unique standard IEEE Task Group 6 (November 2007): Define the Physical (PHY) and Medium Access Control (MAC) Layers for short range, low complexity, low cost, ultra-low power and high reliable wireless communication in, on or around the human body. High level application requirements 7
8 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Physical (PHY) Layer 3. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 8
9 Physical (PHY) Layer 3 different PHY Japan Europe North America Australia New Zeland Japan WorldWide HBC MICS WMTS ISM ISM UWB f [ MHz ] 2.45GHz Packet Component Modulation Symbol Rate (ksps) Spreading Factor (S) Narrowband Information Rate (kbps) PSDU π/2-dbpsk PSDU π/2-dbpsk PSDU π/2-dbpsk PSDU π/4-dqpsk N of 2.45GHz: 79 Channel of 1MHz Bandwidth Min Tx Power: -10 dbm EIRP Receiver 2.45GHz: Frequency Band (MHz) Information Rate (kbps) Minimum Sensitivity (dbm)
10 rates PHY Frequency band (MHz), center frequency (MHz), or modulation rate 0 rate 1 rate 2 rate 3 rate 4 rate 5 rate 6 rate 7 (kb/s) (kb/s) (kb/s) (kb/s) (kb/s) (kb/s) (kb/s) (kb/s) 402 to Rsvd Rsvd Rsvd Rsvd 420 to Rsvd Rsvd Rsvd Rsvd Rsvd 863 to Rsvd Rsvd Rsvd Rsvd Narrow band (NB) Ultra wideband (UWB) 902 to Rsvd Rsvd Rsvd Rsvd 950 to Rsvd Rsvd Rsvd Rsvd 2360 to Rsvd Rsvd Rsvd Rsvd 2400 to Rsvd Rsvd Rsvd Rsvd Noncoherent Rsvd Rsvd Differentially coherent FM Rsvd Rsvd Rsvd Rsvd Rsvd Rsvd Rsvd Human body communications (HBC) Rsvd Rsvd Rsvd Rsvd
11 PHY Protocol Unit (PPDU) 3 bits 1 bit 8 bits 1 bit 1 bit 1 bit RATE Reserved LENGTH Reserved SCRAMBLER SEED BURST MODE PHY Header HCS BCH Parity Bits MAC Header MAC Frame Body Variable Length: bytes FCS 15 bits 4 bits 12 bits 7 bytes 2 bytes PLCP Preamble PLCP Header PSDU Packet detection Time synchronization Carrier off-set recovery Physical layer Service Unit: contains the MAC frame It conveys PHY parameters needed at the Rx to decode the PSDU: a) Length and Rate of MAC packet b) Header check sequence c) BCH encoder to improve header robustness
12 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Physical (PHY) Layer 3. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 12
13 MAC Access Modes and Phases 1/4 1. Beacon Mode with superframe: beacons at the beginning of each superframe to establish a common time base for time referenced allocations; Random Access Phases Contention between nodes: allocations are non-recurring time intervals valid per instance of access. EAP (Exclusive Access Phase): for high priority traffic. RAP (Random Access Phase): for regular traffic. CSMA/CA Access Method : Backoff counter (BC) in the interval [0-CW], BC is decremented by one, for each successive idle CSMA time slot; When BC=0, the node obtains a contended allocation during which the TX occurs. ted Aloha Access Method: Contention Probability (CP) properly set; z =random in the interval [0-1]; If z CP the node obtains a contended allocation in the current Aloha slot, during which the TX occurs. 13
14 SIFS SIFS SIFS SIFS Radio Networks CSMA/CA access illustration = CSMA slot SIFS = psifs F1 = frame transaction initiated by node 1 in a contended allocation (e.g., a data type frame and an I-Ack frame with psifs in between) Tf = time required to complete F1 GT n = nominal guard time Backoff counter decrements Tf Tf Tf Tf RAP1 CAP RAP2 F1 F1 F1 arrives Backoff counter (= 0) No enough time is left; backoff counter (= 2) is locked. Backoff counter (= 0) Backoff counter (= 8) is unlocked Backoff counter (= 0) CW = CWmin = 8; backoff counter is set to 3 over [1, CW] and unlocked. Contention fails 1 st time. CW is not changed; backoff counter is reset to 5 over [1, CW] and locked. Backoff counter (= 5) is unlocked Backoff counter (= 2) is unlocked. Contention fails 2 nd time. CW = 16 (doubled); backoff counter is reset to 8 over [1,CW] and locked Contention succeeds. CW is reset to CWmin; backoff counter is reset to 2 over [1, CW] and locked Priority User Priority Traffic designation CWmin CWmax Lowest 0 Background (BK) Best effort (BE) Excellent effort (EE) Controlled load (CL) Video (VI) Voice (VO) Medical data or network 2 8 Highest control 7 Emergency or medical event 1 4 report 14
15 ted Aloha access illustration F1 = frame transaction initiated by node 1 in a contended allocation (e.g., a management type frame and an I-Ack frame with psifs in between) RAP1 CAP RAP2 Aloha slot Aloha slot Aloha slot Aloha slot Aloha slot Aloha slot Aloha slot Aloha slot F1 F1 F1 CP = CPmax = 1/2. Node 1 does not obtain a contended allocation. CP =1/2. Node 1 obtains a contended allocation and sends a frame which then fails. CP = 1/2 (unchanged). Node 1 obtains a contended allocation and sends a frame which then fails again. CP = 1/4 (halved). Node 1 does not obtain a contended allocation. CP = 1/4. Node 1 does not obtain a contended allocation. CP = 1/4. Node 1 does not obtain a contended allocation. CP = 1/4. Node 1 obtains a contended allocation and sends a frame which then succeeds. CP is reset to CPmax. Node 1 does not obtain a contended allocation. z = rand[0,1] z CP to transmit Priority User Priority Traffic designation CPmax CPmin Lowest 0 Background (BK) 1/8 1/16 1 Best effort (BE) 1/8 3/32 2 Excellent effort (EE) 1/4 3/32 3 Controlled load (CL) 1/4 1/8 4 Video (VI) 3/8 1/8 5 Voice (VO) 3/8 3/16 6 Medical data or network 1/2 3/16 Highest control 7 Emergency or medical event 1 1/4 report 15
16 MAC Access Modes and Phases 2/4 Scheduled Access Method: Managed Access Phase Access to the channel is managed by the hub Beacon period (superframe) n Beacon period (superframe) n+1 Beacon period (superframe) Beacon period (superframe) n Beacon period (superframe) n+1 Beacon period (superframe) n+m Allocation interval Allocation interval Allocation interval Allocation interval Allocation interval 1-periodic scheduled allocation: one or more allocation intervals, of the same temporal length, are granted to the node in every superframe. Suitable for high duty cycle periodic or quasiperiodic traffic. (e.g., streaming) m-periodic scheduled allocation: one or more allocation intervals, of the same temporal length, are granted to the node every m>1 superframe. Suitable for low duty cycle periodic or quasiperiodic traffic. (e.g., status signals) 16
17 B-Ack B-Ack+ Poll B-Ack+ Poll Poll I-Ack+ Poll I-Ack I-Ack I-Ack Poll Poll I-Ack B-Ack B-Ack I-Ack I-Ack I-Ack I-Ack I-Ack Radio Networks MAC Access Modes and Phases 3/4 Improvised Access Methods: for on-demand contention-free frame exchange outside scheduled allocations a) Polling Access: the hub grants to the node one or more nonreoccuring time intervals for initiating one or more frame transactions by the node uplink! Suitable for ordinary, unexpected or extra traffic. E.g., error signaling. Hub transmits Node 1 transmits (L- Ack) (B- Ack) Immediate Future Immediate Immediate Immediate Future Scheduled uplink allocation interval (L- Ack) (B- Ack) Polled allocation interval (I-Ack) (I-Ack) Polled Allocation interval (I-Ack) (I-Ack) Post Scheduled downlink allocation interval Immediate (I-Ack) Polled Allocation interval a) Posting Access: the hub grants to itself one or more non-reoccuring time intervals for initiating one or more frame transactions downlink! Suitable for unexpected or extra traffic. E.g., BAN management information. Hub transmits Node 1 transmits (L- Ack) (B- Ack) Post Scheduled uplink allocation interval Future Immediate Immediate Immediate Immediate Immediate (I-Ack) Post (I-Ack) Posted allocation interval (I-Ack) (I-Ack) Scheduled downlink allocation interval (I-Ack) Post Post (L-Ack) (B- Ack) Post Post (L-Ack) Posted allocation interval (B- Ack) 17
18 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Physical (PHY) Layer 3. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 18
19 MAC Access Modes and Phases 4/4 2. Non-Beacon Mode with superframes: no beacons but superframe and allocation slots are established because the channel access involves time referencing. Only MAP. 3. Non-Beacon Mode without superframes: no beacons; superframe and allocation slots are not established because the allocation involves no time referencing. Unscheduled Access Method: A hub may provide unscheduled reoccuring polled or posted allocations, nodes may use CSMA/CA to obtain a contended allocation. 19
20 Outline 1. Introduction Definitions and Application Scenarios Standardization 2. Physical (PHY) Layer 3. Medium Access Control (MAC) Layer Beacon Mode with beacon periods (superframes) Non-Beacon Mode with superframes Non-Beacon Mode without superframes 5. Coexistence techniques 20
21 Coexistence with other BANs Coexistence Techniques: a) Beacon Shifting: in order to mitigate potential beacon collisions and schedule allocation conflicts the hub transmits its beacons at different time offset, according to a particular beacon shifting sequence, not being used by other neighbor hubs. b) Channel Hopping: the hub changes its operating channel periodically according to a particular channel hopping sequence, not being used by other neighbor hubs. The node shall hop to the same channel to remain connected with its hub. 21
22 References tg6-technical-requirements-document, November Kwak K.S, Ameen M.A, Kwak D, Lee C, Lee H; A Study on proposed IEEE WBAN MAC protocols, ISCIT December Massè F, Penders J; Quality-of-Service in BAN: PER reduction and its trade-offs ; International conference on BSN July tg6-channel-model, September ieee regulation-subcommittee-report, May IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks," IEEE Std , vol., no., pp.1,271, Feb Reichmann A; Standardization of Body Area Networks ; COMCAS January
23 Radio Networks 23
Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.
Wireless Body Area Networks WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks www.wiserban.eu Wireless Body Area Networks (WBANs) WBAN: Collection of nodes placed on, or inside,
More informationAn Energy Analysis of IEEE Scheduled Access Modes
An Energy Analysis of IEEE 802.15.6 Access Modes Christos Tachtatzis, Fabio Di Franco, David C. Tracey, Nick F. Timmons, Jim Morrison WiSAR Lab Letterkenny Institute of Technology Port Road, Co. Donegal,
More informationSeminario fine secondo anno di dottorato. Flavia Martelli
Seminario fine secondo anno di dottorato flavia.martelli@unibo.it Research context Tutor: Prof. Oreste Andrisano Co-Tutor: Prof. Roberto Verdone Reasearch activity performed in the framework of: European
More informationReview Article A Review of IEEE MAC, PHY, and Security Specifications
International Journal of Distributed Sensor Networks Volume 013, Article ID 950704, 1 pages http://dx.doi.org/10.1155/013/950704 Review Article A Review of IEEE 80.15.6 MAC, PHY, and Security Specifications
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationCS-541 Wireless Sensor Networks
CS-541 Wireless Sensor Networks Lecture 5: Network standards for Personal and Body-area networks Prof Panagiotis Tsakalides, Dr Athanasia Panousopoulou, Dr Gregory Tsagkatakis 1 Objectives IEEE Standards
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationTwo-Tier WBAN/WLAN Healthcare Networks; Priority Considerations
Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationZigBee/ David Sanchez Sanchez.
ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network
More informationEvaluating the IEEE GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference
Evaluating the IEEE 802.15.6 2.4GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference Yufei Wang, Qixin Wang {csyufewang, csqwang}@comp.polyu.edu.hk Department of Computing
More informationA Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs
A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationEL2745 Principles of Wireless Sensor Networks
EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology
More informationLecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW
Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final
More informationWiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.
WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationA cluster based interference mitigation scheme for performance enhancement in IEEE
756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationCommunication In Smart Grid -Part3
Communication In Smart Grid -Part3 Dr.-Ing. Abdalkarim Awad 09.12.2015 Informatik 7 Rechnernetze und Kommunikationssysteme Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star
More informationSimulation Analysis of IEEE Non-beacon Mode at Varying Data Rates
Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 The IEEE 802.15.4 Protocol Stack Time Synchronization Energy Management
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationIntroduction to IEEE
Introduction to IEEE 802.15.4 Marcos Rubinstein IEEE 802.15.4 Short range, low bit rate, low power consumption Home Automotive Industrial applications Games Metering 1 PHY speeds 250 kbps 40 kbps 20 kbps.
More informationWIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security
Objectives: 1) Understanding the basic operations of WLANs 2) WLAN security 3) Wireless body area networks (IEEE 802.15.6) Readings: 1. Kurose & Ross, Computer Networking: A Top-Down Approach (6th Edition),
More information2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications
2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications Guan-Tsang Chen, Wen-Tsuen Chen, and Shan-Hsiang Shen Department of Computer Science,
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationMedium Access Control in Wireless Networks
Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationMatteo Petracca Scuola Superiore Sant Anna, Pisa
Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationMessage acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with
ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationTopic 02: IEEE
Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/
More informationNovember 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.
IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationOverview of the IEEE /4a standards for low data rate Wireless Personal Data Networks
Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks Luca De Nardis and Maria-Gabriella Di Benedetto Infocom Department School of Engineering University of Rome
More informationA Hybrid Lifetime Extended Directional Approach for WBANs
Sensors 2015, 15, 28005-28030; doi:10.3390/s151128005 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors A Hybrid Lifetime Extended Directional Approach for WBANs Changle Li *, Xiaoming
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationHIPERLAN/2 and a: A Comparative Study
HIPERLAN/2 and 802.11a: A Comparative Study PADMA BONDE Reader, Department of Computer Science Shri Vaishnav Institute of Technology and Science Indore, INDIA JAYESH BONDE Executive Engineer, Department
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions Data-rate RFID 20 cm, 10-200 kbps 100m, 11-100 Mbps
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationIEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering
by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 PLCP, Packet Format 2 PHY Layer Characteristics and Data Rates Area Concept Layers and Functions (PLCP and PMD Sublayers) Antennas DSSS in IEEE 802.11b
More informationETSI TS V1.1.1 ( )
TS 103 325 V1.1.1 (2015-04) TECHNICAL SPECIFICATION Smart Body Area Network (SmartBAN); Low Complexity Medium Access Control (MAC) for SmartBAN 2 TS 103 325 V1.1.1 (2015-04) Reference DTS/SmartBAN-005
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationIEEE Testing Signal Compliance of ZigBee Standard
IEEE802.15.4 Testing Signal Compliance of ZigBee Standard Tektronix 1 Agenda: 1: What is ZigBee 2: ZigBee Specification 3: ZigBee Signal Analysis 4: Demonstration for ZigBee analysis 2 What is ZigBee (1)
More informationWNC-0300USB. 11g Wireless USB Adapter USER MANUAL
WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationMobile Radio Communications
Session 7: Wireless networks & WLANs Session 7, page 1 Backbone network MSC PSTN PLMN BSC Session 7, page 2 Public switched telephone network (PSTN) PABX central office local exchange long distance subscriber
More informationLaboratory of Nomadic Communication. Quick introduction to IEEE
Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless
More informationMay doc.: IEEE Submission Title: [MAC for IEEE ]
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [MAC for IEEE802.15.6] Date Submitted: [April 29, 2009] Source: [Hyung-il Park 1, Sung-weon Kang 1, Youngmi Kwon 2
More informationIEEE Wireless LANs Part I: Basics
IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:
More informationIEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir
More informationWiMedia Media Access Control (MAC) Dan Froelich
WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationAnalysis of IEEE e for QoS Support in Wireless LANs
Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationInvestigation of WLAN
Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12
More informationIEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract
IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:
More informationC300RU. Version Mbps 11n Wireless USB adapter. Technical Specification Sheet
C300RU Version 2.0 300Mbps 11n Wireless USB adapter Technical Specification Sheet Page 1 of 6 1. Product s Compatible with IEEE 802.11n high rate draft standard to provide wireless downlink 300Mbps and
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationWireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu
Wireless LAN A competing method to wired LAN Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Outline of the presentation Introduction Background Problem Environment
More informationIEEE WBAN Beaconing for Wireless USB Protocol Adaptation
IEEE 802.15.6 WBA Beaconing for Wireless USB Protocol Adaptation Kyeong Hur 1, Won-Sung Sohn 1 *, Jae-Kyung Kim 1 and YangSun Lee 2 1* Dept. of Computer Education, Gyeongin ational University of Education,
More informationCHAPTER 4 CROSS LAYER INTERACTION
38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationWireless Sensor Networks
Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision
More informationJunseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea
Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy
More informationMaximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol
Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationA Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer
Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More information