Communication In Smart Grid -Part3
|
|
- Mark Hodge
- 5 years ago
- Views:
Transcription
1 Communication In Smart Grid -Part3 Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme
2 Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star or Peer-to-Peer operation. Support for low latency devices. CSMA-CA channel access. Dynamic device addressing. Fully handshaked protocol for transfer reliability. Low power consumption. Channels: 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band 1 channel in the European 868MHz band. Extremely low duty-cycle (<0.1%) Applications Network MAC Physical Industrial, Scientific and Medical (ISM) Dr. -Ing. Abdalkarim Awad 1
3 Basics : Media Access Control (MAC) protocols when node has packet to send transmit at full channel data rate R. Usually there is no a priori coordination among nodes two or more transmitting nodes collision, Media Access Control (MAC) protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) examples of random access MAC protocols: ALOHA slotted ALOHA CSMA, CSMA/CD, CSMA/CA Dr. -Ing. Abdalkarim Awad 2
4 ALOHA /m=0 fromabove(data)/ [finished]/ start_timer timeout/ m++ wait for data transmission wait for ACK backoff rcv(ack)/ stop_timer; m=0 random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 3
5 Slotted ALOHA Used in satellite communications fromabove(data)/ /m=0 newslot()/ [finished]/ start_timer timeout/ m++ wait for data wait slot start transmission wait for ACK backoff rcv(ack)/ stop_timer; m=0 random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 4
6 Carrier Sense Multiple Access (CSMA) /m=0 fromabove(data)/ [free]/ [finished]/ start_timer timeout/ m++ wait for data sense transmission wait for ACK backoff rcv(ack)/ stop_timer; m=0 Used in CAN bus random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 5
7 Carrier Sense Multiple Access/ Collision Detection (CSMA/CD) /m=0 fromabove(data)/ [free]/ [collision]/ [jamfinished]/ m++ wait for data sense transmission jam backoff [finished]/ m=0 random(0,...,2 m -1) t/ Used in Ethernet m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 6
8 Carrier Sense Multiple Access (CSMA/CA) /m=0 wait for data fromabove(data)/ sense [busy]/ [free]/ transmission [finished]/ start_timer wait for ACK timeout/ m++ backoff rcv(ack)/ stop_timer; m=0 used in WLAN random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 7
9 IEEE MAC Dr. -Ing. Abdalkarim Awad 8
10 Functional overview Superframe structure contention-access period (CAP) and contention-free period (CFP), The beacons are used to synchronize the attached devices, Dr. -Ing. Abdalkarim Awad 9
11 IEEE Frames/packets MPDU format Frame Check Sequence (FCS): to detect bit errors in a frame, CRC is used Frame Control : 16 bits which indicate type of the packet (Beacon, Data,..), is ack required?, is security enabled?, source and destination address types... is it intrapan communication? Dr. -Ing. Abdalkarim Awad 10
12 PPDU format 5 byte synchronisation header (SHR) 4 byte preamble, all bytes set to 0x00 1 byte start of frame delimiter set to 0x7A 1 byte PHY header (PHR) 1 byte length field containing number of bytes in the packet including 2 byte CRC Dr. -Ing. Abdalkarim Awad 11
13 Error Detection CRC CRC Cyclic Redundancy Check Used to detect errors Polynomial cods or checksums Procedure: 1. Use a common code polynomial 2. Let r be the degree of the code polynomial. Append r zero bits to the end of the transmitted bit string. Call the entire bit string S(x) 3. Divide S(x) by the code polynomial using modulo 2 division. 4. Subtract the remainder from S(x) using modulo 2 subtraction. Dr. -Ing. Abdalkarim Awad 12
14 Generating a CRC example Message: * x * x * x + 1= x 3 + x + 1 Code Polynomial: x (101) Step 1: Compute S(x) r = 2 S(x) = Step 2: Modulo 2 divide Remainder Step 3: Modulo 2 subtract the remainder from S(x) Checksummed Message Dr. -Ing. Abdalkarim Awad 13
15 Decoding a CRC example Procedure 1. Let n be the length of the checksummed message in bits 2. Divide the checksummed message by the code polynomial using modulo 2 division. If the remaidner is zero, there is no error detected. Checksummed message (n=6): Original message Case 1: Remainder = 0 (No error detected) Case 2: Remainder = 1 (Error detected) Dr. -Ing. Abdalkarim Awad 14
16 In Polynomial Code Polynomial: CRC-CCITT 0x1021 = x 16 + x 12 + x Dr. -Ing. Abdalkarim Awad 15
17 Superframe A superframe is divided into two parts Inactive: all stations are sleep mode Active: Active period will be divided into 16 slots 16 slots can further divided into two parts Contention access period (CAP) Contention free period (CFP) Dr. -Ing. Abdalkarim Awad 16
18 Superframe Beacons are used for starting superframes synchronizing with other devices announcing the existence of a PAN informing pending data in coordinators In a beacon-enabled network, Devices use the slotted CAMA/CA mechanism to contend for the usage of channels FFDs which require fixed rates of transmissions can ask for guarantee time slots (GTS) from the coordinator Dr. -Ing. Abdalkarim Awad 17
19 Superframe The structure of superframes is controlled by two parameters: beacon order (BO) : decides the length of a superframe superframe order (SO) : decides the length of the active potion in a superframe For a beacon-enabled network, the setting of BO and SO should satisfy the relationship 0 SO BO 14 For channels 11 to 26, the length of a superframe can range from msec to sec (= 3.5 min). Dr. -Ing. Abdalkarim Awad 18
20 Superframe Each device will be active for 2 -(BO-SO) portion of the time, and sleep for 1-2 -(BO-SO) portion of the time Duty Cycle=(Active/(Active+sleep)): BO-SO Duty cycle (%) < 0.1 Active Sleep Active Dr. -Ing. Abdalkarim Awad 19
21 Data Transfer Model (I) Data transferred from device to coordinator In a beacon-enable network, a device finds the beacon to synchronize to the superframe structure. Then it uses slotted CSMA/CA to transmit its data. In a non-beacon-enable network, device simply transmits its data using unslotted CSMA/CA Communication to a coordinator In a beacon-enabled network Communication to a coordinator In a non beacon-enabled network Dr. -Ing. Abdalkarim Awad 20
22 Data Transfer Model (II-1) Data transferred from coordinator to device in a beacon-enabled network: The coordinator indicates in the beacon that some data is pending. A device periodically listens to the beacon and transmits a Data Requst command using slotted CSMA/CA. Then ACK, Data, and ACK follow Communication from a coordinator In a beacon-enabled network Dr. -Ing. Abdalkarim Awad 21
23 Data transfer model (II-2) Data transferred from coordinator to device in a nonbeacon-enable network: The device transmits a Data Request using unslotted CSMA/CA. If the coordinator has its pending data, an ACK is replied. Then the coordinator transmits Data using unslotted CSMA/CA. If there is no pending data, a data frame with zero length payload is transmitted. Communication from a coordinator in a non beacon-enabled network Dr. -Ing. Abdalkarim Awad 22
24 Channel Access Mechanism Two type channel access mechanism: beacon-enabled networks slotted CSMA/CA channel access mechanism non-beacon-enabled networks unslotted CSMA/CA channel access mechanism Dr. -Ing. Abdalkarim Awad 23
25 Slotted CSMA/CA algorithm In slotted CSMA/CA The backoff period boundaries of every device in the PAN shall be aligned with the superframe slot boundaries of the PAN coordinator i.e. the start of first backoff period of each device is aligned with the start of the beacon transmission The MAC sublayer shall ensure that the PHY layer commences all of its transmissions on the boundary of a backoff period Dr. -Ing. Abdalkarim Awad 24
26 Slotted CSMA/CA algorithm (cont.) Each device maintains 3 variables for each transmission attempt NB: number of times that backoff has been taken in this attempt (if exceeding macmaxcsmabackoff, the attempt fails) BE: the backoff exponent which is determined by NB CW: contention window length, the number of clear slots that must be seen after each backoff always set to 2 and count down to 0 if the channel is sensed to be clear The design is for some PHY parameters, which require 2 CCA for efficient channel usage. Battery Life Extension: designed for very low-power operation, where a node only contends in the first 6 slots Dr. -Ing. Abdalkarim Awad 25
27 Clear Channel Assessment (CCA) CCA Mode 1: Energy above threshold. CCA shall report a busy medium upon detecting any energy above the ED threshold. CCA Mode 2: Carrier sense only. CCA shall report a busy medium only upon the detection of a signal with the modulation and spreading characteristics of IEEE This signal may be above or below the ED threshold. CCA Mode 3: Carrier sense with energy above threshold. CCA shall report a busy medium only upon the detection of a signal with the modulation and spreading characteristics of IEEE with energy above the ED threshold. Dr. -Ing. Abdalkarim Awad 26
28 Slotted CSMA/CA (cont.) need 2 CCA to ensure no collision Dr. -Ing. Abdalkarim Awad 27
29 Why 2 CCAs to Ensure Collision-Free Each CCA occurs at the boundary of a backoff slot (= 20 symbols), and each CCA time = 8 symbols. The standard specifies that a transmitter node performs the CCA twice in order to protect acknowledgment (ACK). When an ACK packet is expected, the receiver shall send it after a t ACK time on the backoff boundary t ACK varies from 12 to 31 symbols One-time CCA of a transmitter may potentially cause a collision between a newly-transmitted packet and an ACK packet. (See examples below) Dr. -Ing. Abdalkarim Awad 28
30 Why 2 CCAs (case 1) Backoff boundary Existing session New transmitter Backoff end here CCA Detect an ACK New transmitter CCA CCA Backoff end here Detect an ACK Dr. -Ing. Abdalkarim Awad 29
31 only one CCA Unslotted CSMA/CA Dr. -Ing. Abdalkarim Awad 30
32 GTS Concepts (I) A guaranteed time slot (GTS) allows a device to operate on the channel within a portion of the superframe A GTS shall only be allocated by the PAN coordinator The PAN coordinator can allocated up to 7 GTSs at the same time The PAN coordinator decides whether to allocate GTS based on: Requirements of the GTS request The current available capacity in the superframe Dr. -Ing. Abdalkarim Awad 31
33 GTS Concepts (II) A GTS can be deallocated At any time at the discretion of the PAN coordinator or By the device that originally requested the GTS A device that has been allocated a GTS may also operate in the CAP A data frame transmitted in an allocated GTS shall use only short addressing Dr. -Ing. Abdalkarim Awad 32
34 GTS Concepts (III) Before GTS starts, the GTS direction shall be specified as either transmit or receive Each device may request one transmit GTS and/or one receive GTS A device shall only attempt to allocate and use a GTS if it is currently tracking the beacon If a device loses synchronization with the PAN coordinator, all its GTS allocations shall be lost The use of GTSs be an RFD is optional Dr. -Ing. Abdalkarim Awad 33
35 Interframe spacing (IFS) Short Interfame Space (SIFS) Long Interframe Spacing (LIFS) The MAC needs a finite amount of time to process data received by the PHY. To allow for this, two successive frames transmitted from a device shall be separated by at least an IFS period Dr. -Ing. Abdalkarim Awad 34
36 IEEE physical layer Dr. -Ing. Abdalkarim Awad 35
37 Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star or Peer-to-Peer operation. Support for low latency devices. CSMA-CA channel access. Dynamic device addressing. Fully handshaked protocol for transfer reliability. Low power consumption. Channels: 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band 1 channel in the European 868MHz band. Extremely low duty-cycle (<0.1%) Applications Network MAC Physical Industrial, Scientific and Medical (ISM) Dr. -Ing. Abdalkarim Awad 36
38 Operating frequency bands 868MHz/ 915MHz PHY Channel 0 Channels MHz 902 MHz 2 MHz 928 MHz 2.4 GHz PHY Channels MHz 2.4 GHz GHz Dr. -Ing. Abdalkarim Awad 37
39 IEEE PHY overview PHY functionalities: Activation and deactivation of the radio transceiver ED within the current channel Clear channel assessment (CCA) for CSMA-CA Link Quality Indicator (LQI) for received packets Channel frequency selection Data transmission and reception Dr. -Ing. Abdalkarim Awad 38
40 PHY Frame Structure PHY packet fields Preamble (32 bits) synchronization Start of packet delimiter (8 bits) shall be formatted as PHY header (8 bits) PSDU length PSDU (0 to 127 bytes) data field Sync Header Preamble Start of Packet Delimiter PHY Header Frame Length (7 bit) Reserve (1 bit) PHY Payload PHY Service Data Unit (PSDU) 4 Octets 1 Octets 1 Octets Bytes Dr. -Ing. Abdalkarim Awad 39
41 6LoWPAN IPv6 over Low-Power Wireless Area Networks Defined by IETF standards RFC 4919, 4944 draft-ietf-6lowpan-hc and -nd draft-ietf-roll-rpl Stateless header compression Enables a standard socket API Minimal use of code and memory Direct end-to-end Internet integration Multiple topology options Applications UDP/ICMP IP6 with lowpan MAC Physical Dr. -Ing. Abdalkarim Awad 40
42 ZigBee Vs. 6loWPAN Zigbee only defines communication between 15.4 nodes ( layer 2 in IP terms), not the rest of the network (other links, other nodes). defines new upper layers, all the way to the application, similar to IRDA, USB, and Bluetooth, rather utilizing existing standards. 6LoWPAN defines how established IP networking layers utilize the 15.4 link. it enables and 15.4 non-15.4 communication It enables the use of a broad body of existing standards as well as higher level protocols, software, and tools. It is a focused extension to the suite of IP technologies that enables the use of a new class of devices in a familiar manner Dr. -Ing. Abdalkarim Awad 41
43 ZigBee and WiFi coexistance ZigBee and WiFi collocate at 2.4 GHz Frequency Band In addition to medium access control: They should automatically avoid common channels. ZigBee (or WiFi or both) should search for unused channels. Dr. -Ing. Abdalkarim Awad 42
44 Wireless Mesh Networks (WMNs) Dr. -Ing. Abdalkarim Awad 43
45 Wireless Mesh Networks (WMNs) WMNs are composed of several wireless access points (routers) a,b,g (wlan) or s can be used Together, they create a fully wireless communication backbone: To serve wireless mesh clients (fixed / mobile) The WMN can be connected to the Internet or other networks: Through a few gateway routers Dr. -Ing. Abdalkarim Awad 44
46 Example Dr. -Ing. Abdalkarim Awad 45
47 Example: Wireless Mesh Routers Example: Wireless Mesh Clients Dr. -Ing. Abdalkarim Awad 46
48 Some of the advantages of WMNs: Low up front costs Ease of incremental deployment Ease of maintenance The wireless mesh clients can also be: Smart Meters, Sensors, Sub stations, capacitor banks, etc. Dr. -Ing. Abdalkarim Awad 47
49 WMNs for Smart Grid Communications Dr. -Ing. Abdalkarim Awad 48
50 Dynamic On Demand Routing Protocol (DYMO) (similar to AODV) If the destination node is not in the routing table, send RREQ message and only the destination node sends back a rout reply Dr. -Ing. Abdalkarim Awad 49
51 Geographic Routing Protocol If Node 8 wants to send a Packet to Node 14, it sends the data to the Node that has progress towards the destination In this Example Dead-end on Node 56 (no progress towards Node 14) Dr. -Ing. Abdalkarim Awad 50
52 Key challenges in WMNs: Wireless Interference and Frequent Collisions Wireless Multi hop Transmissions (e.g., for TCP connections) Congestion at Gateways Smart Grid applications have requirements on Communications Packet Loss and Delay Dr. -Ing. Abdalkarim Awad 51
53 Channel Assignment Assume that we use WiFi technology for WMN. Let us look at the available 11 channels in IEEE b: Partially Overlapping: 1 and 2 Non Overlapping: 1 and 6 and 11 Dr. -Ing. Abdalkarim Awad 52
54 Channel Assignment We assign different non overlapping channels to different links: Links 1, 2, and 3 will no longer interfere on each other. Links 1 and 4 may interfere, but they are far from each other Such multi channel deployment requires mesh routers with multiple NICs. Ch 1 Link1 Ch 6 Link2 Ch 11 Ch 1 Link3 Link4 Dr. -Ing. Abdalkarim Awad 53
55 Channel Assignment Same idea applies to a more complex network: Dr. -Ing. Abdalkarim Awad 54
56 Channel Assignment Same idea applies to a more complex network: Ch 1 Ch 6 Ch 1 Ch 6 Ch 1 Ch 1 Ch 6 Ch 11 Ch 6 Ch 11 Ch 1 Ch 1 Ch 1 Channel assignment depends on the number of NICs per node (2 NICs per Node) Dr. -Ing. Abdalkarim Awad 55
57 Hidden terminal problem Multiple wireless senders and receivers create additional problems (beyond multiple access): C A B C A B A s signal strength C s signal strength Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B space A is sending data to B C wants to send data to B For C the channel is free! And starts to send causing collision Dr. -Ing. Abdalkarim Awad 56
58 Bibliography Smart Grid: Technology and Applications, 2012, ISBN , Wiley, by Janaka Ekanayake, Kithsiri Liyanage, Jianzhong Wu, Akihiko Yokoyama, Nick Jenkins ZigBee Alliance, Smart Energy Profile 2 Application Protocol Standard Smart Grid : Applications, Communications, and Security by Lars T. Berger and Krzysztof Iniewski Hamed Mohsenian-Rad, Communications & Control in Smart Grid (Slides) IEEE Std Y.-C. Tseng, ZigBee/IEEE Overview (Slides) Dr. -Ing. Abdalkarim Awad 57
Principles of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationEL2745 Principles of Wireless Sensor Networks
EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology
More informationIntroduction to IEEE
Introduction to IEEE 802.15.4 Marcos Rubinstein IEEE 802.15.4 Short range, low bit rate, low power consumption Home Automotive Industrial applications Games Metering 1 PHY speeds 250 kbps 40 kbps 20 kbps.
More informationCHAPTER 4 CROSS LAYER INTERACTION
38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationZigBee/ David Sanchez Sanchez.
ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network
More informationMobile Communications
Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current
More informationWireless Sensor Networks
Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 The IEEE 802.15.4 Protocol Stack Time Synchronization Energy Management
More informationMedium Access Control in Wireless Networks
Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More informationC Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme
C37.118 13.1.2016 Informatik 7 Rechnernetze und Kommunikationssysteme Measures Voltage, Current, phase PMU1 IEEE C37.118 WAN PDC Historian Phasor Data Concentrator HMI App1 PMU2 APn Bay1 Bayn LAN e.g.,
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationTopic 02: IEEE
Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/
More informationOutline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with
Section 7. Wireless Communication Outline Wireless Communication with 802.15.4/Zigbee Protocol Introduction to Freescale MC12311 802.15.4/Zigbee Protocol TWR-12311 Module TWR-MC12311 Smart Radio Features
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationOutlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21
IPv6 over WPAN Soohong Daniel Park soohong.park@samsung.com Mobile Convergence Laboratory, Digital Media R&D Center, SAMSUNG Electronics. Contents Outlook on IEEE 802.15.4 ZigBee Implications IP Requirements
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationVolume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based
More informationSimulation Analysis of IEEE Non-beacon Mode at Varying Data Rates
Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University
More informationStandard for wireless sensor networks. Developed and promoted by the ZigBee alliance
Stefano Chessa Zigbee Standard for wireless sensor networks Developed and promoted by the ZigBee alliance Applications: Home automation (domotics, ambient assisted living,...) Health care Consumer electronics
More informationWIRELESS SENSOR NETWORK
1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)
More informationPerformance Evaluation of IEEE for Low-Rate Wireless Personal Area Networks
742 IEEE Transactions on Consumer Electronics, Vol. 52, No. 3, AUGUST 26 Performance Evaluation of IEEE 82.15.4 for Low-Rate Wireless Personal Area Networks Jin-Shyan Lee Abstract IEEE 82.15.4 is an emerging
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationChapter 7. ZigBee (IEEE ) Liang Zhao, Andreas Timm-Giel
Chapter 7 ZigBee (IEEE 802.15.4) Liang Zhao, Andreas Timm-Giel Outline 7.1 Introduction and Overview of IEEE 802.15.4 / ZigBee 7.2 IEEE 802.15.4: Physical Layer Protocols 7.3 IEEE 802.15.4: MAC Layer Protocols
More informationWIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS
3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of
More informationZigbee protocol stack overview
Zigbee protocol stack overview 2018 ASSUMPTIONS FOR USING THIS TEACHING MATERIAL DSR and OTSL takes no responsibility about the problem which occurs as a result of applying the technical information written
More informationDavide Quaglia Assistant CS depart University of Verona, Italy
Emad Ebeid Ph.D. student @ CS depart University of Verona, Italy EmadSamuelMalki.Ebeid@univr.it Davide Quaglia Assistant Professor @ CS depart University of Verona, Italy Davide.Quaglia@univr.it 2 1 ZigBee
More informationChapter 7. IEEE ZigBee. Liang Zhao, Andreas Timm-Giel
Chapter 7 IEEE 802.15.4 ZigBee Liang Zhao, Andreas Timm-Giel Outline 7.1 Introduction and Overview of IEEE 802.15.4 / ZigBee 7.2 IEEE 802.15.4: Physical Layer Protocols 7.3 IEEE 802.15.4: MAC Layer Protocols
More informationMatteo Petracca Scuola Superiore Sant Anna, Pisa
Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction
More informationMessage acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with
ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationWireless communication standards: What makes them unattractive for WSN:
Wireless communication standards: IEEE 802.11 a/b/g Bluetooth GSM What makes them unattractive for WSN: Power hungry (need big batteries) Complexity (need lots of clock cycles and memory) New protocol
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationOverview of the IEEE /4a standards for low data rate Wireless Personal Data Networks
Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks Luca De Nardis and Maria-Gabriella Di Benedetto Infocom Department School of Engineering University of Rome
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationRadio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building
Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application
More informationDesign and Implementation of a Multi-hop Zigbee Network
Design and Implementation of a Multi-hop Zigbee Network Chi-Wen Deng, Li-chun Ko, Yung-chih Liu, Hua-wei Fang Networks and Multimedia Institute Institute for Information Industry, ROC {cwdeng, lcko, ulysses,
More informationModule 10 Data Link Layer CS655! 10-1!
Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely
More informationIPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )
Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationZigBee and IEEE
n overview of ZigBee and IEEE 80.5.4 IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions Data-rate RFID 20 cm, 10-200 kbps 100m, 11-100 Mbps
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationWireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.
Wireless Body Area Networks WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks www.wiserban.eu Wireless Body Area Networks (WBANs) WBAN: Collection of nodes placed on, or inside,
More informationLow-Rate Wireless Personal Area Networks IEEE Fernando Solano Warsaw University of Technology
Low-Rate Wireless Personal Area Networks IEEE 802.15.4 Fernando Solano Warsaw University of Technology fs@tele.pw.edu.pl Wireless Sensor Networks and Hardware A bad example Remote bulb control Reduce Energy
More informationWLAN b/g interference into ZigBee networks
WLAN 802.11 b/g interference into ZigBee networks by Guang Yang Yu Yu Master Thesis in Information and Communication Technology Supervisor: Magne Arild Haglund Agder University 2008.05 Abstract Abstract
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 OVERVIEW For accessing computer networks and its services without cables, wireless communications is a fast-growing technology which gives certain advantages over wired network
More informationZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS
ZIGBEE Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS OUTLINE ZIGBEE AND APPLICATIONS IEEE 802.15.4 PROTOCOL ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER ZIGBEE
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions for Wireless Networks 2 Standard Solutions for WSN 3
More informationIEEE Wireless LANs Part I: Basics
IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationEmad Ebeid Ph.D. CS depart University of Verona, Italy
Emad Ebeid Ph.D. student @ CS depart University of Verona, Italy EmadSamuelMalki.Ebeid@univr.it Davide Quaglia Assistant Professor @ CS depart University of Verona, Italy Davide.Quaglia@univr.it 2 1 ZigBee
More informationPerformance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio
Middle-East Journal of Scientific Research 13 (9): 1137-1143, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.13.9.739 Performance Analysis of Guaranteed Time Slots Allocation
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationJunseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea
Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationCS-541 Wireless Sensor Networks
CS-541 Wireless Sensor Networks Lecture 5: Network standards for Personal and Body-area networks Prof Panagiotis Tsakalides, Dr Athanasia Panousopoulou, Dr Gregory Tsagkatakis 1 Objectives IEEE Standards
More informationThe Link Layer II: Ethernet
Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationTopics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion
ZigBee Topics Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Introduction The Wireless technologies (WiFi,GSM,and Bluetooth) All have one thing
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More information