Communication In Smart Grid -Part3

Size: px
Start display at page:

Download "Communication In Smart Grid -Part3"

Transcription

1 Communication In Smart Grid -Part3 Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme

2 Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star or Peer-to-Peer operation. Support for low latency devices. CSMA-CA channel access. Dynamic device addressing. Fully handshaked protocol for transfer reliability. Low power consumption. Channels: 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band 1 channel in the European 868MHz band. Extremely low duty-cycle (<0.1%) Applications Network MAC Physical Industrial, Scientific and Medical (ISM) Dr. -Ing. Abdalkarim Awad 1

3 Basics : Media Access Control (MAC) protocols when node has packet to send transmit at full channel data rate R. Usually there is no a priori coordination among nodes two or more transmitting nodes collision, Media Access Control (MAC) protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) examples of random access MAC protocols: ALOHA slotted ALOHA CSMA, CSMA/CD, CSMA/CA Dr. -Ing. Abdalkarim Awad 2

4 ALOHA /m=0 fromabove(data)/ [finished]/ start_timer timeout/ m++ wait for data transmission wait for ACK backoff rcv(ack)/ stop_timer; m=0 random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 3

5 Slotted ALOHA Used in satellite communications fromabove(data)/ /m=0 newslot()/ [finished]/ start_timer timeout/ m++ wait for data wait slot start transmission wait for ACK backoff rcv(ack)/ stop_timer; m=0 random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 4

6 Carrier Sense Multiple Access (CSMA) /m=0 fromabove(data)/ [free]/ [finished]/ start_timer timeout/ m++ wait for data sense transmission wait for ACK backoff rcv(ack)/ stop_timer; m=0 Used in CAN bus random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 5

7 Carrier Sense Multiple Access/ Collision Detection (CSMA/CD) /m=0 fromabove(data)/ [free]/ [collision]/ [jamfinished]/ m++ wait for data sense transmission jam backoff [finished]/ m=0 random(0,...,2 m -1) t/ Used in Ethernet m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 6

8 Carrier Sense Multiple Access (CSMA/CA) /m=0 wait for data fromabove(data)/ sense [busy]/ [free]/ transmission [finished]/ start_timer wait for ACK timeout/ m++ backoff rcv(ack)/ stop_timer; m=0 used in WLAN random(0,...,2 m -1) t/ m = #collisions t = constant time Dr. -Ing. Abdalkarim Awad 7

9 IEEE MAC Dr. -Ing. Abdalkarim Awad 8

10 Functional overview Superframe structure contention-access period (CAP) and contention-free period (CFP), The beacons are used to synchronize the attached devices, Dr. -Ing. Abdalkarim Awad 9

11 IEEE Frames/packets MPDU format Frame Check Sequence (FCS): to detect bit errors in a frame, CRC is used Frame Control : 16 bits which indicate type of the packet (Beacon, Data,..), is ack required?, is security enabled?, source and destination address types... is it intrapan communication? Dr. -Ing. Abdalkarim Awad 10

12 PPDU format 5 byte synchronisation header (SHR) 4 byte preamble, all bytes set to 0x00 1 byte start of frame delimiter set to 0x7A 1 byte PHY header (PHR) 1 byte length field containing number of bytes in the packet including 2 byte CRC Dr. -Ing. Abdalkarim Awad 11

13 Error Detection CRC CRC Cyclic Redundancy Check Used to detect errors Polynomial cods or checksums Procedure: 1. Use a common code polynomial 2. Let r be the degree of the code polynomial. Append r zero bits to the end of the transmitted bit string. Call the entire bit string S(x) 3. Divide S(x) by the code polynomial using modulo 2 division. 4. Subtract the remainder from S(x) using modulo 2 subtraction. Dr. -Ing. Abdalkarim Awad 12

14 Generating a CRC example Message: * x * x * x + 1= x 3 + x + 1 Code Polynomial: x (101) Step 1: Compute S(x) r = 2 S(x) = Step 2: Modulo 2 divide Remainder Step 3: Modulo 2 subtract the remainder from S(x) Checksummed Message Dr. -Ing. Abdalkarim Awad 13

15 Decoding a CRC example Procedure 1. Let n be the length of the checksummed message in bits 2. Divide the checksummed message by the code polynomial using modulo 2 division. If the remaidner is zero, there is no error detected. Checksummed message (n=6): Original message Case 1: Remainder = 0 (No error detected) Case 2: Remainder = 1 (Error detected) Dr. -Ing. Abdalkarim Awad 14

16 In Polynomial Code Polynomial: CRC-CCITT 0x1021 = x 16 + x 12 + x Dr. -Ing. Abdalkarim Awad 15

17 Superframe A superframe is divided into two parts Inactive: all stations are sleep mode Active: Active period will be divided into 16 slots 16 slots can further divided into two parts Contention access period (CAP) Contention free period (CFP) Dr. -Ing. Abdalkarim Awad 16

18 Superframe Beacons are used for starting superframes synchronizing with other devices announcing the existence of a PAN informing pending data in coordinators In a beacon-enabled network, Devices use the slotted CAMA/CA mechanism to contend for the usage of channels FFDs which require fixed rates of transmissions can ask for guarantee time slots (GTS) from the coordinator Dr. -Ing. Abdalkarim Awad 17

19 Superframe The structure of superframes is controlled by two parameters: beacon order (BO) : decides the length of a superframe superframe order (SO) : decides the length of the active potion in a superframe For a beacon-enabled network, the setting of BO and SO should satisfy the relationship 0 SO BO 14 For channels 11 to 26, the length of a superframe can range from msec to sec (= 3.5 min). Dr. -Ing. Abdalkarim Awad 18

20 Superframe Each device will be active for 2 -(BO-SO) portion of the time, and sleep for 1-2 -(BO-SO) portion of the time Duty Cycle=(Active/(Active+sleep)): BO-SO Duty cycle (%) < 0.1 Active Sleep Active Dr. -Ing. Abdalkarim Awad 19

21 Data Transfer Model (I) Data transferred from device to coordinator In a beacon-enable network, a device finds the beacon to synchronize to the superframe structure. Then it uses slotted CSMA/CA to transmit its data. In a non-beacon-enable network, device simply transmits its data using unslotted CSMA/CA Communication to a coordinator In a beacon-enabled network Communication to a coordinator In a non beacon-enabled network Dr. -Ing. Abdalkarim Awad 20

22 Data Transfer Model (II-1) Data transferred from coordinator to device in a beacon-enabled network: The coordinator indicates in the beacon that some data is pending. A device periodically listens to the beacon and transmits a Data Requst command using slotted CSMA/CA. Then ACK, Data, and ACK follow Communication from a coordinator In a beacon-enabled network Dr. -Ing. Abdalkarim Awad 21

23 Data transfer model (II-2) Data transferred from coordinator to device in a nonbeacon-enable network: The device transmits a Data Request using unslotted CSMA/CA. If the coordinator has its pending data, an ACK is replied. Then the coordinator transmits Data using unslotted CSMA/CA. If there is no pending data, a data frame with zero length payload is transmitted. Communication from a coordinator in a non beacon-enabled network Dr. -Ing. Abdalkarim Awad 22

24 Channel Access Mechanism Two type channel access mechanism: beacon-enabled networks slotted CSMA/CA channel access mechanism non-beacon-enabled networks unslotted CSMA/CA channel access mechanism Dr. -Ing. Abdalkarim Awad 23

25 Slotted CSMA/CA algorithm In slotted CSMA/CA The backoff period boundaries of every device in the PAN shall be aligned with the superframe slot boundaries of the PAN coordinator i.e. the start of first backoff period of each device is aligned with the start of the beacon transmission The MAC sublayer shall ensure that the PHY layer commences all of its transmissions on the boundary of a backoff period Dr. -Ing. Abdalkarim Awad 24

26 Slotted CSMA/CA algorithm (cont.) Each device maintains 3 variables for each transmission attempt NB: number of times that backoff has been taken in this attempt (if exceeding macmaxcsmabackoff, the attempt fails) BE: the backoff exponent which is determined by NB CW: contention window length, the number of clear slots that must be seen after each backoff always set to 2 and count down to 0 if the channel is sensed to be clear The design is for some PHY parameters, which require 2 CCA for efficient channel usage. Battery Life Extension: designed for very low-power operation, where a node only contends in the first 6 slots Dr. -Ing. Abdalkarim Awad 25

27 Clear Channel Assessment (CCA) CCA Mode 1: Energy above threshold. CCA shall report a busy medium upon detecting any energy above the ED threshold. CCA Mode 2: Carrier sense only. CCA shall report a busy medium only upon the detection of a signal with the modulation and spreading characteristics of IEEE This signal may be above or below the ED threshold. CCA Mode 3: Carrier sense with energy above threshold. CCA shall report a busy medium only upon the detection of a signal with the modulation and spreading characteristics of IEEE with energy above the ED threshold. Dr. -Ing. Abdalkarim Awad 26

28 Slotted CSMA/CA (cont.) need 2 CCA to ensure no collision Dr. -Ing. Abdalkarim Awad 27

29 Why 2 CCAs to Ensure Collision-Free Each CCA occurs at the boundary of a backoff slot (= 20 symbols), and each CCA time = 8 symbols. The standard specifies that a transmitter node performs the CCA twice in order to protect acknowledgment (ACK). When an ACK packet is expected, the receiver shall send it after a t ACK time on the backoff boundary t ACK varies from 12 to 31 symbols One-time CCA of a transmitter may potentially cause a collision between a newly-transmitted packet and an ACK packet. (See examples below) Dr. -Ing. Abdalkarim Awad 28

30 Why 2 CCAs (case 1) Backoff boundary Existing session New transmitter Backoff end here CCA Detect an ACK New transmitter CCA CCA Backoff end here Detect an ACK Dr. -Ing. Abdalkarim Awad 29

31 only one CCA Unslotted CSMA/CA Dr. -Ing. Abdalkarim Awad 30

32 GTS Concepts (I) A guaranteed time slot (GTS) allows a device to operate on the channel within a portion of the superframe A GTS shall only be allocated by the PAN coordinator The PAN coordinator can allocated up to 7 GTSs at the same time The PAN coordinator decides whether to allocate GTS based on: Requirements of the GTS request The current available capacity in the superframe Dr. -Ing. Abdalkarim Awad 31

33 GTS Concepts (II) A GTS can be deallocated At any time at the discretion of the PAN coordinator or By the device that originally requested the GTS A device that has been allocated a GTS may also operate in the CAP A data frame transmitted in an allocated GTS shall use only short addressing Dr. -Ing. Abdalkarim Awad 32

34 GTS Concepts (III) Before GTS starts, the GTS direction shall be specified as either transmit or receive Each device may request one transmit GTS and/or one receive GTS A device shall only attempt to allocate and use a GTS if it is currently tracking the beacon If a device loses synchronization with the PAN coordinator, all its GTS allocations shall be lost The use of GTSs be an RFD is optional Dr. -Ing. Abdalkarim Awad 33

35 Interframe spacing (IFS) Short Interfame Space (SIFS) Long Interframe Spacing (LIFS) The MAC needs a finite amount of time to process data received by the PHY. To allow for this, two successive frames transmitted from a device shall be separated by at least an IFS period Dr. -Ing. Abdalkarim Awad 34

36 IEEE physical layer Dr. -Ing. Abdalkarim Awad 35

37 Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star or Peer-to-Peer operation. Support for low latency devices. CSMA-CA channel access. Dynamic device addressing. Fully handshaked protocol for transfer reliability. Low power consumption. Channels: 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band 1 channel in the European 868MHz band. Extremely low duty-cycle (<0.1%) Applications Network MAC Physical Industrial, Scientific and Medical (ISM) Dr. -Ing. Abdalkarim Awad 36

38 Operating frequency bands 868MHz/ 915MHz PHY Channel 0 Channels MHz 902 MHz 2 MHz 928 MHz 2.4 GHz PHY Channels MHz 2.4 GHz GHz Dr. -Ing. Abdalkarim Awad 37

39 IEEE PHY overview PHY functionalities: Activation and deactivation of the radio transceiver ED within the current channel Clear channel assessment (CCA) for CSMA-CA Link Quality Indicator (LQI) for received packets Channel frequency selection Data transmission and reception Dr. -Ing. Abdalkarim Awad 38

40 PHY Frame Structure PHY packet fields Preamble (32 bits) synchronization Start of packet delimiter (8 bits) shall be formatted as PHY header (8 bits) PSDU length PSDU (0 to 127 bytes) data field Sync Header Preamble Start of Packet Delimiter PHY Header Frame Length (7 bit) Reserve (1 bit) PHY Payload PHY Service Data Unit (PSDU) 4 Octets 1 Octets 1 Octets Bytes Dr. -Ing. Abdalkarim Awad 39

41 6LoWPAN IPv6 over Low-Power Wireless Area Networks Defined by IETF standards RFC 4919, 4944 draft-ietf-6lowpan-hc and -nd draft-ietf-roll-rpl Stateless header compression Enables a standard socket API Minimal use of code and memory Direct end-to-end Internet integration Multiple topology options Applications UDP/ICMP IP6 with lowpan MAC Physical Dr. -Ing. Abdalkarim Awad 40

42 ZigBee Vs. 6loWPAN Zigbee only defines communication between 15.4 nodes ( layer 2 in IP terms), not the rest of the network (other links, other nodes). defines new upper layers, all the way to the application, similar to IRDA, USB, and Bluetooth, rather utilizing existing standards. 6LoWPAN defines how established IP networking layers utilize the 15.4 link. it enables and 15.4 non-15.4 communication It enables the use of a broad body of existing standards as well as higher level protocols, software, and tools. It is a focused extension to the suite of IP technologies that enables the use of a new class of devices in a familiar manner Dr. -Ing. Abdalkarim Awad 41

43 ZigBee and WiFi coexistance ZigBee and WiFi collocate at 2.4 GHz Frequency Band In addition to medium access control: They should automatically avoid common channels. ZigBee (or WiFi or both) should search for unused channels. Dr. -Ing. Abdalkarim Awad 42

44 Wireless Mesh Networks (WMNs) Dr. -Ing. Abdalkarim Awad 43

45 Wireless Mesh Networks (WMNs) WMNs are composed of several wireless access points (routers) a,b,g (wlan) or s can be used Together, they create a fully wireless communication backbone: To serve wireless mesh clients (fixed / mobile) The WMN can be connected to the Internet or other networks: Through a few gateway routers Dr. -Ing. Abdalkarim Awad 44

46 Example Dr. -Ing. Abdalkarim Awad 45

47 Example: Wireless Mesh Routers Example: Wireless Mesh Clients Dr. -Ing. Abdalkarim Awad 46

48 Some of the advantages of WMNs: Low up front costs Ease of incremental deployment Ease of maintenance The wireless mesh clients can also be: Smart Meters, Sensors, Sub stations, capacitor banks, etc. Dr. -Ing. Abdalkarim Awad 47

49 WMNs for Smart Grid Communications Dr. -Ing. Abdalkarim Awad 48

50 Dynamic On Demand Routing Protocol (DYMO) (similar to AODV) If the destination node is not in the routing table, send RREQ message and only the destination node sends back a rout reply Dr. -Ing. Abdalkarim Awad 49

51 Geographic Routing Protocol If Node 8 wants to send a Packet to Node 14, it sends the data to the Node that has progress towards the destination In this Example Dead-end on Node 56 (no progress towards Node 14) Dr. -Ing. Abdalkarim Awad 50

52 Key challenges in WMNs: Wireless Interference and Frequent Collisions Wireless Multi hop Transmissions (e.g., for TCP connections) Congestion at Gateways Smart Grid applications have requirements on Communications Packet Loss and Delay Dr. -Ing. Abdalkarim Awad 51

53 Channel Assignment Assume that we use WiFi technology for WMN. Let us look at the available 11 channels in IEEE b: Partially Overlapping: 1 and 2 Non Overlapping: 1 and 6 and 11 Dr. -Ing. Abdalkarim Awad 52

54 Channel Assignment We assign different non overlapping channels to different links: Links 1, 2, and 3 will no longer interfere on each other. Links 1 and 4 may interfere, but they are far from each other Such multi channel deployment requires mesh routers with multiple NICs. Ch 1 Link1 Ch 6 Link2 Ch 11 Ch 1 Link3 Link4 Dr. -Ing. Abdalkarim Awad 53

55 Channel Assignment Same idea applies to a more complex network: Dr. -Ing. Abdalkarim Awad 54

56 Channel Assignment Same idea applies to a more complex network: Ch 1 Ch 6 Ch 1 Ch 6 Ch 1 Ch 1 Ch 6 Ch 11 Ch 6 Ch 11 Ch 1 Ch 1 Ch 1 Channel assignment depends on the number of NICs per node (2 NICs per Node) Dr. -Ing. Abdalkarim Awad 55

57 Hidden terminal problem Multiple wireless senders and receivers create additional problems (beyond multiple access): C A B C A B A s signal strength C s signal strength Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B space A is sending data to B C wants to send data to B For C the channel is free! And starts to send causing collision Dr. -Ing. Abdalkarim Awad 56

58 Bibliography Smart Grid: Technology and Applications, 2012, ISBN , Wiley, by Janaka Ekanayake, Kithsiri Liyanage, Jianzhong Wu, Akihiko Yokoyama, Nick Jenkins ZigBee Alliance, Smart Energy Profile 2 Application Protocol Standard Smart Grid : Applications, Communications, and Security by Lars T. Berger and Krzysztof Iniewski Hamed Mohsenian-Rad, Communications & Control in Smart Grid (Slides) IEEE Std Y.-C. Tseng, ZigBee/IEEE Overview (Slides) Dr. -Ing. Abdalkarim Awad 57

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.15.4 Marcos Rubinstein IEEE 802.15.4 Short range, low bit rate, low power consumption Home Automotive Industrial applications Games Metering 1 PHY speeds 250 kbps 40 kbps 20 kbps.

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

Mobile Communications

Mobile Communications Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 The IEEE 802.15.4 Protocol Stack Time Synchronization Energy Management

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

C Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme

C Dr.-Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme C37.118 13.1.2016 Informatik 7 Rechnernetze und Kommunikationssysteme Measures Voltage, Current, phase PMU1 IEEE C37.118 WAN PDC Historian Phasor Data Concentrator HMI App1 PMU2 APn Bay1 Bayn LAN e.g.,

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Topic 02: IEEE

Topic 02: IEEE Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/

More information

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with Section 7. Wireless Communication Outline Wireless Communication with 802.15.4/Zigbee Protocol Introduction to Freescale MC12311 802.15.4/Zigbee Protocol TWR-12311 Module TWR-MC12311 Smart Radio Features

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Outlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21

Outlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21 IPv6 over WPAN Soohong Daniel Park soohong.park@samsung.com Mobile Convergence Laboratory, Digital Media R&D Center, SAMSUNG Electronics. Contents Outlook on IEEE 802.15.4 ZigBee Implications IP Requirements

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University

More information

Standard for wireless sensor networks. Developed and promoted by the ZigBee alliance

Standard for wireless sensor networks. Developed and promoted by the ZigBee alliance Stefano Chessa Zigbee Standard for wireless sensor networks Developed and promoted by the ZigBee alliance Applications: Home automation (domotics, ambient assisted living,...) Health care Consumer electronics

More information

WIRELESS SENSOR NETWORK

WIRELESS SENSOR NETWORK 1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)

More information

Performance Evaluation of IEEE for Low-Rate Wireless Personal Area Networks

Performance Evaluation of IEEE for Low-Rate Wireless Personal Area Networks 742 IEEE Transactions on Consumer Electronics, Vol. 52, No. 3, AUGUST 26 Performance Evaluation of IEEE 82.15.4 for Low-Rate Wireless Personal Area Networks Jin-Shyan Lee Abstract IEEE 82.15.4 is an emerging

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Chapter 7. ZigBee (IEEE ) Liang Zhao, Andreas Timm-Giel

Chapter 7. ZigBee (IEEE ) Liang Zhao, Andreas Timm-Giel Chapter 7 ZigBee (IEEE 802.15.4) Liang Zhao, Andreas Timm-Giel Outline 7.1 Introduction and Overview of IEEE 802.15.4 / ZigBee 7.2 IEEE 802.15.4: Physical Layer Protocols 7.3 IEEE 802.15.4: MAC Layer Protocols

More information

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS 3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of

More information

Zigbee protocol stack overview

Zigbee protocol stack overview Zigbee protocol stack overview 2018 ASSUMPTIONS FOR USING THIS TEACHING MATERIAL DSR and OTSL takes no responsibility about the problem which occurs as a result of applying the technical information written

More information

Davide Quaglia Assistant CS depart University of Verona, Italy

Davide Quaglia Assistant CS depart University of Verona, Italy Emad Ebeid Ph.D. student @ CS depart University of Verona, Italy EmadSamuelMalki.Ebeid@univr.it Davide Quaglia Assistant Professor @ CS depart University of Verona, Italy Davide.Quaglia@univr.it 2 1 ZigBee

More information

Chapter 7. IEEE ZigBee. Liang Zhao, Andreas Timm-Giel

Chapter 7. IEEE ZigBee. Liang Zhao, Andreas Timm-Giel Chapter 7 IEEE 802.15.4 ZigBee Liang Zhao, Andreas Timm-Giel Outline 7.1 Introduction and Overview of IEEE 802.15.4 / ZigBee 7.2 IEEE 802.15.4: Physical Layer Protocols 7.3 IEEE 802.15.4: MAC Layer Protocols

More information

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Matteo Petracca Scuola Superiore Sant Anna, Pisa Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction

More information

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Wireless communication standards: What makes them unattractive for WSN:

Wireless communication standards: What makes them unattractive for WSN: Wireless communication standards: IEEE 802.11 a/b/g Bluetooth GSM What makes them unattractive for WSN: Power hungry (need big batteries) Complexity (need lots of clock cycles and memory) New protocol

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks Luca De Nardis and Maria-Gabriella Di Benedetto Infocom Department School of Engineering University of Rome

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

Design and Implementation of a Multi-hop Zigbee Network

Design and Implementation of a Multi-hop Zigbee Network Design and Implementation of a Multi-hop Zigbee Network Chi-Wen Deng, Li-chun Ko, Yung-chih Liu, Hua-wei Fang Networks and Multimedia Institute Institute for Information Industry, ROC {cwdeng, lcko, ulysses,

More information

Module 10 Data Link Layer CS655! 10-1!

Module 10 Data Link Layer CS655! 10-1! Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely

More information

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE ) Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

ZigBee and IEEE

ZigBee and IEEE n overview of ZigBee and IEEE 80.5.4 IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions Data-rate RFID 20 cm, 10-200 kbps 100m, 11-100 Mbps

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Medium Access Control

Medium Access Control Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks. Wireless Body Area Networks WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks www.wiserban.eu Wireless Body Area Networks (WBANs) WBAN: Collection of nodes placed on, or inside,

More information

Low-Rate Wireless Personal Area Networks IEEE Fernando Solano Warsaw University of Technology

Low-Rate Wireless Personal Area Networks IEEE Fernando Solano Warsaw University of Technology Low-Rate Wireless Personal Area Networks IEEE 802.15.4 Fernando Solano Warsaw University of Technology fs@tele.pw.edu.pl Wireless Sensor Networks and Hardware A bad example Remote bulb control Reduce Energy

More information

WLAN b/g interference into ZigBee networks

WLAN b/g interference into ZigBee networks WLAN 802.11 b/g interference into ZigBee networks by Guang Yang Yu Yu Master Thesis in Information and Communication Technology Supervisor: Magne Arild Haglund Agder University 2008.05 Abstract Abstract

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 OVERVIEW For accessing computer networks and its services without cables, wireless communications is a fast-growing technology which gives certain advantages over wired network

More information

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS ZIGBEE Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS OUTLINE ZIGBEE AND APPLICATIONS IEEE 802.15.4 PROTOCOL ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER ZIGBEE

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions for Wireless Networks 2 Standard Solutions for WSN 3

More information

IEEE Wireless LANs Part I: Basics

IEEE Wireless LANs Part I: Basics IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Emad Ebeid Ph.D. CS depart University of Verona, Italy

Emad Ebeid Ph.D. CS depart University of Verona, Italy Emad Ebeid Ph.D. student @ CS depart University of Verona, Italy EmadSamuelMalki.Ebeid@univr.it Davide Quaglia Assistant Professor @ CS depart University of Verona, Italy Davide.Quaglia@univr.it 2 1 ZigBee

More information

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio Middle-East Journal of Scientific Research 13 (9): 1137-1143, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.13.9.739 Performance Analysis of Guaranteed Time Slots Allocation

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

CS-541 Wireless Sensor Networks

CS-541 Wireless Sensor Networks CS-541 Wireless Sensor Networks Lecture 5: Network standards for Personal and Body-area networks Prof Panagiotis Tsakalides, Dr Athanasia Panousopoulou, Dr Gregory Tsagkatakis 1 Objectives IEEE Standards

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion ZigBee Topics Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Introduction The Wireless technologies (WiFi,GSM,and Bluetooth) All have one thing

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information