CS601 Wireless Communication and Networks. Wireless LAN Technology-IEEE Standards-HIPER LAN and Bluetooth-Role of Wireless local loops.

Size: px
Start display at page:

Download "CS601 Wireless Communication and Networks. Wireless LAN Technology-IEEE Standards-HIPER LAN and Bluetooth-Role of Wireless local loops."

Transcription

1 UNIT III WIRELESS LANS Wireless LAN Technology-IEEE Standards-HIPER LAN and Bluetooth-Role of Wireless local loops. WIRELESS LAN TECHNOLOGY Advantages of WLAN Flexibility Planning o Ad-hoc networks without previous planning possible Design o (almost) no wiring difficulties (e.g. historic buildings, firewalls) Robustness o more robust against disasters like, e.g., earthquakes, fire - or users pulling a plug Cost Disadvantages of WLAN Quality of service o typically very low bandwidth compared to wired networks (1-10 Mbit/s) Proprietary solutions o many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE ) Restrictions o products have to follow many national restrictions, very long time to establish global like, e.g., IMT-2000 Safety and security Design Goals for WLAN Global operation Low power License-free operation Robust transmission technology Simplified spontaneous cooperation Easy to use Protection of investment Safety and security Transparency for applications Comparison of Infrared vs. Radio transmission Infrared uses IR diodes, diffuse light, multiple reflections (walls, furniture etc.) Advantages simple, cheap, available in many mobile devices no licenses needed simple shielding possible Disadvantages interference by sunlight, heat sources etc. many things shield or absorb IR light low bandwidth Example IrDA (Infrared Data Association) interface available everywhere Radio typically using the license free ISM band at 2.4 GHz Advantages experience from wireless WAN and mobile phones can be used coverage of larger areas possible (radio can penetrate walls, furniture etc.) Disadvantages very limited license free frequency bands shielding more difficult, interference with other electrical devices Example WaveLAN, HIPERLAN, Bluetooth MTech CSE (PT, ) SRM, Ramapuram 1 hcr:innovationcse@gg

2 Infrastructure and ad-hoc networks Example of three infrastructure-based wireless networks , HyperLAN Example of two ad-hoc wireless networks Bluetooth IEEE System architecture Protocol architecture Physical layer Medium access control layer MAC management MTech CSE (PT, ) SRM, Ramapuram 2 hcr:innovationcse@gg

3 System architecture stations (STAi) access points (AP) basic service set (BSSi) distribution system extended service set (ESS) distribution system services Adhoc o Independent BSSs (IBSS) Protocol architecture PHY physical layer convergence protocol (PLCP) physical medium dependent sublayer (PMD) MAC medium access, fragmentation of user data, and encryption MTech CSE (PT, ) SRM, Ramapuram 3 hcr:innovationcse@gg

4 Physical layer one layer based on infra red o Infra red two layers based on radio transmission o Frequency hopping spread spectrum o Direct sequence spread spectrum Frequency hopping spread spectrum Format of an IEEE PHY frame using FHSS Start frame delimiter (SFD), PLCP_PDU length word (PLW), PLCP signalling field (PSF), Header Error Check Direct sequence spread spectrum Format of an IEEE PHY frame using DSSS Infra red based on infra red (IR) transmission, uses near visible light at nm does not require a line-of-sight between sender and receiver, but should also work with diffuse light The maximum range is about 10 m e.g., classrooms, meeting rooms etc Medium access control layer (MAC) Medium access and inter-frame spacing Traffic services o Asynchronous Data Service (mandatory) exchange of data packets based on best-effort support of broadcast and multicast implemented using Distributed Coordination Function (DCF) o Time-Bounded Service (optional) implemented using Point Coordination Function (PCF) Access methods o DFWMAC-DCF CSMA/CA (mandatory) collision avoidance via randomized back-off mechanism minimum distance between consecutive packets MTech CSE (PT, ) SRM, Ramapuram 4 hcr:innovationcse@gg

5 ACK packet for acknowledgements (not for broadcasts) o DFWMAC-DCF w/ RTS/CTS (optional) Distributed Foundation Wireless MAC avoids hidden terminal problem o DFWMAC- PCF (optional) access point polls terminals according to a list The MAC mechanisms are also called distributed foundation wireless medium access control (DFWMAC) Short inter-frame spacing (SIFS), PCF inter-frame spacing (PIFS), DCF inter-frame spacing (DIFS) PIFS < SIFS < DIFS Basic DFWMAC-DCF using CSMA/CA station ready to send starts sensing the medium (CS based on CCA, Clear Channel Assessment) if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time) if another station occupies the medium during this, the back-off timer stops (fairness) Basic DFWMAC DCF with several competing senders Station3 has the first request senses the medium, waits for DIFS and accesses the medium Station1, station2, and station5 have to wait at least until the medium is idle for DIFS again after station3 has stopped sending. Exponential backoff algorithm Each time a collision occurs, the contention window doubles up to a maximum MTech CSE (PT, ) SRM, Ramapuram 5 hcr:innovationcse@gg

6 IEEE unicast data transfer receiver answers directly with an acknowledgement (ACK). The receiver accesses the medium after waiting for a duration of SIFS so no other station can access the medium in the meantime and cause a collision DFWMAC-DCF with RTS/CTS extension request to send (RTS), net allocation vector (NAV), clear to send (CTS), IEEE hidden node provisions for contention-free access IEEE fragmentation of user data DFWMAC-PCF with polling To provide a time-bounded service, the standard specifies a point coordination function (PCF) on top of the standard DCF mechanisms The point co-ordinator in the access point splits the access time into super frame periods A super frame comprises a contentionfree period and a contention period After the medium has been idle until t1, the point coordinator has to wait for PIFS to access the medium The point coordinator now sends data D1 downstream to the first wireless station After waiting for SIFS again, the point coordinator can poll the second station by sending D2. This station may answer upstream to the coordinator with data U2. MTech CSE (PT, ) SRM, Ramapuram 6 hcr:innovationcse@gg

7 Polling continues with the third node. This time the node has nothing to answer and the point coordinator will not receive a packet after SIFS After waiting for PIFS, the coordinator can resume polling the stations. Finally, the point coordinator can issue an end marker (CFend), indicating that the CP may start again MAC frames IEEE MAC packet structure Frame control o Protocol version: 0 o Type: Function of the frame : management (00), control (=01), or data (=10). value 11 is reserved o Subtype: subtypes for management frames are: 0000 for association request, 1000 for beacon. RTS is a control frame with subtype 1011, CTS is coded as User data is transmitted as data frame with subtype 0000 o Wired equivalent privacy (WEP): Duration/ID o period of time in which the medium is occupied (in μs) Address 1 to 4 o standard IEEE 802 MAC addresses (48 bit each) Sequence control o used to filter duplicates Data: max. 2,312 byte MTech CSE (PT, ) SRM, Ramapuram 7 hcr:innovationcse@gg

8 MAC Management Synchronization o Functions to support finding a WLAN, synchronization of internal clocks, generation of beacon signals. Power management o Functions to control transmitter activity for power conservation, o e.g., periodic sleep, buffering, without missing a frame. Roaming o Functions for joining a network (association), changing access points, scanning for access points. Management information base (MIB) o All parameters representing the current state of a wireless station and an access point are stored within a MIB for internal and external access. o A MIB can be accessed via standardized protocols such as the simple network management protocol (SNMP). Synchronization timing synchronization function (TSF) A beacon contains a timestamp and other management information Beacon transmission in a busy infrastructure network AP always tries to schedule transmissions according to the expected beacon interval (target beacon transmission time) Beacon transmission in a busy ad-hoc network each node maintains its own synchronization timer and starts the transmission of a beacon frame after the beacon interval All other stations now adjust their internal clocks according to the received beacon and suppress their beacons for this cycle If collision occurs, the beacon is lost MTech CSE (PT, ) SRM, Ramapuram 8 hcr:innovationcse@gg

9 Power management The basic idea of IEEE power management is to switch off the transceiver whenever it is not needed two states for a station: sleep and awake Power management in IEEE infrastructure networks With every beacon sent by the access point, a traffic indication map (TIM) is transmitted. The TIM contains a list of stations for which unicast data frames are buffered in the access point. the AP maintains a delivery traffic indication map (DTIM) interval for sending broadcast/multicast frames Power management in IEEE ad-hoc networks Destinations are announced using ad-hoc traffic indication map (ATIMs) the announcement period is called the ATIM window Roaming Moving between access points is called roaming The steps for roaming between access points are A station decides that the current link quality to its access point AP1 is too poor. The station then starts scanning for another access point. Scanning involves the active search for another BSS and can also be used for setting up a new BSS in case of ad-hoc networks. MTech CSE (PT, ) SRM, Ramapuram 9 hcr:innovationcse@gg

10 o Passive scanning simply means listening into the medium to find other networks, i.e., receiving the beacon of another network issued by the synchronization function within an access point. o Active scanning comprises sending a probe on each channel and waiting for a response. Beacon and probe responses contain the information necessary to join the new BSS. The station then selects the best access point for roaming based on, e.g., signal strength, and sends an association request to the selected access point AP2. The new access point AP2 answers with an association response. If the response is successful, the station has roamed to the new access point AP2. Otherwise, the station has to continue scanning for new access points. The access point accepting an association request indicates the new station in its BSS to the distribution system (DS). The DS then updates its database, which contains the current location of the wireless stations Additionally, the DS can inform the old access point AP1 that the station is no longer within its BSS. Future developments IEEE a o compatible MAC, but now 5 GHz band o transmission rates up to 20 Mbit/s o close cooperation with BRAN (ETSI Broadband Radio Access Network) IEEE b o higher data rates at 2.4 GHz o proprietary solutions already offer 10 Mbit/s IEEE WPAN (Wireless Personal Area Networks) o market potential o compatibility o low cost/power, small form factor o technical/economic feasibility Bluetooth e (MAC enhancements) f (Inter-Access Point Protocol) g (Data rates above 20 Mbit/s at 2.4 GHz) h (Spectrum managed a) o balance the load in the 5 GHz band i (Enhanced Security mechanisms) o stronger encryption and authentication mechanisms MTech CSE (PT, ) SRM, Ramapuram 10 hcr:innovationcse@gg

11 HIPER LAN HIgh PERformance Local Area Network ETSI standard o European standard, cf. GSM, DECT,... o Enhancement of local Networks and interworking with fixed networks o integration of time-sensitive services from the early beginning HIPERLAN family o one standard cannot satisfy all requirements o range, bandwidth, QoS support o commercial constraints o HIPERLAN 1 standardized since 1996 HIPERLAN protocol family HIPERLAN 1 HIPERLAN 2 HIPERLAN 3 HIPERLAN 4 Application wireless LAN access to ATM fixed networks wireless local loop point-to-point wireless ATM connections Frequency GHz GHz Topology cellular, centralized decentralized adhoc/infrastructure point-tomultipoint point-to-point Antenna omni-directional directional Range 50 m m 5000 m 150 m QoS statistical ATM traffic classes (VBR, CBR, ABR, UBR) Mobility <10m/s stationary Interface conventional LAN ATM networks Data rate 23.5 Mbit/s >20 Mbit/s 155 Mbit/s Power conservation yes not necessary HIPERLAN 1 Characteristics Data transmission o point-to-point, point-to-multipoint, connectionless o 23.5 Mbit/s, 1 W power, 2383 byte max. packet size Services o asynchronous and time-bounded services with hierarchical priorities o compatible with ISO MAC MTech CSE (PT, ) SRM, Ramapuram 11 hcr:innovationcse@gg

12 Topology o infrastructure or ad-hoc networks o transmission range can be larger then coverage of a single node ( forwarding integrated in mobile terminals) Further mechanisms o power saving, encryption, checksums HIPERLAN 1 - Services and protocols CAC service o definition of communication services over a shared medium o specification of access priorities o abstraction of media characteristics MAC protocol o MAC service, compatible with ISO MAC and ISO MAC bridges o uses HIPERLAN CAC CAC protocol o provides a CAC service, uses the PHY layer, specifies hierarchical access mechanisms for one or several channels Physical protocol o send and receive mechanisms, synchronization, FEC, modulation, signal strength HIPERLAN layers, services, and protocols HIPERLAN 1 - Physical layer Scope o modulation, demodulation, bit and frame synchronization o forward error correction mechanisms o measurements of signal strength o channel sensing Channels o 3 mandatory and 2 optional channels (with their carrier frequencies) o mandatory channel 0: GHz channel 1: GHz channel 2: GHz o optional (not allowed in all countries) MTech CSE (PT, ) SRM, Ramapuram 12 hcr:innovationcse@gg

13 channel 3: GHz channel 4: GHz HIPERLAN 1 - Physical layer frames Maintaining a high data-rate (23.5 Mbit/s) is power consuming - problematic for mobile terminals o packet header with low bit-rate comprising receiver information o only receiver(s) address by a packet continue receiving Frame structure o LBR (Low Bit-Rate) header with 1.4 Mbit/s o 450 bit synchronization o minimum 1, maximum 47 frames with 496 bit each o for higher velocities (> 1.4 m/s) the maximum number of frames has to be reduced Modulation o GMSK for high bit-rate, FSK for LBR header HIPERLAN 1 - CAC sublayer Channel Access Control (CAC) o assure that terminal does not access forbidden channels o priority scheme, access with EY-NPMA Priorities o 5 priority levels for QoS support o QoS is mapped onto a priority level with the help of the packet lifetime (set by an application) if packet lifetime = 0 it makes no sense to forward the packet to the receiver any longer standard start value 500ms, maximum 16000ms if a terminal cannot send the packet due to its current priority, waiting time is permanently subtracted from lifetime based on packet lifetime, waiting time in a sender and number of hops to the receiver, the packet is assigned to one out of five priorities the priority of waiting packets, therefore, rises automatically HIPERLAN 1 - EY-NPMA (MAC Layer) EY-NPMA (Elimination Yield Non-preemptive Priority Multiple Access) 3 phases: priority resolution, contention resolution, transmission finding the highest priority o every priority corresponds to a time-slot to send in the first phase o higher priorities can not be preempted o if an earlier time-slot for a higher priority remains empty, stations with the next lower priority might send o after this first phase the highest current priority has been determined Phases of the HIPERLAN 1 EY-NPMA access scheme MTech CSE (PT, ) SRM, Ramapuram 13 hcr:innovationcse@gg

14 EY-NPMA divides the medium access of different competing nodes into three phases: Prioritization: Determine the highest priority of a data packet ready to be sent by competing nodes. Contention: Eliminate all but one of the contenders Transmission: Finally, transmit the packet of the remaining node. Prioritization phase offers five different priorities for data packets ready to be sent objective of the prioritization phase is to make sure that no node with a lower priority gains access to the medium while packets with higher priority are waiting at other nodes priority detection, time is divided into five slots, slot 0 (highest priority) to slot 4 (lowest priority). Each slot has a duration of IPS = 168 high rate bit-periods. If a node has the access priority p, it has to listen into the medium for p slots (priority detection). If the node senses the medium is idle for the whole period of p slots, the node asserts the priority by immediately transmitting a burst for the duration IPA = 168 high rate bit-periods (priority assertion). The burst consists of the following high rate bit sequence, which is repeated as many times as necessary for the duration of the burst: If the node senses activity in the medium, it stops its attempt to send data in this transmission cycle and waits for the next one. The whole prioritization phase ends as soon as one node asserts the access priority with a burst. This means that the prioritization phase is not limited by a fixed length, but depends on the highest priority.. Elimination phase time is divided into slots, using the elimination slot interval I ES = 212 high rate bit periods. The length of an individual elimination burst is 0 to 12 slot intervals long, the probability of bursting within a slot is 0.5. The probability P E (n) of an elimination burst to be n elimination slot intervals long is given by The elimination phase now resolves contention by means of o elimination bursting o elimination survival verification. Each contending node sends an elimination burst with length n as determined via the probabilities and then listens to the channel during the survival verification interval I ESV = 256 high rate bit periods. The burst sent is the same as for the priority assertion. A contending node survives this elimination phase if, and only if, it senses the channel is idle during its survival verification period. One or more nodes will survive this elimination phase, and can then continue with the next phase Yield phase the remaining nodes only listen into the medium without sending any additional bursts Time is divided into yield slots with a duration of I YS = 168 high rate bit-periods. The length of an individual yield listening period can be 0 to 9 slots The probability P Y (n) for a yield listening period to be n slots long is 0.1 for all n, 0 n 9. Each node now listens for its yield listening period. If it senses the channel is idle during the whole period, it has survived the yield listening. Otherwise, it withdraws for the rest of the current transmission cycle. at this point there can still be more than one surviving node so a collision is still possible Transmission phase A node that has survived the prioritization and contention phase can now send its data, called a Low Bit- Rate High Bit-Rate HIPERLAN 1 CAC Protocol Data Unit (LBR-HBR HCPDU). In case of a unicast transmission, the sender expects to receive an immediate acknowledgement from the destination, called an acknowledgement HCPDU (AK-HCPDU), which is an LBR HCPDU containing only an LBR part MTech CSE (PT, ) SRM, Ramapuram 14 hcr:innovationcse@gg

15 BLUETOOTH Topics Introduction User scenarios Architecture Radio layer Baseband layer Link manager protocol L2CAP Security SDP Profiles IEEE Introduction ad-hoc piconets o local area networks with a very limited coverage and without the need for an infrastructure o different type of network is needed to connect different small devices in close proximity (about 10 m) without expensive wiring or the need for a wireless infrastructure gross data rate is 1 Mbit/s Bluetooth consortium o Founded by Ericsson, Intel, IBM, Nokia, Toshiba o goal of developing a single-chip, low-cost, radio-based wireless network technology Wireless Personal Area Networks (WPAN) Criteria o Market potential o Compatibility o Distinct identity o Technical feasibility o Economic feasibility User scenarios Connection of peripheral devices o keyboard, mouse, joystick, headset, speakers o no wires are needed for data transmission Support of ad-hoc networking o students might join a lecture, with the teacher distributing data to their PDAs Bridging of networks Example configurations with a Bluetooth-based piconet MTech CSE (PT, ) SRM, Ramapuram 15 hcr:innovationcse@gg

16 Architecture Networking Piconet a collection of Bluetooth devices which are synchronized to the same hopping sequence One device can act as master (M), all other devices connected to the master must act as slaves (S). parked devices (P) o can not actively participate in the piconet (i.e., they do not have a connection), but are known and can be reactivated within some milliseconds Devices in stand-by (SB) do not participate in the piconet. Each piconet has exactly one master and up to seven simultaneous slaves. More than 200 devices can be parked. The reason for the upper limit of eight active devices, is the 3-bit address used in Bluetooth. Formation of a piconet. As all active devices have to use the same hopping sequence they must be synchronized. The first step involves a master sending its clock and device ID. The hopping pattern is determined by the device ID, a 48-bit worldwide unique identifier All active devices are assigned a 3-bit active member address (AMA). All parked devices use an 8-bit parked member address (PMA) Bluetooth scatternet As more users join the piconet, the throughput per user drops quickly groups of piconets is called a scatternet Bluetooth applies FH-CDMA for separation of piconets. all piconets can share the total of 80 MHz bandwidth available Communication between different piconets takes place by devices jumping back and forth between nets MTech CSE (PT, ) SRM, Ramapuram 16 hcr:innovationcse@gg

17 Protocol Stack Can be divided into the following two A Core Specification (Bluetooth, 2001a) o describes the protocols from physical layer to the data link control together with management functions o The core protocols of Bluetooth comprise the following elements: o Radio Specification of the air interface, i.e., frequencies, modulation, and transmit power o Baseband Description of basic connection establishment, packet formats, timing, and basic QoS parameters o Link manager protocol Link set-up and managmnt between devices including security functions and parameter negotiation o Logical link control and adaptation protocol (L2CAP) Adaptation of higher layers to the baseband (connectionless and connection-oriented services o Service discovery protocol Device discovery in close proximity plus querying of service characteristics Profile Specifications (Bluetooth, 2001b) o describes many protocols and functions needed to adapt the wireless Bluetooth technology to legacy and new applications Cable Replacement Protocol RFCOMM emulates a serial line interface following the EIA (RS) -232 allows replacement of serial line cables enables many legacy applications and protocols to run over Bluetooth. supports multiple serial ports over a single physical channel Telephony Control protocol Specification Binary (TCS BIN) describes a bit-oriented protocol that defines call control signaling for the establishment of voice and data calls between Bluetooth devices. It also describes mobility and group management functions. Adopted protocols MTech CSE (PT, ) SRM, Ramapuram 17 hcr:innovationcse@gg

18 Classical Internet applications can still use the standard TCP/IP stack running over PPP or use the more efficient Bluetooth network encapsulation protocol (BNEP). Telephony applications can use the AT modem commands as if they were using a standard modem. Calendar and business card objects (vcalendar/vcard) can be exchanged using the object exchange protocol (OBEX) as common with IrDA interfaces. Audio applications may directly use the baseband layer after encoding the audio signals o A real difference to other protocol stacks Radio Layer Design limitations Bluetooth devices will be integrated into typical mobile devices and rely on battery power. o requires small, low power chips which can be built into handheld devices. Worldwide operation also requires a frequency which is available worldwide. has to support multi-media data for data and voice transmission Design uses the license-free frequency band at 2.4 GHz frequency-hopping/time-division duplex scheme is used for transmission fast hopping rate of 1,600 hops per second. The time between two hops is called a slot, which is an interval of 625 μs. Each slot uses a different frequency. uses 79 hop carriers equally spaced with 1 MHz. transceivers use Gaussian FSK for modulation Available in three classes: o Power class 1 Maximum power is 100 mw and minimum is 1 mw typ. 100 m range without obstacles Power control is mandatory. o Power class 2 Maximum power is 2.5 mw, nominal power is 1 mw, and minimum power is 0.25 mw typ. 10 m range without obstacles Power control is optional. o Power class 3 Maximum power is 1 mw. Baseband Layer performs frequency hopping for interference mitigation and medium access also defines physical links and many packet formats Uses time division duplex (TDD) Frequency selection during data transmission (1, 3, 5 slot packets) 1-slot packets as the data transmission uses one 625 μs slot. Bluetooth also defines 3-slot and 5-slot packets for higher data rates (multi-slot packets). No frequency hopping is performed within packets. Baseband packet format Access code needed for timing synchronization and piconet identification (channel access code, CAC). MTech CSE (PT, ) SRM, Ramapuram 18 hcr:innovationcse@gg

19 may represent special codes during paging (device access code, DAC), inquiry (inquiry access code, IAC) consists of a 4 bit preamble, a synchronization field, and a trailer (if a packet header follows). The 64-bit synchronization field is derived from the lower 24 bit of an address (lower address part, LAP). Packet header The 4-bit type field determines the type of the packet. o Packets may carry control, synchronous, or asynchronous data. A simple flow control mechanism for asynchronous traffic uses the 1-bit flow field. o If a packet is received with flow=0 asynchronous data, transmission must stop. o As soon as a packet with flow=1 is received, transmission may resume. Active Member Address, acknowledgement number ARQN, sequence number SEQN Payload Up to 343 bytes payload can be transferred. structure depends on the type of link Physical links Synchronous Connection-Oriented (SCO) link Asynchronous connectionless link (ACL) Synchronous Connection-Oriented (SCO) link o the master reserves two consecutive slots (forward and return slots) at fixed intervals. o A master can support up to three simultaneous SCO links to the same slave or to different slaves. o A slave supports up to two links from different masters or up to three links from the same master Asynchronous Connectionless Link (ACL) master uses a polling scheme. A slave may only answer if it has been addressed in the preceding slot Example data Transmission The master always uses the even frequency slots, the odd slots are for the slaves Error recovery MTech CSE (PT, ) SRM, Ramapuram 19 hcr:innovationcse@gg

20 Link Manager Protocol Groups of functions Authentication, pairing, and encryption o control the exchange of random numbers and signed responses Synchronization o Precise synchronization is of major importance within a Bluetooth network. o The clock offset is updated each time a packet is received from the maste Capability negotiation o devices have to agree the usage of, e.g., multi-slot packets, encryption, SCO links, voice encoding, park/sniff/hold mode (explained below), HV2/HV3 packets etc. Quality of service negotiation Power control o Depending on received signal level the device can direct the sender of the measured signal to increase or decrease its transmit power. Link supervision o set up new SCO links, or it may declare the failure of a link. State and transmission mode change o Devices might switch the master/slave role, o detach themselves from a connection, o or change the operating mode Major baseband states of a Bluetooth device Standby o currently not participating in a piconet (and not switched off) inquiry o device wants to establish a piconet or a device just wants to listen to see if something is going on Page o set up connections to each device o continue to page more devices that will be added to the piconet active state o the slave participates in the piconet by listening, transmitting, and receiving. o ACL and SCO links can be used o Either transmit data or are simply connected o A device can enter standby again, via a detach procedure To save battery power, a Bluetooth device can go into one of three low power states: o Sniff state highest power consumption device keeps its AMA. o Hold state The device does not release its AMA but stops ACL transmission o Park state lowest duty cycle and the lowest power consumption device releases its AMA and receives a parked member address (PMA) MTech CSE (PT, ) SRM, Ramapuram 20 hcr:innovationcse@gg

21 Logical Link Control and Adaptation Protocol L2CAP data link control protocol on top of the baseband layer offering logical channels between Bluetooth devices with QoS properties available for ACLs only provides three different types of logical channels Connectionless o unidirectional channels are typically used for broadcasts from a master to its slave(s). Connection-oriented o bi-directional and QoS o define average/peak data rate, maximum burst size, latency, and jitter. Signaling o exchanging signaling messages between L2CAP entities. L2CAP packet formats The length field indicates the length of the payload (plus PSM for connectionless PDUs). The CID has the multiplexing/demultiplexing function Protocol/Service multiplexor (PSM) field is needed to identify the higher layer recipient for the payload. Several PSM values have been defined, e.g., 1 (SDP), 3 (RFCOMM), 5 (TCS-BIN). The payload of the signaling PDU contains one or more commands. Each command has its own o code (e.g.,for command reject, connection request, disconnection response etc.) o ID that matches a request with its reply o The length field indicates the length of the data field for this command. Security steps in the security architecture pairing o necessary if two Bluetooth devices have never met before. o To set up trust between the two devices a user can enter a secret PIN into both devices. Authentication MTech CSE (PT, ) SRM, Ramapuram 21 hcr:innovationcse@gg

22 o Link key : Based on the PIN, the device address, and random numbers Encryption o Based on the link key, values generated during the authentication, and again a random number an encryption key is generated Ciphering o simple XOR of the user data and the payload key Bluetooth security components and protocols Service Discovery Protocol (SDP) To find new services Devices that want to offer a service have to install an SDP server. For all other devices an SDP client is sufficient Service record., service attribute o attribute ID o attribute value. The attribute value can be an integer, a UUID (universally unique identifier), a string, a Boolean, a URL (uniform resource locator) etc The protocol descriptor list comprises the protocols needed to access this service. Profiles default solutions for a certain usage model. to form a basis for interoperability basic profiles o generic access, service discovery, cordless telephony, intercom, serial port, headset, dialup networking, fax, LAN access, generic object exchange, object push, file transfer, and synchronization. Additional profiles o advanced audio distribution, PAN, audio video remote control, basic printing, basic imaging, extended service discovery, generic audio video distribution, hands-free, and hardcopy cable replacement Each profile selects a set of protocols. o example, the serial port profile needs RFCOMM, SDP, LMP, L2CAP MTech CSE (PT, ) SRM, Ramapuram 22 hcr:innovationcse@gg

23 IEEE IEEE working group for Wireless Personal Area Networks (WPAN) IEEE o standardizes the lower layers of Bluetooth together with the Bluetooth consortium o focus only on the physical and data link layer IEEE : o focus on the coexistence of wireless personal area networks (WPAN) and wireless local area networks o proposes adaptive frequency hopping IEEE o standard providing data rates of 20 Mbit/s or greater while still working with low-power at low-cost. IEEE o standardizes low-rate wireless personal area networks (LR-WPAN) o extremely low power consumption enabling multi-year battery life o applications include industrial control and monitoring, smart badges, interconnection of environmental sensors, interconnection of peripherals o data rates between 20 and 250 kbit/s as maximum and latencies down to 15 ms o superframe mode. o a PAN coordinator transmits beacons in predetermined intervals (15 ms 245 s) o three levels of security: no security, access control lists symmetric encryption using AES-128 WIRELESS LOCAL LOOPS (WLL) WLL connects subscribers to local telephone station wirelessly WLL based on Cellular, Satellite, Microcellular Other names RITL (Radio In The Loop) FRA (Fixed Radio Access) WLL Service Desirable Business Related o Call Transfer o Conference Calling COIN Phones v.29 (9600 bps) ISDN (64 kbps) Example Services provided by WLL Marconi WIPLL (Wireless IP Local Loop) Lucent WSS (Wireless Subscriber system) Goodwin WLL MTech CSE (PT, ) SRM, Ramapuram 23 hcr:innovationcse@gg

24 Role Of WLL Advantages Cost Less expensive than wired systems the cost of installing KMs of cable is avoided Cost of maintaining the wired infrastructure Installation time Can be installed rapidly challenges getting the permission to use given frequency and finding suitable elevated site Selective installation Radio units are installed only for those who want the service Wired systems requires cable to be laid out in anticipation of subscribers Alternatives to Wired scheme using existing installed cable lack of telephone line to large population lack of quality lines for high-speed applications long distance from central office for xdsl May not have cable TV or cable provided for two way data services Makes WLL as a strong alternative Mobile Cellular technology Cellular systems are too expensive do not provide sufficient facilities less functionaly than broadband WLL As the WLL subscriber unit is fixed, it can use directional antenna pointed at base station antenna, providing improved signal quality in both directions Comments & Feedback Thanks to my family members who supported me while I spent hours and hours to prepare this. Your feedback is welcome at GHCRajan@gmail.com MTech CSE (PT, ) SRM, Ramapuram 24 hcr:innovationcse@gg

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department ACOE 422 Wireless Computer Networks WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department Resources: Mobile Communications, J. Schiller book slides

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards Wireless LANs Characteristics 802.11 PHY MAC Roaming Standards Bluetooth 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller, FU-Berlin www.jochenschiller.de

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Characteristics of Wireless LANs

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs EEC173B/ECS152C, Winter 2006 Wireless LANs Evolution of Technology & Standards IEEE 802.11 Design Choices Architecture & Protocols PHY layer MAC layer design Acknowledgment: Selected slides from Prof.

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Chapter 4 WIRELESS LAN

Chapter 4 WIRELESS LAN Chapter 4 WIRELESS LAN Distributed Computing Group Mobile Computing Summer 2002 Overview Design goals Characteristics IEEE 802.11 Architecture Protocol PHY MAC Roaming Security a, b, d, etc. Short intermezzo

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Enabling Technologies

Enabling Technologies Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair

More information

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Wireless Local Area Network. Internet Protocol Suite

Wireless Local Area Network. Internet Protocol Suite Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Structure of the Lecture

Structure of the Lecture Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Personal Area Networks

Wireless Personal Area Networks CE 477 Wireless and obile Networks Wireless ersonal Area Networks Bluetooth CE 477 User cenarios Architecture rotocol tack IEEE 802.15.1 and IEEE 802.15.2 IEEE 802.15.4 (Low-Rate Wireless ersonal Area

More information

Internet Protocol Stack

Internet Protocol Stack Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing

More information

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter,   7.1 Bluetooth Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech Dr.-Ing. H. Ritter, http://www.hartmut-ritter.de/ 7.1 I. Bluetooth Idea Universal radio interface for ad-hoc wireless connectivity Interconnecting

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09 Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless LAN Overview History IEEE 802.11-1997 MAC implementations PHY implementations

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity 1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information