CS601 Wireless Communication and Networks. Wireless LAN Technology-IEEE Standards-HIPER LAN and Bluetooth-Role of Wireless local loops.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CS601 Wireless Communication and Networks. Wireless LAN Technology-IEEE Standards-HIPER LAN and Bluetooth-Role of Wireless local loops."

Transcription

1 UNIT III WIRELESS LANS Wireless LAN Technology-IEEE Standards-HIPER LAN and Bluetooth-Role of Wireless local loops. WIRELESS LAN TECHNOLOGY Advantages of WLAN Flexibility Planning o Ad-hoc networks without previous planning possible Design o (almost) no wiring difficulties (e.g. historic buildings, firewalls) Robustness o more robust against disasters like, e.g., earthquakes, fire - or users pulling a plug Cost Disadvantages of WLAN Quality of service o typically very low bandwidth compared to wired networks (1-10 Mbit/s) Proprietary solutions o many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE ) Restrictions o products have to follow many national restrictions, very long time to establish global like, e.g., IMT-2000 Safety and security Design Goals for WLAN Global operation Low power License-free operation Robust transmission technology Simplified spontaneous cooperation Easy to use Protection of investment Safety and security Transparency for applications Comparison of Infrared vs. Radio transmission Infrared uses IR diodes, diffuse light, multiple reflections (walls, furniture etc.) Advantages simple, cheap, available in many mobile devices no licenses needed simple shielding possible Disadvantages interference by sunlight, heat sources etc. many things shield or absorb IR light low bandwidth Example IrDA (Infrared Data Association) interface available everywhere Radio typically using the license free ISM band at 2.4 GHz Advantages experience from wireless WAN and mobile phones can be used coverage of larger areas possible (radio can penetrate walls, furniture etc.) Disadvantages very limited license free frequency bands shielding more difficult, interference with other electrical devices Example WaveLAN, HIPERLAN, Bluetooth MTech CSE (PT, ) SRM, Ramapuram 1

2 Infrastructure and ad-hoc networks Example of three infrastructure-based wireless networks , HyperLAN Example of two ad-hoc wireless networks Bluetooth IEEE System architecture Protocol architecture Physical layer Medium access control layer MAC management MTech CSE (PT, ) SRM, Ramapuram 2

3 System architecture stations (STAi) access points (AP) basic service set (BSSi) distribution system extended service set (ESS) distribution system services Adhoc o Independent BSSs (IBSS) Protocol architecture PHY physical layer convergence protocol (PLCP) physical medium dependent sublayer (PMD) MAC medium access, fragmentation of user data, and encryption MTech CSE (PT, ) SRM, Ramapuram 3

4 Physical layer one layer based on infra red o Infra red two layers based on radio transmission o Frequency hopping spread spectrum o Direct sequence spread spectrum Frequency hopping spread spectrum Format of an IEEE PHY frame using FHSS Start frame delimiter (SFD), PLCP_PDU length word (PLW), PLCP signalling field (PSF), Header Error Check Direct sequence spread spectrum Format of an IEEE PHY frame using DSSS Infra red based on infra red (IR) transmission, uses near visible light at nm does not require a line-of-sight between sender and receiver, but should also work with diffuse light The maximum range is about 10 m e.g., classrooms, meeting rooms etc Medium access control layer (MAC) Medium access and inter-frame spacing Traffic services o Asynchronous Data Service (mandatory) exchange of data packets based on best-effort support of broadcast and multicast implemented using Distributed Coordination Function (DCF) o Time-Bounded Service (optional) implemented using Point Coordination Function (PCF) Access methods o DFWMAC-DCF CSMA/CA (mandatory) collision avoidance via randomized back-off mechanism minimum distance between consecutive packets MTech CSE (PT, ) SRM, Ramapuram 4

5 ACK packet for acknowledgements (not for broadcasts) o DFWMAC-DCF w/ RTS/CTS (optional) Distributed Foundation Wireless MAC avoids hidden terminal problem o DFWMAC- PCF (optional) access point polls terminals according to a list The MAC mechanisms are also called distributed foundation wireless medium access control (DFWMAC) Short inter-frame spacing (SIFS), PCF inter-frame spacing (PIFS), DCF inter-frame spacing (DIFS) PIFS < SIFS < DIFS Basic DFWMAC-DCF using CSMA/CA station ready to send starts sensing the medium (CS based on CCA, Clear Channel Assessment) if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time) if another station occupies the medium during this, the back-off timer stops (fairness) Basic DFWMAC DCF with several competing senders Station3 has the first request senses the medium, waits for DIFS and accesses the medium Station1, station2, and station5 have to wait at least until the medium is idle for DIFS again after station3 has stopped sending. Exponential backoff algorithm Each time a collision occurs, the contention window doubles up to a maximum MTech CSE (PT, ) SRM, Ramapuram 5

6 IEEE unicast data transfer receiver answers directly with an acknowledgement (ACK). The receiver accesses the medium after waiting for a duration of SIFS so no other station can access the medium in the meantime and cause a collision DFWMAC-DCF with RTS/CTS extension request to send (RTS), net allocation vector (NAV), clear to send (CTS), IEEE hidden node provisions for contention-free access IEEE fragmentation of user data DFWMAC-PCF with polling To provide a time-bounded service, the standard specifies a point coordination function (PCF) on top of the standard DCF mechanisms The point co-ordinator in the access point splits the access time into super frame periods A super frame comprises a contentionfree period and a contention period After the medium has been idle until t1, the point coordinator has to wait for PIFS to access the medium The point coordinator now sends data D1 downstream to the first wireless station After waiting for SIFS again, the point coordinator can poll the second station by sending D2. This station may answer upstream to the coordinator with data U2. MTech CSE (PT, ) SRM, Ramapuram 6

7 Polling continues with the third node. This time the node has nothing to answer and the point coordinator will not receive a packet after SIFS After waiting for PIFS, the coordinator can resume polling the stations. Finally, the point coordinator can issue an end marker (CFend), indicating that the CP may start again MAC frames IEEE MAC packet structure Frame control o Protocol version: 0 o Type: Function of the frame : management (00), control (=01), or data (=10). value 11 is reserved o Subtype: subtypes for management frames are: 0000 for association request, 1000 for beacon. RTS is a control frame with subtype 1011, CTS is coded as User data is transmitted as data frame with subtype 0000 o Wired equivalent privacy (WEP): Duration/ID o period of time in which the medium is occupied (in μs) Address 1 to 4 o standard IEEE 802 MAC addresses (48 bit each) Sequence control o used to filter duplicates Data: max. 2,312 byte MTech CSE (PT, ) SRM, Ramapuram 7

8 MAC Management Synchronization o Functions to support finding a WLAN, synchronization of internal clocks, generation of beacon signals. Power management o Functions to control transmitter activity for power conservation, o e.g., periodic sleep, buffering, without missing a frame. Roaming o Functions for joining a network (association), changing access points, scanning for access points. Management information base (MIB) o All parameters representing the current state of a wireless station and an access point are stored within a MIB for internal and external access. o A MIB can be accessed via standardized protocols such as the simple network management protocol (SNMP). Synchronization timing synchronization function (TSF) A beacon contains a timestamp and other management information Beacon transmission in a busy infrastructure network AP always tries to schedule transmissions according to the expected beacon interval (target beacon transmission time) Beacon transmission in a busy ad-hoc network each node maintains its own synchronization timer and starts the transmission of a beacon frame after the beacon interval All other stations now adjust their internal clocks according to the received beacon and suppress their beacons for this cycle If collision occurs, the beacon is lost MTech CSE (PT, ) SRM, Ramapuram 8

9 Power management The basic idea of IEEE power management is to switch off the transceiver whenever it is not needed two states for a station: sleep and awake Power management in IEEE infrastructure networks With every beacon sent by the access point, a traffic indication map (TIM) is transmitted. The TIM contains a list of stations for which unicast data frames are buffered in the access point. the AP maintains a delivery traffic indication map (DTIM) interval for sending broadcast/multicast frames Power management in IEEE ad-hoc networks Destinations are announced using ad-hoc traffic indication map (ATIMs) the announcement period is called the ATIM window Roaming Moving between access points is called roaming The steps for roaming between access points are A station decides that the current link quality to its access point AP1 is too poor. The station then starts scanning for another access point. Scanning involves the active search for another BSS and can also be used for setting up a new BSS in case of ad-hoc networks. MTech CSE (PT, ) SRM, Ramapuram 9

10 o Passive scanning simply means listening into the medium to find other networks, i.e., receiving the beacon of another network issued by the synchronization function within an access point. o Active scanning comprises sending a probe on each channel and waiting for a response. Beacon and probe responses contain the information necessary to join the new BSS. The station then selects the best access point for roaming based on, e.g., signal strength, and sends an association request to the selected access point AP2. The new access point AP2 answers with an association response. If the response is successful, the station has roamed to the new access point AP2. Otherwise, the station has to continue scanning for new access points. The access point accepting an association request indicates the new station in its BSS to the distribution system (DS). The DS then updates its database, which contains the current location of the wireless stations Additionally, the DS can inform the old access point AP1 that the station is no longer within its BSS. Future developments IEEE a o compatible MAC, but now 5 GHz band o transmission rates up to 20 Mbit/s o close cooperation with BRAN (ETSI Broadband Radio Access Network) IEEE b o higher data rates at 2.4 GHz o proprietary solutions already offer 10 Mbit/s IEEE WPAN (Wireless Personal Area Networks) o market potential o compatibility o low cost/power, small form factor o technical/economic feasibility Bluetooth e (MAC enhancements) f (Inter-Access Point Protocol) g (Data rates above 20 Mbit/s at 2.4 GHz) h (Spectrum managed a) o balance the load in the 5 GHz band i (Enhanced Security mechanisms) o stronger encryption and authentication mechanisms MTech CSE (PT, ) SRM, Ramapuram 10

11 HIPER LAN HIgh PERformance Local Area Network ETSI standard o European standard, cf. GSM, DECT,... o Enhancement of local Networks and interworking with fixed networks o integration of time-sensitive services from the early beginning HIPERLAN family o one standard cannot satisfy all requirements o range, bandwidth, QoS support o commercial constraints o HIPERLAN 1 standardized since 1996 HIPERLAN protocol family HIPERLAN 1 HIPERLAN 2 HIPERLAN 3 HIPERLAN 4 Application wireless LAN access to ATM fixed networks wireless local loop point-to-point wireless ATM connections Frequency GHz GHz Topology cellular, centralized decentralized adhoc/infrastructure point-tomultipoint point-to-point Antenna omni-directional directional Range 50 m m 5000 m 150 m QoS statistical ATM traffic classes (VBR, CBR, ABR, UBR) Mobility <10m/s stationary Interface conventional LAN ATM networks Data rate 23.5 Mbit/s >20 Mbit/s 155 Mbit/s Power conservation yes not necessary HIPERLAN 1 Characteristics Data transmission o point-to-point, point-to-multipoint, connectionless o 23.5 Mbit/s, 1 W power, 2383 byte max. packet size Services o asynchronous and time-bounded services with hierarchical priorities o compatible with ISO MAC MTech CSE (PT, ) SRM, Ramapuram 11

12 Topology o infrastructure or ad-hoc networks o transmission range can be larger then coverage of a single node ( forwarding integrated in mobile terminals) Further mechanisms o power saving, encryption, checksums HIPERLAN 1 - Services and protocols CAC service o definition of communication services over a shared medium o specification of access priorities o abstraction of media characteristics MAC protocol o MAC service, compatible with ISO MAC and ISO MAC bridges o uses HIPERLAN CAC CAC protocol o provides a CAC service, uses the PHY layer, specifies hierarchical access mechanisms for one or several channels Physical protocol o send and receive mechanisms, synchronization, FEC, modulation, signal strength HIPERLAN layers, services, and protocols HIPERLAN 1 - Physical layer Scope o modulation, demodulation, bit and frame synchronization o forward error correction mechanisms o measurements of signal strength o channel sensing Channels o 3 mandatory and 2 optional channels (with their carrier frequencies) o mandatory channel 0: GHz channel 1: GHz channel 2: GHz o optional (not allowed in all countries) MTech CSE (PT, ) SRM, Ramapuram 12

13 channel 3: GHz channel 4: GHz HIPERLAN 1 - Physical layer frames Maintaining a high data-rate (23.5 Mbit/s) is power consuming - problematic for mobile terminals o packet header with low bit-rate comprising receiver information o only receiver(s) address by a packet continue receiving Frame structure o LBR (Low Bit-Rate) header with 1.4 Mbit/s o 450 bit synchronization o minimum 1, maximum 47 frames with 496 bit each o for higher velocities (> 1.4 m/s) the maximum number of frames has to be reduced Modulation o GMSK for high bit-rate, FSK for LBR header HIPERLAN 1 - CAC sublayer Channel Access Control (CAC) o assure that terminal does not access forbidden channels o priority scheme, access with EY-NPMA Priorities o 5 priority levels for QoS support o QoS is mapped onto a priority level with the help of the packet lifetime (set by an application) if packet lifetime = 0 it makes no sense to forward the packet to the receiver any longer standard start value 500ms, maximum 16000ms if a terminal cannot send the packet due to its current priority, waiting time is permanently subtracted from lifetime based on packet lifetime, waiting time in a sender and number of hops to the receiver, the packet is assigned to one out of five priorities the priority of waiting packets, therefore, rises automatically HIPERLAN 1 - EY-NPMA (MAC Layer) EY-NPMA (Elimination Yield Non-preemptive Priority Multiple Access) 3 phases: priority resolution, contention resolution, transmission finding the highest priority o every priority corresponds to a time-slot to send in the first phase o higher priorities can not be preempted o if an earlier time-slot for a higher priority remains empty, stations with the next lower priority might send o after this first phase the highest current priority has been determined Phases of the HIPERLAN 1 EY-NPMA access scheme MTech CSE (PT, ) SRM, Ramapuram 13

14 EY-NPMA divides the medium access of different competing nodes into three phases: Prioritization: Determine the highest priority of a data packet ready to be sent by competing nodes. Contention: Eliminate all but one of the contenders Transmission: Finally, transmit the packet of the remaining node. Prioritization phase offers five different priorities for data packets ready to be sent objective of the prioritization phase is to make sure that no node with a lower priority gains access to the medium while packets with higher priority are waiting at other nodes priority detection, time is divided into five slots, slot 0 (highest priority) to slot 4 (lowest priority). Each slot has a duration of IPS = 168 high rate bit-periods. If a node has the access priority p, it has to listen into the medium for p slots (priority detection). If the node senses the medium is idle for the whole period of p slots, the node asserts the priority by immediately transmitting a burst for the duration IPA = 168 high rate bit-periods (priority assertion). The burst consists of the following high rate bit sequence, which is repeated as many times as necessary for the duration of the burst: If the node senses activity in the medium, it stops its attempt to send data in this transmission cycle and waits for the next one. The whole prioritization phase ends as soon as one node asserts the access priority with a burst. This means that the prioritization phase is not limited by a fixed length, but depends on the highest priority.. Elimination phase time is divided into slots, using the elimination slot interval I ES = 212 high rate bit periods. The length of an individual elimination burst is 0 to 12 slot intervals long, the probability of bursting within a slot is 0.5. The probability P E (n) of an elimination burst to be n elimination slot intervals long is given by The elimination phase now resolves contention by means of o elimination bursting o elimination survival verification. Each contending node sends an elimination burst with length n as determined via the probabilities and then listens to the channel during the survival verification interval I ESV = 256 high rate bit periods. The burst sent is the same as for the priority assertion. A contending node survives this elimination phase if, and only if, it senses the channel is idle during its survival verification period. One or more nodes will survive this elimination phase, and can then continue with the next phase Yield phase the remaining nodes only listen into the medium without sending any additional bursts Time is divided into yield slots with a duration of I YS = 168 high rate bit-periods. The length of an individual yield listening period can be 0 to 9 slots The probability P Y (n) for a yield listening period to be n slots long is 0.1 for all n, 0 n 9. Each node now listens for its yield listening period. If it senses the channel is idle during the whole period, it has survived the yield listening. Otherwise, it withdraws for the rest of the current transmission cycle. at this point there can still be more than one surviving node so a collision is still possible Transmission phase A node that has survived the prioritization and contention phase can now send its data, called a Low Bit- Rate High Bit-Rate HIPERLAN 1 CAC Protocol Data Unit (LBR-HBR HCPDU). In case of a unicast transmission, the sender expects to receive an immediate acknowledgement from the destination, called an acknowledgement HCPDU (AK-HCPDU), which is an LBR HCPDU containing only an LBR part MTech CSE (PT, ) SRM, Ramapuram 14

15 BLUETOOTH Topics Introduction User scenarios Architecture Radio layer Baseband layer Link manager protocol L2CAP Security SDP Profiles IEEE Introduction ad-hoc piconets o local area networks with a very limited coverage and without the need for an infrastructure o different type of network is needed to connect different small devices in close proximity (about 10 m) without expensive wiring or the need for a wireless infrastructure gross data rate is 1 Mbit/s Bluetooth consortium o Founded by Ericsson, Intel, IBM, Nokia, Toshiba o goal of developing a single-chip, low-cost, radio-based wireless network technology Wireless Personal Area Networks (WPAN) Criteria o Market potential o Compatibility o Distinct identity o Technical feasibility o Economic feasibility User scenarios Connection of peripheral devices o keyboard, mouse, joystick, headset, speakers o no wires are needed for data transmission Support of ad-hoc networking o students might join a lecture, with the teacher distributing data to their PDAs Bridging of networks Example configurations with a Bluetooth-based piconet MTech CSE (PT, ) SRM, Ramapuram 15

16 Architecture Networking Piconet a collection of Bluetooth devices which are synchronized to the same hopping sequence One device can act as master (M), all other devices connected to the master must act as slaves (S). parked devices (P) o can not actively participate in the piconet (i.e., they do not have a connection), but are known and can be reactivated within some milliseconds Devices in stand-by (SB) do not participate in the piconet. Each piconet has exactly one master and up to seven simultaneous slaves. More than 200 devices can be parked. The reason for the upper limit of eight active devices, is the 3-bit address used in Bluetooth. Formation of a piconet. As all active devices have to use the same hopping sequence they must be synchronized. The first step involves a master sending its clock and device ID. The hopping pattern is determined by the device ID, a 48-bit worldwide unique identifier All active devices are assigned a 3-bit active member address (AMA). All parked devices use an 8-bit parked member address (PMA) Bluetooth scatternet As more users join the piconet, the throughput per user drops quickly groups of piconets is called a scatternet Bluetooth applies FH-CDMA for separation of piconets. all piconets can share the total of 80 MHz bandwidth available Communication between different piconets takes place by devices jumping back and forth between nets MTech CSE (PT, ) SRM, Ramapuram 16

17 Protocol Stack Can be divided into the following two A Core Specification (Bluetooth, 2001a) o describes the protocols from physical layer to the data link control together with management functions o The core protocols of Bluetooth comprise the following elements: o Radio Specification of the air interface, i.e., frequencies, modulation, and transmit power o Baseband Description of basic connection establishment, packet formats, timing, and basic QoS parameters o Link manager protocol Link set-up and managmnt between devices including security functions and parameter negotiation o Logical link control and adaptation protocol (L2CAP) Adaptation of higher layers to the baseband (connectionless and connection-oriented services o Service discovery protocol Device discovery in close proximity plus querying of service characteristics Profile Specifications (Bluetooth, 2001b) o describes many protocols and functions needed to adapt the wireless Bluetooth technology to legacy and new applications Cable Replacement Protocol RFCOMM emulates a serial line interface following the EIA (RS) -232 allows replacement of serial line cables enables many legacy applications and protocols to run over Bluetooth. supports multiple serial ports over a single physical channel Telephony Control protocol Specification Binary (TCS BIN) describes a bit-oriented protocol that defines call control signaling for the establishment of voice and data calls between Bluetooth devices. It also describes mobility and group management functions. Adopted protocols MTech CSE (PT, ) SRM, Ramapuram 17

18 Classical Internet applications can still use the standard TCP/IP stack running over PPP or use the more efficient Bluetooth network encapsulation protocol (BNEP). Telephony applications can use the AT modem commands as if they were using a standard modem. Calendar and business card objects (vcalendar/vcard) can be exchanged using the object exchange protocol (OBEX) as common with IrDA interfaces. Audio applications may directly use the baseband layer after encoding the audio signals o A real difference to other protocol stacks Radio Layer Design limitations Bluetooth devices will be integrated into typical mobile devices and rely on battery power. o requires small, low power chips which can be built into handheld devices. Worldwide operation also requires a frequency which is available worldwide. has to support multi-media data for data and voice transmission Design uses the license-free frequency band at 2.4 GHz frequency-hopping/time-division duplex scheme is used for transmission fast hopping rate of 1,600 hops per second. The time between two hops is called a slot, which is an interval of 625 μs. Each slot uses a different frequency. uses 79 hop carriers equally spaced with 1 MHz. transceivers use Gaussian FSK for modulation Available in three classes: o Power class 1 Maximum power is 100 mw and minimum is 1 mw typ. 100 m range without obstacles Power control is mandatory. o Power class 2 Maximum power is 2.5 mw, nominal power is 1 mw, and minimum power is 0.25 mw typ. 10 m range without obstacles Power control is optional. o Power class 3 Maximum power is 1 mw. Baseband Layer performs frequency hopping for interference mitigation and medium access also defines physical links and many packet formats Uses time division duplex (TDD) Frequency selection during data transmission (1, 3, 5 slot packets) 1-slot packets as the data transmission uses one 625 μs slot. Bluetooth also defines 3-slot and 5-slot packets for higher data rates (multi-slot packets). No frequency hopping is performed within packets. Baseband packet format Access code needed for timing synchronization and piconet identification (channel access code, CAC). MTech CSE (PT, ) SRM, Ramapuram 18

19 may represent special codes during paging (device access code, DAC), inquiry (inquiry access code, IAC) consists of a 4 bit preamble, a synchronization field, and a trailer (if a packet header follows). The 64-bit synchronization field is derived from the lower 24 bit of an address (lower address part, LAP). Packet header The 4-bit type field determines the type of the packet. o Packets may carry control, synchronous, or asynchronous data. A simple flow control mechanism for asynchronous traffic uses the 1-bit flow field. o If a packet is received with flow=0 asynchronous data, transmission must stop. o As soon as a packet with flow=1 is received, transmission may resume. Active Member Address, acknowledgement number ARQN, sequence number SEQN Payload Up to 343 bytes payload can be transferred. structure depends on the type of link Physical links Synchronous Connection-Oriented (SCO) link Asynchronous connectionless link (ACL) Synchronous Connection-Oriented (SCO) link o the master reserves two consecutive slots (forward and return slots) at fixed intervals. o A master can support up to three simultaneous SCO links to the same slave or to different slaves. o A slave supports up to two links from different masters or up to three links from the same master Asynchronous Connectionless Link (ACL) master uses a polling scheme. A slave may only answer if it has been addressed in the preceding slot Example data Transmission The master always uses the even frequency slots, the odd slots are for the slaves Error recovery MTech CSE (PT, ) SRM, Ramapuram 19

20 Link Manager Protocol Groups of functions Authentication, pairing, and encryption o control the exchange of random numbers and signed responses Synchronization o Precise synchronization is of major importance within a Bluetooth network. o The clock offset is updated each time a packet is received from the maste Capability negotiation o devices have to agree the usage of, e.g., multi-slot packets, encryption, SCO links, voice encoding, park/sniff/hold mode (explained below), HV2/HV3 packets etc. Quality of service negotiation Power control o Depending on received signal level the device can direct the sender of the measured signal to increase or decrease its transmit power. Link supervision o set up new SCO links, or it may declare the failure of a link. State and transmission mode change o Devices might switch the master/slave role, o detach themselves from a connection, o or change the operating mode Major baseband states of a Bluetooth device Standby o currently not participating in a piconet (and not switched off) inquiry o device wants to establish a piconet or a device just wants to listen to see if something is going on Page o set up connections to each device o continue to page more devices that will be added to the piconet active state o the slave participates in the piconet by listening, transmitting, and receiving. o ACL and SCO links can be used o Either transmit data or are simply connected o A device can enter standby again, via a detach procedure To save battery power, a Bluetooth device can go into one of three low power states: o Sniff state highest power consumption device keeps its AMA. o Hold state The device does not release its AMA but stops ACL transmission o Park state lowest duty cycle and the lowest power consumption device releases its AMA and receives a parked member address (PMA) MTech CSE (PT, ) SRM, Ramapuram 20

21 Logical Link Control and Adaptation Protocol L2CAP data link control protocol on top of the baseband layer offering logical channels between Bluetooth devices with QoS properties available for ACLs only provides three different types of logical channels Connectionless o unidirectional channels are typically used for broadcasts from a master to its slave(s). Connection-oriented o bi-directional and QoS o define average/peak data rate, maximum burst size, latency, and jitter. Signaling o exchanging signaling messages between L2CAP entities. L2CAP packet formats The length field indicates the length of the payload (plus PSM for connectionless PDUs). The CID has the multiplexing/demultiplexing function Protocol/Service multiplexor (PSM) field is needed to identify the higher layer recipient for the payload. Several PSM values have been defined, e.g., 1 (SDP), 3 (RFCOMM), 5 (TCS-BIN). The payload of the signaling PDU contains one or more commands. Each command has its own o code (e.g.,for command reject, connection request, disconnection response etc.) o ID that matches a request with its reply o The length field indicates the length of the data field for this command. Security steps in the security architecture pairing o necessary if two Bluetooth devices have never met before. o To set up trust between the two devices a user can enter a secret PIN into both devices. Authentication MTech CSE (PT, ) SRM, Ramapuram 21

22 o Link key : Based on the PIN, the device address, and random numbers Encryption o Based on the link key, values generated during the authentication, and again a random number an encryption key is generated Ciphering o simple XOR of the user data and the payload key Bluetooth security components and protocols Service Discovery Protocol (SDP) To find new services Devices that want to offer a service have to install an SDP server. For all other devices an SDP client is sufficient Service record., service attribute o attribute ID o attribute value. The attribute value can be an integer, a UUID (universally unique identifier), a string, a Boolean, a URL (uniform resource locator) etc The protocol descriptor list comprises the protocols needed to access this service. Profiles default solutions for a certain usage model. to form a basis for interoperability basic profiles o generic access, service discovery, cordless telephony, intercom, serial port, headset, dialup networking, fax, LAN access, generic object exchange, object push, file transfer, and synchronization. Additional profiles o advanced audio distribution, PAN, audio video remote control, basic printing, basic imaging, extended service discovery, generic audio video distribution, hands-free, and hardcopy cable replacement Each profile selects a set of protocols. o example, the serial port profile needs RFCOMM, SDP, LMP, L2CAP MTech CSE (PT, ) SRM, Ramapuram 22

23 IEEE IEEE working group for Wireless Personal Area Networks (WPAN) IEEE o standardizes the lower layers of Bluetooth together with the Bluetooth consortium o focus only on the physical and data link layer IEEE : o focus on the coexistence of wireless personal area networks (WPAN) and wireless local area networks o proposes adaptive frequency hopping IEEE o standard providing data rates of 20 Mbit/s or greater while still working with low-power at low-cost. IEEE o standardizes low-rate wireless personal area networks (LR-WPAN) o extremely low power consumption enabling multi-year battery life o applications include industrial control and monitoring, smart badges, interconnection of environmental sensors, interconnection of peripherals o data rates between 20 and 250 kbit/s as maximum and latencies down to 15 ms o superframe mode. o a PAN coordinator transmits beacons in predetermined intervals (15 ms 245 s) o three levels of security: no security, access control lists symmetric encryption using AES-128 WIRELESS LOCAL LOOPS (WLL) WLL connects subscribers to local telephone station wirelessly WLL based on Cellular, Satellite, Microcellular Other names RITL (Radio In The Loop) FRA (Fixed Radio Access) WLL Service Desirable Business Related o Call Transfer o Conference Calling COIN Phones v.29 (9600 bps) ISDN (64 kbps) Example Services provided by WLL Marconi WIPLL (Wireless IP Local Loop) Lucent WSS (Wireless Subscriber system) Goodwin WLL MTech CSE (PT, ) SRM, Ramapuram 23

24 Role Of WLL Advantages Cost Less expensive than wired systems the cost of installing KMs of cable is avoided Cost of maintaining the wired infrastructure Installation time Can be installed rapidly challenges getting the permission to use given frequency and finding suitable elevated site Selective installation Radio units are installed only for those who want the service Wired systems requires cable to be laid out in anticipation of subscribers Alternatives to Wired scheme using existing installed cable lack of telephone line to large population lack of quality lines for high-speed applications long distance from central office for xdsl May not have cable TV or cable provided for two way data services Makes WLL as a strong alternative Mobile Cellular technology Cellular systems are too expensive do not provide sufficient facilities less functionaly than broadband WLL As the WLL subscriber unit is fixed, it can use directional antenna pointed at base station antenna, providing improved signal quality in both directions Comments & Feedback Thanks to my family members who supported me while I spent hours and hours to prepare this. Your feedback is welcome at MTech CSE (PT, ) SRM, Ramapuram 24

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Bluetooth Vs : state-of-the-art and research challenges

Bluetooth Vs : state-of-the-art and research challenges Bluetooth Vs. 802.11: state-of-the-art and research challenges Pravin Bhagwat ReefEdge, Inc. pravin@reefedge.com or pravin@acm.org http://www.cs.umd.edu/~pravin WINLAB, Rutgers Oct 28, 2001 10/29/2001

More information

Mobile Communications I

Mobile Communications I Mobile Communications I Prof. Dr.-Ing. Rolf Kraemer chair owner telefon: 0335 5625 342 fax: 0335 5625 671 e-mail: kraemer [ at ] ihp-microelectronics.com web: Mobile Communications Chapter 4: Wireless

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Bluetooth. Renato Lo Cigno

Bluetooth. Renato Lo Cigno Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

Wireless Data Networking IEEE & Overview of IEEE b

Wireless Data Networking IEEE & Overview of IEEE b Wireless Data Networking IEEE 802.11 & Overview of IEEE 802.11b Dr. Arian Durresi The Ohio State University Columbus, OH 43210 durresi@cis.ohio-state.edu 1 Overview Wireless Application Market Wireless

More information

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change 802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Internet Structure. network edge:

Internet Structure. network edge: Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Bluetooth. Acknowledgements. Based on Jochen Schiller slides. Supporting text

Bluetooth. Acknowledgements. Based on Jochen Schiller slides. Supporting text BT 1 Bluetooth FEUP PR BT 2 Acknowledgements Based on Jochen chiller slides upporting text» Jochen chiller, obile Comunications, Addison-Wesley» ection 7.5 Bluetooth BT 3 Bluetooth» Universal radio interface

More information

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

IEEE Wireless LANs Part I: Basics

IEEE Wireless LANs Part I: Basics IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Experimental Study on Co-existence of b with Alien Devices

Experimental Study on Co-existence of b with Alien Devices Experimental Study on Co-existence of 8.b with Alien Devices Javier del Prado and Sunghyun Choi Philips Research Briarcliff USA, Briarcliff Manor, New York Email: {javier.delprado,sunghyun.choi}@philips.com

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Local Area Networks: Recent Developments

Wireless Local Area Networks: Recent Developments Wireless Local Area Networks: Recent Developments Ohio Highway Patrol Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 13-1 Overview Spread Spectrum Wireless local area networks Wireless LAN standard:

More information

Master thesis 60 credits

Master thesis 60 credits UNIVERSITY OF OSLO Department of informatics Capacity and performance study of IEEE 802.11e in WLANs and ad hoc networks Master thesis 60 credits Frank Roar Mjøberg 2. May 2007 Abstract Today, WLANs allow

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

IEEE Integrated Communication Systems Group Ilmenau University of Technology

IEEE Integrated Communication Systems Group Ilmenau University of Technology IEEE 802.11 Integrated Communication Systems Group Ilmenau University of Technology Characteristics of Wireless LANs Advantages very flexible alternative to wired LANs (almost) no wiring difficulties (e.g.

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

Implementing A Bluetooth Stack on UEFI

Implementing A Bluetooth Stack on UEFI Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p.

Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p. Preface p. xxv Acknowledgments p. xxix Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p. 4 Wireless Local Area

More information

Bluetooth low energy technology Bluegiga Technologies

Bluetooth low energy technology Bluegiga Technologies Bluetooth low energy technology Bluegiga Technologies Topics Background What is Bluetooth low energy? Basic concepts Architecture Differentiation and comparison Markets and applications Background Background

More information

Chapter 3: Overview 802 Standard

Chapter 3: Overview 802 Standard Chapter 3: Overview 802 Standard IEEE - Institute of Electrical and Electronics Engineers What is the IEEE? international non-profit, professional organization for the advancement of technology related

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect 168 430 Computer Networks Chapter 17 Wireless LANs Overview A wireless LAN uses wireless transmission medium Used to have high prices, low data rates, occupational safety concerns, and licensing requirements

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

7. Wireless Local Area Networks. Characteristics of Wireless LANs

7. Wireless Local Area Networks. Characteristics of Wireless LANs 7. Wireless Local Area Networks Characteristics IEEE 802.11 HIPERLAN, WATM, BRAN, HIPERLAN2 Bluetooth RF Comparison 2005 Burkhard Stiller and Jochen Schiller FU Berlin M7 1 Characteristics of Wireless

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Dominique Chomienne & Michel Eftimakis NewLogic

Dominique Chomienne & Michel Eftimakis NewLogic Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology

More information

Medium Access Control

Medium Access Control Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

IEEE Notes. 1 Local Area Networks. 2 Protocols. 3 Network Model

IEEE Notes. 1 Local Area Networks. 2 Protocols. 3 Network Model IEEE 802.11 Notes This document provides a primer on the layered Internet protocol stack and its correspondence to the IEEE 802.11 standard. The components and architecture of an 802.11 network along with

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Introduction to Bluetooth

Introduction to Bluetooth Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS THE WI-FI COMMUNICATION PROCESS MECHANICS MECHANICS: HOW WI-FI COMMUNICATION WORKS WHAT WE LL BE COVERING Brief Discourse on Frame Types Discovery of Wi-Fi

More information