"OUT OF PRINT" F4i11 HEWLETT ~~PACKARD. HIPERLAN An Air Interface Designed for Multi-Media
|
|
- Amberlynn Bryant
- 6 years ago
- Views:
Transcription
1 "OUT OF PRINT" F4i11 HEWLETT ~~PACKARD HIPERLAN An Air Interface Designed for Multi-Media Timothy A. Wilkinson Networks and Communications Laboratory HP Laboratories Bristol HPL May, 1995 HIPERLAN, radio LANS, wireless LANS The target applications of HIPERLAN are discussed and the target performance of HIPERLAN is specified. The HIPERLAN PHY and MAC designs, to deliver this performance, are described. Areas for further research are suggested. Internal Accession Date Only Copyright Hewlett-Packard Company 1995
2 HIPERLAN An Air Interface Designed for Multi-Media T A Wilkinson Hewlett Packard Laboratories, FUton Road, Stoke Gifford, Bristol, BS12 6QZ, UK Tel: Fax: taw@hplb.hpl.hp.com Abstract The target applications of HIPERLAN are discussed and the target performance of HIPERLAN is specified. The HIPERLAN PHY and MAC designs, to deliver this performance, are described. Areas for further research are suggested.!.introduction Currently, there are two standards for radio LANs (Local Area Networks) being formulated; these are IEEE and HIPERLAN. IEEE is a standard for systems that will operate in the ISM (Industrial Scientific and Medical) bands, these being MHz (in the USA only) and GHz (available worldwide). These bands are not dedicated spectrum and hence these systems are required to use spread spectrum techniques to reduce the effect of considerable mutual interference between these and other ISM band systems. The transmission rate of these systems is around 1Mbit/s. HIPERLAN (High PErformance Radio LAN) is a European standard for operation in the bands GHz and GHz. These bands are dedicated spectrum allocated to the HIPERLAN CAl (Common Air Interface) standard. The provision of considerable dedicated spectrum for HIPERLAN should enable it to provide higher performance than IEEE in terms of reliability and throughput. The initial aim was that HIPERLAN should deliver wired LAN like performance which implies a transmission rate of 10-20Mbit/s. This paper presents an introduction to the design of the HIPERLAN standard in relation to its ability to support multi-media communications. The target applications of HIPERLAN are discussed in section II. The target performance of HIPERLAN is specified in section III. The HIPERLAN PHY (physical layer) and MAC (Medium Access Control layer) designs are described in sections IV and V respectively. Areas for further research are suggested in section VI. II.T.rget applications In 1992 the CEPT (Conference European des administrations des Postes et des Telecommunications) allocated the HIPERLAN bands GHz and GHz with EIRPEP (Equivalent Isotropic Radiated Peak Envelope Power) limits of OdBW and -10dBw respectively (1). ETSI (European Telecommunication Standards Institute) started work on the HIPERLAN standard in early 1992 and finished the draft standard for the 5GHz band in early Figure 1 Wired LAN replacement 1
3 At conception two quite different applications were perceived for HIPERLAN, the wired LAN replacement and the ad-hoc network. These are illustrated in figures 1 and 2 respectively. The wired LAN replacement application provides the user with the convenience of mobility and the elimination of cable management problems around his work area. However, initial installation could be more expensive than a wired LAN if the system is not carefully designed. The ad-hoc network allows the user to create a network anywhere without the need for a wired infrastructure. A wired infra-structure is unlikely in the environment shown in figure 2. However, more typical environments are at work or in the home or anywhere where people may wish to work together or play together using networked computers. lit has a wired infra-structure with access points and the ad-hoc network does not. Many of the other attributes follow from this. If there is no wired Infra-structure then a mesh communication topology is appropriate and a distributed medium access control is compatible with this. In the wired LAN replacement the access points could be placed in elevated positions and hence a line-of-sight radio propagation path is likely, whereas in the ad-hoc networkthe antennas will be buried in the room clutter and a line-of-sight will be unlikely. The existence of a line of sight reduces the degree of fading and time dispersion (illustrated in figure 3). Fading causes the link to be unreliable and can cause the hidden node problem where connection is difficult between stations that are in close proximity with one another. With aline of sight the fading statistics are Rayleigh, without they are Ricean. Time dispersion causes lsi (Inter-Symbol-Interference) which ultimately limits the transmission rate in the channel or forces the use of multipath counter-measures such as equalisation. The delay spread in indoor environment is usually less than 1oons. Typically, this limits the transmission rate to around 1Mbit/s without multipath counter-measures. Figure 2 Ad Hoc network _ LAIl M-HOC _ Il!1'\ACEMeHT INFM STIlUCTUIlE YES NO TO_Y ITAII ME'" COIlMUHl ME_ACC;III CINTMUIID ~ CONTIlOl. (OIl DIITNMJTIDI UNI-Of_ LIKELY UNI.lKILY 'AIlING IlIC1AH MYLI1GH MEO OELAYPMAO LOW - COULD..PLUelID '''~_1ITT1Il CAPACITY IlIQUlll!MfllT HIGH LOW T_1e AIY~ -- _ Table 1 Comparison of applications The attributes of these two applications are compared in table 1. The most important difference between the two applications is that the wired LAN replacement -~ DllTANCI011TWI nme DISPERSION - _..~- DllTANCI0Ill.- Figure 3 Fading and time dispersion In both cases the medium re-use should be self managing so that these networks are easy to deploy, increasing their usability. The support of multi-media applications requires the support of all types of traffic, asynchronous and isochronous. 2
4 The communication of asynchronous traffic such as conventional LAN traffic is typically connectionless, as the traffic is bursty. With asynchronous traffic, minimising the medium access delay and maximising the transmission rate are important. Currently, wired LAN standards such as Ethernet have transmission rates of around 10Mbit/s. The communication of isochronous traffic such as audio or video is typically connection oriented as the traffic is constant rate. With isochronous traffic minimising the transfer delay is important. Typical requirements are; for audio 32kbit/s with a maximum transfer delay of 10ms, and for video 2Mbit/s with a maximum transfer delay of 100ms. Typically the capacity requirement of the wired LAN replacement will be higher than that of the ad-hoc network. III. Performance targets The aim of ETSI was to create a standard that could support both of the two extreme applications discussed previously. Based on the above requirements the following performance targets were set for HIPERLAN. Range - 50m Collocation tolerance - 5m Mobility tolerance - 10m/s, Is Delay spread tolerance - 100ns requirements. IV.HIPERLAN PHY Adaptive equalisation was chosen as the HIPERLAN multipath counter-measure to facilitate high transmission rates. It is envisaged that the system will use a DFE (Decision Feedback Equaliser) although this is not specified in the standard. HIPERLAN transmission can be at one of two data rates. The high data rate is 23.5Mbit!s. The modulation is pre-coded non-differential GMSK (Gaussian Minimum Shift Keying) with a BT (bandwidth bit-period product) of 0.3. This is transmitted in a channel of 23.5MHz bandwidth. There are five channels in the 5GHz band. The low data rate is 1.5Mbit/s, 1/16 of the high data rate. This will be transmitted using the same modulation and direct sequence spread spectrum. This can be detected with a matched filter or correlator. The HIPERLAN data packet consists of three parts a low data rate header, a synchronisation and training sequence, and the data. This is shown in figure 5. The low data rate header contains a truncated version of the destination 48bit MAC address which is transmitted at 1.5Mbit!s. This can be demodulated without equalisation. This is to facilitate power saving strategies where the receiver is only activated when the MAC address is detected in the low data rate header. Packet failure ratio - < 10-3 MAC - distributed PACKET Asynchronous support - asynchronous MAC ldw l MrE_ Asynchronous data rate Mbit!s Isochronous support - priority in MAC Isochronous data rate kbit!s Target format - PCMCIA Power consumption - a few hundered mw The following sections describe the HIPERLAN MAC and PHY design to meet these Figure 5 HIPERLAN packet The synchronisation and training sequence is 450 bits long. 3
5 The data consists of m data blocks of 496 bits where m is from 1 to 47. (the maximum packet length of 47 blocks is calculated for a relative velocity of 1.4m/s.) The packet is designed in this way to make it compatible with Ethernet. A block of 416 bits is divided into 16 segments and FEC (Forward Error Correction) encoded with a BCH (31,26) code to give a block of 496 bits. The HIPERLAN acknowledgement packet is also transmitted at the low data rate so that it can be demodulated without equalisation. There are three classes of transmitter 30dBm, 20dBm and 1OdBm EIRPEP. Antenna diversity is an option and directional antennas can be used but the transmit power must be scaled accordingly. If antenna diversity is used, the antenna used for CCA (Clear Channel Assessment) must also be used for transmitting. The MAC protocol CCA uses an adaptive threshold based on the signal strength measured in the environment. To enable the MAC protocol to function efficiently, the TX to RX turn around time must be less than 5ps. Concerns have been expressed about the complexity of the HIPERLAN PHY and the associated power consumption. These concerns can only be investigated with HIPERLAN hardware demonstrators. V. HIPERLAN MAC The only workable way to implement a distributed MAC protocol was to use a variant of CSMA (Carrier Sense Multiple Access) or Iisten-before-talk that is used to great effect in Ethernet. The difficulty with implementing this on a radio link is that the large dynamic range between transmit and receive signal strengths makes CO (Collision Detection) or IIsten-whlletalk very difficult. Hence, most radio versions of CSMA use CA (Collision Avoidance), which is a randomisation of the collision probability rather than actual avoidance. The HIPERLAN MAC protocol uses a form of Iisten-before-talk with a random listen-talk sequence prior to data packet transmission. The protocol also has priority capability designed to ensure delivery times of isochronous traffic. The MAC protocol mechanism is shown in figure 6 and described below. There are three phases in packet transmission; these are, the prioritisation phase, the contention phase and the transmission phase, all of which are of variable duration. If no activity has been sensed on the channel for 1700 bit periods, transmission can take place immediately. Otherwise, it is assumed that all stations wishing to transmit will synchronise to the end of the last transmission and execute the three phases. StatIon 1 Station 2 Station3 Station4 priorltlsatlon contention transmission stops ~OJ:. TIme ~~ datanacket Figure 6 HIPERLAN MAC protocol mechanism The prioritisation phase exists to prioritise transmissions. The prioritisation phase consists of a maximum of 5 slots of 10ps (256bits) duration. Priority is asserted by transmitting in a slot, 1 to 5, 1 for highest priority, 5 for lowest priority. Stations listen until they transmit. The priority phase ends when one or more stations assert their priority and listening stations with lower priority hear this and defer. Packet priority is related to the residual lifetime of the packet, number of hops to final destination and application assigned priority. So asynchronous traffic such as file transfer will have a long lifetime and low priority, whereas isochronous traffic such as audio or video will have a short lifetime and high priority. The priority for a packet increases until the lifetime expires and then the packet is discarded. When this happens the MAC informs the higher layers. This has interesting implications for multimedia applications. The contention phase exists to resolve contention between stations with the same priority. The contention phase consists of an elimination phase and a yield phase. The elimination phase consists of a maximum of 12 slots of 10ps (256bits). Stations entering the 4
6 elimination phase after the prioritisation phase will continue to transmit in successive slots with probability 0.5 then listen for a single slot. If they hear nothing, they then enter the yield phase. The duration of this phase is 1 to 12 slots. The yield phase consists a maximum of 14 slots of 2.5ps (64bits). Stations entering yield phase from elimination phase will continue to listen in successive slots with probability 0.9. If they hear nothing they then enter the transmission phase. The transmission phase simply consists of packet transmission. Packet reception is acknowledged by transmission of an acknowledgement. Figure 6 shows four stations contending for the channel. Station four has a lower priority packet than the other stations and is eliminated in the prioritisation phase. Stations 3 is eliminated in the elimination part of the contention phase. Station 2 is eliminated in the yield part of contention phase and station four gets the channel. The big question is whether this MAC specification satisfies the original requirements specification. On paper it looks promising, but the answer to this question will be known only when HIPERLAN hardware is available. However, early simulation results from ETSI studies have shown that the MAC protocol can adequately support asynchronous and isochronous traffic. For example it was shown that 25 audio links at 32kbit/s (10ms delivery time), 25 audio links at 13kbit/s (20ms delivery time), 1 video link at 2Mbit/s (1ooms delivery time) and asynchronous file transfer at 13.4Mbit/s can simultaneously be supported by the HIPERLAN MAC. The HIPERLAN standard has other elegant features. HIPERLAN has multi-hop relaying capability facilitated by neighbour tables. These are updated periodically when hello packets are transmitted by neighbour stations. There is also a power saving strategy involving wake sleep cycles specified. VI. Conclusions and areas for further research multi-media traffic. In addition to an outline of the standard, one of the most important things required by academia and industry at this time is a guide to what additional work is required before the standard can be realised as a viable product. The list of research areas below is by no means exhaustive. Diversity antennas for PCMCIA realisations This paper has described the HIPERLAN standard, which should be one of the most [2] powerful and flexible air interfaces yet designed and one of the first radio CAls designed specifically for LAN system architectures and Diversity strategies Low profile RF components for PCMCIA realisations Local oscillator frequency offset measurement and compensation Equaliser technology (high speed and low power) Equalisers tolerant to local oscillator frequency offset Equaliser training algorithms CCA optimisation LAN trafficmodels for MAC optimisation Simulation studies for MAC optimisation General power saving strategies With attention given to these areas we should see HIPERLAN become as successful as other ETSI standards such as GSM (Global Standard for Mobile) and DECT (Digital European Cordless Telecommunications). VII. References [1] CEPT, "Relating to the Harmonised Radio Frequency Bands for High PErformance Radio Local Area Networkn CEPT Recommendation T/R 22-06, ETSI, "Radio Equipment and Systems (RES) High PErformance Radio Local Area Network (HIPERLAN) Functional Specification", RES10TTG 95/07. 5
Local Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationBy Ambuj Varshney & Akshat Logar
By Ambuj Varshney & Akshat Logar Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationWNC-0300USB. 11g Wireless USB Adapter USER MANUAL
WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationBy N.Golmie Presented by: Sushanth Divvela
By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationENSC 427: COMMUNICATION NETWORKS
ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee
More informationLearning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.
Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards
More informationAnnouncements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1
Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2
More informationTHE ISM BAND A REVIEW OF THE ESSENTIALS
HISTORY: In 1985 the Federal Communications Commission issued rules permitting intentional radiators to use the Industrial, Scientific and Medical (ISM) Bands ( 902-928, 2400-2483.5, 5725-5850 Mhz) at
More informationPage 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs
EEC173B/ECS152C, Winter 2006 Wireless LANs Evolution of Technology & Standards IEEE 802.11 Design Choices Architecture & Protocols PHY layer MAC layer design Acknowledgment: Selected slides from Prof.
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS
3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of
More informationWIRELESS TECHNOLOGIES
WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationCOLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SUBJECT CODE& NAME: IT1403 MOBILE COMPUTING YEAR / SEM : IV / VIII UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationWIRELESS LANs: THE DECT APPROACH
WIRELESS LANs: THE DECT APPROACH Anthony Lo Centre for Wireless Communications National University of Singapore 20 Science Park Road #02-34/37 TeleTech Park Singapore Science Park II Singapore 117674 Email:
More informationWhat do we expect from Wireless in the Factory?
What do we expect from Wireless in the Factory? And what are we doing about it? ETSI Wireless Factory Workshop, 15 December 2008 Tim Whittaker System Architect, Wireless Division 11 December 2008 S4989-P-188
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationSWAP and TCP performance
SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationRESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011
Moving Beyond Zigbee for Star Networks RESOURCES By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Multi-hop mesh protocols, such as Zigbee, are getting
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationWireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu
Wireless LAN A competing method to wired LAN Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Outline of the presentation Introduction Background Problem Environment
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More information54M Wireless LAN CardBus Card
54M Wireless LAN CardBus Card User s Manual Ver.2.0 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device,
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationCS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,
More informationDASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public
DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN public DASH7 ALLIANCE PROTOCOL OPEN STANDARD OF ULTRA LOW POWER MID-RANGE SENSOR AND ACTUATOR COMMUNICATION Wireless Sensor and Actuator Network Protocol
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationStrategies and Guidelines for Improving Wireless Local Area Network Performance
Strategies and Guidelines for Improving Wireless Local Area Network Performance Dr Nurul Sarkar Associate Professor School of Computing and Mathematical Sciences nurul.sarkar@aut.ac.nz 2 Outline of Talk
More informationIEEE P ETSI BRAN WG3 meeting - September and TGa Overview
ETSI EP BRAN #4 I ) WG3 Temporary document 70 eptember 1997 doc. IEEE P802.11-97/9 15 page 1 Source: Chairman IEEE P802.11Task Group A Title: IEEE P802.11 Tga Overview Agenda item:joint ETSI-IEEE meeting
More informationIEEE Wireless LAN draft Standard
IEEE 802.11 Wireless LAN draft Standard Keith B. Amundsen Wireless Solutions 508-470-9483 keith_b_amundsen@raytheon.com October 24, 1996 Worcester Polytechnic Institute Introduction IEEE 802.11 Draft 5.0
More informationWireless Communication Session 4 Wi-Fi IEEE standard
Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationFerre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs.
Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Peer reviewed version Link to publication record in Explore Bristol
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationG 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob
G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework
More informationWireless Network Introduction
Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2
More informationInstitute of Electrical and Electronics Engineers (IEEE) IEEE standards
HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationWireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.
Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWireless networks. Wireless Network Taxonomy
Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher
More informationWireless LANs: outline. wireless and WiFi security: WEP, i, WPA, WPA2. networking security wireless ad-hoc and mesh networks
Wireless LANs: outline wireless 802.11 and WiFi. 802.11 security: WEP, 802.11i, WPA, WPA2. networking security wireless ad-hoc and mesh networks ISM bands to operate most radios, a license is needed from
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationA cluster based interference mitigation scheme for performance enhancement in IEEE
756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4
More informationMatteo Petracca Scuola Superiore Sant Anna, Pisa
Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationC H A P T E R Overview Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Mac OS OL
CHAPTER 1 This chapter describes the Cisco Aironet Wireless LAN Adapters, also referred to as client adapters, and illustrates their role in a wireless network. The following topics are covered in this
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationThroughput Considerations for Wireless Networks
Wi4Net White Paper: Throughput Considerations for Wireless Networks About us CelPlan Technologies has been a worldwide leading provider of wireless network design, optimization and performance evaluation
More informationKW41Z IEEE and BLE Coexistence Performance
NXP Semiconductors Document Number: AN12231 Application Note Rev. 0, 08/2018 KW41Z IEEE 802.15.4 and BLE Coexistence Performance MWS module 1. About this manual This document aims to evaluate the performance
More informationIEEE Testing Signal Compliance of ZigBee Standard
IEEE802.15.4 Testing Signal Compliance of ZigBee Standard Tektronix 1 Agenda: 1: What is ZigBee 2: ZigBee Specification 3: ZigBee Signal Analysis 4: Demonstration for ZigBee analysis 2 What is ZigBee (1)
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More information