ReDECTed Building an SDR based DECT sniffer. May 27 th, 2015 HITB HAXPO Marc Newlin

Size: px
Start display at page:

Download "ReDECTed Building an SDR based DECT sniffer. May 27 th, 2015 HITB HAXPO Marc Newlin"

Transcription

1 ReDECTed Building an SDR based DECT sniffer May 27 th, 2015 HITB HAXPO Marc Newlin

2 What is a DECT sniffer? DECT is the ubiquitous wireless protocol used by cordless phones A DECT sniffer uses an SDR to decode packets from nearby DECT devices

3 Why build a DECT sniffer? DECT has a high adoption rate worldwide Writing SDR protocol decoders is fun! Hacking on a sniffer is a great way to learn a new protocol Existing DECT sniffers rely on hardware that is no longer produced SDRs are highly available

4 Dedicated DECT hardware COM-ON-AIR cards from DOSCH-AMAND PCMCIA DECT transceiver Can be used as a generic DECT device No longer produced; increasingly difficult to find

5 Prior DECT sniffer work dedected Released open source firmware/driver for COM-ON-AIR cards Reverse engineered the DECT Standard Authentication Algorithm Osmocom DECT DECT stack for Linux Works with COM-ON-AIR cards to function as a DECT handset or basestation

6 Some Important Terms Acronym RFP PP Meaning Radio Fixed Part (basestation) Portable Part (handset) RFPI Radio Fixed Part Identifier (5- octet globally unique identifier) C-plane TDMA LSIG PMID Control Plane Time Division Multiple Access Link Signature Portable MAC Identifier

7 DECT Physical Layer MHz sample rate per channel MHz channel spacing 5 channels (8.64 MHz) in North America, and 10 channels everywhere else (17.28 MHz) DECT is called DECT 6.0 in North America, but this is for strictly marketing reasons Typically between 1880 MHz and 1930 MHz, but also found at 900 MHz, 2 GHz, and 2.4 GHz GFSK modulation (required) DQPSK, D8PSK, QAM16, QAM64 modulation (optional) TDMA channel access

8 Project goals Build a DECT sniffer that works on both a Linux computer and an Android phone Keep complexity to a minimum Signal processing is computationally expensive Lower complexity means lower power consumption Future self is not smart (keep code simple and well documented!!) Decode all 5 North American DECT channels simultaneously (requires a fancy SDR) Support single channel decoding with an inexpensive SDR Most importantly, learn something!

9 SDR hardware USRP B210 $1100 USD 56 MHz bandwidth 70 MHz 6 GHz 12-bit samples USB 3.0 RTL-SDR E400 $50 USD 3.2 MHz bandwidth 52 MHz 2.2 GHz 8-bit samples USB 2.0

10 What do we need to build? Channelizer In the case of 5 DECT channels, this will take the 8.64 MHz input, and split it into 5x MHz streams FM Demodulator Turns the output of each channelized stream into bits Frame / slot / packet recovery Take the demodulated bits, and figure out what the DECT hardware is doing

11 Keep it simple SDR doesn t have to be complicated Things requiring a Ph.D to understand MS Word page formatting Other things Software Defined Radio

12 Host Environment Linux Host Intel C Compiler Intel Performance Primitives Intel Thread Building Blocks AVX2 and SSE4 SIMD intrinsics Any Intel Core processor Android Host Android NDK Project Ne10 ARM NEON SIMD intrinsics Quad core ARMv7a processor

13 Talking to the SDR What is required to get I/Q samples from the SDR s? USRP B210 UHD Boost libusb RTL-SDR E4000 librtlsdr libusb

14 PFB Channelizer 1. Generate low pass filter coefficients for one channel For N channels, the number of filter coefficients must be an integer multiple of N 2. Low pass filter each channel For N channels, each Nth sample belongs to the same channel Each channel is filtered by every Nth coefficient Given 5 channels, channel 2 s samples are 2, 7, 12, etc, which are filtered by coefficients 2, 7, 12, etc 3. Send the filtered samples through an N-bin FFT 4. Deinterleave the output (at which point each output stream contains samples from one channel)

15 PFB Channelizer Linux

16 PFB Channelizer - Android

17 FM Demodulator 1. Multiply a sample by the complex conjugate of the previous sample. 2. Compute the phase angle of the result. 3. Positive phase angle means bit 1, negative phase angle means bit 0.

18 FM Demodulator - Linux

19 FM Demodulator - Android

20 Timing Recovery The DECT device clock and SDR clock will typically be offset by a small amount. We need to correct this offset in order to produce accurate bits. 1. With no offset, the phase angle representing a 1 bit will be the absolute value of the phase angle representing a 0 bit. 2. Use the offset (error value) to determine the clock difference between the DECT device and the SDR. 3. Interpolate the output value based on the error value.

21 Timing Recovery Linux

22 Timing Recovery - Android

23 DECT TDMA Frames and Slots 1 frame = 24 time slots (10ms) 1 slot = 480 symbols (480 samples/bits with GFSK modulation) 12 downlink slots are followed by 12 uplink slots Slots are used in pairs: [0, 12], [1, 13], etc Full and double slots start at slot symbol offset 0 Half slots start at symbol offset 0 or 240

24 Fixed Capacity Packets Packet Type P0 96 symbols 1 timeslot Packet Type P or 424 symbols 1 timeslot Packet Type P or 904 symbols 2 timeslots

25 Variable Capacity Packets Packet Type P00j Variable length Half slot, full slot, or double slot

26 DECT TDMA Multiframe 1 multiframe = 16 frames RFP s transmit a multiframe marker in frame 8 of each multiframe Multiframes are used a unit of duration Multiframes are numbered when encryption is enabled

27 DECT Packet Structure Field S field D field A field B field X field Z field Description preamble and sync word payload MAC header and tail, protected by a 16 bit CRC, unencrypted data (voice, control data, etc), can be encrypted 32 bit CRC computed over the B field last 4 symbols from the D-field, used to detect interference from unsynchronized transmitters sliding into adjacent timeslots

28 S-field Detector RFP S-field: AA-AA-E9-8A PP S-field: S-field begins with a preamble of alternating 1 s and 0 s, followed by a sync word Preamble can be optionally extended by an additional 16 bits The PP S-field is the inverse of the RFP S-field Packet detector maintains a ring buffer of incoming bits and bytes After each new bit, the ring buffer is checked against both the PP and RFP S- fields When a match is found, the potential packet is passed up to the MAC layer

29 S-field Detector

30 A-field Validator Detecting an S-field doesn t mean we have a valid packet A-field validator calculates the 16 bit CRC, and continues only if it matches If we have a valid A-field, we proceed to determine the slot and frame indexes of this packet

31 A-field Validator

32 Recovering TDMA Timing Not all packets contain unique identifiers Must achieve TDMA sync to infer transceiver state Multiframe markers transmit system information once per multiframe There are 12 multiframe marker types, transmitted at periodic intervals

33 C-plane Frames Frames are fragmented and sent in multiple A-field tails Protected by a 16-bit CRC CRC is XOR d with the LSIG (lower 16 bits of PMID) Common single-fragment C-plane messages allow us to reverse the LSIG Once we know the LSIG for a given connection (timeslot), we can CRC-validate and decode multiple fragment frames

34 Reversing the LSIG

35 Reassembling C-plane Frames

36 Cleartext A-Field Data Static System Information (RFP) TDMA timing details Supported frequencies Number of transceivers Supported and required encryption Voice codecs Lots of other fun stuff MAC Control (RFP, PP) Connection establishment MAC layer encryption setup Paging Tail (RFP) Timeslot availability details Supported modulation types Identity Information (RFP) RFPI (globally unique identifier) Type of basestation (residential, enterprise, etc) Identity Information (PP) RFPI of the associated RFP C-plane (Control Plane) (RFP, PP) Call control management Caller ID details

37 Conclusions SDR s are a viable platform for DECT research A low complexity DECT sniffer can decode 5 channels simultaneously with a modern Android phone or Linux computer Join me next time for more adventures with SDR and DECT!

The Open-Source SDR LTE Platform for First Responders. Software Radio Systems

The Open-Source SDR LTE Platform for First Responders. Software Radio Systems The Open-Source SDR LTE Platform for First Responders Software Radio Systems www.softwareradiosystems.com www.github.com/srslte Outline SRS - Software Radio Systems NIST PSIAP and OpenFirst srslte The

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

PHY Link Channel Resource Allocation, Overhead, Impact on Procedures. Nicola Varanese (Qualcomm)

PHY Link Channel Resource Allocation, Overhead, Impact on Procedures. Nicola Varanese (Qualcomm) PHY Link Channel Resource Allocation, Overhead, Impact on Procedures Nicola Varanese (Qualcomm) 1 Summary A PHY Control Channel (PLC) is needed for Aiding PHY initialization and CNU bring-up Broadcasting

More information

Abusing Calypso phones

Abusing Calypso phones PHDays, May 30/31, 2012 About the speaker Linux and free software geek since 1999 M.Sc. in C.S. + some E.E. General orientation towards low level Embedded, Kernel, Drivers and such. Hardware (Digital stuff,

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

DECODIO. for TETRA. Air interface analysis Network traffic measurements and statistics Coverage tests Network monitoring DETECT DECODE VISUALIZE

DECODIO. for TETRA. Air interface analysis Network traffic measurements and statistics Coverage tests Network monitoring DETECT DECODE VISUALIZE DECODIO for TETRA Air interface analysis Network traffic measurements and statistics Coverage tests Network monitoring DETECT DECODE VISUALIZE DECODIO for TETRA Decodio NET for TETRA is a highly flexible

More information

WHITE PAPER AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH?

WHITE PAPER AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH? WHITE PAPER 80.AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH? November 08 Introduction With the initial versions of 80.ax (Wi-Fi ) coming out, some of the most interesting features and enhancements revolve

More information

Implementation of a Dual-Mode SDR Smart Antenna Base Station Supporting WiBro and TDD HSDPA

Implementation of a Dual-Mode SDR Smart Antenna Base Station Supporting WiBro and TDD HSDPA Implementation of a Dual-Mode SDR Smart Antenna Base Station Supporting WiBro and TDD HSDPA Jongeun Kim, Sukhwan Mun, Taeyeol Oh,Yusuk Yun, Seungwon Choi 1 HY-SDR Research Center, Hanyang University, Seoul,

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

MULTICELL NETWORKS based on DECT and CAT-iq

MULTICELL NETWORKS based on DECT and CAT-iq MULTICELL NETWORKS based on DECT and CAT-iq Part 1/3 Author Padma Ganeshan DOSCH&AMAND Advisor Dirk Kelbch CTO, DOSCH&AMAND Consultant Prof. Dr.-Ing. Holger Stahl Institute of Electrical Engineering &

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC2401 - WIRELESS COMMUNICATION Question Bank (ALL UNITS) UNIT-I: SERVICES & TECHNICAL CHALLENGES PART A 1. What are the types of Services? (Nov.

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

DECT in M2M communication

DECT in M2M communication DECT in M2M communication Wireless Factory SG#1, 21 st -22 nd October 2009 Andrea Lorelli andrea.lorelli@etsi.org ETSI 2009. All rights reserved DECT overview The Digital Enhanced Cordless Telecommunications

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

Questions & Answers SC14CVMDECTDEVKT

Questions & Answers SC14CVMDECTDEVKT SC14CVMDECTDEVKT Introduction This document contains questions and answers that are related to the SC14CVMDECT project and are relevant for customers (both Sales/Marketing and Engineers). The document

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

STA-MU-A0028S (MiniCard-USB version)

STA-MU-A0028S (MiniCard-USB version) STA-MU-A0028S (MiniCard-USB version) WiFi 802.11 b/g and Bluetooth v2.0 + EDR Combo Mini Card Module Approval Sheet Ver: 1.1 CONTENT 1. Introduction...3 1.1 Features & Benefits...3 1.2 Applications...4

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Evaluating GSM A5/1 security on hopping channels

Evaluating GSM A5/1 security on hopping channels Evaluating GSM A5/1 security on hopping channels Bogdan Diaconescu v1.0 This paper is a practical approach on evaluating A5/1 stream cipher on a GSM hopping network air interface called Um. The end goal

More information

STA-UI-A003D (USB version)

STA-UI-A003D (USB version) STA-UI-A003D (USB version) WiFi 802.11 b/g and Bluetooth v2.0 + EDR Combo USB Dongle Module Ver: 1.0 1. 2. 3. 4. 5. 6. 7. 8. CONTENT Introduction...3 1.1Features & Benefits...3 1.2Applications...4 Product

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

WiMOD LoRaWAN EndNode Modem HCI Specification

WiMOD LoRaWAN EndNode Modem HCI Specification WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Nighthawk AX8/8-stream AX6000 WiFi Router

Nighthawk AX8/8-stream AX6000 WiFi Router Leading the New Era of WiFi Nighthawk 8-Stream AX6000 WiFi Router is powered by the industry s latest 802.11ax WiFi standard with 4 times increased data capacities in a dense environment to handle today

More information

Hands-on course Mobile Communications

Hands-on course Mobile Communications Hands-on course Mobile Communications Summer 2008 Material and Assignments in the areas of: Medium Access in Wireless Networks Freie Universität Berlin Institute of Computer Systems & Telematics A. Liers,

More information

Hacking UAVs: the integrity of Wi-Fi, Telemetry and RC links. Author: Mr. Xi Chen, Mr. Jeff Thomas

Hacking UAVs: the integrity of Wi-Fi, Telemetry and RC links. Author: Mr. Xi Chen, Mr. Jeff Thomas Hacking UAVs: the integrity of Wi-Fi, Telemetry and RC links Author: Mr. Xi Chen, Mr. Jeff Thomas WHO AM I Xi Chen PhD student at RMIT University Advanced control theory System identification Passionate

More information

DECT ULTRA LOW ENERGY (ULE) Technology Overview The ETSI Approach to a Mid-range Wireless Technology for IoT

DECT ULTRA LOW ENERGY (ULE) Technology Overview The ETSI Approach to a Mid-range Wireless Technology for IoT DECT ULTRA LOW ENERGY (ULE) Technology Overview The ETSI Approach to a Mid-range Wireless Technology for IoT Angel Bóveda CEO, Wireless Partners S.L. ETSI Board member, co-leader of the IoT strategic group

More information

Wireless standards--home automation, energy, care and security

Wireless standards--home automation, energy, care and security Wireless standards--home automation, energy, care and security Rene Kohlmann - October 30, 2013 Exceptional changes are underway in the home networking market and a wide range of home systems. Everything

More information

Introduction to Video Compression

Introduction to Video Compression Insight, Analysis, and Advice on Signal Processing Technology Introduction to Video Compression Jeff Bier Berkeley Design Technology, Inc. info@bdti.com http://www.bdti.com Outline Motivation and scope

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Case study: Performance-efficient Implementation of Robust Header Compression (ROHC) using an Application-Specific Processor

Case study: Performance-efficient Implementation of Robust Header Compression (ROHC) using an Application-Specific Processor Case study: Performance-efficient Implementation of Robust Header Compression (ROHC) using an Application-Specific Processor Gert Goossens, Patrick Verbist, Erik Brockmeyer, Luc De Coster Synopsys 1 Agenda

More information

Parallelized Progressive Network Coding with Hardware Acceleration

Parallelized Progressive Network Coding with Hardware Acceleration Parallelized Progressive Network Coding with Hardware Acceleration Hassan Shojania, Baochun Li Department of Electrical and Computer Engineering University of Toronto Network coding Information is coded

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli Wireless Sensor Networks BLUETOOTH LOW ENERGY Flavia Martelli flavia.martelli@unibo.it Outline Introduction Applications Architecture Topology Controller specifications: Physical Layer Link Layer Host

More information

Unencrypted Mouse Packet

Unencrypted Mouse Packet MouseJack Injecting Keystrokes into Wireless Mice Marc Newlin Bastille Threat Research Team February 12, 2016 Abstract MouseJack is a collection of security vulnerabilities affecting non-bluetooth wireless

More information

Simplifying FPGA Design for SDR with a Network on Chip Architecture

Simplifying FPGA Design for SDR with a Network on Chip Architecture Simplifying FPGA Design for SDR with a Network on Chip Architecture Matt Ettus Ettus Research GRCon13 Outline 1 Introduction 2 RF NoC 3 Status and Conclusions USRP FPGA Capability Gen

More information

Error characteristics and their prediction in ZigBee transmission at coexistence conditions

Error characteristics and their prediction in ZigBee transmission at coexistence conditions Error characteristics and their prediction in ZigBee transmission at coexistence conditions BOHUSLAVEK ZDENEK and MASIK ILJA Department of Electrical Engineering and Automation, Faculty of Engineering

More information

Contents. 1 Addendum to LCOS version Routing and WAN connections WLAN Public Spot Voice over IP VoIP...

Contents. 1 Addendum to LCOS version Routing and WAN connections WLAN Public Spot Voice over IP VoIP... LCOS 9.24 Contents Contents 1 to LCOS version 9.24...3 2 Routing and WAN connections...4 2.1 Manually configuring VDSL/ADSL bandwidth...4 2.1.1 Configuring bandwidth with LANconfig...4 2.1.2 Additions

More information

IEEE Testing Signal Compliance of ZigBee Standard

IEEE Testing Signal Compliance of ZigBee Standard IEEE802.15.4 Testing Signal Compliance of ZigBee Standard Tektronix 1 Agenda: 1: What is ZigBee 2: ZigBee Specification 3: ZigBee Signal Analysis 4: Demonstration for ZigBee analysis 2 What is ZigBee (1)

More information

Flexible GFDM PHY Tutorial

Flexible GFDM PHY Tutorial Flexible GFDM PHY Tutorial December 22, 2017 Author Contributors Ana B. Martinez ana-belen.martinez@ifn.et.tu-dresden.de Martin Danneberg Shahab Ehsanfar Zhitao Lin Maximilian Matthe Ahmad Nimr Dan Zhang

More information

CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING

CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING 6.1 TRANSMITTER AND RECEIVER Each modulated signal is preceded by a unique N bit pilot sequence (Manton, JH 2001). A switch in the transmitter

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

Chapter 10: Wireless Networking. School of information science and Engineering, SDU Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate

More information

EPoC PHY and MAC proposal

EPoC PHY and MAC proposal EPoC PHY and MAC proposal Marek Hajduczenia, PhD ZTE Corporation marek.hajduczenia@zte.pt Supporters Alan Brown, Aurora Ed Mallette, Bright House Networks 2 RF spectrum churn Chunks of RF spectrum may

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks. Welcome to my presentation: Message Denial and Alteration on IEEE 802.15.4 Low- Power Radio Networks. This presentation discusses the susceptibility of IEEE 802.15.4 radio networks to several different

More information

Long Distance Wireless Communication. Principally satellite communication:

Long Distance Wireless Communication. Principally satellite communication: Long Distance Wireless Communication Principally satellite communication: Uplink/Downlink Footprint LOS (line of sight) communication satellite base station is relay Effective for broadcast Limited bandwidth

More information

AllNet: Ubiquitous Interpersonal Communication

AllNet: Ubiquitous Interpersonal Communication AllNet: Ubiquitous Interpersonal Communication Edoardo Biagioni University of Hawaii at Mãnoa esb@hawaii.edu Basic Idea The radio in my cellphone can talk to the radio in your cellphone There is no software

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

DA1220-B42 CAT-iq 2.0 FP ETSI TS ETSI TS ETSI EN Generic Access Profile ETSI TS

DA1220-B42 CAT-iq 2.0 FP ETSI TS ETSI TS ETSI EN Generic Access Profile ETSI TS DA1220-B42 CAT-iq 2.0 FP ETSI TS 102 527-1 ETSI TS 102 527-3 ETSI EN 300 444 - Generic Access Profile ETSI TS 102 841 1 pa g e D a t a S h e e t D A 1 220 - B42 V 1. 0 2 0 1 5 Technical Data CAT-iq 2.0

More information

Exam : SCNS_EN. Title : SCNS SCNS Tactical Perimeter Defense. Version : Demo

Exam : SCNS_EN. Title : SCNS SCNS Tactical Perimeter Defense. Version : Demo Exam : SCNS_EN Title : SCNS SCNS Tactical Perimeter Defense Version : Demo 1.The exhibit represents a simple routed network. Node 7 is a Windows 2000 Professional machine that establishes a TCP communication

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Hardware Accelerated SDR Platform for Adaptive Air Interfaces Tarik Kazaz, Christophe Van Praet, Merima Kulin, Pieter Willemen, Ingrid Moerman

Hardware Accelerated SDR Platform for Adaptive Air Interfaces Tarik Kazaz, Christophe Van Praet, Merima Kulin, Pieter Willemen, Ingrid Moerman Hardware Accelerated SDR Platform for Adaptive Air Interfaces Tarik Kazaz, Christophe Van Praet, Merima Kulin, Pieter Willemen, Ingrid Moerman 27/01/2016 1 Overview Common SDR approach Propposed approach

More information

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Moving Beyond Zigbee for Star Networks RESOURCES By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Multi-hop mesh protocols, such as Zigbee, are getting

More information

Impact of Bluetooth on Direct Sequence Wireless LANs

Impact of Bluetooth on Direct Sequence Wireless LANs Impact of on 802.11 Direct Sequence Wireless LANs Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos, CA 95032 page 1 s Fast Frequency Hopping is a fast frequency hopping system focused on PAN

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

osmo-gmr: Intro to receiving GMR-1 satphones

osmo-gmr: Intro to receiving GMR-1 satphones CyberSpectrum, September, 2016 Introduction Outline 1 Introduction 2 GMR-1 3 GMR-1 Reception 4 Final words About the speaker Linux and free software geek since 1999 M.Sc. in C.S. + some E.E. General orientation

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

DA1220-B41 CAT-iq 2.0 PP ETSI TS ETSI TS ETSI EN Generic Access Profile ETSI TS

DA1220-B41 CAT-iq 2.0 PP ETSI TS ETSI TS ETSI EN Generic Access Profile ETSI TS DA1220-B41 CAT-iq 2.0 PP ETSI TS 102 527-1 ETSI TS 102 527-3 ETSI EN 300 444 - Generic Access Profile ETSI TS 102 841 1 pa g e D a t a S h e e t D A 1 220 - B 4 1 V 1. 0 2 0 1 5 Technical Data CAT-iq 2.0

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation

More information

CIS 700/002 : Special Topics : Bluetooth: With Low Energy comes Low Security

CIS 700/002 : Special Topics : Bluetooth: With Low Energy comes Low Security CIS 700/002 : Special Topics : Bluetooth: With Low Energy comes Low Security Kamenee Arumugam CIS 700/002: Security of EMBS/CPS/IoT Department of Computer and Information Science School of Engineering

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

More information

WiMedia Media Access Control (MAC) Dan Froelich

WiMedia Media Access Control (MAC) Dan Froelich WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

WIRELESS LANs: THE DECT APPROACH

WIRELESS LANs: THE DECT APPROACH WIRELESS LANs: THE DECT APPROACH Anthony Lo Centre for Wireless Communications National University of Singapore 20 Science Park Road #02-34/37 TeleTech Park Singapore Science Park II Singapore 117674 Email:

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

RF69 Communication Example

RF69 Communication Example RF69 Communication Example AN-2001 VER1.1 This chapter will guide the user to carry out a pair of RF69 transmitting and receiving communication experiment through HopeDuino. RF69 is a main push wireless

More information

Configuring Advanced Radio Settings on the WAP371

Configuring Advanced Radio Settings on the WAP371 Article ID: 5069 Configuring Advanced Radio Settings on the WAP371 Objective Radio settings are used to configure the wireless radio antenna and its properties on the wireless access point (WAP) device

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007.

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007. Modems, DSL, and Multiplexing CS158a Chris Pollett Feb 19, 2007. Outline Finish up Modems DSL Multiplexing The fastest modems Last day, we say the combinations and phases used to code symbols on a 2400

More information

An Experimental Study of Network Performance Impact of Increased Latency in SDR

An Experimental Study of Network Performance Impact of Increased Latency in SDR An Experimental Study of Network Performance Impact of Increased Latency in SDR Thomas Schmid Oussama Sekkat Mani B. Srivastava - Wintech workshop was started with the Keynote from Eric Blossom on GNU

More information

Understanding Routers, Switches, and Network Hardware

Understanding Routers, Switches, and Network Hardware Understanding Routers, Switches, and Network Hardware Rather than start off with a glossary of networking terms and in the process slam you with a technical terms with no easy point of reference let s

More information

SOFTWARE IMPLEMENTATION OF IEEE B WIRELESS LAN STANDARD. Suyog D. Deshpande (Sr. MTS: HelloSoft, Inc, San Jose, CA, USA;

SOFTWARE IMPLEMENTATION OF IEEE B WIRELESS LAN STANDARD. Suyog D. Deshpande (Sr. MTS: HelloSoft, Inc, San Jose, CA, USA; SOFTWARE IMPLEMENTATION OF IEEE 802.11B WIRELESS LAN STANDARD Suyog D. Deshpande (Sr. MTS: HelloSoft, Inc, San Jose, CA, USA; suyog@hellosoft.com) ABSTRACT Software-Defined Radio (SDR) is a rapidly evolving

More information

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001 3G Wireless from an Operator s Perspective David T. Shimozawa Technology Development Page 1 Introduction Background CDMA Evolution Services and Market Issues Technology Issues Spectrum Issues Network Evolution

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

Hacking the Fast Lane: security issues in p, DSRC and WAVE

Hacking the Fast Lane: security issues in p, DSRC and WAVE Hacking the Fast Lane: security issues in 802.11p, DSRC and WAVE Bruno Gonçalves de Oliveira boliveira@trustwave.com Rob Havelt rhavelt@trustwave.com THIS IS NOT A USER-MODE CALLBACK TO RING0 PRESENTATION

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

GIGABIT ETHERNET XMVR LAN SERVICES MODULES

GIGABIT ETHERNET XMVR LAN SERVICES MODULES GIGABIT ETHERNET XMVR LAN SERVICES MODULES DATA SHEET Ixia's Gigabit Ethernet XMVR LAN Services Modules (LSMs) offer Layer 2-3 network testing functionality in a single test system. Each test port supports

More information

DA1150 DECT Examiner Installation & Usage Guide Version 1.1

DA1150 DECT Examiner Installation & Usage Guide Version 1.1 DA1150 DECT Examiner Installation & Usage Guide Version 1.1 according ETSI Standards DECT GAP, CAT-iq 2.0/2.1/3.0, DECT ULE EU, US, Brazil, and LATAM DECT 1 pa g e I n s t a l l a t i o n & U s a g e G

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

BlueW-2310 Slim Dongle STA-UI-A005G WiFi & Bluetooth v2.1+edr Datasheets

BlueW-2310 Slim Dongle STA-UI-A005G WiFi & Bluetooth v2.1+edr Datasheets BlueW-2310 Slim Dongle STA-UI-A005G WiFi & Bluetooth v2.1+edr Datasheets Version 1.1 CONTENT 1 Introductions... 3 1.1 Features and Benefits... 3 1.2 Module System Diagram... 4 1.3 Product Specifications...

More information

Parallel Computing. Prof. Marco Bertini

Parallel Computing. Prof. Marco Bertini Parallel Computing Prof. Marco Bertini Modern CPUs Historical trends in CPU performance From Data processing in exascale class computer systems, C. Moore http://www.lanl.gov/orgs/hpc/salishan/salishan2011/3moore.pdf

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information