Wireless USB Protocol John S. Howard. Senior Architect Intel Corporation
|
|
- Lindsay Malone
- 6 years ago
- Views:
Transcription
1 Wireless USB Protocol John S. Howard Senior Architect Intel Corporation
2 Agenda Protocol Components Data Transfers (general model) Device Notifications Flow Control 2
3 Wireless USB Channel Review Beacon Period t=0 Wiedia AC DRP WUSB DRP WUSB Wiedia Physical Layer Channel Time Beacon Beacon Superframe n Superframe n+1 Period Period DRP WUSB DRP WUSB DRP WUSB DRP WUSB t=0 t=0 C C C C C C C C C C Wireless USB Channel The Wireless USB Channel is encapsulated by the Wiedia channel Wireless USB channel is continuous sequence of linked control packets transmitted by the Host during reserved Wiedia channel time WUSB time is reserved from Wiedia channel time (DRPs) Called s icro-schedule anagement Commands All Wireless USB Data communications are over the Wireless USB Channel 3
4 Packet Layout N * 6 OFD Symbols 12 OFD Symbols 30 OFD Symbols Non-secure Packet Format msb Pad Bits Tail Bits FCS Payload Variable Length: Z or more bytes Tail Bits AC PHY HCS Header Header PLCP Preamble lsb IC (8) Secure Packet Format Application Payload (Variable Length: 0 to axpacketsize) Isochronous Packet Format WUSB Hdr (2) SFN (6) Encrypt Offset (2) Rsrvd (1) TKID (3) Acc Info (2) Seq. Control (2) SrcID (2) Type [8:6] Delivery Ident/Control Frame Subtype [12:9] (011B) Data Frame [12] = 1B; [11:9] = Stream Index (001B) Control Frame [12:9] = Application Defined Control Value DestID Frame (2) Control (2) bmstatus (1) bmattributes (1) Isochronous Header (3) Isochronous Segment0 Isochronous Segment1 Endpoint Number [3:0] Packet ID [6:4] bnumisosegments (1) wpresentationtime (2) wlength (2) Segment Data (wlength) Isochronous SegmentbNumIsoSegments -1 Cypher Text (Encrypted Data) Wiedia AC Packet format Utilizes Secure frame format 4
5 Wireless USB Channel plus time till next Channel Time Dynamically Allocated for Data Communications Between the Host and Devices in its Wireless USB Cluster Information Elements Next Time Basic structure used to maintain Wireless USB Channel Transaction Group 5
6 Transaction Group Channel Time Allocations [WCTA_IE] Data & Handshake Phase & Device Notification Time Slots WCTA_IE Header WXCTA[0] Attributes Endpoint Info Flags Slot Type Start Time WXCTA[1] WXCTA [EOL] Protocol Time Slot Start Time (µs) Type-Specific Start Time is easured from the beginning of the packet (µs) Next Time Transaction Group 6
7 Transaction Group Slot Durations Slot time durations are derived from adjacent W X CTA blocks OUTs device know when they can stop listening INs devices transmit what was requested EOL W X CTA is always required to be present WCTA_IE Header WXCTA [0] Attributes Endpoint Info Flags Slot Type Start Time WXCTA [1] Attributes Endpoint Info Flags Slot Type Start Time WXCTA [EOL] Protocol Time Slot [0] Start Time [0] Protocol Time Slot [1] Start Time [1] Type-Specific Type-Specific Next Time Transaction Group 7
8 Time Slot Allocations Three types of time slots: W DR CTA (Device Receive) W DT CTA (Device Transmit) W DNTS CTA (Device Notification) time slot W_CTA W DR CTA W DNTS CTA W DT CTA W DR CTA W DNTS CTA W DT CTA 8
9 Time Slot Allocations [cont.] W DR CTA, W DT CTAs are used for Transaction Protocol Control, Bulk, Interrupt and Isochronous data streams Access is : guaranteed time slot Schedule based on client application data flow needs W DNTS CTAs used to emulate USB signaling events Connect, disconnect, etc. Access is : contention based - Slotted Aloha Host schedules sufficient number of slots to provide adequate service for the cluster 9
10 Transaction Group Protocol Synchronization Scheduled Time Slots in preamble (n-1) TS[0] TS[1] TS[2] TS[3] TS[4] preamble (n) t=0 Time at which a Receiver must be listening before the slot start time t G UARDTIE Slot start time according to Device s local clock Transmitter could begin transmitting anywhere in this window (±t AXDRIFT ) Time at which a receiver must be listening before the scheduled start of the ((n-1) Next) t G UARDTIE t=0 start time according to Device s local clock Host could begin transmitting (n) anywhere in this window (±t AXDRIFT ) 10
11 Transaction Group Protocol Synchronization (cont.) PHY_ACTIVE 24 OFD Symbols Sync Delay Radio edium PLCP Preamble PLCP Header t0 30 OFD Symbols t0 is the time of the first symbol of the s preamble Devices can calculate this from the edge of PHY_ACTIVE 11
12 Time Slot Scheduling Requirements Host Transmitted Packets Device Transmitted Packets TS[0] TS[1] TS[2] TS[3] TS[4] data t B USTURNI NTERS LOTTIEE Standard Preamble PHY Hdr data t INTERS LOTTIE + tguardtie Standard Preamble PHY Hdr Data Packet for TS[3] Packet data tbusturni NTERSLOTT IE Standard Preamble PHY Hdr Data Packet for TS[2] data tinters LOTTIE Standard Preamble PHY Hdr Data Packet for TS[1] t I NTERS LOTTIE Standard Preamble PHY Hdr Data Packet for TS[0] The first packet transmitted in a protocol time slot must have a standard preamble 12
13 Data Burst Timing to first Data OUT : IFS (1.875 µs) to first Data IN : Bus Turn Time Bus Turn + Guard Time (SIFS + 1µs) (11 µs) IPGs between burst packets is fixed (IFS) First packet Preamble must be Standard Length Host determines subsequent preamble to use OUT Data Phase Time Slot Standard Preamble PHY Hdr data Short /Std Preamble PHY Hdr data t INTERSLOTTIE t STREAIPG t STREAIPG t BUSTURNINTERSLOTTIE Standard Preamble PHY Hdr data Short/Std Preamble PHY Hdr data IN Data Phase Time Slot 13
14 Agenda Protocol Components Data Transfers (general model) Device Notifications Flow Control 14
15 Data Stream Synchronization Basic odel Protocol-level support for reliable data delivery Identifies: Data ordering requirements Guarantees advancement of data stream only after reliable data delivery Terms: aximum Burst Size aximum Sequence aximum Sequence Distance Transmit Window Data Packet Burst (S0, S1, S2, S3) Acknowledgement ( B) Transmitter sends data packets associated with Transmit window Sequence numbers Receiver acknowledges with new receive window (what is available now) Protocol rules for recovering lost packets, avoiding sequence range wrap, etc. See Bursting Session Receive Window
16 Transaction Transmit Bit Rate s are transmitted at base signaling rate (53.3 b/s) Host dictates transmit bit rate for data and handshake phase transmissions Transmit bit rate applies to entire phase OUTs : host uses only TBRs supported by device (assumes Tx/Rx symmetry) INs :.PHY_TXRate directs which TBR device must use during protocol time slot Handshakes: Host must use base signaling rate for a handshake time slot (OUTs) Host must ensure a data phase time slot is always large enough to accommodate a handshake transmitted at base signaling rate 16
17 Transaction Format General odel Idle IN OUT Token W DT CTA W DR CTA W DT CTA Smashed Direction = IN = 1 bvdinack PHY_TXRate Data not Ready, or Internal Error Smashed Direction = OUT = 0 Data Data IN Phase Data Packets DATA (Seq# N) DATA (Seq# N+1)... DATA (Seq# N+Y) HNDSK NAK or STALL Data OUT Phase Data Packets DATA (Seq# N) DATA (Seq# N+1)... DATA (Seq# N+Y) Number of packets in data phase depends on Transaction Burst Size or available data. The next Sequence number is always derived (N+1) modulo axsequence. Handshake W DT CTA HNDSK ACK (bvackcode) or NAK or STALL bvdinack Idle Idle 17
18 Data IN Transfer Streaming Example TokenI.bvDINAcK =001 H TokenI.bvDINAcK =002H (Token I) Data (S0) (Token I) Data (S1) Transaction Group N Transaction Group N + 1 Transaction 1 Transaction 0 Transaction 2 W DT CTA (IN) bvdinack = 001H DATA(S0) (Use Data) W DT CTA (IN) bvdinack = 002H DATA(S1) (Use Data) W DT CTA (IN) bvdinack = 001H Device EP TX Device EP TX Host TX () 18
19 Data IN Transfer End Of Transfer Example bvdinack=002h (Token I) Data (S1) (Token I) EOL Blank BlanK.wStart = NextWxCTA.wStart TokenI. bvdinack=000h Transaction Group N Transaction Group N + 1 Transaction N-1 Transaction N W DT CTA (IN) bvdinack = 002H DATA(S1) (Use Data) Blank W DT CTA (IN) bvdinack = 000H wstart = NextWxCTA.wStart End of List WxCTA (EOL) Device EP TX 19
20 Data IN Transfer Short Packet Example TokenI.bvDINAcK =001 H TokenI.bvDINAcK =002H W D TCTA (Token I) Data (S0) LastPacketFlag = 1B W DTCTA (Token I) Blank W DTCTA Transaction Group N Transaction Group N + 1 Transaction 0 W DT CTA (IN) bvdinack = 001H DATA(S0) LastPacketFlag = 1 (Use Data) Transaction 1 W DT CTA (IN) bvdinack = 002H Device EP TX Host may commence next transfer immediately (if buffer available) 20
21 Data OUT Transfers Streaming Example Token Phase Data Phase Handshake Phase Data (S 0) AcK Data (S 1) AcK WDRCTA (Token O) (Hndsk O) bvackcode 10B WDRCTA (Token O) (Hndsk O) bvackcode 01B Transaction Group N Transaction Group N + 1 Transaction 1 Transaction 0 W DR CTA (OUT) W DT CTA (Handshake) DATA(0) (Use Data) HNDSHK bvackcode = 02H W DR CTA (OUT) W DT CTA (Handshake) DATA(1) (Use Data) HNDSHK bvackcode = 01H Host TX () Host TX Device EP TX Host TX () Host TX Device EP TX 21
22 Data OUT Transfers Short Packet Example LastPacketFlag = 1 Data (S 0) AcK W DRCTA (Token O) (Hndsk O) bvackcode 002 H Transaction Group N Transaction Group N + 1 Transaction 0 Transaction 1 W DR CTA (OUT) W DT CTA (Handshake) DATA(0) LastPacketFlag = 1 (Use Data) HNDSHK bvackcode = 02H Host TX () Host TX Device EP TX Host TX () Host may commence next transfer immediately (if data available) 22
23 Control Transaction Format Setup Stage w/data Stage Setup + first IN Data Stage transaction Idle Setup + first OUT Data Stage transaction Setup Bytes WDRCTA Setup Bytes Token w/setup Setup Flag = 1B ControlStatusFlag= 0B Direction = IN = 1 PHY_TXRate bvdinack= 001H Setup Flag = 1B Direction = OUT = 0 Direction = OUT = 0B Data not Ready, or Bad Command Data Smashed DataIN Phase Data Packet DATA (Seq# 0) HNDSK NAK or STALL Smashed Data OUT Phase Data Packet DATA (Seq# 0) Handshake HNDSK ACK (bvackcode) or NAK or STALL Idle bvdinack Idle 23
24 Control Transaction Format Setup w/no Data Stage; Bare Status Stage Setup + No Data Stage Idle Status Stage Token Setup Bytes Setup Flag = 1B ControlStatusFlag= 1B Direction = IN = 1 Setup Flag = 0B ControlStatusFlag= 1B Direction = IN = 1 Data Handshake Smashed HNDSK ACK or NAK or STALL Smashed HNDSK ACK or NAK or STALL Idle Idle 24
25 Control Transfer Example (Set Address - No Data Stage) W DTCTA (S tat us Stage) Setup Bytes (8) Status Stage - Handshake Handshake ETC. Setup Stage Status Stage Transaction Group N Transaction Group N+1 Transaction 0 W DT CTA SetupFlag = 1B Ctrl/StatusFlg = 1B (Handshake) Setup Bytes (8) set address Host TX () Setup Stage HNDSHK Hndshk code = ACK bvackcode = 00H Direction = IN Device EP TX Status Stage Host TX () 25
26 Control Transfer Example (Control Write - SetKey) Std. Out Transaction Handshake Transaction WDRCTA (Token O) (Hndsk O) Data (seq = 0) Length = Y AcK (Status Stg) HNSK ETC. Setup Flag = 1 Setup Stage Setup Bytes (8) Data Stage ControlStatusFlag= 1 Status Stage Transaction Group N Transaction Group N+1 Transaction Group N+2 Transaction 0 Transaction 1 W DR CTA SetupFlag = 1B Ctrl/StatusFlag = 0B (Handshake) Setup Bytes (8) set Key W DT CTA - handshake Data Out Seq = 0B (Set Key) HNDSHK Hndshk code = ACK bvackcode = 02H W DT CTA SetupFlag = 0B Ctrl/StatusFlag = 1B (Handshake) HNDSHK Hndshk code = ACK bvackcode = 00H Direction = IN Host TX () Host TX Device EP TX Host TX () Device EP TX Setup Stage Data Stage Status Stage 26
27 Control Transfer (Control Write SetKey lost data packet) Std. Out Transaction Std. Out Transaction Handshake Transaction (Token I) (Hndsk O) X Data (seq = 0) Length = Y AcK WDRCTA (Token O) (Hndsk O) Data (seq = 0) Length = Y AcK (Status Stg) HNSK ETC. Setup Flag = 1 Setup Bytes (8) bvackcode = 001H bvackcode = 002H ControlStatusFlag = 1 Setup Stage Data Stage Status Stage Transaction Group N Transaction Group N+1 Transaction Group N+2 Transaction 0 Transaction 1 W DR CTA SetupFlag = 1B Ctrl/StatusFlag = 0B (Handshake) Setup Bytes (8) set Key W DT CTA - handshake Data Out Seq = 0B (Set Key) HNDSHK Hndshk code = ACK bvackcode = 01H W DR CTA SetupFlag = 0B Ctrl/StatusFlag = 0B W DT CTA - handshake Data Out Seq = 0B (Set Key HNDSHK Hndshk code = ACK bvackcode = 02H Host TX () Host TX Device EP TX Host TX () Host TX Device EP TX Setup Stage Data Stage 27
28 Control Transfer Example (Control Read Get Descriptor) Std. IN Transaction Handshake Transaction (Token I) Setup Bytes Data (seq = 0) Length = Y (Status Stg) HNSK ETC. Setup Stage SetupFlag = 1 Data Stage StatusStageFlag = 1 Status Stage bvdinack = 002H Transaction Group N Transaction Group N+1 Transaction 0 Transaction 1 W DT CTA SetupFlag = 1B Ctrl/StatusFlag = 0B bvdinack = 001H Setup Bytes (8) Get Descriptor Data IN Seq = 1B (Get Descriptor Data) W DT CTA SetupFlag = 0B Ctrl/StatusFlag = 1B bvdinack = 002H (Handshake) HNDSHK Hndshk code = ACK bvackcode = 00H Direction = IN Host TX () Device EP TX Host TX () Device EP TX Setup Stage Data Stage Status Stage 28
29 Control Transfer Example (Control Read Get Descriptor) Data packet gets smashed Host will retry Data Stage If device saw Setup, will respond with Data Std. IN Transaction (Token I) Data (seq = 0) Handshake Transaction (Status Stg) HNSK ETC. (Token I) SetupBytes X Data (seq = 0) Length = Y bvdinack = 002H StatusStageFlag = 1 Handshake Transaction SetupFlag = 1 If device did not see a Setup, will respond with STALL (Token I) HNSK (STALL) (Token I) Setup Bytes Data (seq = 0) (Status Stg) StatusStageFlag = 1 HNSK ETC. bvdinack = 002H 29
30 Agenda Packet Layouts Transaction Groups Timing Constraints Data Transfers (general model) Device Notifications Flow Control 30
31 Device Notifications Time Slots DNTS Devices are only allowed transmitters Device notification messages (to the WUSB Host) are only allowed data communications Nature of notification messages are that they are asynchronous and infrequent Fixed aximum Size for notification messages Take advantage of this in the access method Host policy to manage efficiently Unused time is just lost to WUSB data stream 31
32 DNTS Access ethod Contention Based : Slotted Aloha Fixed (maximum) sized message DNTS is a window of uniform sized message slots W DNTS CTA indicates number of message slots Device selects a message slot using a uniformly distributed random integer value (in range 1 to N) Device transmits message a message slot start time W DNTS CTA # Slots (N) DNTS CTA Start 123 N Slot Select = uniform(1, N) 32
33 Device Notifications Reliability Protocol for Device Notifications is designed for unreliability: Notification(s) Host Response Device Continues to send Notifications until it observes Host Response Host will cease response when it observes follow-up device response (when applicable) Host must tolerate retransmissions of notification that occur while it is responding Device must tolerate Host response retransmissions Device Response 33
34 Device Notification Example (Device Perspective) - Connect UnConnected Initiate Connect Xmit Notification Transmit (DN_Connect, Self-Beaconing, ycdid) Sending Notification DNTS Available Wait For Connect ACK Receive [ConnectAck_IE [ycdid, DeviceAddress] [ ]] Connected Connect Ack 34
35 Agenda Packet Layouts Transaction Groups Timing Constraints Data Transfers (general model) Device Notifications Flow Control 35
36 Flow Control Used on All transfer types Device provides flow-control information in it s response to the host bmstatus field in the WUSB Header of a Data, IData or Handshake OUTs, the flow control response is in the AcK handshake INs, the flow control response is in the Data(x) packet Handshake encoded with NAKs always available Flow control status from Endpoint results in removal of endpoint from Active schedule Resumption of service to a flow-controlled endpoint depends on transfer type Bulk & Control Device delivers a Endpoint Ready (DN_EPRdy) notification to the host during an DNTS Interrupt & Isochronous Next service interval 36
37 Control Transfer Example (Control Read Flow Control) (Token I) Setup Stage SetupFlag = 1 Setup Bytes NAK HNSK Data Stage WDNTSCTA DN_EPRdy (Token I) Std. IN Transaction Data (seq = 0) Length = Y Data Stage (cont.) Handshake Transaction W DT CTA (Status Stg) Status Stage HNSK StatusStageFlag = 1 ETC. bvdinack = 002H Transaction Group N Transaction Group Y Transaction Group Z Transaction Group Z+1 Host stops polling endpoint on NAK Device notifies it is ready with DN_EPRdy Host resumes polling endpoint Retries data phase transaction in this example 37
38 Track II Announcement
Certified Wireless USB Protocol Dan Froelich
Certified Wireless USB Protocol Dan Froelich Intel Corporation Content also provided by: John S. Howard, Intel Corporation Agenda Protocol Components Data Transfers (general model) Device Notifications
More informationWUSB Command Verifier (WUSBCV) Compliance Test Specification. Based on the Certified Wireless Universal Serial Bus Specification, Revision 1.
WUSB Command Verifier (WUSBCV) Compliance Test Specification Revision 1.0 Based on the Certified Wireless Universal Serial Bus Specification, Revision 1.0 The information is this document is under review
More informationHigh-Speed WUSB Technology Based on WiMedia.
High-Speed WUSB Technology Based on WiMedia ysnam@dongguk.ac.kr KRnet 2006 Contents I. MBOA/Wimedia/WUSB II. Wireless USB Specification III. WUSB Development Systems IV. Conclusions KRnet 2006 I. MBOA
More informationWireless USB Periodic Transfer Models. Dan Froelich Intel
Wireless USB Periodic Transfer Models Dan Froelich Intel Agenda Wired Isochronous Model Overview Key Features Wireless Media Reliability Coexistence (Shared With Other Hosts And UWB Devices) Wireless USB
More informationWireless USB Architecture Overview Brad Hosler. Intel Corporation
Wireless USB Architecture Overview Brad Hosler Intel Corporation Agenda Devcon goals Radio environment (common platform) High level architecture Compliance environment Intellectual Property Industry Enabling
More informationInterrupt transfers & USB 2.0 & USB 3.0. Group Members Mehwish Awan Mehwish Kiran
Interrupt transfers & Isochronous transfers in USB 2.0 & USB 3.0 Group Members Mehwish Awan Mehwish Kiran Agenda What is isochronous transfer? Use of isochronous transfer Format of isochronous transactions
More informationWiMedia Media Access Control (MAC) Dan Froelich
WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia
More informationCertified Wireless USB Wire Adapter Model
Certified Wireless Wire Adapter Model Abdul R. Ismail Intel Corporation Content also provided by: Matt Katagiri, NEC Agenda Overview Software-Hardware Overview Delivery Mechanism: RPipe Hardware Architecture
More informationIEEE P Wireless Personal Area Networks
Project Title IEEE P802.15 Wireless Personal Area Networks IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) JCS Proposed Changes Date Submitted Source Re: [28 April, 2004] [John C.
More informationUniversal Serial Bus - USB 2.0
USB Packet Types USB has four packet types Token packets (type of transaction) Data Packets (payload / information) Handshake Packets (ack & error correction) Start of Frame packets (flag start of a new
More informationDevelopers Conference 2006 Taipei, Taiwan
Developers Conference 2006 Taipei, Taiwan Certified Wireless USB Architecture Overview Brad Hosler Intel Corporation Agenda Devcon goals Radio environment (common platform) High level architecture Compliance
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationUSB Feature Specification: Shared Endpoints
USB Feature Specification: Shared Endpoints SYSTEMSOFT CORPORATION INTEL CORPORATION Revision 1.0 October 27, 1999 USB Feature Specification: Shared Endpoints Revision 1.0 Revision History Revision Issue
More informationCertified Wireless USB Compliance
Certified Wireless USB Compliance Dan Froelich Staff Architect/Engineer Intel Corporation Agenda Compliance Program Goals Compliance Process Compliance Devices Test Areas WiMedia WiMedia Mac WiMedia Coexistence
More informationUWBTRACER /TRAINER. Protocol Verification for Certified Wireless USB (WUSB) and WiMedia Ultra Wideband Applications
UWBTRACER /TRAINER Protocol Verification for Certified Wireless USB (WUSB) and WiMedia Ultra Wideband Applications LeCroy s UWBTracer/Trainer system is the industry s most advanced verification tool for
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationComputer Peripherals
Computer Peripherals School of Computer Engineering Nanyang Technological University Singapore These notes are part of a 3rd year undergraduate course called "Computer Peripherals", taught at Nanyang Technological
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationThe Link Layer II: Ethernet
Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationDevice Wire Adapter (DWA) Test Specification. Designed using the Certified Wireless USB Base Specification, Revision 1.0
Device Wire Adapter (DWA) Test Specification Designed using the Certified Wireless USB Base Specification, Revision 1.0 Date: September 27, 2006 Revision: 1.0 Review Draft The information is this document
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationMobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods
Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where
More informationLecture (08) Wireless Traffic Flow and AP Discovery
Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame
More informationAppendix A Pseudocode of the wlan_mac Process Model in OPNET
Appendix A Pseudocode of the wlan_mac Process Model in OPNET static void wlan_frame_transmit () { char msg_string [120]; char msg_string1 [120]; WlanT_Hld_List_Elem* hld_ptr; const WlanT_Data_Header_Fields*
More informationMore on IO: The Universal Serial Bus (USB)
ecture 37 Computer Science 61C Spring 2017 April 21st, 2017 More on IO: The Universal Serial Bus (USB) 1 Administrivia Project 5 is: USB Programming (read from a mouse) Optional (helps you to catch up
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationEECE494: Computer Bus and SoC Interfacing. USB (Universal Series Bus) Dr. Charles Kim Electrical and Computer Engineering Howard University
EECE494: Computer Bus and SoC Interfacing USB (Universal Series Bus) Dr. Charles Kim Electrical and Computer Engineering Howard University Spring 2014 1 Review - Line Code Line Code = Digital Baseband
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationDevelopers Conference 2007 Amsterdam, The Netherlands
Developers Conference 2007 Amsterdam, The Netherlands Wireless USB 1.1 Additions and Improvements Rahman Ismail Sr. Software Architect Intel Corporation Focus Areas Wireless USB Additions/Modifications
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationSTUDY, DESIGN AND SIMULATION OF FPGA BASED USB 2.0 DEVICE CONTROLLER
STUDY, DESIGN AND SIMULATION OF FPGA BASED USB 2.0 DEVICE CONTROLLER 1 MS. PARUL BAHUGUNA CD 1 M.E. [VLSI & Embedded System Design] Student, Gujarat Technological University PG School, Ahmedabad, Gujarat.
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More informationCross Layer QoS Provisioning in Home Networks
Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationoutline background & overview mac & phy wlan management security
IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a
More informationMicroprocessors LCD Parallel Port USB Port
Microprocessors LCD Parallel Port USB Port H. Abdoli Bu-Ali Sina University 1 New LCDs Interfacing Lower prices Display numbers, characters, graphics Integrated refreshing controller Ease of programming
More informationWiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.
WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationEEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationIEEE WLAN (802.11) Copyright. Nomadic Communications
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
More informationWLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationSerial Communications
Serial Communications p. 1/2 Serial Communications CSEE W4840 Prof. Stephen A. Edwards Columbia University Early Serial Communication Serial Communications p. 2/2 Data Terminal Equipment Serial Communications
More informationSerial Communications
Serial Communications p. 1/2 Serial Communications Prof. Stephen A. Edwards sedwards@cs.columbia.edu Columbia University Spring 2007 Early Serial Communication Serial Communications p. 2/2 Data Terminal
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationUNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.
Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless
More informationRadio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building
Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationChannel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks
Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationWiMOD LoRaWAN EndNode Modem HCI Specification
WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information
More informationCHAPTER 8: LAN Standards
CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationOptional Point Coordination Function (PCF)
Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationData Communications & Computer Networks. Digital Data Communications Techniques
Data Communications & Computer Networks Chapter 6 Digital Data Communications Techniques Fall 2008 Agenda Preface Asynchronous & Synchronous transmission Error Detection & Correction Line configurations
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationUSB Compliance Checklist
USB Compliance Checklist Peripheral Silicon (excluding hubs) July 19, 1999 USB Device Product Information Date July 19, 1999 Vendor Name Motorola Vendor Street Address Vendor City, State, Zip Vendor Phone
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at
More informationBachelor Thesis MAC Layer Implementation of the IEEE c Standard
Bachelor Thesis MAC Layer Implementation of the IEEE 802.15.3c Standard Alberto Arco Miras September 2010 Prof. Dr.-Ing. Tomas Kürner Tutor: Dipl.-Ing. Marcos Liso Department of Mobile Radio Systems Institute
More informationLecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW
Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationCLD SC58x CDC Library v.1.00 Users Guide Users Guide Revision For Use With Analog Devices ADSP-SC58x Series Processors. Closed Loop Design, LLC
CLD SC58x CDC Library v.1.00 Users Guide Users Guide Revision 1.00 For Use With Analog Devices ADSP-SC58x Series Processors Closed Loop Design, LLC 748 S MEADOWS PKWY STE A-9-202 Reno, NV 89521 support@cld-llc.com
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationCLD BF70x CDC Library v.1.3 Users Guide Users Guide Revision 1.3. For Use With Analog Devices ADSP-BF70x Series Processors. Closed Loop Design, LLC
CLD BF70x CDC Library v.1.3 Users Guide Users Guide Revision 1.3 For Use With Analog Devices ADSP-BF70x Series Processors Closed Loop Design, LLC 748 S MEADOWS PKWY STE A-9-202 Reno, NV 89521 support@cld-llc.com
More informationProject: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [A MAC proposal for LECIM] Date Submitted: [September, 2011] Source: [Kyungsup Kwak, Jaedoo Huh*, M. Al Ameen, Niamat
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host
More informationCSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP
CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use
More informationNomadic Communications WLAN MAC Fundamentals
Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More information