Wireless USB Protocol John S. Howard. Senior Architect Intel Corporation

Size: px
Start display at page:

Download "Wireless USB Protocol John S. Howard. Senior Architect Intel Corporation"

Transcription

1 Wireless USB Protocol John S. Howard Senior Architect Intel Corporation

2 Agenda Protocol Components Data Transfers (general model) Device Notifications Flow Control 2

3 Wireless USB Channel Review Beacon Period t=0 Wiedia AC DRP WUSB DRP WUSB Wiedia Physical Layer Channel Time Beacon Beacon Superframe n Superframe n+1 Period Period DRP WUSB DRP WUSB DRP WUSB DRP WUSB t=0 t=0 C C C C C C C C C C Wireless USB Channel The Wireless USB Channel is encapsulated by the Wiedia channel Wireless USB channel is continuous sequence of linked control packets transmitted by the Host during reserved Wiedia channel time WUSB time is reserved from Wiedia channel time (DRPs) Called s icro-schedule anagement Commands All Wireless USB Data communications are over the Wireless USB Channel 3

4 Packet Layout N * 6 OFD Symbols 12 OFD Symbols 30 OFD Symbols Non-secure Packet Format msb Pad Bits Tail Bits FCS Payload Variable Length: Z or more bytes Tail Bits AC PHY HCS Header Header PLCP Preamble lsb IC (8) Secure Packet Format Application Payload (Variable Length: 0 to axpacketsize) Isochronous Packet Format WUSB Hdr (2) SFN (6) Encrypt Offset (2) Rsrvd (1) TKID (3) Acc Info (2) Seq. Control (2) SrcID (2) Type [8:6] Delivery Ident/Control Frame Subtype [12:9] (011B) Data Frame [12] = 1B; [11:9] = Stream Index (001B) Control Frame [12:9] = Application Defined Control Value DestID Frame (2) Control (2) bmstatus (1) bmattributes (1) Isochronous Header (3) Isochronous Segment0 Isochronous Segment1 Endpoint Number [3:0] Packet ID [6:4] bnumisosegments (1) wpresentationtime (2) wlength (2) Segment Data (wlength) Isochronous SegmentbNumIsoSegments -1 Cypher Text (Encrypted Data) Wiedia AC Packet format Utilizes Secure frame format 4

5 Wireless USB Channel plus time till next Channel Time Dynamically Allocated for Data Communications Between the Host and Devices in its Wireless USB Cluster Information Elements Next Time Basic structure used to maintain Wireless USB Channel Transaction Group 5

6 Transaction Group Channel Time Allocations [WCTA_IE] Data & Handshake Phase & Device Notification Time Slots WCTA_IE Header WXCTA[0] Attributes Endpoint Info Flags Slot Type Start Time WXCTA[1] WXCTA [EOL] Protocol Time Slot Start Time (µs) Type-Specific Start Time is easured from the beginning of the packet (µs) Next Time Transaction Group 6

7 Transaction Group Slot Durations Slot time durations are derived from adjacent W X CTA blocks OUTs device know when they can stop listening INs devices transmit what was requested EOL W X CTA is always required to be present WCTA_IE Header WXCTA [0] Attributes Endpoint Info Flags Slot Type Start Time WXCTA [1] Attributes Endpoint Info Flags Slot Type Start Time WXCTA [EOL] Protocol Time Slot [0] Start Time [0] Protocol Time Slot [1] Start Time [1] Type-Specific Type-Specific Next Time Transaction Group 7

8 Time Slot Allocations Three types of time slots: W DR CTA (Device Receive) W DT CTA (Device Transmit) W DNTS CTA (Device Notification) time slot W_CTA W DR CTA W DNTS CTA W DT CTA W DR CTA W DNTS CTA W DT CTA 8

9 Time Slot Allocations [cont.] W DR CTA, W DT CTAs are used for Transaction Protocol Control, Bulk, Interrupt and Isochronous data streams Access is : guaranteed time slot Schedule based on client application data flow needs W DNTS CTAs used to emulate USB signaling events Connect, disconnect, etc. Access is : contention based - Slotted Aloha Host schedules sufficient number of slots to provide adequate service for the cluster 9

10 Transaction Group Protocol Synchronization Scheduled Time Slots in preamble (n-1) TS[0] TS[1] TS[2] TS[3] TS[4] preamble (n) t=0 Time at which a Receiver must be listening before the slot start time t G UARDTIE Slot start time according to Device s local clock Transmitter could begin transmitting anywhere in this window (±t AXDRIFT ) Time at which a receiver must be listening before the scheduled start of the ((n-1) Next) t G UARDTIE t=0 start time according to Device s local clock Host could begin transmitting (n) anywhere in this window (±t AXDRIFT ) 10

11 Transaction Group Protocol Synchronization (cont.) PHY_ACTIVE 24 OFD Symbols Sync Delay Radio edium PLCP Preamble PLCP Header t0 30 OFD Symbols t0 is the time of the first symbol of the s preamble Devices can calculate this from the edge of PHY_ACTIVE 11

12 Time Slot Scheduling Requirements Host Transmitted Packets Device Transmitted Packets TS[0] TS[1] TS[2] TS[3] TS[4] data t B USTURNI NTERS LOTTIEE Standard Preamble PHY Hdr data t INTERS LOTTIE + tguardtie Standard Preamble PHY Hdr Data Packet for TS[3] Packet data tbusturni NTERSLOTT IE Standard Preamble PHY Hdr Data Packet for TS[2] data tinters LOTTIE Standard Preamble PHY Hdr Data Packet for TS[1] t I NTERS LOTTIE Standard Preamble PHY Hdr Data Packet for TS[0] The first packet transmitted in a protocol time slot must have a standard preamble 12

13 Data Burst Timing to first Data OUT : IFS (1.875 µs) to first Data IN : Bus Turn Time Bus Turn + Guard Time (SIFS + 1µs) (11 µs) IPGs between burst packets is fixed (IFS) First packet Preamble must be Standard Length Host determines subsequent preamble to use OUT Data Phase Time Slot Standard Preamble PHY Hdr data Short /Std Preamble PHY Hdr data t INTERSLOTTIE t STREAIPG t STREAIPG t BUSTURNINTERSLOTTIE Standard Preamble PHY Hdr data Short/Std Preamble PHY Hdr data IN Data Phase Time Slot 13

14 Agenda Protocol Components Data Transfers (general model) Device Notifications Flow Control 14

15 Data Stream Synchronization Basic odel Protocol-level support for reliable data delivery Identifies: Data ordering requirements Guarantees advancement of data stream only after reliable data delivery Terms: aximum Burst Size aximum Sequence aximum Sequence Distance Transmit Window Data Packet Burst (S0, S1, S2, S3) Acknowledgement ( B) Transmitter sends data packets associated with Transmit window Sequence numbers Receiver acknowledges with new receive window (what is available now) Protocol rules for recovering lost packets, avoiding sequence range wrap, etc. See Bursting Session Receive Window

16 Transaction Transmit Bit Rate s are transmitted at base signaling rate (53.3 b/s) Host dictates transmit bit rate for data and handshake phase transmissions Transmit bit rate applies to entire phase OUTs : host uses only TBRs supported by device (assumes Tx/Rx symmetry) INs :.PHY_TXRate directs which TBR device must use during protocol time slot Handshakes: Host must use base signaling rate for a handshake time slot (OUTs) Host must ensure a data phase time slot is always large enough to accommodate a handshake transmitted at base signaling rate 16

17 Transaction Format General odel Idle IN OUT Token W DT CTA W DR CTA W DT CTA Smashed Direction = IN = 1 bvdinack PHY_TXRate Data not Ready, or Internal Error Smashed Direction = OUT = 0 Data Data IN Phase Data Packets DATA (Seq# N) DATA (Seq# N+1)... DATA (Seq# N+Y) HNDSK NAK or STALL Data OUT Phase Data Packets DATA (Seq# N) DATA (Seq# N+1)... DATA (Seq# N+Y) Number of packets in data phase depends on Transaction Burst Size or available data. The next Sequence number is always derived (N+1) modulo axsequence. Handshake W DT CTA HNDSK ACK (bvackcode) or NAK or STALL bvdinack Idle Idle 17

18 Data IN Transfer Streaming Example TokenI.bvDINAcK =001 H TokenI.bvDINAcK =002H (Token I) Data (S0) (Token I) Data (S1) Transaction Group N Transaction Group N + 1 Transaction 1 Transaction 0 Transaction 2 W DT CTA (IN) bvdinack = 001H DATA(S0) (Use Data) W DT CTA (IN) bvdinack = 002H DATA(S1) (Use Data) W DT CTA (IN) bvdinack = 001H Device EP TX Device EP TX Host TX () 18

19 Data IN Transfer End Of Transfer Example bvdinack=002h (Token I) Data (S1) (Token I) EOL Blank BlanK.wStart = NextWxCTA.wStart TokenI. bvdinack=000h Transaction Group N Transaction Group N + 1 Transaction N-1 Transaction N W DT CTA (IN) bvdinack = 002H DATA(S1) (Use Data) Blank W DT CTA (IN) bvdinack = 000H wstart = NextWxCTA.wStart End of List WxCTA (EOL) Device EP TX 19

20 Data IN Transfer Short Packet Example TokenI.bvDINAcK =001 H TokenI.bvDINAcK =002H W D TCTA (Token I) Data (S0) LastPacketFlag = 1B W DTCTA (Token I) Blank W DTCTA Transaction Group N Transaction Group N + 1 Transaction 0 W DT CTA (IN) bvdinack = 001H DATA(S0) LastPacketFlag = 1 (Use Data) Transaction 1 W DT CTA (IN) bvdinack = 002H Device EP TX Host may commence next transfer immediately (if buffer available) 20

21 Data OUT Transfers Streaming Example Token Phase Data Phase Handshake Phase Data (S 0) AcK Data (S 1) AcK WDRCTA (Token O) (Hndsk O) bvackcode 10B WDRCTA (Token O) (Hndsk O) bvackcode 01B Transaction Group N Transaction Group N + 1 Transaction 1 Transaction 0 W DR CTA (OUT) W DT CTA (Handshake) DATA(0) (Use Data) HNDSHK bvackcode = 02H W DR CTA (OUT) W DT CTA (Handshake) DATA(1) (Use Data) HNDSHK bvackcode = 01H Host TX () Host TX Device EP TX Host TX () Host TX Device EP TX 21

22 Data OUT Transfers Short Packet Example LastPacketFlag = 1 Data (S 0) AcK W DRCTA (Token O) (Hndsk O) bvackcode 002 H Transaction Group N Transaction Group N + 1 Transaction 0 Transaction 1 W DR CTA (OUT) W DT CTA (Handshake) DATA(0) LastPacketFlag = 1 (Use Data) HNDSHK bvackcode = 02H Host TX () Host TX Device EP TX Host TX () Host may commence next transfer immediately (if data available) 22

23 Control Transaction Format Setup Stage w/data Stage Setup + first IN Data Stage transaction Idle Setup + first OUT Data Stage transaction Setup Bytes WDRCTA Setup Bytes Token w/setup Setup Flag = 1B ControlStatusFlag= 0B Direction = IN = 1 PHY_TXRate bvdinack= 001H Setup Flag = 1B Direction = OUT = 0 Direction = OUT = 0B Data not Ready, or Bad Command Data Smashed DataIN Phase Data Packet DATA (Seq# 0) HNDSK NAK or STALL Smashed Data OUT Phase Data Packet DATA (Seq# 0) Handshake HNDSK ACK (bvackcode) or NAK or STALL Idle bvdinack Idle 23

24 Control Transaction Format Setup w/no Data Stage; Bare Status Stage Setup + No Data Stage Idle Status Stage Token Setup Bytes Setup Flag = 1B ControlStatusFlag= 1B Direction = IN = 1 Setup Flag = 0B ControlStatusFlag= 1B Direction = IN = 1 Data Handshake Smashed HNDSK ACK or NAK or STALL Smashed HNDSK ACK or NAK or STALL Idle Idle 24

25 Control Transfer Example (Set Address - No Data Stage) W DTCTA (S tat us Stage) Setup Bytes (8) Status Stage - Handshake Handshake ETC. Setup Stage Status Stage Transaction Group N Transaction Group N+1 Transaction 0 W DT CTA SetupFlag = 1B Ctrl/StatusFlg = 1B (Handshake) Setup Bytes (8) set address Host TX () Setup Stage HNDSHK Hndshk code = ACK bvackcode = 00H Direction = IN Device EP TX Status Stage Host TX () 25

26 Control Transfer Example (Control Write - SetKey) Std. Out Transaction Handshake Transaction WDRCTA (Token O) (Hndsk O) Data (seq = 0) Length = Y AcK (Status Stg) HNSK ETC. Setup Flag = 1 Setup Stage Setup Bytes (8) Data Stage ControlStatusFlag= 1 Status Stage Transaction Group N Transaction Group N+1 Transaction Group N+2 Transaction 0 Transaction 1 W DR CTA SetupFlag = 1B Ctrl/StatusFlag = 0B (Handshake) Setup Bytes (8) set Key W DT CTA - handshake Data Out Seq = 0B (Set Key) HNDSHK Hndshk code = ACK bvackcode = 02H W DT CTA SetupFlag = 0B Ctrl/StatusFlag = 1B (Handshake) HNDSHK Hndshk code = ACK bvackcode = 00H Direction = IN Host TX () Host TX Device EP TX Host TX () Device EP TX Setup Stage Data Stage Status Stage 26

27 Control Transfer (Control Write SetKey lost data packet) Std. Out Transaction Std. Out Transaction Handshake Transaction (Token I) (Hndsk O) X Data (seq = 0) Length = Y AcK WDRCTA (Token O) (Hndsk O) Data (seq = 0) Length = Y AcK (Status Stg) HNSK ETC. Setup Flag = 1 Setup Bytes (8) bvackcode = 001H bvackcode = 002H ControlStatusFlag = 1 Setup Stage Data Stage Status Stage Transaction Group N Transaction Group N+1 Transaction Group N+2 Transaction 0 Transaction 1 W DR CTA SetupFlag = 1B Ctrl/StatusFlag = 0B (Handshake) Setup Bytes (8) set Key W DT CTA - handshake Data Out Seq = 0B (Set Key) HNDSHK Hndshk code = ACK bvackcode = 01H W DR CTA SetupFlag = 0B Ctrl/StatusFlag = 0B W DT CTA - handshake Data Out Seq = 0B (Set Key HNDSHK Hndshk code = ACK bvackcode = 02H Host TX () Host TX Device EP TX Host TX () Host TX Device EP TX Setup Stage Data Stage 27

28 Control Transfer Example (Control Read Get Descriptor) Std. IN Transaction Handshake Transaction (Token I) Setup Bytes Data (seq = 0) Length = Y (Status Stg) HNSK ETC. Setup Stage SetupFlag = 1 Data Stage StatusStageFlag = 1 Status Stage bvdinack = 002H Transaction Group N Transaction Group N+1 Transaction 0 Transaction 1 W DT CTA SetupFlag = 1B Ctrl/StatusFlag = 0B bvdinack = 001H Setup Bytes (8) Get Descriptor Data IN Seq = 1B (Get Descriptor Data) W DT CTA SetupFlag = 0B Ctrl/StatusFlag = 1B bvdinack = 002H (Handshake) HNDSHK Hndshk code = ACK bvackcode = 00H Direction = IN Host TX () Device EP TX Host TX () Device EP TX Setup Stage Data Stage Status Stage 28

29 Control Transfer Example (Control Read Get Descriptor) Data packet gets smashed Host will retry Data Stage If device saw Setup, will respond with Data Std. IN Transaction (Token I) Data (seq = 0) Handshake Transaction (Status Stg) HNSK ETC. (Token I) SetupBytes X Data (seq = 0) Length = Y bvdinack = 002H StatusStageFlag = 1 Handshake Transaction SetupFlag = 1 If device did not see a Setup, will respond with STALL (Token I) HNSK (STALL) (Token I) Setup Bytes Data (seq = 0) (Status Stg) StatusStageFlag = 1 HNSK ETC. bvdinack = 002H 29

30 Agenda Packet Layouts Transaction Groups Timing Constraints Data Transfers (general model) Device Notifications Flow Control 30

31 Device Notifications Time Slots DNTS Devices are only allowed transmitters Device notification messages (to the WUSB Host) are only allowed data communications Nature of notification messages are that they are asynchronous and infrequent Fixed aximum Size for notification messages Take advantage of this in the access method Host policy to manage efficiently Unused time is just lost to WUSB data stream 31

32 DNTS Access ethod Contention Based : Slotted Aloha Fixed (maximum) sized message DNTS is a window of uniform sized message slots W DNTS CTA indicates number of message slots Device selects a message slot using a uniformly distributed random integer value (in range 1 to N) Device transmits message a message slot start time W DNTS CTA # Slots (N) DNTS CTA Start 123 N Slot Select = uniform(1, N) 32

33 Device Notifications Reliability Protocol for Device Notifications is designed for unreliability: Notification(s) Host Response Device Continues to send Notifications until it observes Host Response Host will cease response when it observes follow-up device response (when applicable) Host must tolerate retransmissions of notification that occur while it is responding Device must tolerate Host response retransmissions Device Response 33

34 Device Notification Example (Device Perspective) - Connect UnConnected Initiate Connect Xmit Notification Transmit (DN_Connect, Self-Beaconing, ycdid) Sending Notification DNTS Available Wait For Connect ACK Receive [ConnectAck_IE [ycdid, DeviceAddress] [ ]] Connected Connect Ack 34

35 Agenda Packet Layouts Transaction Groups Timing Constraints Data Transfers (general model) Device Notifications Flow Control 35

36 Flow Control Used on All transfer types Device provides flow-control information in it s response to the host bmstatus field in the WUSB Header of a Data, IData or Handshake OUTs, the flow control response is in the AcK handshake INs, the flow control response is in the Data(x) packet Handshake encoded with NAKs always available Flow control status from Endpoint results in removal of endpoint from Active schedule Resumption of service to a flow-controlled endpoint depends on transfer type Bulk & Control Device delivers a Endpoint Ready (DN_EPRdy) notification to the host during an DNTS Interrupt & Isochronous Next service interval 36

37 Control Transfer Example (Control Read Flow Control) (Token I) Setup Stage SetupFlag = 1 Setup Bytes NAK HNSK Data Stage WDNTSCTA DN_EPRdy (Token I) Std. IN Transaction Data (seq = 0) Length = Y Data Stage (cont.) Handshake Transaction W DT CTA (Status Stg) Status Stage HNSK StatusStageFlag = 1 ETC. bvdinack = 002H Transaction Group N Transaction Group Y Transaction Group Z Transaction Group Z+1 Host stops polling endpoint on NAK Device notifies it is ready with DN_EPRdy Host resumes polling endpoint Retries data phase transaction in this example 37

38 Track II Announcement

Certified Wireless USB Protocol Dan Froelich

Certified Wireless USB Protocol Dan Froelich Certified Wireless USB Protocol Dan Froelich Intel Corporation Content also provided by: John S. Howard, Intel Corporation Agenda Protocol Components Data Transfers (general model) Device Notifications

More information

WUSB Command Verifier (WUSBCV) Compliance Test Specification. Based on the Certified Wireless Universal Serial Bus Specification, Revision 1.

WUSB Command Verifier (WUSBCV) Compliance Test Specification. Based on the Certified Wireless Universal Serial Bus Specification, Revision 1. WUSB Command Verifier (WUSBCV) Compliance Test Specification Revision 1.0 Based on the Certified Wireless Universal Serial Bus Specification, Revision 1.0 The information is this document is under review

More information

High-Speed WUSB Technology Based on WiMedia.

High-Speed WUSB Technology Based on WiMedia. High-Speed WUSB Technology Based on WiMedia ysnam@dongguk.ac.kr KRnet 2006 Contents I. MBOA/Wimedia/WUSB II. Wireless USB Specification III. WUSB Development Systems IV. Conclusions KRnet 2006 I. MBOA

More information

Wireless USB Periodic Transfer Models. Dan Froelich Intel

Wireless USB Periodic Transfer Models. Dan Froelich Intel Wireless USB Periodic Transfer Models Dan Froelich Intel Agenda Wired Isochronous Model Overview Key Features Wireless Media Reliability Coexistence (Shared With Other Hosts And UWB Devices) Wireless USB

More information

Wireless USB Architecture Overview Brad Hosler. Intel Corporation

Wireless USB Architecture Overview Brad Hosler. Intel Corporation Wireless USB Architecture Overview Brad Hosler Intel Corporation Agenda Devcon goals Radio environment (common platform) High level architecture Compliance environment Intellectual Property Industry Enabling

More information

Interrupt transfers & USB 2.0 & USB 3.0. Group Members Mehwish Awan Mehwish Kiran

Interrupt transfers & USB 2.0 & USB 3.0. Group Members Mehwish Awan Mehwish Kiran Interrupt transfers & Isochronous transfers in USB 2.0 & USB 3.0 Group Members Mehwish Awan Mehwish Kiran Agenda What is isochronous transfer? Use of isochronous transfer Format of isochronous transactions

More information

WiMedia Media Access Control (MAC) Dan Froelich

WiMedia Media Access Control (MAC) Dan Froelich WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia

More information

Certified Wireless USB Wire Adapter Model

Certified Wireless USB Wire Adapter Model Certified Wireless Wire Adapter Model Abdul R. Ismail Intel Corporation Content also provided by: Matt Katagiri, NEC Agenda Overview Software-Hardware Overview Delivery Mechanism: RPipe Hardware Architecture

More information

IEEE P Wireless Personal Area Networks

IEEE P Wireless Personal Area Networks Project Title IEEE P802.15 Wireless Personal Area Networks IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) JCS Proposed Changes Date Submitted Source Re: [28 April, 2004] [John C.

More information

Universal Serial Bus - USB 2.0

Universal Serial Bus - USB 2.0 USB Packet Types USB has four packet types Token packets (type of transaction) Data Packets (payload / information) Handshake Packets (ack & error correction) Start of Frame packets (flag start of a new

More information

Developers Conference 2006 Taipei, Taiwan

Developers Conference 2006 Taipei, Taiwan Developers Conference 2006 Taipei, Taiwan Certified Wireless USB Architecture Overview Brad Hosler Intel Corporation Agenda Devcon goals Radio environment (common platform) High level architecture Compliance

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

USB Feature Specification: Shared Endpoints

USB Feature Specification: Shared Endpoints USB Feature Specification: Shared Endpoints SYSTEMSOFT CORPORATION INTEL CORPORATION Revision 1.0 October 27, 1999 USB Feature Specification: Shared Endpoints Revision 1.0 Revision History Revision Issue

More information

Certified Wireless USB Compliance

Certified Wireless USB Compliance Certified Wireless USB Compliance Dan Froelich Staff Architect/Engineer Intel Corporation Agenda Compliance Program Goals Compliance Process Compliance Devices Test Areas WiMedia WiMedia Mac WiMedia Coexistence

More information

UWBTRACER /TRAINER. Protocol Verification for Certified Wireless USB (WUSB) and WiMedia Ultra Wideband Applications

UWBTRACER /TRAINER. Protocol Verification for Certified Wireless USB (WUSB) and WiMedia Ultra Wideband Applications UWBTRACER /TRAINER Protocol Verification for Certified Wireless USB (WUSB) and WiMedia Ultra Wideband Applications LeCroy s UWBTracer/Trainer system is the industry s most advanced verification tool for

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Computer Peripherals

Computer Peripherals Computer Peripherals School of Computer Engineering Nanyang Technological University Singapore These notes are part of a 3rd year undergraduate course called "Computer Peripherals", taught at Nanyang Technological

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Device Wire Adapter (DWA) Test Specification. Designed using the Certified Wireless USB Base Specification, Revision 1.0

Device Wire Adapter (DWA) Test Specification. Designed using the Certified Wireless USB Base Specification, Revision 1.0 Device Wire Adapter (DWA) Test Specification Designed using the Certified Wireless USB Base Specification, Revision 1.0 Date: September 27, 2006 Revision: 1.0 Review Draft The information is this document

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

Lecture (08) Wireless Traffic Flow and AP Discovery

Lecture (08) Wireless Traffic Flow and AP Discovery Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame

More information

Appendix A Pseudocode of the wlan_mac Process Model in OPNET

Appendix A Pseudocode of the wlan_mac Process Model in OPNET Appendix A Pseudocode of the wlan_mac Process Model in OPNET static void wlan_frame_transmit () { char msg_string [120]; char msg_string1 [120]; WlanT_Hld_List_Elem* hld_ptr; const WlanT_Data_Header_Fields*

More information

More on IO: The Universal Serial Bus (USB)

More on IO: The Universal Serial Bus (USB) ecture 37 Computer Science 61C Spring 2017 April 21st, 2017 More on IO: The Universal Serial Bus (USB) 1 Administrivia Project 5 is: USB Programming (read from a mouse) Optional (helps you to catch up

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

EECE494: Computer Bus and SoC Interfacing. USB (Universal Series Bus) Dr. Charles Kim Electrical and Computer Engineering Howard University

EECE494: Computer Bus and SoC Interfacing. USB (Universal Series Bus) Dr. Charles Kim Electrical and Computer Engineering Howard University EECE494: Computer Bus and SoC Interfacing USB (Universal Series Bus) Dr. Charles Kim Electrical and Computer Engineering Howard University Spring 2014 1 Review - Line Code Line Code = Digital Baseband

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Developers Conference 2007 Amsterdam, The Netherlands

Developers Conference 2007 Amsterdam, The Netherlands Developers Conference 2007 Amsterdam, The Netherlands Wireless USB 1.1 Additions and Improvements Rahman Ismail Sr. Software Architect Intel Corporation Focus Areas Wireless USB Additions/Modifications

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

STUDY, DESIGN AND SIMULATION OF FPGA BASED USB 2.0 DEVICE CONTROLLER

STUDY, DESIGN AND SIMULATION OF FPGA BASED USB 2.0 DEVICE CONTROLLER STUDY, DESIGN AND SIMULATION OF FPGA BASED USB 2.0 DEVICE CONTROLLER 1 MS. PARUL BAHUGUNA CD 1 M.E. [VLSI & Embedded System Design] Student, Gujarat Technological University PG School, Ahmedabad, Gujarat.

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

Microprocessors LCD Parallel Port USB Port

Microprocessors LCD Parallel Port USB Port Microprocessors LCD Parallel Port USB Port H. Abdoli Bu-Ali Sina University 1 New LCDs Interfacing Lower prices Display numbers, characters, graphics Integrated refreshing controller Ease of programming

More information

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved. WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

IEEE WLAN (802.11) Copyright. Nomadic Communications

IEEE WLAN (802.11) Copyright. Nomadic Communications Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Serial Communications

Serial Communications Serial Communications p. 1/2 Serial Communications CSEE W4840 Prof. Stephen A. Edwards Columbia University Early Serial Communication Serial Communications p. 2/2 Data Terminal Equipment Serial Communications

More information

Serial Communications

Serial Communications Serial Communications p. 1/2 Serial Communications Prof. Stephen A. Edwards sedwards@cs.columbia.edu Columbia University Spring 2007 Early Serial Communication Serial Communications p. 2/2 Data Terminal

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

WiMOD LoRaWAN EndNode Modem HCI Specification

WiMOD LoRaWAN EndNode Modem HCI Specification WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Data Communications & Computer Networks. Digital Data Communications Techniques

Data Communications & Computer Networks. Digital Data Communications Techniques Data Communications & Computer Networks Chapter 6 Digital Data Communications Techniques Fall 2008 Agenda Preface Asynchronous & Synchronous transmission Error Detection & Correction Line configurations

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

USB Compliance Checklist

USB Compliance Checklist USB Compliance Checklist Peripheral Silicon (excluding hubs) July 19, 1999 USB Device Product Information Date July 19, 1999 Vendor Name Motorola Vendor Street Address Vendor City, State, Zip Vendor Phone

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Bachelor Thesis MAC Layer Implementation of the IEEE c Standard

Bachelor Thesis MAC Layer Implementation of the IEEE c Standard Bachelor Thesis MAC Layer Implementation of the IEEE 802.15.3c Standard Alberto Arco Miras September 2010 Prof. Dr.-Ing. Tomas Kürner Tutor: Dipl.-Ing. Marcos Liso Department of Mobile Radio Systems Institute

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

CLD SC58x CDC Library v.1.00 Users Guide Users Guide Revision For Use With Analog Devices ADSP-SC58x Series Processors. Closed Loop Design, LLC

CLD SC58x CDC Library v.1.00 Users Guide Users Guide Revision For Use With Analog Devices ADSP-SC58x Series Processors. Closed Loop Design, LLC CLD SC58x CDC Library v.1.00 Users Guide Users Guide Revision 1.00 For Use With Analog Devices ADSP-SC58x Series Processors Closed Loop Design, LLC 748 S MEADOWS PKWY STE A-9-202 Reno, NV 89521 support@cld-llc.com

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

CLD BF70x CDC Library v.1.3 Users Guide Users Guide Revision 1.3. For Use With Analog Devices ADSP-BF70x Series Processors. Closed Loop Design, LLC

CLD BF70x CDC Library v.1.3 Users Guide Users Guide Revision 1.3. For Use With Analog Devices ADSP-BF70x Series Processors. Closed Loop Design, LLC CLD BF70x CDC Library v.1.3 Users Guide Users Guide Revision 1.3 For Use With Analog Devices ADSP-BF70x Series Processors Closed Loop Design, LLC 748 S MEADOWS PKWY STE A-9-202 Reno, NV 89521 support@cld-llc.com

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [A MAC proposal for LECIM] Date Submitted: [September, 2011] Source: [Kyungsup Kwak, Jaedoo Huh*, M. Al Ameen, Niamat

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host

More information

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information