Wireless IP for IoT / M2M 101 The Basics

Size: px
Start display at page:

Download "Wireless IP for IoT / M2M 101 The Basics"

Transcription

1 Wireless IP for IoT / M2M 101 The Basics Aeris White Paper A concise introduction to using wireless devices for Internet of Things (IoT) and machine-to-machine (M2M) data transmissions. 1

2 Let our experts lead the way Table of Contents INTRODUCTION 1 WHY DO I NEED WIRELESS IP FOR IOT / M2M COMMUNICATION? 1 WIRELESS IP IN IOT / M2M: THE BASICS 1 Wireless IP Radio Modules... Think Modems 2 Point-to-Point Protocols 2 IP Session Started by Device 2 UDP or TCP? 2 User Datagram Protocol (UDP) 2 Transmission Control Protocol (TCP) 2 Which Protocol to Use? 3 SECURITY 3 ABOUT AERIS 4 2

3 INTRODUCTION Since the introduction of wireless IP for IoT / M2M networks in 1995, communication and data transmission between and among machines is faster than ever before. This revelation has not only increased the speed of business, but also enabled the introduction of many new products and applications for IoT / M2M communication. Aeris has worked with many companies to develop and roll out best-in-class IoT / M2M solutions that rely on a wireless IP data connection. This white paper discusses the best practices for using IP data transport for IoT / M2M applications. WHY DO I NEED WIRELESS IP FOR IOT / M2M COMMUNICATION? The first IoT / M2M applications used Short Message Service (SMS) as their data transport methodology. While very reliable for the delivery of data, SMS is limited to 140 eight-bit bytes (or 160 characters of seven bits) of IoT / M2M application data in every message packet transmission. This is true for both GSM and CDMA cellular technologies. Many IoT / M2M applications require more bandwidth than SMS allows. For example, firmware updates for a remote device or content updates for a digital billboard require more data to be sent than SMS would allow. In 2G GSM and CDMA cellular, the IP data transport technologies are GPRS and 1xRTT. While these have slower data throughput rates compared to 3G and 4G cellular, they are quite sufficient for the IP transmission needs for most IoT / M2M applications. (Readers should be aware that a significant portion of 2G GSM GPRS services are being shut down at the end of 2016 in the United States, so CDMA 1xRTT is the only practical option for new 2G devices.) For IoT / M2M applications requiring faster transmission rates, devices can use 3G CDMA and GSM protocols such as EV-DO and HSPA (or 4G LTE in the future). But today, HSPA geographic coverage in the US does not match the EV-DO coverage, and LTE coverage is not yet sufficient for IoT / M2M applications. Finally, the cost-per-byte of data is significantly lower for wireless IP when compared to SMS as a transport. 3G radio modules are more expensive than 1xRTT modules, so they are only used when the faster transmission rates are required for a particular IoT / M2M application. All of this has led to the mass adoption of wireless IP as the primary method of data transfer for IoT / M2M applications. WIRELESS IP IN IOT / M2M: THE BASICS This section describes the basics of wireless IP for IoT / M2M data transport. First, it is important to recognize that wireless IP data technologies are not the same as wired IP data technologies. Recently, software developers, used to working with DSL, fiber, and cable IP services (and local-area IP networks), have begun working on wireless IP devices. They sometimes attempt to apply wired IP practices to wireless IP implementations, and then things are certain to go awry. 1

4 WIRELESS IP RADIO MODULES THINK MODEMS Wireless IP radio modules (aka, modules) are more similar to old dial-up modems than continuously-connected devices used in DSL and cable IP services (DSL and cable units also perform the functional equivalent of dial-up, but these are usually set to dial immediately at power-on and stay connected until power-off acting as if they were connected via a physical wire to the Internet). To establish a session, the IoT / M2M code must initiate the cellular transmission from the module using a dial-string similar to making a phone call with a dial-up modem. The controller running the IoT / M2M code sends an AT command (for example, ATDT #777) to the module over a RS-232 or USB port. Using AT commands with modules is very similar to using AT commands (originally developed by Hayes Corporation) for traditional dial-up modems. After receiving the ATDT #777 command, the module originates a call using the dialed digits #777 to the Mobile Switching Center (MSC) that is serving the device in the local cellular network. The MSC interprets the digits #777 as a request to establish a data session and allows the process to continue. The detailed mechanisms of establishing an IP session in wireless IP technologies (authorization, authentication, etc.) are not described here. It is sufficient to note that the cellular systems have the necessary equipment, protocols, and communication and control mechanisms to make it happen using relevant cellular standards. POINT-TO-POINT PROTOCOLS Using a Point-to-Point Protocol (PPP) session for IP data transmissions after dialing in using a module is just like using PPP on traditional dial-up modems on dial-up telephone lines. In traditional dial-up modem connections, the computer that is connected to the modem uses a PPP stack to establish an IP session to the network and remote server. This is under the control of the computer, since the user can choose whether the dial-up modem connection is used for an IP data session or with a terminal emulation program for accessing the server. Similarly, the wireless device must use a PPP stack for the IP data session to the cellular network. IP SESSION STARTED BY THE DEVICE In cellular data technologies, the session is always initiated by the module (under the control of the external IoT / M2M application code) the analogy to dial-up modem service holds true. Thus, until such an IP session is started and connected, there isn t any IP data path for a network system or server to send IP data to the device. IoT / M2M applications are generally designed with this concept in mind. However, if the network or server needs to initiate the transmission of IP data to a device, mechanisms called shoulder-taps must be used to cause the device to start the actual session if it is not in a session. Typically, these shoulder-taps are Mobile- Terminated SMS (MT-SMS) messages sent to the device. UDP OR TCP? We are often asked whether a device should transmit User Datagram Protocol (UDP) packets or use Transmission Control Protocol (TCP) streaming sessions for IoT / M2M data transport. The answer, not surprisingly, is: It depends! From the Internet Engineering Task Force (IETF) detailed definitions, let s briefly describe these two protocols to understand why one may be better than the other for certain IoT / M2M data transmissions. First, it is important to note that both UDP and TCP are used over an underlying IP connection. USER DATAGRAM PROTOCOL (UDP) The UDP format was first defined in an IETF Request for Comment specification, RFC 768. This protocol provides a procedure for applications programs to send messages to other programs with a minimum of protocol mechanism. This protocol is transaction-oriented, and delivery and duplicate protection are not guaranteed. If an application requires ordered, reliable delivery of streams of data, UDP is not the preferred protocol. The format has lower overhead than TCP i.e., fewer bytes are sent in the headers of the packets in UDP than TCP. TRANSMISSION CONTROL PROTOCOL (TCP) The TCP format was first defined in an IETF RFC specification, RFC 761. TCP is a connection-oriented, end-to-end reliable protocol and is intended for use as a highly reliable host-to-host protocol between hosts in IP networks and especially in interconnected systems of such networks. TCP requires that a connection be opened and managed for the duration of the IP data transmission. Within the protocol, transmitted and received packets are acknowledged by the device and the servers. The format has more overhead than UDP i.e., more bytes are sent in the headers of the packets in TCP than UDP. 2

5 WHICH PROTOCOL TO USE? In general, the choice of UDP vs. TCP must take into account: The desired balance between the reliability of TCP and the lower cost of UDP, since UDP uses fewer bytes of overhead to transmit the same amount of application data. The increased complexity of TCP, where the module must open a data stream to a remote host where server programs await connections. Careful design of TCP server programs to allow easy scaling as the number of deployed devices is increased. A desire for the acknowledgments provided by TCP sessions. It is important to note that these two protocols are not mutually exclusive for a given IoT / M2M application. For some communication purposes, a simple transmission of a UDP packet to a remote host may be sufficient including using independent acknowledgment packets via UDP. If an acknowledgment is expected, but not received, either side can retry intelligently (i.e., with limits on number of retries, variable delays between retries, etc.) For other purposes, even in the same application, a device may open a TCP connection to a server and communicate with the higher reliability of a TCP streaming session to a program that accepts these connections and transmissions. Often, the amount of data may require the use of TCP. For example, if an application needs to transmit a large file (more than a few kilobytes), it is better to use TCP, since the consequences of an error during transmission via UDP could mean that the entire file might need a complete retransmission. SECURITY Should transmitted data from an IoT / M2M device be encrypted to enhance security? Let s examine the perceived need. While it is true that the radios in wireless cellular systems can be overheard, the ANSI-2000 CDMA radio protocol is secure to all but the most serious of listeners. The vast majority of individuals and entities do not have the expensive equipment needed to listen to the spread spectrum noisy CDMA transmissions. Furthermore, the cellular nature of the system also ensures that any listening to the radio in the device will necessarily be localized radio frequency (RF) transmissions from a particular cellular module do not travel more than a few miles in dense urban areas. In the Aeris CDMA network, the network transmission of data is very secure. Once the device transmission and data leaves the radio network, it is received at Aeris via Virtual Private Network (VPN) connections from the carrier networks and sent to the customers systems via other VPN connections. These VPN network connections are already encrypted and provide secure access. Finally, content data encryption may require significant processor performance in the module or device to encode and decode data. This process might be beyond the capability of many IoT / M2M application devices. Based on these issues, our experiences, and use of VPN s where appropriate, Aeris does not recommend or require, application-level encryption of IP data to and from the modules. 3

6 ABOUT AERIS Aeris is a pioneer and leader in the market of the Internet of Things as an operator of end-to-end IoT and M2M services and as a technology provider enabling other operators to build profitable IoT businesses. Among our customers are the most demanding users of IoT services today, including Hyundai, Acura, Rand McNally, Leica, and Sprint. Through our technology platform and dedicated IoT and M2M services, we strive to fundamentally improve their businesses by dramatically reducing costs, improving operational efficiency, reducing time-to-market, and enabling new revenue streams. Our global headquarters is in Silicon Valley (Santa Clara, California). Our European headquarters is near London, UK. Visit or follow us on to learn how we can inspire you to create new business models and to participate in the revolution of the Internet of Things. Get in touch Copyright 2015 Aeris Communications, Inc. All Rights Reserved. To learn more, contact us at info@aeris.net or GO-AERIS in North America or in Europe

Wireless IP for M2M / IoT 101

Wireless IP for M2M / IoT 101 Wireless IP for M2M / IoT 101 Neo White Paper A concise introduction to using wireless devices for M2M / IoT data transmissions. www.neo.aeris.com Let our experts lead the way Table of Contents INTRODUCTION

More information

The Truth About IoT / M2M Cellular Roaming

The Truth About IoT / M2M Cellular Roaming The Truth About IoT / M2M Cellular Roaming Aeris White Paper www.aeris.com THE TRUTH ABOUT M2M / IOT CELLULAR ROAMING COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the way Table of

More information

How to Decide if an MVNO or Carrier Is Right for Your IoT / M2M Application

How to Decide if an MVNO or Carrier Is Right for Your IoT / M2M Application How to Decide if an MVNO or Carrier Is Right for Your IoT / M2M Application Aeris White Paper www.aeris.com HOW TO DECIDE IF AN MVNO OR CARRIER IS RIGHT FOR YOU COPYRIGHT 2015, AERIS COMMUNICATIONS, INC.

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Understanding IP Event Reporting. Ted Nesse November 17, 2016 North Latitude Technology, LLC

Understanding IP Event Reporting. Ted Nesse November 17, 2016 North Latitude Technology, LLC Understanding IP Event Reporting Ted Nesse November 17, 2016 North Latitude Technology, LLC 2 1 Goals Distinguish Internet Protocol reporting, cloud reporting and other types of reporting. Recognize three

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

Module Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks

Module Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks SG Exam Three will draw questions from multiple content areas including: our networking textbook, our wireless electronic textbook, our assignments and our class lectures. The purpose of this guide is

More information

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction Chapter 12 Objectives Chapter 12 Network Organization and Architecture Become familiar with the fundamentals of network architectures. Be able to describe the ISO/OSI reference model and the TCP/IP standard.

More information

Over Cellular. Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track

Over Cellular.  Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Accessing EtherNet/IP Networks Over Cellular www.odva.org Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Introduction Pervasiveness of Cellular 100% annual increase in iphone

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

2G, 3G, 4G... OMG! What G is Right for M2M?

2G, 3G, 4G... OMG! What G is Right for M2M? 2G, 3G, 4G... OMG! What G is Right for M2M? Introduction Every M2M deployment has four things in common: 1. M2M applications need longrange communications capability. 2. The data gathered by remote devices

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet? What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication

More information

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review Access to the Web CMPT 165: Review Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University December 5, 2011 Access to the Web requires: a computer (of some kind) a connection

More information

rcell 100 Series MultiConnect Cellular Routers Features Benefits

rcell 100 Series MultiConnect Cellular Routers Features Benefits MultiConnect rcell 100 Series Cellular Routers The MultiConnect rcell 100 Series of cellular routers are a part of MultiTech s comprehensive portfolio of cellular connectivity products optimized for M2M

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

Data Service Options for Spread Spectrum Systems:

Data Service Options for Spread Spectrum Systems: GPP C.S00-0-A Version.0 May, 00 Data Service Options for Spread Spectrum Systems: Service Options and GPP 00 GPP and its Organizational Partners claim copyright in this document and individual Organizational

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

Study Guide. Module Three

Study Guide. Module Three Exam Three will draw questions four content areas: our textbook, our assignments, the Rackspace Web Hosting Tutorial, and our class lectures. The purpose of this guide is to help you focus your exam preparations.

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Open Systems Interconnection Model

Open Systems Interconnection Model OPEN SYSTEMS INTERCONNECTION AND TCP/IP PROTOCOL SUITE TCP/IP P Open Systems Interconnection Model An ISO standard that covers all aspects of network communications A layered framework consisting of seven

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018 Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed

More information

Chapter 2. Literature Survey. 2.1 Remote access technologies

Chapter 2. Literature Survey. 2.1 Remote access technologies Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is

More information

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1 EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard

More information

Tellabs End of Profit study executive summary

Tellabs End of Profit study executive summary Tellabs End of Profit study executive summary Executive summary Between November 2010 and January 2011, Tellabs created a study that analysed revenue and cost trends for carriers in Western Europe, North

More information

CS 204: Advanced Computer Networks

CS 204: Advanced Computer Networks CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications

More information

Internet Routing. Review of Networking Principles. What s the Internet: nuts and bolts view. Communication links

Internet Routing. Review of Networking Principles. What s the Internet: nuts and bolts view. Communication links Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters

More information

Internet Routing. Review of Networking Principles

Internet Routing. Review of Networking Principles Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters

More information

Broadband and Last Mile Networks

Broadband and Last Mile Networks Broadband and Last Mile Networks Last-Mile Network Design Concerns Infrastructure Cost Throughput: Upstream and Downstream Packet or Circuit Switching Congestion Control Latency History: Dial-up First

More information

Wireless Personal Area Networks & Wide Area Networks

Wireless Personal Area Networks & Wide Area Networks Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission

More information

LTE-M vs NB-IoT. Comparing New Cellular Connectivity Options

LTE-M vs NB-IoT. Comparing New Cellular Connectivity Options LTE-M vs Comparing New Cellular Connectivity Options Cellular Connectivity Brings New Options Across industries and applications, engineers and product designers are increasingly attracted to the bandwidth

More information

Network Protocols and Architectures

Network Protocols and Architectures Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters

More information

Network Connectivity and Mobility Part 2

Network Connectivity and Mobility Part 2 Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.

More information

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing

More information

Lecture 2: Layering & End-to-End

Lecture 2: Layering & End-to-End Lecture 2: Layering & End-to-End CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 2 Overview Layering Application interface Transport services Discussion

More information

WHITE PAPER. The 450 MHz Band Ecosystem

WHITE PAPER. The 450 MHz Band Ecosystem WHITE PAPER The 450 MHz Band Ecosystem Introduction M2M communications, in which everyday objects and devices are online and able to interact with each other, have seen significant growth in recent years.

More information

CNT 4007 Computer Networks - Chapter 1 : Overview

CNT 4007 Computer Networks - Chapter 1 : Overview CNT 4007 Computer Networks - Chapter 1 : Overview Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida 1 Chapter 1: Introduction Our goal: get

More information

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani: Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Planning a scalable long-term wireless strategy

Planning a scalable long-term wireless strategy Planning a scalable long-term wireless strategy While operators in many markets will continue to invest in maintaining and upgrading 2G networks for the foreseeable future, operators in other markets have

More information

RSC Part I: Introduction

RSC Part I: Introduction RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking: A Top Down Approach

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Part 1: Introduction. Goal: Review of how the Internet works Overview

Part 1: Introduction. Goal: Review of how the Internet works Overview Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

CS 348: Computer Networks. - PHY; 30 th July Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - PHY; 30 th July Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - PHY; 30 th July 2012 Instructor: Sridhar Iyer IIT Bombay Activity: Think-Pair-Share Consider two people who want to communicate by talking. Think Individually (about the following

More information

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing. Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:

More information

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

CSEN 503 Introduction to Communication Networks

CSEN 503 Introduction to Communication Networks CSEN 503 Introduction to Communication Networks 1-1 Mervat AbuElkheir Hana Medhat Ayman Dayf ** Slides are attributed to J. F. Kurose People and Resources 1-2 Course Name Introduction to Communication

More information

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...

More information

Digital terrestrial television broadcasting Interactive channel

Digital terrestrial television broadcasting Interactive channel Digital terrestrial television broadcasting Interactive channel Televisão digital terrestre Canal de Inteeravidade Parte 1: Protocolos, interfaces fíisicas e interfaces de software Televisión digital terrestre

More information

Review of Topology and Access Techniques / Switching Concepts

Review of Topology and Access Techniques / Switching Concepts Review of Topology and s / Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Three base wired topologies Bus, star, ring Two wireless topologies Ad-hoc, infrastructure

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

UNIT II NETWORKING

UNIT II NETWORKING UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Lecture 2: Internet Structure

Lecture 2: Internet Structure Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,

More information

Physical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book

Physical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book Physical Layer: Multiplexing, Spectrum Spreading and Switching Covers Chapters# 06 & 08 from Text Book 2 Multiplexing From Chapter#06 3 Multiplexing If bandwidth of a medium linking two devices is greater

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Switching, Mobile Phones, Cable, Beginning Data Link Layer. CS158a Chris Pollett Feb 21, 2007.

Switching, Mobile Phones, Cable, Beginning Data Link Layer. CS158a Chris Pollett Feb 21, 2007. Switching, Mobile Phones, Cable, Beginning Data Link Layer CS158a Chris Pollett Feb 21, 2007. Outline Switching Mobile Phones Cable Start of Data Link Layer Switching We will now examine how the switching

More information

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

Chapter 10: Wireless Networking. School of information science and Engineering, SDU Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate

More information

Internet of Things: Latest Technology Development and Applications

Internet of Things: Latest Technology Development and Applications Internet of Things: Latest Technology Development and Applications Mr UY Tat-Kong Assistant Vice President Network Evolution Planning & Development 22 August 2014 Agenda Communication Technologies Development

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

Enabling the Wireless Internet

Enabling the Wireless Internet Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2

More information

Chapter 1: introduction

Chapter 1: introduction Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,

More information

Lecture 2: Internet Architecture

Lecture 2: Internet Architecture CS 3700 Networks and Distributed Systems Lecture 2: Internet Architecture Revised 1/6/14 Organizing Network Functionality 2 Organizing Network Functionality 2 Networks are built from many components! Networking

More information

Chapter 6 The Internet

Chapter 6 The Internet Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

Efficient Mail Submission and Delivery (EMSD) On Windows CE

Efficient Mail Submission and Delivery (EMSD) On Windows CE Efficient Mail Submission and Delivery (EMSD) On Windows CE Neda Document Number: 103-101-01.02 Last Updated: Author unspecified Doc. Revision: source unspecified Neda Communications, Inc. First Published:

More information

Xcel Energy Leverages 4G LTE to Enable Reliable, High Speed Connectivity to Distribution End Points

Xcel Energy Leverages 4G LTE to Enable Reliable, High Speed Connectivity to Distribution End Points Xcel Energy Leverages 4G LTE to Enable Reliable, High Speed Connectivity to Distribution End Points Presented By: Speakers: David Markland, Senior Manager, Product Management, Sierra Wireless Dan Lysaker,

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

In-Vehicle Tracking Platform

In-Vehicle Tracking Platform In-Vehicle Tracking Platform Mobile Resource Management (MRM) PinPoint XT Connectivity for Fleet Management, Vehicle Telemetry, and Field Service The PinPoint XT in-vehicle tracking platform simplifies

More information

IMMS-CELL-GSM. Cellular Communications Kit. Installation Instructions

IMMS-CELL-GSM. Cellular Communications Kit. Installation Instructions IMMS-CELL-GSM Cellular Communications Kit Installation Instructions TABLE OF CONTENTS... Before You Install... 1 Operating Systems: GSM, and GSM-E...2 Circuit Switched Data (CSD)...2 Installation Notes...

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

AIRAVE Frequently Asked Questions

AIRAVE Frequently Asked Questions AIRAVE Frequently Asked Questions 2008 Sprint - 1-2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. AIRAVE FAQs General 1. What do I need

More information

Alcatel-Lucent 9500 Microwave Packet Radio (ETSI Markets)

Alcatel-Lucent 9500 Microwave Packet Radio (ETSI Markets) Alcatel-Lucent 9500 Microwave Packet Radio (ETSI Markets) The Alcatel-Lucent 9500 Microwave Packet Radio (MPR) provides cost-effective IP transformation for seamless microwave transport of TDM, ATM, IP

More information

LANCOM Techpaper Smart WLAN controlling

LANCOM Techpaper Smart WLAN controlling The widespread use of wireless access points and wireless routers provides great convenience and flexibility in network access for businesses, universities and other organizations. In recent years, wireless

More information