AD-SM2400AP04A-PWRLN. Application Note. G3 Coordinator Network Formation. Overview

Size: px
Start display at page:

Download "AD-SM2400AP04A-PWRLN. Application Note. G3 Coordinator Network Formation. Overview"

Transcription

1 AD-SM2400AP04A-PWRLN Application Note Communication Technology by: Semitech Semiconductor Revision 1.0 August 2016 Overview This application note describes the Join procedure which performs G3 coordinator network formation through the SM2400 PLC modem. The material in this application note is based on and derived from the following standards: IETF RFC 4764 (The EAP-PSK Protocol) IETF RFC 3748 (Extensible Authentication Protocol [EAP]) ITU-T G.9903 Recommendation (Narrowband orthogonal frequency division multiplexing power line communication transceivers for G3-PLC networks) Note: References herein to text, tables, and figures outside this document are for the ITU-T G.9903 Recommendation (Narrowband orthogonal frequency division multiplexing power line communication transceivers for G3-PLC networks) except where otherwise noted. Much of the content of this application note originated in the ITU-T G.9903 recommendation.

2 Table of Contents 1. Introduction Preliminaries Command Descriptions Message Formats Network Join Procedure details General Step Step Step Step Step Step Step Step Abbreviations and acronyms Contact Information Revision Information

3 1. Introduction The network join procedure in G3 performs the following main tasks: Authenticate that the device is allowed on the network. Provide the device with appropriate encryption keys. Assign a short address to the device. Because the network join steps involve authentication and the sharing of secret information (keys), they need to be made secure. G3 uses EAP-PSK for the network join procedure (with minor modifications). The full details of EAP-PSK are found in IEC RFC The following is a summary of the EAP-PSK procedure. Note: A list of relevant acronyms and abbreviations is located in Section 4. Note: The symbol indicates concatenation. For example, this message: ID_S RAND_P. 3

4 2. Preliminaries 2.1 Command Descriptions Table 2-1. Command Descriptions Command ID Value Description 0x011C ADPM_LBP_REQUEST Request to send LBP message to server. nsdulength 2 bytes - The size of the payload in bytes. maxhops 1 byte - The number of times the frame will be repeated by network routers. dstaddrtype 1 byte - The type of address contained in the dstaddr parameter. 0=no address; 2=short address; 3=extended address. dstaddr[8] 8 bytes - The 16 bit address of the LBA or 64 bit address of the LBD. nsduhandle 1 byte - The handle of the NSDU to transmit. nsdutype 1 byte - The type of data contained in the NSDU: 0x00 = any data; 0x01 = UDP; 0x02 = ICMP; 0x03 = TCP. discoverroute 1 byte - If TRUE, a route discovery procedure will be performed prior to sending the frame if a route to the destination is not available in the routing table. qualityofservice 1 byte - The requested quality of service (QoS) of the frame to send. Allowed values are: 0x00 = normal priority; 0x01 = high priority securityenabled 1 byte - If TRUE, enables the MAC layer security for sending the frame. nsdu[] nsdulength bytes - The LBP message to send. 0x011D ADPM_LBP_CONFIRM Status of a LBP request. status 1 byte - The result of the LBP request nsduhandle 1 byte - The handle corresponding to the request. 0x011E ADPM_LBP_INDICATION Received LBP message from server. dstaddr 2 bytes - The short address of the destination of this message. srcaddr 2 bytes - The short address of the source of this message. If the device is unregistered, then will be 0xffff. nsdulength 2 bytes - The number of bytes in the payload. linkqualityindicator 1 byte - The link quality of this packet. securityenabled 1 byte - 0 is no security; otherwise security. nsdutype 1 byte - The type of the payload. nsdu[] nsdulength bytes - The LBP message. 4

5 2.2 Message Formats LBP Message Figure 2-1. LBP Message Format 0 1 Bits T Code Transaction-id A_LBD Bootstrapping data Table 2-2. LBP message format Field Length Definition T 1 bit Identifies the type of message. 0: Message from LBD 1: Message to LBD Code 3 bits Identifies the message code defined in Table 2-3. Transaction-id 12 bits Reserved by ITU-T, set to 0 by the sender and ignored by the receiver. A_LBD 8 bytes Indicates the EUI-64 address of the bootstrapping device (LBD). Bootstrapping Data Variable Contains additional information elements. Two types are defined: Embedded EAP messages (see clause ), Configuration parameters (see clause ). Table 2-3. T and code fields in LBP message T Code LBD Message Description 0 0b001 JOINING The LBD requests joining a PAN and provides the necessary authentication material 1 0b001 ACCEPTED Authentication succeeded with the delivery of device specific information (DSI) to the LBD 5

6 Table 2-3. T and code fields in LBP message T Code LBD Message Description 1 0b010 CHALLENGE Authentication in progress. PAN specific information (PSI) may be delivered to the LBD. 1 0b011 DECLINE Authentication failed. 0/1 0b100 KICK KICK frame is used by a PAN coordinator to force a device to lose its MAC address, or by any device to inform the coordinator that it left the PAN. On receipt of this frame, a device shall set its short address to the default value of 0xFFFF, disconnect itself from the network and perform a reset of the MAC and adaptation layers. See clause for details of the kicking procedure. 6

7 2.2.2 EAP Message Note: The G3 EAP message differs from the standard EAP message in the code field. The standard EAP message has the code field as 8 bits (compared with 6 bits and 2 0s in G3). For all EAP authentication, the G3 code field must be changed into the standard form. Figure 2-2. EAP Message Format 0 1 Bits Code 0 0 Identifier Length Data Table 2-4. Fields in embedded EAP message Field Length Definition Code 6 bits Identifies the type of EAP packet (6-bit). EAP codes are assigned as follows: 0b000001: Request (sent to the peer = LBD) 0b000010: Response (sent by the peer) 0b000011: Success (sent to the peer) 0b000100: Failure (sent to the peer) The code field is slightly different from a regular EAP code field as specified in [IETF RFC 3748]. The conversion appears straightforward in both directions. The proper conversion shall apply when the EAP message is propagated over another protocol (i.e., RADIUS) and in case of integrity protection covering the EAP header. Identifier 8 bits Aids in making responses with requests. Length 2 bytes Indicates the length, in bytes, of the EAP packet including the code, identifier, length, and data fields. A message with the length field set to a value larger than the number of received bytes shall be silently discarded. Data variable The format of the data field is determined by the code field. NOTE Refer to [IETF RFC 3748] for more details on: Specific format for request / response messages and the introduction of the type field (Identity, Nak, etc.) Specific format for success / failure messages with an empty data field. 7

8 2.2.3 Configuration Parameter Figure 2-3. Configuration Parameter Format 0 1 Bits Attr-ID M 1 Len Value Tables 2-5 and 2-6 below list EARP parameters as specified in ITU-T G Table 2-5. Fields in embedded EAP message Field Length Definition Attr-ID 6 bits Represents the ID of the attribute in the LoWPAN information base (LIB). M 1 bit Identifies the type of the attribute: 0: Device specific information (DSI) 1: PAN specific information (PSI) Len 8 bit Indicates the length, in bytes, of the Value field. Value variable (defined by Len field) Contains the value of the attribute. Its format is defined by Attr-ID. Table 2-6. Parameters for embedded EAP message T Code LBD Message Description Short_Addr 7 D 16 bit address for a new device. The address is unique inside the PAN. GMK 9 P Provide a GMK key. Upon receipt, the key is installed in the provided key identifier slot. Constituted of the following fields: id (1 byte): the key identifier of the GMK gmk (16 bytes): the value of the current GMK 8

9 Table 2-6. Parameters for embedded EAP message (Continued) T Code LBD Message Description GMK-activation 10 P GMK-removal 11 P Indicates the GMK to use for outgoing messages. Constituted of the following field: id (1 byte): the key identifier of the active GMK Indicates a GMK to delete. Constituted of the following field: id (1 byte): the key identifier of the GMK to delete Parameterresult 12 D Indicate the result of the reception of parameters: Constituted of the following fields: result (1 byte): can take the following values: 0x00: Success 0x01: Missing required parameter 0x02: Invalid parameter value 0x03: Unknown parameter ID Attr-ID+type (1 byte): indicates the parameter related to the result. Encoded as defined in Figure 2-3 first byte. If result = Success, Attr-ID = 0x00 and is ignored. 9

10 3. Network Join Procedure details Most of the processing for the network join procedure on the coordinator side is done in an EAP-PSK server that runs on the host. The procedure is illustrated infigure 3-1. Figure 3-1. Network Join Procedure Flowchart 10

11 3.1 General ADPM_LBP_REQUEST All messages from the host need to be sent via the ADPM_LBP_REQUEST message. Apart from the payload length and payload data, parameters will be the same for all messages. They are: maxhops 1 byte - 8. nsdutype 1 byte - 0. qualityofservice 1 byte - 0. If the ADPM_LBP_INDICATION has an src address of 0xffff: dstaddrtype 1 byte -3. dstaddr[8] 8 bytes -64 bit address of the LBD. discoverroute 1 byte - 0. securityenabled 1 byte - 0. Else: dstaddrtype 1 byte -2. dstaddr[8] 8 bytes - The 16 bit address of the LBA. discoverroute 1 byte - 1. securityenabled 1 byte Step 1. nsduhandle 1 byte - Incremented each request. In the current build the PSK is set to 0 (16 bytes long). The server needs to generate two keys from the PSK: AK and KDK, which are used for authentication and encryption. The details are on page 18 of RFC Step 2. When a device issues a join request command, a Lowpan Bootstapping Protocol (LBP) message is sent to the coordinator. The message triggers an ADPM_LBP_INDICATION event on the coordinator, which in turn sends an event indication to the host. The payload of the indication is an LBP message with T=0; Code = 1; A_LBD= extended address of device. There is no additional data. 11

12 3.4 Step 3. The host may perform access control based on the extended address on the device; however, it is not necessary. If the host agrees to allow the device to join, it must send an EAP-PSK first message to the device via an ADPM_LBP_REQUEST. The EAP-PSK first message will look like: Code = 1 Identifier = 0 Length = = 30 Data = Byte 0 = 47 Byte 1 = 0 Byte 2-17 = 16 byte random number RAND_S Byte = 8 byte extended address of the server ID_S This EAP-PSK message must then be packaged inside an LBP message with: T = Step 4. Code = 2 A_LBD= extended address of device Bootstrapping data = EAP-PSK first message The device processes the EAP-PSK first message and sends an EAP-PSK second message. This second message contains the RAND_S, a device generated RAND_P, the device extended address ID_P, and an authentication tag MAC_P. MAC_P is calculated using CMAC-AES-128 [same as OMAC1] with key AK and message ID_P ID_S RAND_S RAND_P ( is concatenation). 3.6 Step 5. The host receives an ADPM_LBP_INDICATION with a payload of an LBP message with an embedded EAP message (EAP-PSK second message). The host has to verify the MAC_P contained in the EAP-PSK second message by recalculating it. If it is verified, the host prepares an EAP-PSK third message. 3.7 Step 6. The EAP-PSK third message contains an authentication tag calculated by the host MAC_S, as well as a protected P- channel that is used to send configuration data. MAC_S is calculated using CMAC_AES-128 with key AK and message ID_S RAND_P. The following configuration parameters must be sent: Short address, GMK (at least one), GMK-activation The configuration parameters are concatenated, and are placed in the P-channel extension field. The ext-type is set to 0x2. The P-channel is protected by using EAX encryption over the result and ext bytes of the P-channel. The encryption key for EAX is derived using the KDK and RAND_P, as described in RFC 4764 pg The inputs to EAX are described in RFC 4764 pg

13 The EAP-PSK third message looks like: Code = 1; Identifier = 0; Length = length of P-channel Byte 0 = 47 Byte 1 = 0x80 Byte 2-17 = 16 bytes RAND_S Byte = 16 bytes MAC_S Byte 34 - end = Pchannel This EAP-PSK message must then be packaged inside an LBP message with: T = Step 7. Code = 2 A_LBD= extended address of device Bootstrapping data = EAP-PSK third message The device receives the EAP-PSK third message. It first authenticates the MAC_S, then decrypts the P-channel and installs the configuration parameters. If all the parameters are correct and present, the device sends an EAP-PSK fourth message with a P-channel containing a parameter-result configuration parameter with result = success. 3.9 Step 8. The host receives an ADPM_LBP_INDICATION with a payload of an LBP message with an embedded EAP message (EAP-PSK fourth message). The host decrypts the P-Channel and verifies that the configuration parameter has a result=success. The host then prepares a final LBP message to send to the device that says that it has been accepted into the network. The accepted message uses an embedded EAP message. The final EAP message looks like: Code = 3 Identifier = 0 Length = 4 This final EAP message must then be packaged inside an LBP message with: T = 1 Code = 1 A_LBD= extended address of device Bootstrapping data = final EAP message 13

14 4. Abbreviations and acronyms Following is a list of abbreviations and acronyms that may be used in this document. LQ LSB LSF MAC MIB Link Quality Least Significant Bit Last Segment Flag Media Access Control Management Information Base MPDU MAC Protocol Data Unit MSB MSE NACK NIB NPCW NSDU OFDM PAN PAR PCS PDC PHY PIB PICS PLC PN POS PPDU PPM PSDU PHY PSI PAN QPSK RA RADIUS RC Most Significant Bit Mean Square Error Negative Acknowledgement Neighbour Information Base Normal Priority Contention Window Network Service Data Unit Orthogonal Frequency Division Multiplexing Personal Area Network Peak to Average Ratio Physical Carrier Sense Phase Detection Counter Physical layer PAN Information Base Protocol Implementation Conformance Statement Power Line Communication Pseudo Noise Personal Operating Space PHY Protocol Data Unit Parts Per Million Service Data Unit Specific Information Quadrature Phase Shift Keying Router Advertisement Remote Authentication Dial in User Service Repetition Code Rec. ITU-T G.9903 (02/2014) 5 RERR RES RIFS rms Route Error Reserved (bit fields) Response Inter-frame Space Root Mean Square RREP Route Reply RREQ Route Request RS RX SC SCI S-FSK Reed-Solomon Receiver Segment Count Source Context Identifier Spread Frequency Shift Keying SN Sequence Number SNR SSCS TMI TMR TX TX VCS 6LoWPAN 8-PSK 16-QAM AAA ACK ADP AFE AGC AMM ARQ BPSK CIFS CP CRC D8PSK DBPSK DCI DQPSK DSI EAP ED EIFS FCH FEC FFT Signal to Noise Ratio Service-Specific Convergence Sublayer Tone Map Index Tone Map Request Transmitter Transmit Virtual Carrier Sense IPv6 over Low power Wireless Personal Area Network 8 Phase Shift Keying 16 Quadrature Amplitude Modulation Authentication, Authorization and Accounting Acknowledge Adaptation Analogue Front End Automatic Gain Control Automated Meter Management Automatic Repeat Request Binary Phase Shift Keying Contention Inter-Frame Space Cyclic Prefix Cyclic Redundancy Check Differential 8 Phase Shift Keying Differential Binary Phase Shift Keying Destination Context Identifier Differential Quadrature Phase Shift Keying Device Specific Information Extensible Authentication Protocol End Device Extended Inter-frame Space Frame Control Header Forward Error Correction Fast Fourier Transform 14

15 FL GF GI GMK Frame Length Galois Field Guard Interval Group Master Key GTS Guaranteed Time Slot (see [IEEE ]) HPCW IB ICI IFFT IFS IS LBA LBD LBP LBS LFSR LQ LSB LSF MAC MIB High Priority Contention Window Information Base Inter-Carrier Interference Inverse Fast Fourier Transform Inter-frame Spacing Information System LoWPAN Bootstrapping Agent LoWPAN Bootstrapping Device LoWPAN Boostrapping Protocol LoWPAN Bootstrapping Server Linear Feedback Shift Register Link Quality Least Significant Bit Last Segment Flag Media Access Control Management Information Base MPDU MAC Protocol Data Unit MSB MSE NACK NIB NPCW NSDU OFDM PAN PAR PCS PDC PHY PIB PICS PLC PN POS PPDU Most Significant Bit Mean Square Error Negative Acknowledgement Neighbour Information Base Normal Priority Contention Window Network Service Data Unit Orthogonal Frequency Division Multiplexing Personal Area Network Peak to Average Ratio Physical Carrier Sense Phase Detection Counter Physical layer PAN Information Base Protocol Implementation Conformance Statement Power Line Communication Pseudo Noise Personal Operating Space PHY Protocol Data Unit PPM Parts Per Million PSDU PHY Service Data Unit PSI PAN Specific Information QPSK Quadrature Phase Shift Keying RA Router Advertisement RADIUS Remote Authentication Dial in User Service RC Repetition Code Rec. ITU-T G.9903 (02/2014) 5 RERR Route Error RES Reserved (bit fields) RIFS Response Inter-frame Space rms Root Mean Square RREP Route Reply RREQ Route Request RS Reed-Solomon RX Receiver SC Segment Count SCI Source Context Identifier S-FSK Spread Frequency Shift Keying SN Sequence Number SNR Signal to Noise Ratio SSCS Service-Specific Convergence Sublayer TMI Tone Map Index TMR Tone Map Request TX Transmitter TX Transmit VCS Virtual Carrier Sense 15

16 5. Contact Information For more information regarding the SM2400EVK1 including application notes, product samples, demonstration modules, pricing and ordering please contact: Adesto Technologies Communication technology by: Semitech Semiconductor 6. Revision Information Table 6-1. Revision history Version Description Date 1.0 First publication 16

17 This page intentionally blank

18 Corporate Office California USA Adesto Headquarters 3600 Peterson Way Santa C;ara, CA Phone: (+1) Adesto Technologies. All rights reserved. / Rev.: PB2480A PWRLN 5/2016 Disclaimer: Adesto Technologies Corporation makes no warranty for the use of its products, other than those expressly contained in the Company's standard warranty which is detailed in Adesto's Terms and Conditions located on the Company's web site. The Company assumes no responsibility for any errors which may appear in this document, reserves the right to change devices or specifications detailed herein at any time without notice, and does not make any commitment to update the information contained herein. No licenses to patents or other intellectual property of Adesto are granted by the Company in connection with the sale of Adesto products, expressly or by implication. Adesto's products are not authorized for use as critical components in life support devices or systems.

Dual core architecture with custom N-PLC optimized DSP and Data Link Layer 32bit controller

Dual core architecture with custom N-PLC optimized DSP and Data Link Layer 32bit controller SM2400 N-PLC Transceiver MultiStandard Narrowband Power Line Communication Modem Communication technology by: Semitech Semiconductor Product Overview The SM2400 is the ultimate Narrowband Power Line Communication

More information

Communication Technology by: Semitech Semiconductor. SM2400 Serial-2-PLC Adapter User s Guide

Communication Technology by: Semitech Semiconductor. SM2400 Serial-2-PLC Adapter User s Guide Communication Technology by: Semitech Semiconductor Serial-2-PLC Adapter User s Guide This publication contains proprietary information which is subject to change without notice and is supplied as is,

More information

PLC Suite Host Message Protocol Specification Version May 3, 2012 Copyright Texas Instruments Incorporated,

PLC Suite Host Message Protocol Specification Version May 3, 2012 Copyright Texas Instruments Incorporated, PLC Suite Host Message Protocol Specification Version 1.0010 May 3, 2012 Copyright Texas Instruments Incorporated, 2009-2012 The information and/or drawings set forth in this document and all rights in

More information

SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Access networks In premises networks

SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Access networks In premises networks International Telecommunication Union ITU-T G.9904 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2012) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Access networks In premises

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

SM2400-EVK1. Evaluation Kit for SM2400 Multi-Standard Narrowband Power Line Communication Modem. Product Overview. Features

SM2400-EVK1. Evaluation Kit for SM2400 Multi-Standard Narrowband Power Line Communication Modem. Product Overview. Features SM2400-EVK1 Evaluation Kit for SM2400 Multi-Standard Narrowband Power Line Communication Modem Communication technology by: Semitech Semiconductor Product Overview The SM2400-EVK1 is a complete evaluation

More information

WiMOD LR Base Host Controller Interface

WiMOD LR Base Host Controller Interface WiMOD LR Base Host Controller Interface Specification Version 1.7 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File

More information

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract The growing penetration of the internet throughout the society has also brought advantages to SOHOs and home networks. As networks develop,

More information

Target Device R9A06G037

Target Device R9A06G037 Target Device All information contained in these materials, including products and product specifications, represents information on the product at the time of publication and is subject to change by Renesas

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

WiMOD LR Base Host Controller Interface

WiMOD LR Base Host Controller Interface WiMOD LR Base Host Controller Interface Specification Version 1.10 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File

More information

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX HATS Conference (Promotion Conference of Harmonization of Advanced Telecommunication Systems) Multimedia Communication Test Implementation Liaison

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

G3 PHYSICAL LAYER API SPECIFICATION

G3 PHYSICAL LAYER API SPECIFICATION G3 PHYSICAL LAYER API SPECIFICATION Document Revision: 0.6 Issue Date: 08 August, 2011 Revision History Revision Draft Author Date Comment 0.0 Initial version Susan Yim 01/21/2010 0.1 PHY Lib release 1.0

More information

Veryx ATTEST TM Conformance Test Suite

Veryx ATTEST TM Conformance Test Suite Veryx ATTEST TM Conformance Test Suite IPv6 ReadyTest Host (IPv6-Host) Sample Test case List Overview Part Number: T / TCL IPv6-Host 1.0-0612/1.1 This page is intentionally left blank. Introduction 1 Introduction

More information

WiMOD LoRaWAN EndNode Modem HCI Specification

WiMOD LoRaWAN EndNode Modem HCI Specification WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information

More information

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX HATS Conference (Promotion Conference of Harmonization of Advanced Telecommunication Systems) Multimedia Communication Test Implementation Liaison

More information

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert SharkFest 18 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch Introduction 2 Rolf Leutert,

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 16504 First edition 2011-11-15 Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space Technologies

More information

S Series Switches. MACsec Technology White Paper. Issue 1.0. Date HUAWEI TECHNOLOGIES CO., LTD.

S Series Switches. MACsec Technology White Paper. Issue 1.0. Date HUAWEI TECHNOLOGIES CO., LTD. S Series Switches MACsec Technology White Paper Issue 1.0 Date 2016-03-25 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2016. All rights reserved. No part of this document may be

More information

Laboratory of Nomadic Communication. Quick introduction to IEEE

Laboratory of Nomadic Communication. Quick introduction to IEEE Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless

More information

Siemens Networks GmbH & Co KG January The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method

Siemens Networks GmbH & Co KG January The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method Network Working Group Request for Comments: 4764 Category: Experimental F. Bersani France Telecom R&D H. Tschofenig Siemens Networks GmbH & Co KG January 2007 The EAP-PSK Protocol: A Pre-Shared Key Extensible

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

HIPERLAN/2 and a: A Comparative Study

HIPERLAN/2 and a: A Comparative Study HIPERLAN/2 and 802.11a: A Comparative Study PADMA BONDE Reader, Department of Computer Science Shri Vaishnav Institute of Technology and Science Indore, INDIA JAYESH BONDE Executive Engineer, Department

More information

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs.

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Peer reviewed version Link to publication record in Explore Bristol

More information

PROXIMITY-1 SPACE LINK PROTOCOL CODING AND SYNCHRONIZATION SUBLAYER

PROXIMITY-1 SPACE LINK PROTOCOL CODING AND SYNCHRONIZATION SUBLAYER Draft Recommendation for Space Data System Standards PROXIMITY-1 SPACE LINK PROTOCOL CODING AND SYNCHRONIZATION SUBLAYER DRAFT RECOMMENDED STANDARD CCSDS 211.2-P-2.1 PINK SHEETS March 2019 Draft Recommendation

More information

PRIME PROJECT PRIME. Technology Whitepaper. PHY, MAC and Convergence layers. Release status: v1.0 Edition: 21/07/2008 Language version:

PRIME PROJECT PRIME. Technology Whitepaper. PHY, MAC and Convergence layers. Release status: v1.0 Edition: 21/07/2008 Language version: PRIME Technology Whitepaper PHY, MAC and Convergence layers Author: PRIME Project Release status: v1.0 Edition: 21/07/2008 Language version: EN Copyright 2008 Contents 1 Introduction... 3 2 PRIME initiative...

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master

More information

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -

More information

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group < 2004-05-172004-05-17 IEEE C802.16e-04/67r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Enhancement of 802.16e to Support Secure EAP PKM messages

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

WiMOD LR Base Plus Host Controller Interface

WiMOD LR Base Plus Host Controller Interface WiMOD LR Base Plus Host Controller Interface Specification Version 1.2 Document ID: 4000/40140/0125 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information

More information

I Voice Trunking Format over MPLS Implementation Agreement. MPLS /Frame Relay Alliance 5.0.0

I Voice Trunking Format over MPLS Implementation Agreement. MPLS /Frame Relay Alliance 5.0.0 I.366.2 Voice Trunking Format over MPLS Implementation Agreement MPLS /Frame Relay Alliance 5.0.0 MPLS /Frame Relay Alliance Technical Committee August 2003 I.366.2 Voice Trunking Format over MPLS Implementation

More information

Communication In Smart Grid -Part3

Communication In Smart Grid -Part3 Communication In Smart Grid -Part3 Dr.-Ing. Abdalkarim Awad 09.12.2015 Informatik 7 Rechnernetze und Kommunikationssysteme Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star

More information

ECMA-397. Short Distance Visible Light Communication (SDVLC) 1 st Edition / December Reference number ECMA-123:2010

ECMA-397. Short Distance Visible Light Communication (SDVLC) 1 st Edition / December Reference number ECMA-123:2010 ECMA-397 1 st Edition / December 2010 Short Distance Visible Light Communication (SDVLC) Reference number ECMA-123:2010 Ecma International 2010 COPYRIGHT PROTECTED DOCUMENT Ecma International 2010 Contents

More information

Framing, Synchronization, and Error Detection

Framing, Synchronization, and Error Detection Exercise 4 Framing, Synchronization, and Error Detection EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with the ADSL superframe structure. You will be able to demonstrate

More information

Welcome! SharkFest 16 Europe. Troubleshooting WLANs (Part 2) Rolf Leutert

Welcome! SharkFest 16 Europe. Troubleshooting WLANs (Part 2) Rolf Leutert SharkFest 16 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 19. October 2016 Welcome! #sf16eu Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) doc.: IEEE 802. 15-16-0746-07-003d 15-16-0746-01-003d Performance_of_FEC_in_TG3d_Channels Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: Preliminary Performance

More information

Mobile Communications

Mobile Communications Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #5: Medium Access Control High Throughput, Security Tamer Nadeem Dept. of Computer Science High Throughput Networks (802.11n) Slides adapted from

More information

Proprietary Information PRELIMINARY. IT700 Y-NET Package. Quick Start. February 1, Copyright Yitran Communications Ltd.

Proprietary Information PRELIMINARY. IT700 Y-NET Package. Quick Start. February 1, Copyright Yitran Communications Ltd. PRELIMINARY IT700 Y-NET Package Quick Start Copyright Yitran Communications Ltd. PRELIMINARY information concerns products in the formative or design phase of development. Characteristic data and other

More information

Module Contact: Dr. Ben Milner Copyright of the University of East Anglia Version 2

Module Contact: Dr. Ben Milner Copyright of the University of East Anglia Version 2 UNIVERSITY OF EAST ANGLIA School of Computing Sciences Main Series Examination 2013-14 COMPUTER NETWORKS CMPSMD22 Time allowed: 3 hours Answer Question 1 and THREE questions from questions 2 to 6. Notes

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

CONTACT: ,

CONTACT: , S.N0 Project Title Year of publication of IEEE base paper 1 Design of a high security Sha-3 keccak algorithm 2012 2 Error correcting unordered codes for asynchronous communication 2012 3 Low power multipliers

More information

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Matteo Petracca Scuola Superiore Sant Anna, Pisa Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction

More information

First Feedback on the G3-PLC roll-out in France

First Feedback on the G3-PLC roll-out in France First Feedback on the G3-PLC roll-out in France Thierry Lys (ERDF) ISPLC 21-23/03/2016 Linky Program Main features & rollout Roll out strategy (2015-2021) Leopard pattern rollout 2013 2014 2015 2016 2017

More information

ETSI TS V1.3.2 ( )

ETSI TS V1.3.2 ( ) TS 101 761-4 V1.3.2 (2002-01) Technical Specification Broadband Radio Access Networks (BRAN); HIPERLAN Type 2; Data Link Control (DLC) Layer; Part 4: Extension for Home Environment 2 TS 101 761-4 V1.3.2

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Status of P Sub-Specification

Status of P Sub-Specification Status of P1451.5 802.11 Sub-Specification June 7, 2004 Ryon Coleman Senior Systems Engineer 802.11 Subgroup rcoleman@3eti.com Agenda 1. IEEE 802.11 Architecture 2. Scope within the 1451 Reference Model

More information

UM2330 User manual. ST8500 boot. Introduction

UM2330 User manual. ST8500 boot. Introduction UM30 User manual ST8500 boot Introduction This user manual describes ST8500 bootloader functionalities and operations to be done for a correct device boot and the firmware images download. The following

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 PLCP, Packet Format 2 PHY Layer Characteristics and Data Rates Area Concept Layers and Functions (PLCP and PMD Sublayers) Antennas DSSS in IEEE 802.11b

More information

Space engineering. SpaceWire Protocols

Space engineering. SpaceWire Protocols Space engineering SpaceWire Protocols This ECSS is a draft standard circulated for xxxxxxxxxx. It is therefore subject to change without notice and may not be referred to as an ECSS Standard until published

More information

ECMA-385. NFC-SEC: NFCIP-1 Security Services and Protocol. 4 th Edition / June Reference number ECMA-123:2009

ECMA-385. NFC-SEC: NFCIP-1 Security Services and Protocol. 4 th Edition / June Reference number ECMA-123:2009 ECMA-385 4 th Edition / June 2015 NFC-SEC: NFCIP-1 Security Services and Protocol Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2015 Contents Page

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Configuring RTP Header Compression First Published: January 30, 2006 Last Updated: July 23, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

Troubleshooting WLANs (Part 2)

Troubleshooting WLANs (Part 2) SharkFest 17 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 8. November 2017 Breaking News: Including KRACK!!! Rolf Leutert Leutert NetServices Switzerland

More information

Outlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21

Outlook on IEEE ZigBee Implications IP Requirements IPv6 over Low Power WPAN (IEEE ) Conclusions. KRnet /21 IPv6 over WPAN Soohong Daniel Park soohong.park@samsung.com Mobile Convergence Laboratory, Digital Media R&D Center, SAMSUNG Electronics. Contents Outlook on IEEE 802.15.4 ZigBee Implications IP Requirements

More information

ECMA-409. NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM. 2 nd Edition / June Reference number ECMA-123:2009

ECMA-409. NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM. 2 nd Edition / June Reference number ECMA-123:2009 ECMA-409 2 nd Edition / June 2015 NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International

More information

Nokia Fax:

Nokia Fax: 2002-09-11 IEEE C802.16c-02/09 Project Title Date Submitted 2002-09-11 IEEE 802.16 Broadband Wireless Access Working Group Editorial instructions pertaining to comments submitted

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Intel IXP400 Software Version 1.5

Intel IXP400 Software Version 1.5 Intel IXP400 Software Version 1.5 Order Number: 308225, Revision: 001 Legal Notice Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

Veryx ATTEST TM. Sample Test cases Overview. Conformance Test Suite. Internet Protocol version 4 (IPv4) Part Number: T / TCLS IPv /1.

Veryx ATTEST TM. Sample Test cases Overview. Conformance Test Suite. Internet Protocol version 4 (IPv4) Part Number: T / TCLS IPv /1. Veryx ATTEST TM Conformance Test Suite Internet Protocol version 4 (IPv4) Sample Test cases Overview Part Number: T / TCLS IPv4 1.0-1110/1.0 This page is intentionally left blank. Introduction The Veryx

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (11 th Week) Wireless LANs 11.Outline Overview IEEE 802.11 Architecture and Services IEEE 802.11 Medium Access Control

More information

Standard for wireless sensor networks. Developed and promoted by the ZigBee alliance

Standard for wireless sensor networks. Developed and promoted by the ZigBee alliance Stefano Chessa Zigbee Standard for wireless sensor networks Developed and promoted by the ZigBee alliance Applications: Home automation (domotics, ambient assisted living,...) Health care Consumer electronics

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

Internet Structure. network edge:

Internet Structure. network edge: Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected

More information

Copyright 2008 by the Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue New York, New York USA All Rights Reserved.

Copyright 2008 by the Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue New York, New York USA All Rights Reserved. IEEE Standards Interpretation for IEEE Std 802.11-2007 IEEE Standard for Information technology- Telecommunications and information exchange between systems- Local and metropolitan area networks- Specific

More information

Understanding the Network: A practical Guide to Internetworking Michael J. Martin

Understanding the Network: A practical Guide to Internetworking Michael J. Martin Understanding the Network: A practical Guide to Internetworking 0735709777 Michael J. Martin Copyright 2001 by New Riders Publishing Warning and Disclaimer: Every effort has been made to make this book

More information

Item 2) In clause PL_OC2:Overall_Control state frame transmission cancellations: change the text to be as follows:

Item 2) In clause PL_OC2:Overall_Control state frame transmission cancellations: change the text to be as follows: a Maxtor Corporation 500 McCarthy Boulevard Milpitas, CA 95035 USA To: T10 SAS Protocol Working Group Contact: Mark Evans Phone: 408-894-5310 Email: mark_evans@maxtor.com Date: 23 February 2004 Subject:

More information

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)

More information

Mobile WiMAX EPL 657. Panayiotis Kolios

Mobile WiMAX EPL 657. Panayiotis Kolios Mobile WiMAX EPL 657 Panayiotis Kolios 1 WiMAX Based on the 802.16 suite of protocols Air interface OFDMA defined under 802.16-2004 Mobility enhancements made under 802.16e include multi-path performance

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved

add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved www.addgrup.com RTR8A.L-X-X Data Concentrator Technical Description 1 Contents 1. Overview...

More information

How to handle different PLC technologies?

How to handle different PLC technologies? How to handle different PLC technologies? Győző Kmethy Convenor, CLC, Smart electricity metering 5th October 2011 Metering Europe, Amsterdam 1 Presentation program M/441 and CLC Early PLC technologies:

More information

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 4 RPL and 6LoWPAN Protocols 1 RPL [Ipv6 Routing Protocol For Low Power Lossy Networks (LLNs)] 2 LLN A constrained nodes network Low data transfer rate Low packet delivery rate in comparison to IP

More information

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels draft-spiriyath-ipsecme-dynamic-ipsec-pmtu-01 Shibu Piriyath, Umesh Mangla, Nagavenkata Suresh Melam, Ron Bonica

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information

IN THE FIRST MILE CONSORTIUM. Clause 65 Test Suite v1.1 Technical Document. Last Updated: March 23, :43pm

IN THE FIRST MILE CONSORTIUM. Clause 65 Test Suite v1.1 Technical Document. Last Updated: March 23, :43pm EFM ETHERNET IN THE FIRST MILE CONSORTIUM Technical Document Last Updated: March 23, 2005 12:43pm Ethernet in the First Mile Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham,

More information

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Chapter2: Peak amplitude: it is the absolute value of the highest intensity. Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Phase: it describes the position

More information

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial

More information

ITU-T G (01/2005) ATM-based multi-pair bonding

ITU-T G (01/2005) ATM-based multi-pair bonding International Telecommunication Union ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU G.998.1 (01/2005) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and

More information

DTCP Volume 1 Supplement G Mapping DTCP to WirelessHD (Informational Version)

DTCP Volume 1 Supplement G Mapping DTCP to WirelessHD (Informational Version) DTCP Volume 1 Supplement G Mapping DTCP to WirelessHD (Informational Version) Hitachi, Ltd. Intel Corporation Matsushita Electric Industrial Co., Ltd. Sony Corporation Toshiba Corporation Revision 1.0

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Real-World Experience with a Mobile Broadband Network

Real-World Experience with a Mobile Broadband Network Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview

More information

Add performance and security to your business' wireless network with the Intellinet High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point.

Add performance and security to your business' wireless network with the Intellinet High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point. High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point 450 Mbps Wireless N (2.4 GHz) + 1300 Mbps Wireless AC (5 GHz), WDS, Wireless client isolation, 27.5 dbm, wall-mount Part No.: 525787 Add performance

More information

Network Working Group Request for Comments: 2236 Updates: 1112 November 1997 Category: Standards Track

Network Working Group Request for Comments: 2236 Updates: 1112 November 1997 Category: Standards Track Network Working Group W. Fenner Request for Comments: 2236 Xerox PARC Updates: 1112 November 1997 Category: Standards Track Internet Group Management Protocol, Version 2 Status of this Memo This document

More information

ECB N Multi-Function Client Bridge

ECB N Multi-Function Client Bridge ECB9300 is a multi-functioned 11n product with 7 major multi-functions, is designed to operate in every working environment for enterprises. ECB9300 is a Wireless Network device that delivers up to 3x

More information

DAB. Digital Audio Broadcasting

DAB. Digital Audio Broadcasting DAB Digital Audio Broadcasting DAB history DAB has been under development since 1981 at the Institut für Rundfunktechnik (IRT). In 1985 the first DAB demonstrations were held at the WARC-ORB in Geneva

More information