March, 2000 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Applications for Consideration] Date Submitted: [6 March, 2000] Source: [David Cypher] Company [NIST] Address [100 Bureau Drive / STOP 8920, Gaithersburg, MD 20899-8920] Voice:[+1 301 975 4855], FAX: [+1 301 590 0932], E-Mail:[david.cypher@nist.gov] Re: [CALL FOR SUBMISSIONS ON THE COEXISTENCE MODEL, September 30, 1999] Abstract: [This document 1) lists the available applications from which coexistence models will need to consider as an input parameter to the MAC layer, 2) attempts to define what information is needed in order to specify the traffic generated by these applications into parameters that the coexistence models can accommodate, and 3) suggests defining a priority to investigate these applications.] Purpose: [To provide the group with a list of applications to be examined, to define what is needed to specify these applications for use in, and to agree on a priority listing of these applications for the coexistence modeling and performance study.] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. Contribution of the NIST, not subject to copyright in the United States of America. Cypher/NIST
Applications for Consideration March, 2000 Applications for Consideration Bluetooth Profiles IEEE Network Cypher/NIST
Bluetooth Profiles Generic Access Service Discovery Application March, 2000 Bluetooth Profiles Generic Access Service Discovery Application Cordless Telephony Intercom Serial Port Headset Dial-up Networking Fax LAN Access Generic Object Exchange Object Push File Transfer Synchronization Cypher/NIST
March, 2000 Generic Access Discovery Modes (Non-Discoverable, Limited, General) tied to Inquiry/Inquiry Scan Connectability Modes (Non-connectable, Connectable) tied to Page/Page Scan Pairing Modes (Non-pairable, Pairable) Recommended values for Timers Cypher/NIST
Service Discovery Application March, 2000 Service Discovery Application Local Device (initiator) (Inquiry/Page) Remote Device (inquiry scan/page scan) L2CAP in connection-oriented, no QoS LMP no requirements, just no SCO Cypher/NIST
Cordless Telephony Gateway (1) connectionless & -oriented March, 2000 Cordless Telephony Gateway (1) connectionless & -oriented Terminal (<=7) connection-oriented minimun MTU 171 octets use HV3 packets Cypher/NIST
Intercom L2CAP connection-oriented minimum MTU 3 octets SCO links March, 2000 Intercom L2CAP connection-oriented minimum MTU 3 octets SCO links Cypher/NIST
Serial Port One-slot packets Connection Oriented Peer Entities March, 2000 Serial Port One-slot packets Connection Oriented Peer Entities Cypher/NIST
HeadSet Profile Audio Gateway (AG) {Inquiry} March, 2000 HeadSet Profile Audio Gateway (AG) {Inquiry} Headset (HS) {Inquiry Scan} Use Serial Port Profile CVSD One connection SCO Cypher/NIST
Dial-Up Networking Profile March, 2000 Dial-Up Networking Profile Gateway (GA) Data Terminal (DT) Uses Serial Port Profile Single Slot packets One call at a time SCO link HV3/CSVD (conditional) Cypher/NIST
Fax Profile Gateway (GW) {Inquiry Scan} Data Terminal (DT) {Inquiry} March, 2000 Fax Profile Gateway (GW) {Inquiry Scan} Data Terminal (DT) {Inquiry} Use Serial Port Profile Cypher/NIST
LAN Access Profile PPP over RFCOMM - single, multiple, PC2PC March, 2000 LAN Access Profile PPP over RFCOMM - single, multiple, PC2PC LAN Access Point (LAP) {Inquiry Scan} Data Terminal (DT) {Inquiry} Uses Serial Port Profile Single Radio Possible Master/Slave Roles Cypher/NIST
Generic Object Exchange Profile March, 2000 Generic Object Exchange Profile Object Push Profile File Transfer Profile Synchronization Profile Cypher/NIST
Conclusions Define User scenarios from Profiles March, 2000 Conclusions Define User scenarios from Profiles Define Traffic characteristics from Profiles Most single point to point profiles (exception LAN Access) Either SCO or ACL Most Single Slot packets Cypher/NIST
Conclusions (continued) March, 2000 Conclusions (continued) LAN Access Profile (started by NIST) Dial-up Networking (started by NIST) Others to be considered Cypher/NIST
doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> March, 2000 Cypher/NIST <author>, <company>