C O - EXISTENCE BETWEEN W I -F I & B LUETOOTH. SIDDHESH KARNAD.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
IEEE DRAFT RECOMMENDED PRACTICE Clause 14: Collaborative Coexistence Mechanism – IEEE and Steve Shellhammer (Symbol Technologies)
Doc.: IEEE /080r1 Submission January 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas,
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Contents IEEE MAC layer operation Basic CSMA/CA operation
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
College of Engineering Optimal Access Point Selection and Channel Assignment in IEEE Networks Sangtae Park Advisor: Dr. Robert Akl Department of.
Sattam Al-Sahli – Emad Al-Hemyari –
Coexistence Mechanism Using Dynamic Fragmentation for Interference Mitigation between Wi-Fi and Bluetooth David S. L. Wei Joint Work with Alex Chia-Chun.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Standard for Low Rate WPAN. Home Networking Features. Wired and Wireless Networks. Advantages of Wireless. Need for low power consumption. Bluetooth:
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Paper Presentation Wi-Fi (802.11b) and Bluetooth: Enabling Coexistence Jim Lansford, Ron Nevo, and Brett Monello CSC8900 Presented by: Tu Tran.
ZIGBEE Compared to BLUETOOTH
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Lecture #2 Chapter 14 Wireless LANs.
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
ZigBee Module 구성도. IEEE LR-WPAN  Low power consumption  Frequent battery change is not desired and/or not feasible  Low cost  Otherwise,
COMMUNICATION SYSTEM EEEB453 Chapter 7(Part I) MULTIPLEXING.
KARTIK DABBIRU Roll # EE
Doc.: IEEE /206 Submission Slide 1 July 2000 Loraine, Micro Linear Corp. HRb performance requirements: PHY Overhead & Data Rate July 2000 Jerry.
Bluetooth Address or Name Sharing By Joseph Charboneau.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Doc.: IEEE /441r0 Submission September 2001 Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for Wireless Personal Area.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Cognitive Radio Networks
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
BLUETOOTH TECHNOLOGY Coexistence Of Bluetooth And Wi-Fi
IEEE WLAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Doc.: IEEE sru Submission March 2011 Shoichi Kitazawa, ATRSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Chapter 15 Wireless LANs 15.# 1
WLAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Session: IT 601: Mobile Computing Session 1 Introduction Prof. Anirudha Sahoo IIT Bombay.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Doc.: IEEE /00144r0 Submission 3/01 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Dialog with FCC Nada.
Doc.: IEEE /243r0 Submission May 2001 Slide 1Steve Shellhammer, Symbol Technologies IEEE P Working Group for Wireless Personal Area Networks.
Bluetooth.
Doc.: IEEE /482r0 Submission October 2001 Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE COEX-02/004r0 Submission 23 January, 2001 James P. K. Gilb, Appairent Technologies Project: IEEE P Working Group for Wireless Personal.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Experimental Evaluation of Co-existent LTE-U and Wi-Fi on ORBIT Problem DefinitionExperimental Procedure Results Observation WINLAB Conclusion Samuel
Doc.: IEEE /360r0 Submission November 2000 Jim Lansford, Mobilian Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
2. Data Link Layer: Medium Access Control. Scheduling.
Month Year doc.: IEEE yy/xxxxr0 July 2013
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Communication Networks: Technology & Protocols
Contention-based protocols with Reservation Mechanisms
Cognitive Radio Based 5G Wireless Networks
Channel Allocation (MAC)
Bluetooth, RFID, Data Link Layer Switching
IEEE P Working Group for Wireless Personal Area NetworksTM
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
(60GHz New Technique Proposal)
(60GHz New Technique Proposal)
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

C O - EXISTENCE BETWEEN W I -F I & B LUETOOTH. SIDDHESH KARNAD.

INTRODUCTION This presentation is about the Wi-Fi and Bluetooth devices and the co existence between them. Both Wi-Fi and Bluetooth use same Unlicensed 2.4Ghz Band. As both of them use the same Frequency band the interference between the to is bound to happen. So we study the problem and try to find the best solution on it.

W I -F I AND B LUETOOTH B ANDWIDTH UTILIZATION Bluetooth and Wi-Fi works in 2.4 GHz range. Wi-Fi is based on DHSS and Bluetooth is based on FHSS. Bluetooth Devices hopes over 79 frequencies that are 1Mhz wide. Thus Bluetooth occupies 79MHZ of frequencies. Wi-Fi network uses a subset of 83.5Mhz frequency. Each channel is defined by its center frequency. Centre frequencies are 5MHz apart from each other. Wi-Fi channels are numbered from it uses 1,6 and 11 to avoid interference. So the frequency used is 48Mhz out of the 83.5 Mhz.

F REQUENCY OCCUPANCY OF THE 2 NETWORKS. BluetoothWi-Fi

PROBLEM By the help of different figures we will go through how the coexistence of this two products effect the throughput. The figure will explain the throughput : o With normal setup of Wi-Fi and Bluetooth. o With setup of Wi-Fi with Bluetooth interfering. o With setup of Bluetooth with Wi-Fi interfering.

S ETUP COMPONENTS.

W I -F I & B LUETOOTH COEXISTENCE SETUP.

W I -F I SETUP WITH B LUETOOTH I NTERFERENCE.

S IMILAR CASE WITH W I -F I INTERFERENCE.

C OEXISTENCE M ETHODS : Collocated Method: MEHTA: is a technique for managing packet transmission requests. It grants permission to transmit a packet based on parameters including signal strength and the difference between and Bluetooth center frequencies. MEHTA is a “Hebrew” word for conductor.

W HAT IS MEHTA? MEHTA involves the use of a centralized controller, that monitors the and the traffic and allows exchange of information between the two radio systems. The controller works at the MAC layer and allows precise timing of packet traffic, thus avoiding interference between the two devices voice traffic has priority over WLAN packets, otherwise WLAN traffic is transmitted first. When there is voice traffic pending, WLAN packets are queued.

O VERALL S TRUCTURE OF M ECHANISM :

S TRUCTURE D ETAILS : The MAC and LM + LC entities provide status information to the TDMA control and MEHTA control entities. The TDMA control entity provides a transmit enable ( Tx Enable ) signal to each stack. This is a continuous signal that gates whether each stack can start a new packet transmission. The MEHTA control entity receives a per-transmission transmit request ( Tx Request ) and issues a per-transmission transmit confirm ( Tx Confirm ) to each stack to indicate whether the transmission can proceed. The Tx Confirm carries a status value that is one of: allowed or denied. The Tx Request and Tx Confirm are discreet signals exchanged for every packet transmission attempt.

S TRUCTURE OF M EHTA :

S IMPLIFIED D IAGRAM :

C ONTROL E NTITY D ETAILS : MEHTA uses its knowledge of the duration of activity and future activity a number of slots into the future to predict collisions. When a collision would occur, MEHTA prioritizes transmissions based on simple rules that depend on packet types. Each stack has a corresponding control entity to which it submits its transmit requests. This control entity allows or denies the request based on the known state of both stacks. The purpose of the Control entity is to allow or deny transmit requests from the MAC. The Tx Request signal is sent when the MAC has determined that it can transmit according to its own protocol – i.e. after any required backoff has completed. On receipt of a Tx Request signal, the Control immediately generates a Tx Confirm signal containing a status value that is either allowed or denied. In response to a Tx Request signal, the control immediately generates a Tx Confirm signal containing a status value that is either allowed or denied. The effect of the denied result on the stack is to prevent transmission during the whole slot (or slot half in the case of scan sequences).

L OGIC FOR W I -F I TX REQUEST

B LOCK D ETAILS :

L OGIC F OR B LUETOOTH T X R EQUEST

B LOCK D ETAILS :

P RIORITIES. A SCO packet should have a higher priority than DATA MPDUs. A ACK MPDU should have a higher priority than all packets.

C ONCLUSION : In this presentation we have went through the effects of interference caused to throughput and discussed the coexistence mechanism technique MEHTA in detail.

THANK YOU