Example Wireless Networks: WaveLAN, Bluetooth Y. Richard Yang 01/26/2004.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Error Detection and Correction
Transmission Errors Error Detection and Correction
EEC-484/584 Computer Networks
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Error Detection and Correction
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
Transmission Errors1 Error Detection and Correction.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
The OSI Reference Model
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
CS352- Link Layer Dept. of Computer Science Rutgers University.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
1/26 Chapter 6 Digital Data Communication Techniques.
Transmission Errors Error Detection and Correction
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Bluetooth: Introduction
Physical Layer (2). Goal Physical layer design goal: send out bits as fast as possible with acceptable low error ratio Goal of this lecture – Review some.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
Enhancing Bluetooth TCP Throughput via Packet Type Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla Dept. of Computer Science, UCLA.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2.
Lecture 6: Framing and Error Detection-Data Link Layer Functions
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Networking and Communication Greg Drysdale Oct. 28, 2008 CS147 Section 3.
Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Fall 2000Datacom 11 Outline Hardware Building Blocks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
5: DataLink Layer5-1 Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
1 Quick Review on Data Link Layer – Part 2 Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
1 Quick Review on Data Link Layer – Part 2 Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
6: Wireless and Mobile Networks6-1 hub or switch AP 2 AP 1 H1 BBS 2 BBS : mobility within same subnet router r H1 remains in same IP subnet: IP.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
1 Wireless Networks Lecture 19 cdmaOne/IS-95 Dr. Ghalib A. Shah.
Bluetooth Technology Name- Bittu Kumar Roll No.- A05 Section- E2801
CS4470 Computer Networking Protocols
SSN College of Engineering
Cyclic Redundancy Check (CRC)
Advanced Computer Networks
A Wireless LAN technologies IEEE
Bluetooth, RFID, Data Link Layer Switching
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Transmission Errors Error Detection and Correction
Transmission Errors Error Detection and Correction
Presentation transcript:

Example Wireless Networks: WaveLAN, Bluetooth Y. Richard Yang 01/26/2004

2 Outline  Admin. and recap  Bluetooth networks

3 Admin: Homework 1 r A mini-paper on MAC protocols for directional antennas m due 11:59pm on Friday the 30th m send result to pdf, ps, or word should be fine m no longer than 6 pages (double/single space, or single/double column, your decision)

4 Recap: Cellular Networks r GSM and GPRS m GSM GSM combines TDMA and FDMA GSM data rate is low, e.g., 9.6kbps m GPRS: higher data rates m discussion: a comparison of GSM and GPRS which one is better: –Eight servers each can process X packets per second –One server which can process 8 X packets per second r IMT-2000 m UMTS uses W-CDMA as radio interface

5 GPRS User Data Rates in kbps Coding scheme 1 slot 2 slots 3 slots 4 slots 5 slots 6 slots 7 slots 8 slots CS CS CS CS GPRS channel structure: - time is divided into multiframe (240ms) - each multiframe contains 48 data frames - 4 slots form a block

6 GPRS Coding Coding scheme Pre- cod. USF Infobits without USF Parity bits BC Tail bits Output conv encoder Punc tured bits Code rate Data rate kbit/s CS /29.05 CS ~2/313.4 CS ~3/415.6 CS ­456­121.4 g(1)(D) = 1 + D3 + D4 g(2)(D) = 1 + D + D3 + D4, convolution code:

7 Computation: Examples r CS-1 and 1 slot: r CS-4 and 8 slot:

8 Recap: Architecture Ad hoc mode Infrastructure mode

9 Recap: Wireless LAN (802.11) PHY

10 DSSS PHY 3 non-overlapping channels

11 Recap: MAC Layer r Traffic services m Asynchronous Data Service (mandatory) exchange of data packets based on “best-effort” support of broadcast and multicast m Time-Bounded Service (optional) exchange of bounded delay service m Use Inter framing spacing (IFS) to combine the two modes m Use RTS/CTS/DATA/ACK r Power saving mode m Use beacon interval to allow sleep

Frame Format r frame has more fields than other media type frames r 30 bytes frame header appears too long! r Duration ID: NAV r CRC: check sum

Frame Control Field

14 Background: Cyclic Redundancy Check r For a given data D, consider it as a polynomial D(x) m consider the string of 0 and 1 as the coefficients of a polynomial e.g. consider string as x 4 +x+1 m addition and subtraction are modular 2, thus the same as xor r Choose generator polynomial G(x) with r+1 bits, where r is called the degree of G(x) m For example the degree of the G(x) for is 32

15 Cyclic Redundancy Check: Objective r Given data G(x) and D(x), choose R(x) with r bits, such that m D(x)x r +R(x) is exactly divisible by G(x) r The bits correspond to T(x)=D(x)x r +R(x) are sent to the receiver r Since G(x) is global, when the receiver receives the transmission T’(x), it divides T’(x) by G(x) m If non-zero remainder: error detected! m If zero remainder, assumes no error +x

16 CRC: Steps and an Example Suppose the degree of G(x) is r Append r zero to D(x), i.e. consider D(x)x r Divide D(x)x r by G(x). Let R(x) denote the reminder Send to the receiver

17 The Power of CRC r Let T(x) denote D(x)x r +R(x), and E(x) the polynomial of the error bits, i.e m the received signal T’(x) = T(x)+E(x) r Since T(x) is divisible by G(x), we only need to consider E(x) divided by G(x) r A single bit of error: E(x) = x i m If G(x) contains two or more terms, E(x) is not divisible by G(x) r An odd number of errors: E(x) has an odd number of terms: m Lemma: if E(x) has an odd number of terms, E(x) cannot be divisible by (x+1) suppose E(x) = (x+1)F(x), let x=1, the left hand will be 1, while the right hand will be 0 m If G(x) contains x+1 as a factor, E(x) will not be divided by G(x) r Many more errors can be detected by designing the right G(x)

18 Outline  Admin. and recap  Bluetooth networks

19 Bluetooth Design Objective r Design objective: a cable replacement technology m 1 Mb/s m range 10+ meters m single chip radio + baseband (means digital part) low power low price point (target price $5)

20 Bluetooth: Use Scenarios r Synchronization r Data access points r Headset r Conference table r Business card exchange r Instant postcard r … File synchronization Cordless headset

21 Bluetooth Architecture

22 Bluetooth Radio Link r Bluetooth shares the same freq. range as r Radio link is the most expensive part of a communication chip (discussion: compare with ) m Bluetooth uses frequency hopping spread spectrum GHz + k MHz, k=0, …, 78 1,600 hops per second m GFSK (Gaussian FSK) modulation 1 Mb/s symbol rate m transmit power: 1mW

23 Bluetooth Physical Layer r Nodes form piconet: one master and upto 7 slaves m Each radio can function as a master or a slave r The slaves follow the pseudorandom jumping sequence of the master A piconet

24 Physical Channel Setup (Piconet formation) r An inquiry/scan/page protocol r Master: sends Inquiry messages, with Inquiry Access Code (IAC), hoping at a universal frequency hopping sequence (32 frequencies) m announce the master r Joining slave: m jump at a much lower speed m after receiving an Inquiry message, wait for a random time, then send a request to the master r The master sends a paging message to the slave to join it

25 Inquiry Hopping

26 The Bluetooth Link Establishment Protocol FS: Frequency Synchronization DAC: Device Access Code IAC: Inquiry Access Code

27 Bluetooth Links

28 Bluetooth Packet Format Header

29 Multiple-Slot Packet

30 Background: Forward Error Correction Code/Erasure Code r Widely used in wireless communications x y

31 FEC: Example r Suppose data signal is x, and the encoded signal y = Gx, where G is the generator matrix r Example: Vandermonde Matrix: g ij = a i j-1, where a i are different numbers

32 FEC: An Example r Suppose k=3, and n=5 r Suppose y 2 and y 3 are dropped, then we have y 1, y 4, and y 5. Given the relationship (we know they are y 1, y 4, y 5 ) r Since the matrix is not singular, we can recover x 1, x 2, and x 3

33 Further Enhancements of Bluetooth r Power management modes m e.g., PARK r Scatternets: multiple piconets