Submission doc.: IEEE 11-11/1023r0 July 2011 Fanny Mlinarsky, octoScopeSlide 1 Public Safety Ad Hoc Requirements Date: 2011-07-18 Authors:

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Wireless Networks and Spread Spectrum Technologies.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
UMTS / 3G Wireless ENGR 475 – Telecommunications November 7, 2006 Harding University Jonathan White.
Wireless Network Taxonomy Wireless communication includes a wide range of network types and sizes. Government regulations that make specific ranges of.
4G Technology Presented By Nithin Raj. 4G Definition 4G is not one defined technology or standard, but rather a collection of technologies at creating.
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
Network Protocol Trade-off for Strawman Missions
CDMA X RTT Overview. Global 3G Evolution.
Chapter 11: Wireless LANs Business Data Communications, 5e.
Dedicated Short Range Communication. What is DSRC? A short to medium range communications service Aimed as a replacement to the wireless standards.
Module contents Technologies overview Spread Spectrum Modulation
DECT Tom Jongsma. Contents History of DECT DECT = Digital Enhanced Cordless Telecommunications First release of the standard in 1992 Designed for short-range.
WiMAX Presented By Ch.Srinivas Koundinya 118T1A0435.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
Doc.: IEEE /0984r0 Submission September 2008 John R. Barr, Motorola, Inc.Slide 1 Bluetooth test cases with n 40 MHz Date: Authors:
Trends In Unlicensed Spread Spectrum Devices Presentation at FCC Commission Meeting May 10, 2001 Office of Engineering and Technology Federal Communications.
Bluetooth Introduction The Bluetooth Technology
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Wireless Network Technologies Asst. Prof.
The IEEE Specification By Matthew Ruston November 25, 2007.
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
 Midterm 30%  Final 40%  LAB 15%  Assignment 15%  Text Book – Designing and Deploying n Wireless Networks  Jim Geier (ciscopress)
Mobile Broadband for Public Safety August G Supports Today the Entire Range of IP Services Needed to provide Public Safety Applications Video.
 Midterm 30%  Final 40%  LAB 15%  Assignment 15%  Text Book – Designing and Deploying n Wireless Networks  Jim Geier (ciscopress)
INTRODUCTION OVERVIEW OF OPERATION FREQUENCY HOPPING NETWORKING CONNECTION POWER CONSIDERATIONS CORE ARCHITECTURE RELIABILITY AND SECURITY ADVANTAGES.
Doc.: IEEE Submission Body Area Networks July 2006 Stefan Drude, PhilipsSlide 1.
System parameters and performance CDMA-2000, W-CDMA (UMTS), GSM 900, WLAN a, WLAN b, Bluetooth. By Øystein Taskjelle.
Doc.: IEEE /0893r0 Submission July 2008 Eldad Perahia (Intel)Slide 1 Measurements of Coexistence between n 40MHz and Bluetooth Date:
An Introduction to BLUETOOTH TECHNOLOGY
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Critical Communications World, 21st-24th May © 3GPP 2012 © 3GPP 2013 LTE Standards for Public Safety – 3GPP view Balazs Bertenyi Chairman of 3GPP.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
IEEE in 5G ‘5G’ means 5th Generation Mobile Networks not 5 GHz!
SEMINAR ON BLUETOOTH TECHNOLOGY
Wireless LANs and PANs : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Doc.: IEEE /0127r0 Submission January 2009 John R. Barr, Motorola, Inc.Slide 1 Bluetooth AFH and IEEE Date: Authors:
CDMA X EV-DO by S.Vidhya. CDMA 2000 CDMA2000 (also known as C2K or IMT Multi ‑ Carrier (IMT ‑ MC)) is a family of 3G[1] mobile technology standards,
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Submission doc.: IEEE 11-11/1023r1 July 2011 Fanny Mlinarsky, octoScopeSlide 1 Public Safety Ad Hoc Requirements Date: Authors:
Huawei Technologies 1 Technology changes. Communication lasts. AIE Requirements and Competitions.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Submission May 2016 H. H. LEESlide 1 IEEE Framework and Its Applicability to IMT-2020 Date: Authors:
Ad Hoc Relay Mode for Mobile Coverage Extension and Peer-to-Peer Communications IEEE Presentation Submission Document Number: IEEE S802.16m-07/260r2.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
Respected Ma’am & Dear friends
LONG TERM EVOLUTION DANISH HASRAT (091042) DEEPAK SINGH (091043) GAURAV THAWANI (091052) NILESH SINGH (091079)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Doc.:IEEE /206r1July 2000 Submission Walt Davis, Motorola Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
5 G.
4G Technology.
Wireless NETWORKS NET 434 Topic No 8 Wireless PANs ZiGBee NEtworks
Motorola Canopy LENS Antenna A simple, cost effective way for Canopy Network Operators to increase antenna gain and reach more subscribers. Today I will.
A Wireless LAN technologies IEEE
Long Term Evolution (LTE)
אינגר משה ינואר 2007 אינגר משה ינואר 2007.
Wireless for Miniaturized Consumer Electronics
Bluetooth Liaison Report
April 19 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4g-SUN Closing Report for Montreal, May 2009.
Mountain Connect 2019 Off-Network Communications Challenges
Presentation transcript:

Submission doc.: IEEE 11-11/1023r0 July 2011 Fanny Mlinarsky, octoScopeSlide 1 Public Safety Ad Hoc Requirements Date: Authors:

Submission doc.: IEEE 11-11/1023r0 Public Safety Broadband Network Spectrum in the 700 MHz band has been licensed by the FCC to carry a nationwide public safety broadband network [FCC-release].FCC-release In July of 2009 the 3GPP Long Term Evolution (LTE) was selected as the next generation technology for public safety communications. Because the initial thrust of LTE has been on data services, voice over LTE is still in its infancy. Slide 2Fanny Mlinarsky, octoScope July 2011

Submission doc.: IEEE 11-11/1023r0 Requirements for Public Safety (PS) Network Public safety mission critical requirements include: Push to talk (e.g. < 500 ms connection time) Low latency voice (e.g. < 100 ms)  Talkaround when fixed infrastructure coverage is unavailable Security with encryption Simultaneous voice and data Network size Cluster of tens of devices in close range (within meters) Interconnect clusters that may be separated by 100 meters Slide 3Fanny Mlinarsky, octoScope July 2011

Submission doc.: IEEE 11-11/1023r0 Possible Talkaround Approach What are the concerns for EDCA based Layer 2 in terms of mission- critical delay-sensitive VoIP? Do L3 and s QoS schemes interact in a detrimental way? Does the industry have any experience with peer-to-peer VoIP? Slide 4Fanny Mlinarsky, octoScope July s IP VoIP Layer 2 mesh Layer 3 Application Per-hop drop in throughput; added delays and jitter Peer-to-peer VoIP

Submission doc.: IEEE 11-11/1023r0 Additional Questions Are there any scalability issues to consider? Are there any successful implementation of peer-to- peer security? Powersave? Does HCCA offer benefits? Are there any chipsets supporting HCCA? Benefits over the Bluetooth approach? Slide 5Fanny Mlinarsky, octoScope July 2011

Submission doc.: IEEE 11-11/1023r0 Bluetooth Evolution v1.2v2.0 + EDRv2.1 + EDRV3.0 + HS November 2003November 2004July 2007April 2009 Cell phone, headsets, notebooks, car kits, printers, GPS, cameras, MP3 players New applications include: stereo headphones, sunglasses, radios, picture frames, PMPs New applications include: high speed data transfers and video downloads 2.4 to GHz – AFH across 79 channels at 1600 hops per second channels Class 1: 100 meter (100 mW); Class 2: 10 meter (2.5 mW); Class 3: 1 meter (1 mW) 100 mW, 1W, 4W GFSK (1 Mbps) GFSK (1Mbps), π/4 DQPSK (2 Mbps), 8DPSK (3 Mbps) OFDM with BPSK, QPSK,16-128QAM TDMA multiple access Manual pairing and security settingsAutomatic discovery/security settings via SSP Battery life 1xBattery life 5x improvement Battery life depends on radio in use GFSK = Gaussian frequency shift keying π/4 DQPSK = pi/4 rotated differential quaternary phase shift keying 8DPSK = 8 phase differential phase shift keying AFH = adaptive frequency hopping EDR = enhanced data rate HS = high speed SSP = secure simple pairing 6

Submission doc.: IEEE 11-11/1023r0 Bluetooth Considerations Optimized for voice – all layer 2; apparent single layer efficiency Synchronized Piconets Piconet/Scatternet architecture appears to be scalable, at least on the surface Authentication and encryption Has there been any work in TGs evaluating s vs. Bluetooth for voice service? Slide 7Fanny Mlinarsky, octoScope July 2011

Submission doc.: IEEE 11-11/1023r0July 2011 Fanny Mlinarsky, octoScopeSlide 8 References FCC press release regarding approval to deploy interoperable broadband networks for first responders, May C A1.pdf C A1.pdf NPSTC (National Public Safety Telecommunications Council) APCO (Association of Public Safety Communications Officials)