wimax, wimesh, bluetooth, zigbee, rfid, and other … wimax... · wimax, wimesh, bluetooth, zigbee,...
Post on 20-Mar-2018
233 Views
Preview:
TRANSCRIPT
WiMax, Wimesh, Bluetooth, Zigbee, RFID, and other wireless technologies
EPL657Andreas Pitsillides
1
Wireless broadband
2
+ 802.20??
WMAN – Wireless Metropolitan Area
Network802.16WiMax
3
IEEE 802.16• series of Wireless Broadband standards
written by the IEEE Standards established in 1999 to develop standards for broadband for Wireless Metropolitan Area Networks. – The Workgroup is a unit of the IEEE 802 local area
network and metropolitan area network standards committee.
• 802.16 family of standards officially called WirelessMAN in IEEE, – has been commercialized under the name "WiMAX"
(from "Worldwide Interoperability for Microwave Access") by the WiMAX Forum industry alliance.
4
IEEE 802.16• 802.16-2009 Air Interface for Fixed and
Mobile Broadband Wireless Access System (rollup of 802.16–2004, 802.16-2004/Cor 1, 802.16e, 802.16f, 802.16g and P802.16i)
• 802.16m-2011 Advanced Air Interface with data rates of 100 Mbit/s mobile and 1 Gbit/s fixed. Also known as Mobile WiMAX Release 2 or WirelessMAN-Advanced.
• Aiming at fulfilling the ITU-R IMT-Advanced requirements on 4G systems.
5http://en.wikipedia.org/wiki/IEEE_802.16
IEEE 802.16
Standard IEEE 802.16 (http://grouper.ieee.org/groups/802/16/) defines the
air interface, including the MAC layer and multiple PHY layer options, for fixed Broadband Wireless Access (BWA) systems to be used in a Wireless Metropolitan Area Network (WMAN) for residential and enterprise use.
IEEE 802.16 is also often referred to as WiMax. The WiMax Forum strives to ensure interoperability between different 802.16 implementations - a difficult task due to the large number of options in the standard.
IEEE 802.16 cannot be used in a mobile environment. For this IEEE 802.16e is being developed; expected to compete with IEEE 802.20 standard (base standard 2008 –now in hibernation – lack of activity).
IEEE 802.20 http://grouper.ieee.org/groups/802/20/ or Mobile Broadband Wireless Access (MBWA) is a proposed IEEE Standard to enable worldwide deployment of multi-vendor interoperable mobile broadband wireless access networks
6
WiMax Standards
802.16 802.16a 802.16-2004
802.16e-2005
Date Completed
December 2001
January 2003
June 2004
December 2005
Spectrum 10-66 GHz < 11 GHz < 11 GHz < 6 GHz
Operation LOS Non-LOS Non-LOS Non-LOS and Mobile
Bit Rate 32-134 Mbps Up to 75 Mbps
Up to 75 Mbps
Up to 15 Mbps
Cell Radius 1-3 miles 3-5 miles 3-5 miles 1-3 miles
7
802.16 Publications
8
IEEE 802.16 standardization
first version of IEEE 802.16 standard completed in 2001.
defined a single carrier (SC) physical layer for line-of-sight (LOS) transmission in the 10-66 GHz range.
IEEE 802.16a defined three physical layer options (SC, OFDM, and OFDMA) for the 2-11 GHz range.
IEEE 802.16c contained upgrades for the 10-66 GHz range.
IEEE 802.16d contained upgrades for the 2-11 GHz range.
In 2004, the original 802.16 standard, 16a, 16c and 16d were combined into the massive IEEE 802.16-2004 standard.
9
10
WiMax system• Typically, a WiMAX system consists of two parts:
– A WiMAX Base Station (BS): Base station consists of indoor electronics and a WiMAX tower. Typically, a base station can cover up to 10 km radius (Theoretically, a base station can cover up to 50 km radius or 30 miles, however practical considerations limit it to about 10 km or 6 miles). Any wireless node within the coverage area would be able to access the Internet.
– A WiMAX receiver (Subscriber Station-SS) - The receiver and antenna could be a stand-alone box or a PCMCIA card that sits in your laptop or computer. Access to WiMAX base station is similar to accessing a Wireless Access Point in a WiFi network, but the coverage is further.
11
WiMax is well suited to offer both fixed and mobile access
12
Application scenarios
13
WiMax Forum publication
How WiMax Works
• WiMax can provide 2 forms of wireless service:- Non-LOS, Wi-Fi sort of service, where a small antenna ona computer connects to the tower. Uses lower frequency range (2 to 11 GHz).
- LOS, where a fixed antenna points straight at the WiMaxtower from a rooftop or pole. The LOS connection is stronger and more stable, so it is able to
send a lot of data with fewer errors. Uses higher frequencies, withranges reaching a possible 66 GHz. Through stronger LOS antennas, WiMax transmitting stations would
send data to WiMax enabled computers or routers set up within 30mile radius (3,600 square miles of coverage) .
14
WiMax Spectrum• Broad Operating Range• WiMax Forum is focusing on 3 spectrum bands for
global deployment:– Unlicensed 5 GHz: Includes bands between 5.25 and
5.85 GHz. In the upper 5 GHz band (5.725 – 5.850 GHz) many countries allow higher power output (4 Watts) that makes it attractive for WiMax applications.
– Licensed 3.5 GHz: Bands between 3.4 and 3.6 GHz have been allocated for Broadband Wireless Access (BWA) in majority of countries.
– Licensed 2.5 GHz: The bands between 2.5 and 2.6 GHz have been allocated in the US, Mexico, Brazil and in some SEA countries.
15
WiMax Uplink / downlink separation
IEEE 802.16 offers both TDD (Time Division Duplexing) and FDD (Frequency Division Duplexing) alternatives.
Wireless devices should avoid transmitting and receiving at the same time, since duplex filters increase the cost:
TDD: this problem is automatically avoided
FDD: IEEE 802.16 offers semi-duplex operation as an option in Subscriber Stations.
(Note that expensive duplex filters are also the reason why IEEE 802.11 WLAN technology is based on CSMA/CA instead of CSMA/CD.)
16
IEEE 802.16 basic architecture
BS SS
SS
SS
Point-to-multipoint transmission AP
AP
802.11 WLANBS = Base Station
SS = Subscriber Station
Fixed network
Subscriber line replacement
17
ATMtransport
IPtransport
Service Specific ConvergenceSublayer (CS)
IEEE 802.16 protocol layering
MAC Common Part Sublayer(MAC CPS)
Privacy sublayer
Physical Layer (PHY)
MA
C
Like IEEE 802.11, IEEE 802.16 specifies the Medium Access Control (MAC) and PHY layers of the wireless transmission system.
The IEEE 802.16 MAC layer consists of three sublayers.
18
ATMtransport
IPtransport
Service Specific ConvergenceSublayer (CS)
IEEE 802.16 protocol layering
MAC Common Part Sublayer(MAC CPS)
Privacy sublayer
Physical Layer (PHY)
MA
C
CS maps data (ATM cells or IP packets) to a certain unidirectional connection identified by the Connection Identifier (CID) and associated with a certain QoS.
CS adapts higher layer protocols to MAC CPS.
May also offer payload header suppression.
19
ATMtransport
IPtransport
Service Specific ConvergenceSublayer (CS)
IEEE 802.16 protocol layering
MAC Common Part Sublayer(MAC CPS)
Privacy sublayer
Physical Layer (PHY)
MA
C
MAC CPS provides the core MAC functionality:
• System access
• Bandwidth allocation
• Connection control
Note: QoS control is applied dynamically to every connection individually.
20
ATMtransport
IPtransport
Service Specific ConvergenceSublayer (CS)
IEEE 802.16 protocol layering
MAC Common Part Sublayer(MAC CPS)
Privacy sublayer
Physical Layer (PHY)
MA
C
The privacy sublayer provides authentication, key management and encryption.
21
ATMtransport
IPtransport
Service Specific ConvergenceSublayer (CS)
IEEE 802.16 protocol layering
MAC Common Part Sublayer(MAC CPS)
Privacy sublayer
Physical Layer (PHY)
MA
C IEEE 802.16 offers three PHY options for the 2-11 GHz band:
• WirelessMAN-SCa
• WirelessMAN-OFDM
• WirelessMAN-OFDMA
22
WiMAX
The WiMax (Worldwide Interoperability for Microwave Access) certification program of the WiMax Forum addresses compatibility of IEEE 802.16 equipment
=>
WiMax ensures interoperability of equipment from different vendors.
ATMtransport
IPtransport
Service Specific ConvergenceSublayer (CS)
MAC Common Part Sublayer(MAC CPS)
Privacy sublayer
Physical Layer (PHY)
WiMax
23
24
WiMAX (IEEE 802.16a) in a nutshell Frequency Spectrum: 2 – 11GHz Last mile technology (WAN) Up to 30 miles of range with cell radius: 4-6 miles Backhaul technology for wireless LANs (802.11) Shared data rate up to 75 Mbps.
Support 50 customers with T1-rate wireless connections ISP: http://www.towerstream.com/about.asp
Ref: http://www.intel.com/ebusiness/pdf/wireless/intel/80216_wimax.pdf
IEEE 802.16: WiMax in a nutshell• The WiMAX wireless metropolitan network standard, IEEE
802.16, – defines various high speed mechanisms that provide
wireless last mile broadband access in Metropolitan Area Networks (MANs) at a cost much lower than traditional cable, DSL or T1 technologies.
• A typical scenario for the use of WiMAX is for it to provide broadband Internet access to various users in one or more buildings via rooftop antennae. – This emerging technology could had provided a very attractive
alternative to the 3G technology which is based on cellular networks. The low cost of WiFi deployment is obtained at the cost of much smaller coverage.
25
IEEE 802.16: WiMax in a nutshell
• WiMAX is part of a global standardization effort of the IEEE that involves not only the local WiFi networks (IEEE 802.11) but also regional networks (IEEE 802.22).
• IEEE 802.16 MAC protocol is mainly designed for point-to-multipoint access in wireless broadband applications.
• provides different levels of QoS to provide a multitude of transmission services including data, video and voice over IP.
26
IEEE 802.16: WiMax in a nutshell• WIMAX Forum announced that 802.16 networks now
cover 430m people worldwide and are on a path to nearly double to 800m pops by end of 2010. prediction!!
• based on almost 460 deployments in 135 countries, • new roll-outs will be driven by auctions in India and Brazil,
among others.
• “In both emerging markets and mature countries, companies and governments are deploying 4G WIMAX networks to help bridge the digital divide,” said Intel’s Maloney (Feb 2009).
• In early 2011 projections say that only about 5% of the market will adopt 802.16!!!
27
Challenges to Overcome in WiMax Deployment
• RF Interference: Disrupts a transmission and decreasesperformance.– Common forms are multi-path interference and attenuation.
Overlapping interference generate random noise.• Infrastructure Placement: physical structure that
houses or supports base station must be RF friendly.– Health and environmental concerns– High RF activity in the area can cause interference.– Obstacles such as trees and buildings can block signal paths.– A metal farm silo, for example, may distort signals, or a tree
swaying in the wind may change signal strength.
28
Solving the challenges in WiMax Deployment
• Proper network design and infrastructureplacement are critical for solving the challenges.- Subscriber Site Survey, Statistics Gathering, coordinationof RF use with neighbouring providers.- Antennas (Type, Tilt Angles, Array Gain, Diversity Gain)- Proper design and deployment of the provider’s NOC.- Well deployed base station or cells with 24/7 access, RFfriendly structure, and shielding from weather elements.
29
WiMax Evolution Path Leads to Mobile Access
30
IEEE802.20
31
MBWA: 802.20• Mobile Broadband Wireless Access (MBWA)
aka Mobile-Fi– IEEE Standard to enable worldwide deployment of
multi-vendor interoperable mobile broadband wireless access network
– scope of working group consists of PHY, MAC, LLC layers. The air interface will operate in bands below 3.5 GHz and with a peak data rate of over 80 Mbit/s.
– The goals of 802.20 and 802.16e, the so-called "mobile WiMAX", are similar.
– New MAC and PHY with IP and adaptive antennas
32
33
34
Wireless Mesh Networks
35
Wireless Mesh Network solution • ideal for WLAN coverage of large open areas,
both indoor and outdoor, • considered where Ethernet cabling is prohibitive to install
or to minimize the requirement for leased backhaul. • deployment scenarios that are often particularly well suited
for Wireless Mesh Network include:– campus environments (enterprises and universities),
manufacturing, shopping centers,– construction sites– airports, sporting venues, special events– military operations, disaster recovery, temporary installations,
public safety– municipalities, including downtown cores, residential areas, and
parks– carrier managed service in public areas or residential communities
36
WiMax Mesh Mode
37
• Presented in (802.16d-2004) as optional mode
• SS don’t have to be within the range of the BS
• Traffic is relayed by parent nodes to the BS
WMN deployment
38
Nortel approach
WMN deployment
39
Nortel approach
Comparison WLAN and WMN
40
Wireless Mesh networks example
41
The Wireless Mesh Network is well-suited for providing broadband wireless access in areas that traditional WLAN systems are unable to cover.
Wireless Mesh networks example
42
Wireless Mesh networks example
43
Wireless Mesh networks example
44
Wireless Mesh networks example
45
Wireless Mesh networks example
46
Wireless Mesh networks example
47
Wireless Mesh networks example
48
OTHER WIRELESS TECHNOLOGIES
EPL657
Bluetooth802.15 (zigbee)
Hiperlan – old stuff49
Wireless Personal Area Networks (WPAN)
50
51
IEEE definition of WPAN
Wireless personal area networks (WPANs) are used to convey information over short distances among a private, intimate group of participant devices.
connection made through a WPAN involves little or no infrastructure or direct connectivity to the world outside the link (ad-hoc). This allows small, power-efficient, inexpensive solutions to be implemented for a wide range of devices.
• less than 10 m diameter• replacement for cables
(mouse, keyboard, headphones)
• ad hoc: no infrastructure• master/slaves:
– slaves request permission to send (to master)
– master grants requests• 802.15: evolved from
Bluetooth specification– 2.4-2.5 GHz radio band– up to 721 kbps
52
M radius ofcoverage
S
SS
P
P
P
P
M
S
Master device
Slave device
Parked device (inactive)P
802.15: personal area network
Example of a Personal Area Network (PAN) as provided by the Bluetooth standard.
53
PAN example
54
Bluetooth (IEEE 802.15.1)
Wireless Personal Area Network Spread Spectrum: Frequency Hopping Spread Spectrum (FHSS) Frequency Band: 2.4GHz Very low power consumption Short distance: < 10m Relatively low rate: < 1M Applications:
Cellular phone Peripheral device Home appliance Car
www.xilinx.com/esp/bluetooth/tutorials/intro.htm
55
Bluetooth ≈ IEEE 802.15.1
A widely used WPAN technology is known as Bluetooth (version 1.2 or version 2.0)
The IEEE 802.15.1 standard specifies the architecture and operation of Bluetooth devices, but only as far as physical layer and medium access control (MAC) layer operation is concerned (the core system architecture).
Higher protocol layers and applications defined in usage profiles are standardised by the Bluetooth SIG.
56
Piconets
Bluetooth enabled electronic devices connect and communicate wirelessly through short-range, ad hoc networks known as piconets.
Piconets are established dynamically and automatically as Bluetooth enabled devices enter and leave radio proximity.
Up to 8 devices in one piconet (1 master and 7 slave devices). Max range 10 m.
ad hoc => no base station
57
Piconet operation
The piconet master is a device in a piconet whose clock and device address are used to define the piconet physical channel characteristics. All other devices in the piconet are called piconet slaves.
At any given time, data can be transferred between the master and one slave. The master switches rapidly from slave to slave in a round-robin fashion.
Any device may switch the master/slave role at any time.
58
Power classes
Bluetooth products are available in one of three power classes:
Class
Class 1
Class 2
Class 3
Power
100 mW
2.5 mW
1 mW
Range
~100 m
~10 m
~10 cm
Industrial usage
Mobile devices
59
Data rates
Channel data rates:Bluetooth version 1.2 offers a bit rate of 1 Mbit/s. Bluetooth version 2.0 offers 3 Mbit/s.
Achievable user bit rates are much lower, (among others) due to the following reasons:
overhead resulting from various protocol headers
interference causes destroyed frequency bursts => information has to be retransmitted
IEEE 802.15.1 BLUETOOTH (I)
• Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for an infrastructure.
• Needed to connect different small devices in close proximity without expensive wiring or the need for a wireless infrastructure.
• Represents a single-chip, low-cost, radio-based wireless network technology.
60
BLUETOOTH (II)
• No standardization body has set up any specification regarding Bluetooth.
• The primary goal of Bluetooth is not a complex standard covering many aspects of wireless networking, but a quick and very cheap solution enabling ad hoc personal communication within a short range in the license-free 2.4 GHz band.
61
BLUETOOTH (III)
• Physical layer:– A frequency-hopping\time-division duplex scheme is used
for transmission with a fast hopping rate of 1,600 hops per second. The time between two hops is called a slot, which is an interval of 625μs, thus each slot uses a different frequency.
– On average, the frequency-hopping sequence ´visits´ each hop carrier with an equal probability.
– All devices using the same hopping sequence with the same phase form a Bluetooth piconet.
62
BLUETOOTH (IV)
– With transmitting power of up to 100 mW, Bluetooth devices have a range of up to 10m (or even up to 100m with special transceivers).
– Having this power and relying on battery power, a Bluetooth device cannot be in an active transmit mode all the time.
– Bluetooth defines several low-power states for the device.
63
BLUETOOTH (V)
– States of a possible Bluetooth device and possible transitions:
• Standby mode: Every device which is currently not participating in a piconet (and not switched off)
– In this mode, a device listens for paging messages.• Connections can be initiated by any device which becomes the
master.– This is done by sending page messages if the device already knows
the address of the receiver, or inquiry messages followed by a page message if the receiver’s address is unknown.
64
BLUETOOTH (VI)• To save battery power, a Bluetooth device can go into one
of three low power states if no data is ready to be sent:– PARK state: The device has the lowest duty cycle, and thus
the lowest power consumption. The device releases its MAC address, but remains synchronized with the piconet. The device occasionally listens to the traffic of the master device to resynchronize and check for broadcast messages.
– HOLD state: The power consumption of this state is a little higher. The device does not release its MAC address and can resume sending at once after transition out of the HOLD state.
– SNIFF state: It has the highest power consumption of the low-power states. The device listens to the piconet at a reduced rate.
65
BLUETOOTH (VII)
66
STANDBY
inquiry page
connectedtransmit
PARK HOLD SNIFF
unconnected
connecting
active
low power
BLUETOOTH (VIII)
• MAC layer:– Several mechanisms control medium access in a Bluetooth
system.– One device within a piconet acts as a master, all other
devices (up to seven) act as slaves.– The master determines the hopping sequence as well as
the phase of the sequence.– All Bluetooth devices have the same networking
capabilities, i.e., they can be master or slave. The unit establishing the piconet automatically becomes the master and controls medium access; all other devices will be slaves.
67
68
L2CAP layer
Host Controller Interface
L2CAP layer
ChannelManager
ResourceManager
L2CAP
ControlDataSynchronous traffic
The Logical Link Control and Adaptation Protocol (L2CAP) layer handles the multiplexing of higher layer protocols and the segmentation and reassembly (SAR) of large packets. The L2CAP layer provides both connectionless and connection-oriented services.
69
Higher protocol layers (1)
The operation of higher protocol layers is outside the scope of the IEEE 802.15.1 standard (but included in the Bluetooth SIG standards). The usage of these protocols depends on the specific Bluetooth profile in question. A large number of Bluetooth profiles have been defined.
L2CAP layer
RFCOMM
TCP/IP/PPP RS-232 emulation SDPTCS BINOBEX
70
Higher protocol layers (2)
The radio frequency communication protocol RFCOMMenables the replacement of serial port cables (carrying RS-232 control signals such as TxD, RxD, CTS, RTS, etc.) with wireless connections. Several tens of serial ports can be multiplexed into one Bluetooth device.
L2CAP layer
RFCOMM
TCP/IP/PPP SDPTCS BINOBEX RS-232 emulation
71
Higher protocol layers (3)
TCP/IP based applications, for instance information transfer using the Wireless Application Protocol (WAP), can be extended to Bluetooth devices by using the Point-to-Point Protocol (PPP) on top of RFCOMM.
L2CAP layer
RFCOMM
TCP/IP/PPP SDPTCS BINOBEX RS-232 emulation
72
Higher protocol layers (4)
The Object Exchange Protocol (OBEX) is a session-level protocol for the exchange of objects. This protocol can be used for example for phonebook, calendar or messaging synchronisation, or for file transfer between connected devices.
L2CAP layer
RFCOMM
TCP/IP/PPP SDPTCS BINOBEX RS-232 emulation
73
Higher protocol layers (5)
The telephony control specification - binary (TCS BIN) protocol defines the call-control signalling for the establishment of speech and data calls between Bluetooth devices. In addition, it defines mobility management procedures for handling groups of Bluetooth devices.
L2CAP layer
RFCOMM
TCP/IP/PPP SDPTCS BINOBEX RS-232 emulation
74
Higher protocol layers (6)
The Service Discovery Protocol (SDP) can be used to access a specific device (such as a digital camera) and retrieve its capabilities, or to access a specific application (such as a print job) and find devices that support this application.
L2CAP layer
RFCOMM
TCP/IP/PPP SDPTCS BINOBEX RS-232 emulation
75
Usage models
A number of usage models are defined in Bluetooth profile documents. A usage model is described by a set of protocols that implement a particular Bluetooth-based application. Some examples are shown on the following slides:
• File transfer
• LAN access
• Wireless headset
• Cordless (three-in-one) phone.
76
File transfer application
Using the file transfer profile:
A Bluetooth device can browse the file system of another Bluetooth device, can manipulate objects (e.g. delete objects) on another Bluetooth device, or - as the name implies - files can be transferred between Bluetooth devices.
SDP
RFCOMM
OBEX
File transfer application
L2CAP
77
LAN access application
Using the LAN profile:
A Bluetooth device can access LAN services using (for instance) the TCP/IP protocol stack over Point-to-Point Protocol (PPP).
Once connected, the device functions as if it were directly connected (wired) to the LAN.
SDP
RFCOMM
PPP
LAN access application
L2CAP
TCP/IP (e.g.)
78
Wireless headset applicationUsing the headset profile:
According to this usage model, the Bluetooth-capable headset can be connected wirelessly to a PC or mobile
SDPRFCOMM
Headset application
L2CAP
Audio
phone, offering a full-duplex audio input and output mechanism.
This usage model is known as the ultimate headset.
79
Cordless (three-in-one) phone application
Using the cordless telephone profile:
A Bluetooth device using this profile can set up phone calls to users in the PSTN (e.g. behind a PC acting as voice base
SDPTCS BIN
Cordless phone application
L2CAP
Audio
station) or receive calls from the PSTN.
Bluetooth devices implementing this profile can also communicate directly with each other.
80
Version Data rateMaximum application throughput
Version 1.2 1 Mbit/s >80 kbit/sVersion 2.0 + EDR 3 Mbit/s >80 kbit/s
Version 3.0 + HS 24 Mbit/s See Version 3.0+HS.
Version 4.0 24 Mbit/s See Version 4.0LE.
Bluetooth versions
81
Version 3.0 + HS of the Bluetooth Core Specification was adopted by the Bluetooth SIG on 21 April 2009. Bluetooth 3.0+HS provides theoretical data transfer speeds of up to 24 Mbit/s, though not over the Bluetooth link itself. Instead, the Bluetooth link is used for negotiation and establishment, and the high data rate traffic is carried over a collocated 802.11 link.
main new feature is AMP (Alternative MAC/PHY), the addition of 802.11 as a high speed transport. The High-Speed part of the specification is not mandatory, and hence only devices sporting the "+HS" will actually support the Bluetooth over 802.11 high-speed data transfer. A Bluetooth 3.0 device without the "+HS" suffix will not support High Speed, and needs to only support a feature introduced in Core Specification Version 3.0 or earlier Core Specification Addendum 1.
Bluetooth v3.0 + HS
http://en.wikipedia.org/wiki/Bluetooth#Bluetooth_v3.0_.2B_HS
82
Bluetooth Core Specification version 4.0 (called Bluetooth Smart) adopted 30 June 2010. It includes Classic Bluetooth, Bluetooth high speed and Bluetooth low energy protocols. Bluetooth high speed is based on Wi-Fi, and Classic Bluetooth consists of legacy Bluetooth protocols.
Bluetooth low energy (BLE), previously known as Wibree, is a subset of Bluetooth v4.0 with an entirely new protocol stack for rapid build-up of simple links. As an alternative to the Bluetooth standard protocols that were introduced in Bluetooth v1.0 to v3.0, it is aimed at very low power applications running off a coin cell. Chip designs allow for two types of implementation, dual-mode, single-mode and enhanced past versions.
Bluetooth Smart (v4.0 & 4.1)
http://en.wikipedia.org/wiki/Bluetooth#Bluetooth_v3.0_.2B_HS
http://en.wikipedia.org/wiki/Bluetooth_low_energy
83
Bluetooth Smart (v4.0 & 4.1)
84
• set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
• Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag".
NFC Near Field Communication
http://en.wikipedia.org/wiki/Near_field_communication
85
• NFC standards cover communications protocols and data exchange formats, and are based on existing radio-frequency identification (RFID) standards including ISO/IEC 14443 and FeliCa.
• The standards include ISO/IEC 18092 and those defined by the NFC Forum. Forum promotes NFC and certifies device compliance and if it fits the criteria for being considered a personal area network.
• NFC builds upon RFID systems by allowing two-way communication between endpoints, where earlier systems such as contactless smart cards were one-way only.
NFC Near Field Communication
http://en.wikipedia.org/wiki/Near_field_communication
86
• is a set of short-range wireless technologies, typically requiring a distance of 10 cm or less.
• operates at 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s.
• always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target.
• enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries.
• peer-to-peer communication is possible, provided both devices are powered.
NFC Near Field Communication
http://en.wikipedia.org/wiki/Near_field_communication
87
• NFC tags contain data and are typically read-only, but may be rewriteable.
• can be custom-encoded by their manufacturers or use the specifications provided by the NFC Forum.
• The tags can securely store personal data such as debit and credit card information, loyalty program data, PINs and networking contacts, among other information.
• NFC Forum defines four types of tags that provide different communication speeds and capabilities in terms of configurability, memory, security, data retention and write endurance. Tags between 96 and 4,096 bytes of memory.
NFC Near Field Communication
http://en.wikipedia.org/wiki/Near_field_communication
88
• As with proximity card technology, NFC uses magnetic induction between two loop antennas located within each other's near field, effectively forming an air-core transformer.
• operates within globally available and unlicensed radio frequency ISM band of 13.56 MHz. Most of the RF energy is concentrated in the allowed ±7 kHz bandwidth range, but the full spectral envelope may be as wide as 1.8 MHz when using ASK modulation.
• Theoretical working distance with compact standard antennas: up to 20 cm (practical working distance of about 4 cm)
• Supported data rates: 106, 212 or 424 kbit/s
NFC Near Field Communication
http://en.wikipedia.org/wiki/Near_field_communication
89
There are two modes:• Passive communication mode: The initiator device provides
a carrier field and the target device answers by modulating the existing field. In this mode, the target device may draw its operating power from the initiator-provided electromagnetic field, thus making the target device a transponder.
• Active communication mode: Both initiator and target device communicate by alternately generating their own fields. A device deactivates its RF field while it is waiting for data. In this mode, both devices typically have power supplies.
• NFC devices are able to receive and transmit data at the same time. Thus, they can check for potential collisions, if the received signal frequency does not match with the transmitted signal's frequency.
NFC Near Field Communication
http://en.wikipedia.org/wiki/Near_field_communication
90
NFC comparison with Bluetooth
http://en.wikipedia.org/wiki/Near_field_communication
Aspect NFC Bluetooth Bluetooth Low Energy
RFID compatible ISO 18000-3 active activeStandardisation body ISO/IEC Bluetooth SIG Bluetooth SIG
Network Standard ISO 13157 etc. IEEE 802.15.1 IEEE 802.15.1Network Type Point-to-point WPAN WPANCryptography not with RFID available availableRange < 0.2 m ~100 m (class 1) ~50 mFrequency 13.56 MHz 2.4–2.5 GHz 2.4–2.5 GHzBit rate 424 kbit/s 2.1 Mbit/s 25 Mbit/sSet-up time < 0.1 s < 6 s < 0.006 sPower consumption < 15mA (read) varies with class < 15 mA (read and
transmit)
IEEE 802.15.4 LR-WPAN (ZigBee)
91
802.15.4 vs ZigBee - What's the difference?
• The Wireless Sensor Network Research group (WSNRG) has published an article titled 802.15.4 vs ZigBee which helps people understand and distinguish between all the communications technologies that are used in the WSN field: 802.15.4, ZigBee, Mesh protocols, 2.4GHz, 868MHz and 900MHz bands…
• This document compares both IEEE 802.15.4 and ZigBeetechnologies while explaining the main characteristics of each.
92
See 802.15.4 vs Zigbee doc
802.15.4 vs ZigBee - What's the difference?
• To summarize 802.15.4 vs ZigBee:– 802.15.4 is a protocol to get point to point and energy
efficient communications.– ZigBee defines extra services (star topology routing,
encryption, application services) over 802.15.4.– ZigBee creates semi-centralized networks where just
the end devices can sleep– Different completely distributed mesh algorithms are
being used over 802.15.4.
93
See 802.15.4 vs Zigbee doc
IEEE 802.15.4 • a standard which specifies the physical layer and
media access control (MAC) for low-rate wireless personal area networks (LR-WPANs).
• basis for the ZigBee, ISA100.11a, WirelessHART, and MiWi specifications, which further extend standard by developing the upper layers which are not defined by 802.15.4.
• Alternatively, it can be used with 6LoWPAN and standard Internet protocols to build a Wireless Embedded Internet.
94
95
IEEE 802.15.4 LR-WPAN (ZigBee http://www.zigbee.org/)
ZigBee technology is simpler (and less expensive) than Bluetooth.
The main objectives of an LR-WPAN like ZigBee are ease of installation, reliable data transfer, short-range operation, extremely low cost, and a reasonable battery life, while maintaining a simple and flexible protocol.
The raw data rate will be high enough (maximum of 250 kbit/s @ 10 metres) to satisfy a set of simple needs such as interactive toys, etc..., but is also scalable down to the needs of sensor and automation needs (20 kbit/s or below) using wireless communications.
96
IEEE 802.15.4 LR-WPAN (ZigBee http://www.zigbee.org/)Important features include:
•real-time suitability by reservation of guaranteed time slots,
•collision avoidance through CSMA/CA and integrated support for secure communications.
•Devices also include power management functions such as link quality and energy detection
•PHY manages the physical RF transceiver and performs channel selection and energy and signal management functions. Operates on unlicensed frequency bands:
• 868.0-868.6 MHz: Europe, allows 1 communication channel (2003, 2006) 902-928 MHz: North America, up to ten channels (2003), extended to 30 (2006) 2400-2483.5 MHz: worldwide use, up to 16 channels (2003, 2006)
97
ZigBee http://www.zigbee.org/ZigBee offers basically four kinds of different services:
• Extra Encryption services (application and network keys implement extra 128b AES encryption)
• Association and authentication (only valid nodes can join to the network).
• Routing protocol: AODV, a reactive ad hoc protocol.
• Application Services: An abstract concept called "cluster" is introduced. Each node belongs to a predefined cluster and can take a predefined number of actions. Example: the "house light system cluster" can perform two actions: "turn the lights on", and "turn the lights off".
98
http://www.zigbee.org/)
99
http://www.zigbee.org/)
100
http://www.zigbee.org/)
101
http://www.zigbee.org/)
Zigbee public profiles
102
http://www.zigbee.org/)Zigbee home control example
103
LR-WPAN device types
Two different device types can participate in an LR-WPANnetwork:
Full-function devices (FFD) can operate in three modes serving as a personal area network (PAN) coordinator, a coordinator, or a device.
Reduced-function devices (RFD) are intended for applications that are extremely simple.
An FFD can talk to RFDs or other FFDs, while an RFD can talk only to an FFD.
104
Network topologies (1)
Two or more devices communicating on the same physical channel constitute a WPAN. The WPAN network must include at least one FFD that operates as the PAN coordinator.
The PAN coordinator initiates, terminates, or routes communication around the network. The PAN coordinator is the primary controller of the PAN.
The WPAN may operate in either of two topologies: the star topology or the peer-to-peer topology.
105
Network topologies (2)
Star topology
PAN coordinator (always FFD) FFD RFD
In a star network, after an FFD is activated for the first time, it may establish its own network and become the PAN coordinator.
The PAN coordinator can allow other devices to join its network.
106
Network topologies (3)
Peer-to-peer topologyIn a peer-to-peer network, each FFD is capable of communicating with any other FFD within its radio sphere of influence. One FFD will be nominated as the PAN coordinator.
A peer-to-peer network can be ad hoc, self-organizing and self-healing, and can combine devices using a mesh networking topology.
PAN coordinator (always FFD) FFD RFD
107
ZigBee PHY and MAC parameters
Topology Ad hoc (central PAN coordinator)RF band 2.4 GHz ISM frequency bandRF channels 16 channels with 5 MHz spacingSpreading DSSS (32 chips / 4 bits)Chip rate 2 Mchip/sModulation Offset QPSK
Access method CSMA/CA (or slotted CSMA/CA)
108
Comparison: Bluetooth radio and baseband parameters
Topology Up to 7 simultaneous linksModulation Gaussian filtered FSKRF bandwidth 220 kHz (-3 dB), 1 MHz (-20 dB)RF band 2.4 GHz ISM frequency bandRF carriers 79 (23 as reduced option)Carrier spacing 1 MHzAccess method FHSS-TDD-TDMAFreq. hop rate 1600 hops/s
109
Beacon frames
The LR-WPAN standard allows the optional use of a superframe structure. The format of the superframe is defined by the coordinator.
Superframe is bounded by network beacons, sent by the coordinator, and is divided into 16 equally sized slots. The beacon frame is transmitted in the first slot of each superframe. If a coordinator does not wish to use a superframe structure, it may turn off the beacon transmissions.
The beacons are used to synchronize the attached devices, to identify the PAN, and to describe the superframe structure.
110
CSMA/CA operation (1)
Nonbeacon-enabled networks use an unslotted CSMA-CA channel access mechanism.
Each time a device wishes to transmit data frames or MAC commands, it shall wait for a random period. If the channel is found to be idle, the device shall transmit its data. If the channel is found to be busy, following the device shall wait for the random backoff before trying to access the channel again.
111
CSMA/CA operation (2)
Beacon-enabled networks use a slotted CSMA-CA channel access mechanism, where the backoff slots are aligned with the start of the beacon transmission.
Similar to the unslotted operation, however the device can begin transmitting on the next available slot boundary.
6LoWPAN
112
What is 6LoWPAN
• Low-power RF + IPv6 = 6LoWPAN
• Defined by IETF standards– RFC 4919, “IPv6 over Low-Power Wireless
Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals”
– RFC 4944, “Transmission of IPv6 Packets over IEEE 802.15.4 Networks”
– draft-ietf-6lowpan-hc and –nd
113Prepared by Zinon Zinonos
University of Cyprus6LoWPAN• simple, low-cost, wireless communication network for
constrained applications with limited power.• is an adaption layer that allows efficient IPv6 communication
over IEEE 802.15.4.• turns IEEE 802.15.4 into the next IP-enabled link• offers wide-scale connectivity, open-system based interoperability,
and interoperability between low-power devices and IP devices• Leverages well-known IP-based knowledge and practices• Imports well-known capabilities of IPv6 to low-power devices.
uIPv6114
Blip,and uIPv6 are implementations of the 6LoWPAN stack for TinyOS 2.x and CONTIKI
Why is needed?
115Internet of Things
Benefits of using IP in 6LoWPAN Technology
The benefits of 6LoWPAN include:– Open, long-lived, reliable standards– Transparent Internet integration– Easy learning-curve– Established network management tools– Global scalability– Established security– End-to-end data flows
116
6LoWPAN architecture
117
6LoWPAN characteristics
As IEEE 802.15.4:– Small MTU size of 127 bytes– Low data rate of 250kbps – Operates in 2.4 GHz band– Short range communication
Efficient header compression Network autoconfiguration using neighbor discovery Unicast, multicast and broadcast support Fragmentation
– 1280 bytes IPv6 MTU -> 127 bytes 802.15.4 frames Support for IP routing (e.g. IETF RPL) Star and peer-to-peer (mesh) topologies
118
6LoWPAN routing• RPL Routing
119
RFID - RADIO-FREQUENCY IDENTIFICATION
120
Radio-frequency identification (RFID)
• wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. – Passive tags: require no battery and are powered by
the electromagnetic fields used to read them.– Active tags: use a local power source and emit radio
waves (electromagnetic radiation at radio frequencies). • RFID tag contains electronically stored information which
can be read from up to several metres away. Unlike a bar code, the tag does not need to be within line of sight of the reader and may be embedded in the tracked object.
121
Radio-frequency identification (RFID)
• RFID tags are used in many industries:– track its progress through the assembly line of an
automobile – Pharmaceuticals can be tracked through warehouses. – Livestock and pets may have tags injected. – identity cards can give employees access to locked
areas of a building– RF transponders mounted in automobiles can be used
to bill motorists for access to toll roads or parking.
• Since RFID tags can be attached to clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised privacy concerns.
122
Radio-frequency identification (RFID)
123
http://en.wikipedia.org/wiki/Radio-frequency_identification
5 D. Sen et al., RFID For Energy and Utility Industries, PennWell Corp., 2009 ISBN 978-1-595370-105-5, pages 1-486 Stephen A. Weis, RFID (Radio Frequency Identification):Principles and Applications, MIT
Radio-frequency identification (RFID)
• SEE SLIDES
• RFID: Cow Jewelry – or – Revolution slides
• By Travis Sparks• http://www.cs.unc.edu/~sparkst
124
DASH 7THE LOWEST POWER, LONGEST RANGE WIRELESS NETWORKING TECHNOLOGY AVAILABLE ANYWHERE!!!!
125
Dash7 low-power radio protocolgains momentum …• Yet another technology ????• Goal: The lowest power, longest range wireless
networking technology available anywhere!!!
• DASH7 Alliance is the body responsible for overseeing the development of the ISO 18000-7 standard for wireless sensor networking, as well as interoperability certification of DASH7 devices and the licensing of DASH7 trademarks. The DASH7 Alliance is an industry consortium whereas "DASH7" is the name of the technology.
• http://www.dash7.org/index.php?option=com_content&view=article&id=9&Itemid=11
• See IEEE spectrum article Wireless Networking Dashes in a New Direction: The Dash7 low-power radio protocol gains momentum, Feb 2010.
126
Dash7
• Range: Dynamically adjustable from 10 meters to 10 kilometers• Power: <1 milliwatt power draw• Data Rate: dynamically adjustable from 28kbps to 200kbps.• Frequency: 433.92 MHz (available worldwide)• Signal Propagation: Penetrates Walls, Concrete, Water• Real-Time Locating Precision: within 4 meters• Latency: Configurable, but worst case is less than two seconds • P2P Messaging: Yes• IPv6 Support: Yes• Security: 128-bit AES, public key• Application Profiles: None• Standard: ISO/IEC 18000-7
127
Dash7 in a nutshellespecially appropriate for such things as radio-frequency identification (RFID) tags
128
Dash7 in comparison
http://www.dash7.org/index.php?option=com_content&view=article&id=148&Itemid=203
129
Dash7 in comparison
SEE slides:
DASH7 Capabilities Overview for SeoulSeoul Briefing of Dec 9th 2009 Slides
http://www.dash7.org/index.php?option=com_content&view=article&id=192&Itemid=196
WLAN technologies – summary
• The basic goals of all wireless LAN/WAN types (WLAN, WiMAX, WiMesh, BUETOOTH, ZigBee, etc…) are the provision of a much higher flexibility for nodes within a network.
• All WLANs suffer from limitations of the air interface and higher complexity compared to their wired counterparts but allow for a new degree of freedom for their users within rooms, buildings etc, leading to diverse applications, including the Internet-Of-Things
130
Extra slides
131
HIPERLAN –High Performance LAN (I)• The European Telecommunications Standards
Institute (ETSI) standardized HIPERLAN as a WLAN allowing for node mobility and supporting ad hoc and infrastructure-based topologies.
• It is a wireless LAN supporting priorities and packet life time for data transfer at 23.5 Mbit/s, including forwarding mechanisms, topology discovery, user data encryption, network identification and power conservation mechanisms.
• HIPERLANs operate at 5.1 – 5.3 GHz with a range of 50m in buildings at 1 W transmit power.
132
HIPERLAN –High Performance LAN (II)
• The service offered by a HIPERLAN is compatible with the standard MAC services known from IEEE 802.x LANs.
• The HIPERLAN Channel Access Control mechanism was specifically designed to provide channel access with priorities.
• The CAC contains the access scheme EY-NPMA, which is unique for HIPERLAN.
133
HIPERLAN –High Performance LAN (III)• Elimination-yield non-preemptive priority
multiple access (EY-NPMA)– not only a complex acronym, but also the heart of the
channel access providing priorities and different access schemes.
– divides the medium access of different competing nodes into three phases:
• Prioritization: Determine the highest priority of a data packet ready to be sent on competing nodes
• Contention: Eliminate all but one of the contenders, if more than one sender has the highest current priority.
• Transmission: Finally, transmit the packet of the remaining node.
134
HIPERLAN –High Performance LAN (IV)
– The contention phase is further subdivided into an elimination phase and a yield phase.
– The purpose of the elimination phase is to eliminate as many contending nodes as possible. The result is a more or less constant number of remaining nodes, almost independent of the initial number of competing nodes.
– The yield phase completes the work of the elimination phase with the goal of only one remaining node.
135
top related