You are on page 1of 78

Mobile Communications Chapter 7: Wireless LANs

Slides by Jochen Schiller with modifications by Emmanuel Agu

Characteristics q IEEE 802.11


q
q

PHY q MAC q Roaming q .11a, b, g, h, i

HIPERLAN q Bluetooth / IEEE 802.15.x q IEEE 802.16/.20/.21/.22 q RFID q Comparison


q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.1

Mobile Communication Technology according to IEEE


Local wireless networks WLAN 802.11

WiFi

802.11a

802.11b

802.11h 802.11i/e//w 802.11g

ZigBee
Personal wireless nw WPAN 802.15 802.15.1 802.15.4 802.15.2 802.15.4a/b 802.15.5 802.15.3 802.15.3a/b

Bluetooth
Wireless distribution networks WMAN 802.16 (Broadband Wireless Access)
+ Mobility

WiMAX

802.20 (Mobile Broadband Wireless Access)


Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.2

Characteristics of wireless LANs


Advantages
q q q q

very flexible within reception area Ad-hoc networks do not need planning (almost) no wiring difficulties (e.g. historic buildings, firewalls) more robust against disasters like, e.g., earthquakes, fire low bandwidth compared to wired networks (1-10 Mbit/s) many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE 802.11) many national restrictions for wireless, long time to establish global solutions like, e.g., IMT-2000

Disadvantages
q q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.3

Design goals for wireless LANs


q q q q q q q q q

global, seamless operation low power for battery use no special permissions or licenses needed to use the LAN robust transmission technology simplified spontaneous cooperation at meetings easy to use for everyone, simple management protection of investment in wired networks security (no one should be able to read my data), privacy (no one should be able to collect user profiles), safety (low radiation) transparency concerning applications and higher layer protocols, but also location awareness if necessary

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.4

Comparison: infrared vs. radio transmission


Infrared
q

Radio
q

uses IR diodes, diffuse light, multiple reflections (walls, furniture etc.)

typically using the license free ISM band at 2.4 GHz

Advantages
q

Advantages
q

simple, cheap, available in many mobile devices q no licenses needed q simple shielding possible

experience from wireless WAN and mobile phones can be used q coverage of larger areas possible (radio can penetrate walls, furniture etc.)

Disadvantages
q

Disadvantages
q

interference by sunlight, heat sources etc. q many things shield or absorb IR light q low bandwidth

limited license free frequency bands q shielding more difficult, electrical interference

Example
q

Example
q

Many different products

IrDA (Infrared Data Association) interface available everywhere


MC SS05 7.5

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Comparison: infrastructure vs. ad-hoc networks


infrastructure network
AP AP wired network AP: Access Point

AP

ad-hoc network

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.6

802.11 - Architecture of an infrastructure network


Station (STA)
802.11 LAN 802.x LAN
q

terminal with access mechanisms to the wireless medium and radio contact to the access point group of stations using the same radio frequency station integrated into the wireless LAN and the distribution system bridge to other (wired) networks interconnection network to form one logical network (EES: Extended Service Set) based on several BSS

STA1

BSS1 Access Point Portal

Basic Service Set (BSS)


q

Access Point
q

Distribution System ESS BSS2 Access Point

Portal
q

Distribution System
q

STA2

802.11 LAN

STA3

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.7

802.11 - Architecture of an ad-hoc network


Direct communication within a limited range
q

802.11 LAN

STA1 IBSS1 STA3

Station (STA): terminal with access mechanisms to the wireless medium q Independent Basic Service Set (IBSS): group of stations using the same radio frequency

STA2

IBSS2 STA5 STA4 802.11 LAN

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.8

IEEE standard 802.11


fixed terminal mobile terminal

infrastructure network access point application TCP IP LLC 802.11 MAC 802.11 PHY LLC 802.11 MAC 802.11 PHY 802.3 MAC 802.3 PHY application TCP IP LLC 802.3 MAC 802.3 PHY

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.9

802.11 - Layers and functions


MAC
q

PLCP Physical Layer Convergence Protocol


access mechanisms, fragmentation, encryption synchronization, roaming, MIB, power management
q

clear channel assessment signal (carrier sense) modulation, coding channel selection, MIB coordination of all management functions

MAC Management
q

PMD Physical Medium Dependent


q

PHY Management
q

Station Management
q

DLC

LLC MAC PLCP PHY Management PMD MAC Management

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Station Management
MC SS05

PHY

7.10

802.11 - Physical layer (classical)


3 versions: 2 radio (typ. 2.4 GHz), 1 IR
q

data rates 1 or 2 Mbit/s spreading, despreading, signal strength, typ. 1 Mbit/s min. 2.5 frequency hops/s (USA), two-level GFSK modulation DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying), DQPSK for 2 Mbit/s (Differential Quadrature PSK) preamble and header of a frame is always transmitted with 1 Mbit/s, rest of transmission 1 or 2 Mbit/s chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code) max. radiated power 1 W (USA), 100 mW (EU), min. 1mW 850-950 nm, diffuse light, typ. 10 m range carrier detection, energy detection, synchronization
MC SS05 7.11

FHSS (Frequency Hopping Spread Spectrum)


q q

DSSS (Direct Sequence Spread Spectrum)


q q q q

Infrared
q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

802.11 - MAC layer I - DFWMAC


Traffic services
q

Asynchronous Data Service (mandatory)


l

exchange of data packets based on best-effort l support of broadcast and multicast


q

Time-Bounded Service (optional)


l

implemented using PCF (Point Coordination Function)

Access methods
q

DFWMAC-DCF CSMA/CA (mandatory)


l

collision avoidance via randomized back-off mechanism l minimum distance between consecutive packets l ACK packet for acknowledgements (not for broadcasts)
q

DFWMAC-DCF w/ RTS/CTS (optional)


l

Distributed Foundation Wireless MAC l avoids hidden terminal problem


q

DFWMAC- PCF (optional)


l

access point polls terminals according to a list


MC SS05 7.12

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

802.11 - MAC layer II


Priorities
q q q q q

defined through different inter frame spaces no guaranteed, hard priorities SIFS (Short Inter Frame Spacing)
l

highest priority, for ACK, CTS, polling response medium priority, for time-bounded service using PCF lowest priority, for asynchronous data service

PIFS (PCF IFS)


l

DIFS (DCF, Distributed Coordination Function IFS)


l

DIFS

medium busy

DIFS PIFS SIFS

contention

next frame t

direct access if medium is free DIFS


Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.13

802.11 - CSMA/CA access method I


DIFS DIFS contention window (randomized back-off mechanism) next frame t slot time

medium busy direct access if medium is free DIFS


q q q

q q

station ready to send senses medium (based on PHY layer CCA, Clear Channel Assessment) if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending (IFS depends on service type) if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time) if another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness) If multiple stations have backed off, when 1 timer expires, other timers frozen
MC SS05 7.14

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

802.11 - CSMA/CA access method II


Sending unicast packets
q q q

station has to wait for DIFS before sending data receivers acknowledge at once (after waiting for SIFS) if the packet was received correctly (CRC) automatic retransmission of data packets in case of transmission errors

DIFS sender receiver other stations

data SIFS ACK DIFS data t contention

waiting time

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.15

802.11 - DFWMAC
Sending unicast packets
q q q q

station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) acknowledgement via CTS after SIFS by receiver (if ready to receive) sender can now send data at once, acknowledgement via ACK other stations store medium reservations distributed via RTS and CTS
DIFS RTS SIFS CTS SIFS data SIFS ACK

sender receiver

other stations

NAV (RTS) NAV (CTS) defer access

DIFS

data t

contention
MC SS05 7.16

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Fragmentation

DIFS sender receiver

RTS SIFS CTS SIFS

frag1 SIFS ACK1 SIFS

frag2 SIFS ACK2

NAV (RTS) NAV (CTS) other stations NAV (frag1 ) NAV (ACK1 ) DIFS data t

contention

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.17

DFWMAC-PCF I

t0 t1 medium busy PIFS D1 point SIFS coordinator wireless stations stations NAV U1

SuperFrame SIFS SIFS SIFS U2 NAV

D2

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.18

802.11 - Frame format


Types
q

control frames, management frames, data frames important against duplicated frames due to lost ACKs receiver, transmitter (physical), BSS identifier, sender (logical) sending time, checksum, frame control, data
0-2312 Data 1 4 CRC

Sequence numbers
q

Addresses
q

Miscellaneous
q

bytes

2 2 6 6 6 2 6 Frame Duration/ Address Address Address Sequence Address Control ID 1 2 3 Control 4 2 2 4 1 1 1 1 1 1 1

bits

Protocol To From More Power More Type Subtype Retry WEP Order version DS DS Frag Mgmt Data

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.19

802.11 - MAC management


Synchronization
q q q q q q q q q q q

Clock skew may happen Infrastructure: AP broadcasts beacons, other nodes correct skew Ad hoc: All nodes broadcast beacons Save battery, nodes can go to sleep, wake up periodically to receive Infrastructure: AP buffers packets for sleeping nodes Ad hoc: sender buffers packets for sleeping destinations Roaming: Move from access point to access point as user moves scanning, i.e. active search for a network Node sends message to new AP, says goodbye to old AP All information for managing network, node stored in SNMP MIB MIB can be read (access) or written to (update)

Power management

Association/Reassociation

MIB - Management Information Base

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.20

WLAN: IEEE 802.11b


Data rate
q

Connection set-up time


q q

1, 2, 5.5, 11 Mbit/s, depending on SNR q User data rate max. approx. 6 Mbit/s

Connectionless/always on Typ. Best effort, no guarantees (unless polling is used, limited support in products) Limited (no automated key distribution, sym. Encryption)

Quality of Service

Transmission range
q

300m outdoor, 30m indoor q Max. data rate ~10m indoor

Manageability
q

Frequency
q

Special Advantages/Disadvantages
q

Free 2.4 GHz ISM-band Limited, WEP insecure, SSID Many products, many vendors

Security
q

Availability
q

Advantage: many installed systems, lot of experience, available worldwide, free ISM-band, many vendors, integrated in laptops, simple system q Disadvantage: heavy interference on ISM-band, no service guarantees, slow relative speed only

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.21

Channel selection (non-overlapping)


Europe (ETSI) channel 1 channel 7 channel 13

2400

2412

2442 22 MHz

2472

2483.5 [MHz]

US (FCC)/Canada (IC)

channel 1

channel 6

channel 11

2400

2412

2437 22 MHz

2462

2483.5 [MHz]

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.22

WLAN: IEEE 802.11a


Data rate
q q q

Connection set-up time


q

6, 9, 12, 18, 24, 36, 48, 54 Mbit/s, depending on SNR User throughput (1500 byte packets): 5.3 (6), 18 (24), 24 (36), 32 (54) 6, 12, 24 Mbit/s mandatory 100m outdoor, 10m indoor
l

Connectionless/always on Typ. best effort, no guarantees (same as all 802.11 products) Limited (no automated key distribution, sym. Encryption) Advantage: fits into 802.x standards, free ISM-band, available, simple system, uses less crowded 5 GHz band Disadvantage: stronger shading due to higher frequency, no QoS

Quality of Service
q

Transmission range
q

Manageability
q

E.g., 54 Mbit/s up to 5 m, 48 up to 12 m, 36 up to 25 m, 24 up to 30m, 18 up to 40 m, 12 up to 60 m

Special Advantages/Disadvantages
q

Frequency
q

Free 5.15-5.25, 5.25-5.35, 5.725-5.825 GHz ISM-band


q

Security
q

Limited, WEP insecure, SSID Some products, some vendors

Availability
q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.23

WLAN: IEEE 802.11 future developments (03/2005)


802.11c: Bridge Support
q q q

Definition of MAC procedures to support bridges as extension to 802.1D Support of additional regulations related to channel selection, hopping sequences

802.11d: Regulatory Domain Update 802.11e: MAC Enhancements QoS


Enhance the current 802.11 MAC to expand support for applications with Quality of Service requirements, and in the capabilities and efficiency of the protocol q Definition of a data flow (connection) with parameters like rate, burst, period q Additional energy saving mechanisms and more efficient retransmission

802.11f: Inter-Access Point Protocol


q

Establish an Inter-Access Point Protocol for data exchange via the distribution system q Currently unclear to which extend manufacturers will follow this suggestion

802.11g: Data Rates > 20 Mbit/s at 2.4 GHz; 54 Mbit/s, OFDM


q q

Successful successor of 802.11b, performance loss during mixed operation with 11b Extension for operation of 802.11a in Europe by mechanisms like channel measurement for dynamic channel selection (DFS, Dynamic Frequency Selection) and power control (TPC, Transmit Power Control)
MC SS05 7.24

802.11h: Spectrum Managed 802.11a

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

WLAN: IEEE 802.11 future developments (03/2005)


802.11i: Enhanced Security Mechanisms
q q q q

Enhance the current 802.11 MAC to provide improvements in security. TKIP enhances the insecure WEP, but remains compatible to older WEP systems AES provides a secure encryption method and is based on new hardware Changes of 802.11a for operation at 5GHz in Japan using only half the channel width at larger range Devices and access points should be able to estimate channel quality in order to be able to choose a better access point of channel

802.11j: Extensions for operations in Japan 802.11k: Methods for channel measurements
q

802.11m: Updates of the 802.11 standards 802.11n: Higher data rates above 100Mbit/s
q q

Changes of PHY and MAC with the goal of 100Mbit/s at MAC SAP MIMO antennas (Multiple Input Multiple Output), up to 600Mbit/s are currently feasible q However, still a large overhead due to protocol headers and inefficient mechanisms

802.11p: Inter car communications


q q q

Communication between cars/road side and cars/cars Planned for relative speeds of min. 200km/h and ranges over 1000m Usage of 5.850-5.925GHz band in North America

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.25

WLAN: IEEE 802.11 future developments (03/2005)


802.11r: Faster Handover between BSS
q q q

Secure, fast handover of a station from one AP to another within an ESS Current mechanisms (even newer standards like 802.11i) plus incompatible devices from different vendors are massive problems for the use of, e.g., VoIP in WLANs Handover should be feasible within 50ms in order to support multimedia applications efficiently Design of a self-configuring Wireless Distribution System (WDS) based on 802.11 Support of point-to-point and broadcast communication across several hops Standardization of performance measurement schemes

802.11s: Mesh Networking


q q

802.11t: Performance evaluation of 802.11 networks


q

802.11u: Interworking with additional external networks 802.11v: Network management


q q

Extensions of current management functions, channel measurements Definition of a unified interface Classical standards like 802.11, but also 802.11i protect only data frames, not the control frames. Thus, this standard should extend 802.11i in a way that, e.g., no control frames can be forged.

802.11w: Securing of network control


q

Note: Not all standards will end in products, many ideas get stuck at working group level Info: www.ieee802.org/11/, 802wirelessworld.com, standards.ieee.org/getieee802/

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.26

ETSI HIPERLAN (historical)


ETSI standard
q q q

European standard, cf. GSM, DECT, ... Enhancement of local Networks and interworking with fixed networks integration of time-sensitive services from the early beginning one standard cannot satisfy all requirements
l

HIPERLAN family
q

range, bandwidth, QoS support l commercial constraints


q

HIPERLAN 1 standardized since 1996 no products!


higher layers

medium access control layer channel access control layer physical layer HIPERLAN layers

network layer data link layer physical layer OSI layers

logical link control layer medium access control layer physical layer IEEE 802.x layers
MC SS05 7.27

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Overview: original HIPERLAN protocol family


HIPERLAN 1 wireless LAN HIPERLAN 2 access to ATM fixed networks HIPERLAN 3 wireless local loop HIPERLAN 4 point-to-point wireless ATM connections 17.2-17.3GHz point-to-point

Application

Frequency Topology Antenna Range QoS Mobility Interface Data rate Power conservation

5.1-5.3GHz decentralized adcellular, point-tohoc/infrastructure centralized multipoint omni-directional directional 50 m 50-100 m 5000 m 150 m statistical ATM traffic classes (VBR, CBR, ABR, UBR) <10m/s stationary conventional LAN ATM networks 23.5 Mbit/s yes >20 Mbit/s 155 Mbit/s not necessary

HIPERLAN 1 never reached product status, the other standards have been renamed/modfied !
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.28

HIPERLAN 1 - Characteristics
Data transmission
q q

point-to-point, point-to-multipoint, connectionless 23.5 Mbit/s, 1 W power, 2383 byte max. packet size asynchronous and time-bounded services with hierarchical priorities compatible with ISO MAC infrastructure or ad-hoc networks transmission range can be larger then coverage of a single node (forwarding integrated in mobile terminals) power saving, encryption, checksums

Services
q q

Topology
q q

Further mechanisms
q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.29

HIPERLAN 1 - CAC sublayer


Channel Access Control (CAC)
q q q

assure that terminal does not access forbidden channels priority scheme, access with EY-NPMA 3 EY-NPMA phases: priority resolution, contention resolution, transmission 5 priority levels for QoS support QoS is mapped onto a priority level with the help of the packet lifetime (set by an application)
elimination survival verification IPS synchronization priority detection IPA priority assertion IES elimination burst IESV I YS yield listening user data transmission
MC SS05 7.30

Priorities
q q

transmission

prioritization

contention

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

HIPERLAN 1 - EY-NPMA II
Several terminals can now have the same priority and wish to send
q

contention phase
l

Elimination Burst: all remaining terminals send a burst to eliminate contenders (11111010100010011100000110010110, high bit- rate) l Elimination Survival Verification: contenders now sense the channel, if the channel is free they can continue, otherwise they have been eliminated l Yield Listening: contenders again listen in slots with a nonzero probability, if the terminal senses its slot idle it is free to transmit at the end of the contention phase l the important part is now to set the parameters for burst duration and channel sensing (slot-based, exponentially distributed)
q

data transmission
l

the winner can now send its data (however, a small chance of collision remains) l if the channel was idle for a longer time (min. for a duration of 1700 bit) a terminal can send at once without using EY-NPMA
q

synchronization using the last data transmission


MC SS05 7.31

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

HIPERLAN 1 - MAC layer


Compatible to ISO MAC Supports time-bounded services via a priority scheme Packet forwarding
q q

support of directed (point-to-point) forwarding and broadcast forwarding (if no path information is available) support of QoS while forwarding mechanisms integrated, but without key management mobile terminals can agree upon awake patterns (e.g., periodic wake-ups to receive data) additionally, some nodes in the networks must be able to buffer data for sleeping terminals and to forward them at the right time (so called stores)

Encryption mechanisms
q

Power conservation mechanisms


q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.32

Some history: Why wireless ATM?


q q q q q q q

seamless connection to wired ATM, a integrated services highperformance network supporting different types a traffic streams ATM networks scale well: private and corporate LANs, WAN B-ISDN uses ATM as backbone infrastructure and integrates several different services in one universal system mobile phones and mobile communications have increasing importance in everyday life current wireless LANs do not offer adequate support for multimedia data streams merging mobile communication and ATM leads to wireless ATM from a telecommunication provider point of view goal: seamless integration of mobility into B-ISDN

Problem: very high complexity of the system never reached products

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.33

ATM - basic principle


q q q q q

favored by the telecommunication industry for advanced high-performance networks, e.g., B-ISDN, as transport mechanism statistical (asynchronous, on demand) TDM (ATDM, STDM) cell header determines the connection the user data belongs to mixing of different cell-rates is possible
l

different bit-rates, constant or variable, feasible

interesting for data sources with varying bit-rate:


l

e.g., guaranteed minimum bit-rate l additionally bursty traffic if allowed by the network

ATM cell:
5
cell header

48
user data

[byte]

connection identifier, checksum etc.

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.34

Cell-based transmission
q q q q q

asynchronous, cell-based transmission as basis for ATM continuous cell-stream additional cells necessary for operation and maintenance of the network (OAM cells; Operation and Maintenance) OAM cells can be inserted after fixed intervals to create a logical frame structure if a station has no data to send it automatically inserts idle cells that can be discarded at every intermediate system without further notice

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.35

B-ISDN protocol reference model


3 dimensional reference model
q

three vertical planes (columns)


l l l

user plane control plane management plane

three hierarchical layers


l l l

management plane plane management control user plane plane higher higher layers layers ATM adaptation layer ATM layer layer management

physical layer ATM layer ATM adaptation layer

Out-of-Band-Signaling: user data is transmitted separately from control information

layers

physical layer

planes
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.36

ATM Forum Wireless ATM Working Group


q q

q q q

ATM Forum founded the Wireless ATM Working Group June 1996 Task: development of specifications to enable the use of ATM technology also for wireless networks with a large coverage of current network scenarios (private and public, local and global) compatibility to existing ATM Forum standards important it should be possible to easily upgrade existing ATM networks with mobility functions and radio access two sub-groups of work items
Radio Access Layer (RAL) Protocols
q q q q q

Mobile ATM Protocol Extensions


q q q q q

radio access layer wireless media access control wireless data link control radio resource control handover issues

handover signaling location management mobile routing traffic and QoS Control network management

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.37

WATM services
Office environment
q

multimedia conferencing, online multimedia database access distance learning, teaching database connection, surveillance, real-time factory management reliable, high-bandwidth network, medical images, remote monitoring high-bandwidth interconnect of devices (TV, CD, PC, ...) trucks, aircraft etc. interconnect, platooning, intelligent roads

Universities, schools, training centers


q

Industry
q

Hospitals
q

Home
q

Networked vehicles
q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.38

WATM components
WMT (Wireless Mobile ATM Terminal) RAS (Radio Access System) EMAS-E (End-user Mobility-supporting ATM Switch - Edge) EMAS-N (End-user Mobility-supporting ATM Switch - Network) M-NNI (Network-to-Network Interface with Mobility support) LS (Location Server) AUS (Authentication Server)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.39

Reference model
EMAS-N WMT RAS

EMAS-E M-NNI WMT RAS EMAS-N

LS AUS

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.40

BRAN Broadband Radio Access Networks


Motivation
q q

deregulation, privatization, new companies, new services How to reach the customer?
l

alternatives: xDSL, cable, satellite, radio

Radio access
q q q

flexible (supports traffic mix, multiplexing for higher efficiency, can be asymmetrical) quick installation economic (incremental growth possible) private customers (Internet access, tele-xy...) small and medium sized business (Internet, MM conferencing, VPN) access networks, indoor/campus mobility, 25-155 Mbit/s, 50 m-5 km coordination with ATM Forum, IETF, ETSI, IEEE, ....
MC SS05 7.41

Market
q q

Scope of standardization
q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Broadband network types


Common characteristics
q

ATM QoS (CBR, VBR, UBR, ABR) short range (< 200 m), indoor/campus, 25 Mbit/s user data rate access to telecommunication systems, multimedia applications, mobility (<10 m/s) wider range (< 5 km), outdoor, 25 Mbit/s user data rate fixed radio links to customers (last mile), alternative to xDSL or cable modem, quick installation Several (proprietary) products exist with 155 Mbit/s plus QoS intermediate link, 155 Mbit/s connection of HIPERLAN access points or connection between HIPERACCESS nodes

HIPERLAN/2
q q

HIPERACCESS
q q q

HIPERLINK currently no activities


q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.42

BRAN and legacy networks


Independence
q q

BRAN as access network independent from the fixed network Interworking of TCP/IP and ATM under study Network Convergence Sub-layer as superset of all requirements for IP and ATM

Layered model
q

Coordination
core network ATM core network IP
q

network convergence sublayer BRAN data link control BRAN PHY-1 BRAN PHY-2

IETF (TCP/IP) q ATM forum (ATM) q ETSI (UMTS) q CEPT, ITU-R, ... (radio frequencies)

...

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.43

HiperLAN2 (historical)
Official name: BRAN HIPERLAN Type 2
q

H/2, HIPERLAN/2 also used More efficient than 802.11a

High data rates for users


q

Connection oriented QoS support Dynamic frequency selection Security support


q

Strong encryption/authentication

Mobility support Network and application independent


q

convergence layers for Ethernet, IEEE 1394, ATM, 3G


No products but several mechanisms have been Adopted by other standards (e.g. 802.11a)

Power save modes Plug and Play

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.44

HiperLAN2 architecture and handover scenarios

AP MT1 APT 1 MT2 3 MT3 2 MT4 APT APT AP APC APC Core Network (Ethernet, Firewire, ATM, UMTS)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.45

HiperLAN2 protocol stack

Higher layers DLC control SAP Convergence layer DLC user SAP Data link control basic data transport function Error control Scope of HiperLAN2 standards

Radio link control sublayer


Radio resource control Assoc. control DLC conn. control

Radio link control

Medium access control Physical layer

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.46

Operating channels of HiperLAN2 in Europe

36

40

44

48

52

56

60

64

channel

5150

5180 5200 5220 5240 5260 5280 5300 5320 16.6 MHz

5350 [MHz]

100

104

108

112

116

120

124

128

132

136

140

channel

5470

5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 16.6 MHz center frequency = 5000 + 5*channel number [MHz]

5725 [MHz]

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.47

Bluetooth
Idea
q q q q q

Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, PDAs, cell phones replacement of IrDA Embedded in other devices, goal: 5/device (2005: 40/USB bluetooth) Short range (10 m), low power consumption, license-free 2.45 GHz ISM Voice and data transmission, approx. 1 Mbit/s gross data rate

One of the first modules (Ericsson).

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.48

Bluetooth
History
q q q q q q

1994: Ericsson (Mattison/Haartsen), MC-link project Renaming of the project: Bluetooth according to Harald Bltand Gormsen [son of Gorm], King of Denmark in the 10th century (was: ) 1998: foundation of Bluetooth SIG, www.bluetooth.org 1999: erection of a rune stone at Ercisson/Lund ;-) 2001: first consumer products for mass market, spec. version 1.1 released 2005: 5 million chips/week

Special Interest Group


q q q q

Original founding members: Ericsson, Intel, IBM, Nokia, Toshiba Added promoters: 3Com, Agere (was: Lucent), Microsoft, Motorola > 2500 members Common specification and certification of products

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.49

History and hi-tech

1999: Ericsson mobile communications AB reste denna sten till minne av Harald Bltand, som fick ge sitt namn t en ny teknologi fr trdls, mobil kommunikation.
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.50

Characteristics
2.4 GHz ISM band, 79 (23) RF channels, 1 MHz carrier spacing
q q

Channel 0: 2402 MHz channel 78: 2480 MHz G-FSK modulation, 1-100 mW transmit power Frequency hopping with 1600 hops/s Hopping sequence in a pseudo random fashion, determined by a master Time division duplex for send/receive separation FEC (forward error correction), no retransmission, 64 kbit/s duplex, pointto-point, circuit switched Asynchronous, fast acknowledge, point-to-multipoint, up to 433.9 kbit/s symmetric or 723.2/57.6 kbit/s asymmetric, packet switched Overlapping piconets (stars) forming a scatternet
MC SS05 7.51

FHSS and TDD


q q q

Voice link SCO (Synchronous Connection Oriented)


q

Data link ACL (Asynchronous ConnectionLess)


q

Topology
q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Piconet
Collection of devices connected in an ad hoc fashion
P S

One unit acts as master and the others as slaves for the lifetime of the piconet Master determines hopping pattern, slaves have to synchronize Each piconet has a unique hopping pattern Participation in a piconet = synchronization to hopping sequence Each piconet has one master and up to 7 simultaneous slaves (> 200 could be parked)
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

S M SB P SB S P

M=Master S=Slave

P=Parked SB=Standby

MC SS05

7.52

Forming a piconet
All devices in a piconet hop together
q

Master gives slaves its clock and device ID


l

Hopping pattern: determined by device ID (48 bit, unique worldwide) l Phase in hopping pattern determined by clock

Addressing
q q

Active Member Address (AMA, 3 bit) Parked Member Address (PMA, 8 bit)

SB SB

SB SB SB SB SB SB SB

S SB

P S M P SB P S

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.53

Scatternet
Linking of multiple co-located piconets through the sharing of common master or slave devices
q

Devices can be slave in one piconet and master of another Devices jumping back and forth between the piconets
P S M SB S P SB S SB P M

Communication between piconets


q

S P

Piconets (each with a capacity of 720 kbit/s)

M=Master S=Slave P=Parked SB=Standby

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.54

Bluetooth protocol stack


audio apps. NW apps. TCP/UDP IP BNEP PPP RFCOMM (serial line interface) Audio Logical Link Control and Adaptation Protocol (L2CAP) Link Manager Baseband Radio
AT: attention sequence OBEX: object exchange TCS BIN: telephony control protocol specification binary BNEP: Bluetooth network encapsulation protocol Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ SDP: service discovery protocol RFCOMM: radio frequency comm.

vCal/vCard OBEX

telephony apps.

mgmnt. apps.

AT modem commands

TCS BIN

SDP Control

Host Controller Interface

MC SS05

7.55

Frequency selection during data transmission


625 s fk M f k+1 S f k+2 M f k+3 S f k+4 M f k+5 S f k+6 M t fk M f k+3 S f k+4 M f k+5 S f k+6 M t fk M f k+1 S f k+6 M t

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.56

SCO payload types


payload (30) HV1 HV2 HV3 audio (10) audio (20) audio (30) FEC (20) FEC (10)

DV

audio (10)

header (1)

payload (0-9)

2/3 FEC

CRC (2) (bytes)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.57

Baseband link types


Polling-based TDD packet transmission
q

625s slots, master polls slaves Periodic single slot packet assignment, 64 kbit/s full-duplex, point-to-point Variable packet size (1,3,5 slots), asymmetric bandwidth, point-to-multipoint
SCO f0 ACL f4 SCO f6 ACL f8 SCO f12 ACL f14 SCO f18 ACL f20

SCO (Synchronous Connection Oriented) Voice


q

ACL (Asynchronous ConnectionLess) Data


q

MASTER

SLAVE 1

f1

f7

f9

f13

f19

SLAVE 2

f5

f17

f21

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.58

Robustness
Slow frequency hopping with hopping patterns determined by a master
q q

Protection from interference on certain frequencies Separation from other piconets (FH-CDMA) ACL only, very fast SCO and ACL
A C C F H

Retransmission
q

Forward Error Correction


q

Error in payload (not header!) NAK ACK

MASTER

SLAVE 1

SLAVE 2
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

G MC SS05 7.59

Example: Power consumption/CSR BlueCore2


Typical Average Current Consumption (1) VDD=1.8V Temperature = 20C Mode SCO connection HV3 (1s interval Sniff Mode) (Slave) SCO connection HV3 (1s interval Sniff Mode) (Master) SCO connection HV1 (Slave) SCO connection HV1 (Master) ACL data transfer 115.2kbps UART (Master) ACL data transfer 720kbps USB (Slave) ACL data transfer 720kbps USB (Master) ACL connection, Sniff Mode 40ms interval, 38.4kbps UART ACL connection, Sniff Mode 1.28s interval, 38.4kbps UART Parked Slave, 1.28s beacon interval, 38.4kbps UART Standby Mode (Connected to host, no RF activity) Deep Sleep Mode(2) Notes: (1) Current consumption is the sum of both BC212015A and the flash. (2) Current consumption is for the BC212015A device only. (More: www.csr.com )
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05

26.0 mA 26.0 mA 53.0 mA 53.0 mA 15.5 mA 53.0 mA 53.0 mA 4.0 mA 0.5 mA 0.6 mA 47.0 A 20.0 A

7.60

Example: Bluetooth/USB adapter (2002: 50)

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.61

L2CAP - Logical Link Control and Adaptation Protocol


Simple data link protocol on top of baseband Connection oriented, connectionless, and signalling channels Protocol multiplexing
q

RFCOMM, SDP, telephony control

Segmentation & reassembly


q

Up to 64kbyte user data, 16 bit CRC used from baseband

QoS flow specification per channel


q

Follows RFC 1363, specifies delay, jitter, bursts, bandwidth

Group abstraction
q

Create/close group, add/remove member

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.62

Security
User input (initialization) PIN (1-16 byte) E2 link key (128 bit) E3 encryption key (128 bit) Keystream generator payload key Data
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05

Pairing Authentication key generation (possibly permanent storage) Authentication Encryption key generation (temporary storage) Encryption

PIN (1-16 byte) E2 link key (128 bit) E3 encryption key (128 bit) Keystream generator

Ciphering Cipher data

payload key Data


7.63

SDP Service Discovery Protocol


Inquiry/response protocol for discovering services
q q q q q q

Searching for and browsing services in radio proximity Adapted to the highly dynamic environment Can be complemented by others like SLP, Jini, Salutation, Defines discovery only, not the usage of services Caching of discovered services Gradual discovery

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.64

Additional protocols to support legacy protocols/apps.


RFCOMM
q q

Emulation of a serial port (supports a large base of legacy applications) Allows multiple ports over a single physical channel

Telephony Control Protocol Specification (TCS)


q q

Call control (setup, release) Group management

OBEX
q

Exchange of objects, IrDA replacement

WAP
q

Interacting with applications on cellular phones

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.65

Profiles
Represent default solutions for a certain usage model
q

Applications Protocols

Vertical slice through the protocol stack q Basis for interoperability

Generic Access Profile Service Discovery Application Profile Cordless Telephony Profile Intercom Profile Serial Port Profile Additional Profiles Headset Profile Advanced Audio Distribution Dial-up Networking Profile PAN Fax Profile Audio Video Remote Control LAN Access Profile Basic Printing Generic Object Exchange Profile Basic Imaging Object Push Profile Extended Service Discovery File Transfer Profile Generic Audio Video Distribution Synchronization Profile Hands Free Hardcopy Cable Replacement
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.66

Profiles

WPAN: IEEE 802.15-1 Bluetooth


Data rate
q

Connection set-up time


q q

Synchronous, connection-oriented: 64 kbit/s q Asynchronous, connectionless


l l

Depends on power-mode Max. 2.56s, avg. 0.64s Guarantees, ARQ/FEC Public/private keys needed, key management not specified, simple system integration Advantage: already integrated into several products, available worldwide, free ISM-band, several vendors, simple system, simple ad-hoc networking, peer to peer, scatternets Disadvantage: interference on ISM-band, limited range, max. 8 devices/network&master, high set-up latency

Quality of Service
q

433.9 kbit/s symmetric 723.2 / 57.6 kbit/s asymmetric

Transmission range
q

Manageability
q

POS (Personal Operating Space) up to 10 m q with special transceivers up to 100 m

Special Advantages/Disadvantages
q

Frequency
q q

Free 2.4 GHz ISM-band Challenge/response (SAFER+), hopping sequence Integrated into many products, several vendors
q

Security

Availability
q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.67

WPAN: IEEE 802.15 future developments 1


802.15-2: Coexistence
q

Coexistence of Wireless Personal Area Networks (802.15) and Wireless Local Area Networks (802.11), quantify the mutual interference Standard for high-rate (20Mbit/s or greater) WPANs, while still lowpower/low-cost Data Rates: 11, 22, 33, 44, 55 Mbit/s Quality of Service isochronous protocol Ad hoc peer-to-peer networking Security Low power consumption Low cost Designed to meet the demanding requirements of portable consumer imaging and multimedia applications

802.15-3: High-Rate
q q q q q q q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.68

WPAN: IEEE 802.15 future developments 3


802.15-4: Low-Rate, Very Low-Power
q q q q q q q q q q q q

Low data rate solution with multi-month to multi-year battery life and very low complexity Potential applications are sensors, interactive toys, smart badges, remote controls, and home automation Data rates of 20-250 kbit/s, latency down to 15 ms Master-Slave or Peer-to-Peer operation Up to 254 devices or 64516 simpler nodes Support for critical latency devices, such as joysticks CSMA/CA channel access (data centric), slotted (beacon) or unslotted Automatic network establishment by the PAN coordinator Dynamic device addressing, flexible addressing format Fully handshaked protocol for transfer reliability Power management to ensure low power consumption 16 channels in the 2.4 GHz ISM band, 10 channels in the 915 MHz US ISM band and one channel in the European 868 MHz band

Basis of the ZigBee technology www.zigbee.org


Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.69

ZigBee
Relation to 802.15.4 similar to Bluetooth / 802.15.1 Pushed by Chipcon, ember, freescale (Motorola), Honeywell, Mitsubishi, Motorola, Philips, Samsung More than 150 members
q

Promoter (40000$/Jahr), Participant (9500$/Jahr), Adopter (3500$/Jahr)

No free access to the specifications (only promoters and participants) ZigBee platforms comprise
q

IEEE 802.15.4 for layers 1 and 2 q ZigBee protocol stack up to the applications 802.15.5: Mesh Networking
q q

Partial meshes, full meshes Range extension, more robustness, longer battery live MC SS05 7.70

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

Some more IEEE standards for mobile communications


IEEE 802.16: Broadband Wireless Access / WirelessMAN / WiMax
q q q q

Wireless distribution system, e.g., for the last mile, alternative to DSL 75 Mbit/s up to 50 km LOS, up to 10 km NLOS; 2-66 GHz band Initial standards without roaming or mobility support 802.16e adds mobility support, allows for roaming at 150 km/h
l

Unclear relation to 802.20, 802.16 started as fixed system

IEEE 802.20: Mobile Broadband Wireless Access (MBWA)


q q q

Licensed bands < 3.5 GHz, optimized for IP traffic Peak rate > 1 Mbit/s per user Different mobility classes up to 250 km/h and ranges up to 15 km Standardize handover between different 802.x and/or non 802 networks Radio-based PHY/MAC for use by license-exempt devices on a noninterfering basis in spectrum that is allocated to the TV Broadcast Service
MC SS05 7.71

IEEE 802.21: Media Independent Handover Interoperability


q

IEEE 802.22: Wireless Regional Area Networks (WRAN)


q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

WLAN: Home RF yet another standard, no success


Data rate
q

Connection set-up time


q

0.8, 1.6, 5, 10 Mbit/s 300m outdoor, 30m indoor 2.4 GHz ISM Strong encryption, no open access Adapter 130, base station 230 Several products from different vendors, no more support

10 ms bounded latency Up to 8 streams A/V, up to 8 voice streams, priorities, best-effort Like DECT & 802-LANs

Transmission range
q

Quality of Service
q

Frequency
q

Manageability
q

Security
q

Special Advantages/Disadvantages
q

Cost
q

Availability
q

Advantage: extended QoS support, host/client and peer/peer, power saving, security q Disadvantage: future uncertain due to DECT-only devices plus 802.11a/b for data

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.72

RFID Radio Frequency Identification (1)


Data rate
q q

Connection set-up time


q

Transmission of ID only (e.g., 48 bit, 64kbit, 1 Mbit) 9.6 115 kbit/s Passive: up to 3 m Active: up to 30-100 m Simultaneous detection of up to, e.g., 256 tags, scanning of, e.g., 40 tags/s 125 kHz, 13.56 MHz, 433 MHz, 2.4 GHz, 5.8 GHz and many others Application dependent, typ. no crypt. on RFID device Very cheap tags, down to 1 (passive) Many products, many vendors

Depends on product/medium access scheme (typ. 2 ms per device) none Very simple, same as serial interface Advantage: extremely low cost, large experience, high volume available, no power for passive RFIDs needed, large variety of products, relative speeds up to 300 km/h, broad temp. range Disadvantage: no QoS, simple denial of service, crowded ISM bands, typ. oneway (activation/ transmission of ID)

Transmission range
q q q

Quality of Service
q

Manageability
q

Special Advantages/Disadvantages
q

Frequency
q

Security
q q

Cost
q

Availability
q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.73

RFID Radio Frequency Identification (2)


Function
q q

Standard: In response to a radio interrogation signal from a reader (base station) the RFID tags transmit their ID Enhanced: additionally data can be sent to the tags, different media access schemes (collision avoidance) No line-of sight required (compared to, e.g., laser scanners) RFID tags withstand difficult environmental conditions (sunlight, cold, frost, dirt etc.) Products available with read/write memory, smart-card capabilities Passive RFID: operating power comes from the reader over the air which is feasible up to distances of 3 m, low price (1) Active RFID: battery powered, distances up to 100 m

Features
q q q

Categories
q q

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.74

RFID Radio Frequency Identification (3)


Applications
q q q q

Total asset visibility: tracking of goods during manufacturing, localization of pallets, goods etc. Loyalty cards: customers use RFID tags for payment at, e.g., gas stations, collection of buying patterns Automated toll collection: RFIDs mounted in windshields allow commuters to drive through toll plazas without stopping Others: access control, animal identification, tracking of hazardous material, inventory control, warehouse management, ...

Local Positioning Systems


q q

GPS useless indoors or underground, problematic in cities with high buildings RFID tags transmit signals, receivers estimate the tag location by measuring the signals time of flight

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.75

RFID Radio Frequency Identification (4)


Security
q q q

Denial-of-Service attacks are always possible


l

Interference of the wireless transmission, shielding of transceivers

IDs via manufacturing or one time programming Key exchange via, e.g., RSA possible, encryption via, e.g., AES

Future Trends
q q q q

RTLS: Real-Time Locating System big efforts to make total asset visibility come true Integration of RFID technology into the manufacturing, distribution and logistics chain Creation of electronic manifests at item or package level (embedded inexpensive passive RFID tags) 3D tracking of children, patients

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.76

RFID Radio Frequency Identification (5)


Devices and Companies
q q q q q q q q q q

AXCESS Inc., www.axcessinc.com Checkpoint Systems Group, www.checkpointsystems.com GEMPLUS, www.gemplus.com/app/smart_tracking Intermec/Intellitag, www.intermec.com I-Ray Technologies, www.i-ray.com RF Code, www.rfcode.com Texas Instruments, www.ti-rfid.com/id WhereNet, www.wherenet.com Wireless Mountain, www.wirelessmountain.com XCI, www.xci-inc.com

Only a very small selection

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.77

ISM band interference


Many sources of interference
q q q q q

OLD

Microwave ovens, microwave lightning 802.11, 802.11b, 802.11g, 802.15, Home RF Even analog TV transmission, surveillance Unlicensed metropolitan area networks

NEW

Levels of interference
q

Physical layer: interference acts like noise


l

Spread spectrum tries to minimize this l FEC/interleaving tries to correct


q

MAC layer: algorithms not harmonized


l

E.g., Bluetooth might confuse 802.11

Bluetooth may act like a rogue member of the 802.11 network IEEE 802.15-2 discusses these problems
q

Fusion Lighting, Inc.

Proposal: Adaptive Frequency Hopping

Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

MC SS05

7.78

You might also like