You are on page 1of 7
Bluetooth * Itis a global standard that: — Eliminates wires and cables between both stationary and mobile devices — Facilitates both data and voice communication — Offers the possibility of ad hoc networks and delivers the ultimate synchronicity between all your personal devices, Bluetooth Protocol Stack ‘open Genet ana Aapaon Peal EAP) Bluetooth Stack Layers + Radio (FY layer: = 1 performs modulabor/derodulation of the data info RF signal. defines the physic! horace of Blutocth tnscelver dees two types af Pyscal nk. cormectomless tnd connector oneried + paseband Unk ayer ‘= Itperforms te connection estabishrent within piconet ‘Unk tanager protocol ayer: “= ttperforms the maragement of the aeady established inks. alainclides authentication and eeryton processes + Logie tink Canto and Adaption protocol aye: =" its also known as the hear of the Bluetsctprotecl stack. It allows the eommuricaion between upper and lower layers of the Busooth prota! sack I packages the data packets recewed from upper layers to the form expected by lower layer. Walz perfomns the Segmentation andmaplexng Bluetooth Stack Layers SOP layer: — Itis short for Service Discovery Protocol. It allows to discover the services available on another Bluetooth enabled device. RF comm. layer: - Kis ahort for Radio Frontend Component. It provides serial interface with WAP and OBEX: — Its short for Object Exchange. |t is a communication protocol to exchange objects between 2 devices. WAP: ~_Itis short for Wireless Access Protocol. It is used for internet access. Tes: = Its short for Telephony Control Protocol. It provides telephony service. Application layer: — Itenables the user ta interact with the application, WiFi | Applicationtayer | Transportlayer | Internetlayer Internet Wireless data communications 2.4 GHz ISM band radio interface Physical layer WiFi Architectures and Elements IEEE 862.11 Architecture ‘The components of an IEEE 802.11 architecture are as follows 1) Stations (STA) - Stations comprise all devices and equipments that are connected to the ‘wireless LAN. A station can be of two types: Wireless Access Point (WAP) - WAPs of simply access points (AP) are generally wireless routers that form the base stations or access Client. - Clients are workstations, computers, laptops, printers, smartphones, etc. Each station has a wireless network interface controller. 2) Basic Service Set (BSS) =A basic service set is a group of stations communicating at physical layer level. BSS can be of two categories depending upon mode of operation: Infrastructure BSS ~ Here, the devices communicate with other devices through access points, Independent BSS - Here, the devices communicate in peer-to-peer basis in an ad hoc manner. 3) Extended Service Set (ESS) - Itis a set of all connected BSS. 4) Distribution System (DS) - It connects access points in ESS * Zigbee : — It is low power and low data rate wireless system. — Operates in three bands 2.4 GHz, 868 MHz and 915 MHz. — Modulation: Uses OQPSK and BPSK — Coverage: 10 meters. — Data rates : 250 Kbps, 40 Kbps and 20 Kbps as per bands Zigbee Protocol Stack See Deere tol eg Physical (PHY) Layer Zigbee Layers PHY. Defines the physical operation of the Zighee device including recelve sensitvty, channel relection, output power, number of channels, chip ‘modulation, and transmission rate specications. Most Zigbee applications operate on the 2.4 GH ISM band at a 250 kb/s data rate. MAC Manages RF data transactions between neighbouring devices (point to point). The MAC includes services such as transmission retry and acknowledgment management, and collsion avoidance techniques {csMA-cA). Network Adds routing capabilites that allows RF data packets to traverse multiple wns - DPS; -MMAG: i___ [DWOP; = MCSMA: sendorinnted | | recover intated *DLPS. = POM: = RLBTMA: = MACA-BI: = MARCH. single channel | | multiple channel MACAW: -BTMA: FAMA. = DBTMA; =ICSMA. Hidden- and Exposed-node problems ” ~*~ \ ” st Ss : , ‘ ‘ , , ‘ ‘ . Q_+_P<,;—o9 o:; ! o<+—0 | o—>0 | ! : ‘ A\ BIC dy; oN AN Bic Db? NS Me a NS ‘el ue Hidden Node Problem Expased!Nade Problem Hidden- and Exposed-node problems * Several approaches have been proposed to eliminate, or at least reduce, the impact of the hidden- and exposed-node problems on the network throughput. ¢ The first approach is based on the use of a busy tone. * The busy-tone approach requires the use of two separate channels: a data channel and a control channel. * The major drawback of the approach, however, is a node’s need to operate in duplex mode, to be able to transmit and receive simultaneously. * This requirement increases the design complexity of a node significantly, thereby increasing its cost and power consumption. The second approach to deal with the hidden- node problem is based on collision avoidance. This is achieved using a procedure referred to as the ready to-send (RTS), clear-to-send (CTS) handshake. This is called as Multiple Access with Collision Avoidance (MACA). Exposed node problem can be addressed using Multiple Access with Collision Avoidance for Wireless (MACAW) to some extent.

You might also like