Bluetooth
* Itis a global standard that:
— Eliminates wires and cables between both stationary
and mobile devices
— Facilitates both data and voice communication
— Offers the possibility of ad hoc networks and delivers
the ultimate synchronicity between all your personal
devices,
Bluetooth Protocol Stack
‘open Genet ana Aapaon Peal EAP)
Bluetooth Stack Layers
+ Radio (FY layer:
= 1 performs modulabor/derodulation of the data info RF signal. defines the physic!
horace of Blutocth tnscelver dees two types af Pyscal nk. cormectomless
tnd connector oneried
+ paseband Unk ayer
‘= Itperforms te connection estabishrent within piconet
‘Unk tanager protocol ayer:
“= ttperforms the maragement of the aeady established inks. alainclides authentication and
eeryton processes
+ Logie tink Canto and Adaption protocol aye:
=" its also known as the hear of the Bluetsctprotecl stack. It allows the eommuricaion
between upper and lower layers of the Busooth prota! sack I packages the data packets
recewed from upper layers to the form expected by lower layer. Walz perfomns the
Segmentation andmaplexngBluetooth Stack Layers
SOP layer:
— Itis short for Service Discovery Protocol. It allows to discover the services available
on another Bluetooth enabled device.
RF comm. layer:
- Kis ahort for Radio Frontend Component. It provides serial interface with WAP and
OBEX:
— Its short for Object Exchange. |t is a communication protocol to exchange objects
between 2 devices.
WAP:
~_Itis short for Wireless Access Protocol. It is used for internet access.
Tes:
= Its short for Telephony Control Protocol. It provides telephony service.
Application layer:
— Itenables the user ta interact with the application,WiFi
| Applicationtayer |
Transportlayer |
Internetlayer
Internet
Wireless data
communications
2.4 GHz ISM band
radio interface
Physical layer
WiFi Architectures and Elements
IEEE 862.11 Architecture
‘The components of an IEEE 802.11 architecture are as follows
1) Stations (STA) - Stations comprise all devices and equipments that are connected to the
‘wireless LAN. A station can be of two types:
Wireless Access Point (WAP) - WAPs of simply access points (AP) are generally wireless
routers that form the base stations or access
Client. - Clients are workstations, computers, laptops, printers, smartphones, etc.
Each station has a wireless network interface controller.
2) Basic Service Set (BSS) =A basic service set is a group of stations communicating at
physical layer level. BSS can be of two categories depending upon mode of operation:
Infrastructure BSS ~ Here, the devices communicate with other devices through access points,
Independent BSS - Here, the devices communicate in peer-to-peer basis in an ad hoc manner.
3) Extended Service Set (ESS) - Itis a set of all connected BSS.
4) Distribution System (DS) - It connects access points in ESS* Zigbee :
— It is low power and low data rate wireless system.
— Operates in three bands 2.4 GHz, 868 MHz and
915 MHz.
— Modulation: Uses OQPSK and BPSK
— Coverage: 10 meters.
— Data rates : 250 Kbps, 40 Kbps and 20 Kbps as per
bands
Zigbee Protocol Stack
See
Deere tol eg
Physical (PHY) Layer
Zigbee Layers
PHY. Defines the physical operation of the Zighee device including recelve
sensitvty, channel relection, output power, number of channels, chip
‘modulation, and transmission rate specications. Most Zigbee
applications operate on the 2.4 GH ISM band at a 250 kb/s data rate.
MAC Manages RF data transactions between neighbouring devices (point to
point). The MAC includes services such as transmission retry and
acknowledgment management, and collsion avoidance techniques
{csMA-cA).
Network Adds routing capabilites that allows RF data packets to traverse multiple
wns
- DPS; -MMAG:
i___ [DWOP; = MCSMA:
sendorinnted | | recover intated *DLPS. = POM:
= RLBTMA:
= MACA-BI:
= MARCH.
single channel | | multiple channel
MACAW: -BTMA:
FAMA. = DBTMA;
=ICSMA.Hidden- and Exposed-node problems
” ~*~ \ ” st Ss
: , ‘ ‘ , , ‘ ‘
. Q_+_P<,;—o9 o:; ! o<+—0 | o—>0 |
! :
‘ A\ BIC dy; oN AN Bic Db?
NS Me a NS ‘el ue
Hidden Node Problem Expased!Nade Problem
Hidden- and Exposed-node problems
* Several approaches have been proposed to eliminate, or at
least reduce, the impact of the hidden- and exposed-node
problems on the network throughput.
¢ The first approach is based on the use of a busy tone.
* The busy-tone approach requires the use of two separate
channels: a data channel and a control channel.
* The major drawback of the approach, however, is a node’s
need to operate in duplex mode, to be able to transmit and
receive simultaneously.
* This requirement increases the design complexity of a node
significantly, thereby increasing its cost and power
consumption.The second approach to deal with the hidden-
node problem is based on collision avoidance.
This is achieved using a procedure referred to as
the ready to-send (RTS), clear-to-send (CTS)
handshake.
This is called as Multiple Access with Collision
Avoidance (MACA).
Exposed node problem can be addressed using
Multiple Access with Collision Avoidance for
Wireless (MACAW) to some extent.