SlideShare a Scribd company logo
1 of 42
Wireless Personal Area
Networks
CS5440 Wireless Access Networks
Dilum Bandara
Dilum.Bandara@uom.lk
Some slides extracted from ZigBee by J. Dohl, F. Diehm, & P. Grosa and
ZigBee by E. Ünal CSE 401 Special Topics In Computer Networks
Outline
 Bluetooth
 ZigBee
 Ultra-Wideband
2
3
OSI
Stack
Source: http://walkwidnetwork.blogspot.com/2013/04/physical-layer-osi-model.html
OSI vs. TCP/IP
4
Source: http://blog.anuesystems.com/category/span-and-taps/
Bluetooth – IEEE 802.15.1
 Developed by Ericson
 Now managed by Bluetooth Special Interest Group
 2.4 – 2.48 GHz ISM band
 Range – 10 m
 Bandwidth – 2.1 Mbps (shared) (version 2.0)
 Version 4.0
 Includes Classic Bluetooth, Bluetooth high speed & Bluetooth low
energy protocols
 Bluetooth high-speed based on Wi-Fi
 Classic Bluetooth based on legacy Bluetooth protocols
 Low power consumption
 Found in mobile phones, laptops, computer peripherals,
printers, etc. 5
Bluetooth Applications
 Cable replacement
 Phone to PC connection
 Connecting computing devices
 Digital imaging
 Smart car systems
 Multiparty data exchange
 Exchange business cards, calendar events
 Share presentation material
 Synchronize information between multiple terminals
 Play multi-player games
 Personal trusted device
 Reliable e-commerce transactions
 Local value added services
 Locking & access control 6
Stick N Find
Bluetooth Piconet
 Through master
 No slave-to-slave communication
 Up to 7 active slaves 255 parked slaves 7
Source: www.techrepublic.com/article/secure-your-bluetooth-
wireless-networks-and-protect-your-data/6139987
Bluetooth Scatternet
 By connecting 2+
piconets
 No direct support at
Baseband Layer
8
Source: www.techrepublic.com/article/secure-your-bluetooth-
wireless-networks-and-protect-your-data/6139987
Bluetooth Protocol Stack
9
Source: http://withfriendship.com/user/sathvi/bluetooth-stack.php
Protocols & Usage Models
10
PPP
RFCOMM
TCP/IP
Baseband
L2CAP
OBEX
IrMC
TCS-BIN
Audio
Sync
Dial-up
net.
Usage Models
File
Transfer
AT-commands
Fax Headset
LAN
Access
Cordless
Phone
SDP
LMP
Bluetooth Protocol Stack (Cont.)
11
Bluetooth Applications/Profiles
 Set of application protocols
 Definitions of possible applications & specify general
behaviors
 Resides on top of Bluetooth core specification &
(optionally) additional protocols
 Example profiles
 Hands-Free Profile (HFP)
 Basic Printing Profile (BPP)
 Audio/Video Remote Control Profile (AVRCP)
 File Transfer Profile (FTP)
 Human Interface Device Profile (HID)
 Personal Area Networking Profile (PAN)
 Generic Object Exchange Profile (GOEP)
 OBEX
12
Other Key Layers
 Link Management Protocol (LMP)
 Set-up & control of radio link between 2 devices
 Logical Link Control & Adaptation Protocol (L2CAP)
 Multiplex multiple logical connections between 2 devices using
different higher-level protocols
 Provides segmentation & reassembly of on-air packets
 Service Discovery Protocol (SDP)
 Allows a device to discover services offered by other devices, &
their associated parameters
 Baseband layer
 Physical layer
 Manages physical channels & links
 Error correction, data whitening, hop selection, & security
13
Physical Channel
 Required to use spread spectrum technology as
it’s in ISM band
 79 RF channels spaced 1 MHz apart
 Channel – frequency range in which communication
occurs
 Frequency hoping
 Channel represented by a pseudo-random hopping
sequence hopping through 79 channels
 Piconet – all devices use same channel
 Hopping sequence is unique for the piconet & is determined
by device address (BD_ADDR) of master
14
Physical Channel (Cont.)
 Traffic controlled by master
 Master clock used for all timing & scheduling activities
 Master transmissions at even slots, slaves always at odd
slots
 Packet extended over up to 5 slots
15
Packets
 Access code
 Used for timing synchronization, offset compensation, paging &
inquiry
 Header
 Contains information for packet acknowledgement, packet
numbering for out-of-order packet reordering, flow control, slave
address, & error check for header
 Payload
 Can contain either voice field, data field, or both
16
ZigBee
 By ZigBee Alliance
 Very low power consumption  long battery life
 Low data rate
 Low complexity circuits & small size  low cost
17
ZigBee Applications
Telecom
Services
m-commerce
info services
object interaction
(Internet of Things)
ZigBee
Wireless Control that
Simply Works
TV
VCR
DVD/CD
remote
security
HVAC
lighting control
access control
irrigation
PC&
Peripherals
asset mgt
process
control
environmental
energy mgt
Personal
Health Care
security
HVAC
AMR
lighting control
access control
patient
monitoring
fitness
monitoring
18
Source: http://zigbee.org/
ZigBee Protocol Stack
 IEEE 802.15.4 covers
physical layer & MAC
layer of low-rate
WPAN
 ZigBee adds network
construction,
application services,
& more on top of
IEEE 802.15.4
19
Source: www.sena.com/products/industrial_zigbee/zigbee_summary.php
IEEE 802.15.4 Devıce Types
 LR-WPAN devices defined by IEEE 802.15.4
1. Full Functional Device (FFD)
 Can work as a PAN coordinator, as a coordinator, or
as a simple device
 Can communicate with either another FFD or a RFD
2. Reduced Functional Device (RFD)
 For applications that don’t need to transmit large
volumes of data & have to communicate only with a
specific FFD
20
IEEE/ZigBee Topologies
21
Source: http://wireless.arcada.fi/MOBWI/material/PAN_5_2.html
ZigBee Topologies (Cont.)
1. Star Topology
 Pros
 Easy to synchronize
 Low latency
 Cons
 Small scale
2. Mesh/P2P Topology
 Pros
 Robust multi-hop
communication
 Multi-path communication
 Flexible network
 Lower latency
 Cons
 Route discovery is costly
 Needs to store routing
table
22
ZigBee Topologies (Cont.)
3. Cluster Tree Topology
 Pros
 Low routing cost
 Multi-hop communication
 Scalable
 Cons
 Route reconstruction is costly
 Latency may be quite long
 Root node becomes a single point of failure
23
ZigBee Frequency Bands
24
PHY Protocol Data Unit (PPDU)
 2 different services
 Data service
 Controls radio
 Management service
 Energy detection in the channel
 Clear channel assesment before sending messages
 Link Quality Indication (LQI) for received packets
 Preamble for chip & symbol synchronization
 Frame size 8-127 Octets 25
MAC Layer
 2 services
 Data service
 Tx & Rx MPDUs
 Management service
 If coordinator
 Manages network beacons, PAN association & disassociation,
frame validation, & acknowledgment
 CSMA/CA for channel access
 Support device security
26
Traffic-Modes – Device to PAN
Coordinator
 Beacon mode
 Beacon send periodically
 Coordinator & end device
can go to sleep
 Lowest energy
consumption
 Precise timing needed
 Beacon period (ms-min)
27
Source: IEEE 802.15.4 Standard (2006)
Traffic-Modes – Device to PAN
Coordinator (Cont.)
 Non-Beacon mode
 Coordinator/routers have
to stay awake
 Heterogeneous network
 Asymmetric power
28
Source: IEEE 802.15.4 Standard (2006)
Data Transfer From PAN Coordınator
29
Source: IEEE 802.15.4 Standard (2006)
MAC Layer – Managing PANs
 Channel scanning
 Active, passive
 PAN ID conflict detection & resolution
 Starting a PAN
 Sending beacons
 Device discovery
 Device association/disassociation
 Synchronization (beacon/nonbeacon)
 Orphaned device realignment
30
MAC Layer – Frame Security
 Provided security features
 Access control
 Data encryption
 Frame integrity
 Sequential freshness
 Available security modes
 Unsecured mode
 ACL mode
 Secured mode
 Available security suites
 AES-CTR
 AES-CCM
 AES-CBC-MAC
31
Network Layer
 Distributed address assignment
 Tree structure or self managed by higher layer
 16-bit network space divided among child routers
 Child routers divide their space again for their children
 Depends on
 Maximum child count per parent
 Maximum child-routers per parent
 Maximum network depth
32
Network Layer (Cont.)
 Route discovery
 Find or update route between specific source &
destination
 Started if no active route present in routing table
 Broadcast routing request (RREQ) packets
 Generates routing table entries for hops to source
 Endpoint router responds with Routing response
(RREP) packet
 Routes generated for hops to destination
 Routing table entry generated in source device
33
Route Discovery
RREQ
RREP
1 2 3
4
2
1
5
34
Network Layer (Cont.)
 Routing
 Check if routing table entry exists
 Initiate route discovery if possible
 Hierarchical routing as fallback
 Route maintenance
 Track failed deliveries to neighbors
 Initiate route repair when threshold reached
 Careful with network load!
 In case of total connectivity loss
 Orphaning procedure
 Re-association with network
35
ZigBee Profiles
 Describes a common language for exchanging
data
 Defines offered services
 Device interoperability across different
manufacturers
 Standard profiles available from the ZigBee
Alliance
 Profiles contain device descriptions
 Unique identifier (licensed by the ZigBee Alliance)
36
ZigBee vs. Bluetooth
Feature(s) Bluetooth ZigBee
Power Profile days years
Complexity complex Simple
Nodes/Master 7 64000
Latency 10 seconds 30 ms – 1s
Range 10m 70m ~ 300m
Extendibility no Yes
Data Rate 1 Mbps 250 Kbps
Security 64bit, 128bit 128bit AES &
Application Layer 37
ZigBee vs. BluetoothSHORT<RANGE>LONG
LOW < DATA RATE > HIGH
PAN
LAN
Text Graphic
s
Internet Hi-fi
Audio
Streaming
Video
Digital
Video
Multi-channel
Video
802.15.1
Bluetooth1
802.15.1
Bluetooth 2
802.15.4
ZigBee
802.11b
802.11a/HL2 & 802.11g
38
Ultra-Wideband
 Short-range technology for high-speed WPANs
 3.1 – 10.6 GHz, 15 MHz channels (up to 5)
 10 m
 Applications – Cell phones, HDTV, DVD players, audio
players, etc.
39
Source: www.ice.rwth-aachen.de/index.php?id=630&tx_felogin_pi1[forgot]=1&tx_iceprojects_pi1[uid]=155
Ultra-Wideband (Cont.)
 Emit large no of very-short pluses over a wide
bandwidth
 Few nanoseconds or less
 Gains few 100s of Mbps
 Channel capacity proportional to used bandwidth
 No specific frequency allocation
 Operate on frequency band allocated to other
technologies
 Secure
 Like other spread spectrum technologies
40
Protocol Stack
 Wireless USB, Wireless IP, Bluetooth over UWB, &
IEEE1394 over UWB can be operated over a common
radio platform
41
Source: http://research.nokia.com/page/244
Summary
 Bluetooth
 Spread Spectrum
 Moderate rate, short-range (10 m)
 ZigBee
 Low rate, low power, short range (10 m – 100 m)
 Ultra-Wideband
 High rate, very-short range
42

More Related Content

What's hot

Different Types of Backhaul
Different Types of BackhaulDifferent Types of Backhaul
Different Types of Backhaul3G4G
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements3G4G
 
Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"surabhii007
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology TutorialAPNIC
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance Sajid Marwat
 
Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationBryan Slayman
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication GenerationYansi Keim
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layersJay Nagar
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final pptShelly
 
Ericsson Microwave Outlook 2016
Ericsson Microwave Outlook 2016Ericsson Microwave Outlook 2016
Ericsson Microwave Outlook 2016Ericsson
 

What's hot (20)

Different Types of Backhaul
Different Types of BackhaulDifferent Types of Backhaul
Different Types of Backhaul
 
5g presentation
5g presentation5g presentation
5g presentation
 
4g technology
4g technology4g technology
4g technology
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements
 
Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"
 
5G report
5G report5G report
5G report
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication Generation
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Mobile communications
Mobile communicationsMobile communications
Mobile communications
 
4G
4G4G
4G
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
Ericsson Microwave Outlook 2016
Ericsson Microwave Outlook 2016Ericsson Microwave Outlook 2016
Ericsson Microwave Outlook 2016
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 

Viewers also liked

Personal area network (pan)
Personal area network (pan)Personal area network (pan)
Personal area network (pan)Kukuh Rahmadi
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
 
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks Manas Rai
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationguest664c3f
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentationKrishna Kumari
 
Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Biplob Orton
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
計概報告 家妃 970701
計概報告 家妃 970701計概報告 家妃 970701
計概報告 家妃 970701emily1202
 
計概報告家妃.Ppt
計概報告家妃.Ppt計概報告家妃.Ppt
計概報告家妃.Pptemily1202
 

Viewers also liked (20)

Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Personal area network (pan)
Personal area network (pan)Personal area network (pan)
Personal area network (pan)
 
Pan
PanPan
Pan
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)
 
Wpan
WpanWpan
Wpan
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
計概報告 家妃 970701
計概報告 家妃 970701計概報告 家妃 970701
計概報告 家妃 970701
 
WPAN
WPANWPAN
WPAN
 
True Cost of Latency
True Cost of LatencyTrue Cost of Latency
True Cost of Latency
 
The Cell Processor
The Cell ProcessorThe Cell Processor
The Cell Processor
 
計概報告家妃.Ppt
計概報告家妃.Ppt計概報告家妃.Ppt
計概報告家妃.Ppt
 

Similar to Wireless Personal Area Networks

Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth TechnologiesSaurav Kumar
 
Dash7 alliance protocol - where rfid meets wsn
Dash7 alliance protocol -  where rfid meets wsnDash7 alliance protocol -  where rfid meets wsn
Dash7 alliance protocol - where rfid meets wsnMaarten Weyn
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileipRamya Sasi
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networksN. A. Sutisna
 
Normas y Estándares
Normas y EstándaresNormas y Estándares
Normas y Estándaresguestc07d512a
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Introamit_monty
 

Similar to Wireless Personal Area Networks (20)

Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Ch4
Ch4Ch4
Ch4
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Presentation
PresentationPresentation
Presentation
 
Dash7 alliance protocol - where rfid meets wsn
Dash7 alliance protocol -  where rfid meets wsnDash7 alliance protocol -  where rfid meets wsn
Dash7 alliance protocol - where rfid meets wsn
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
OSI layers
OSI layersOSI layers
OSI layers
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networks
 
Normas y Estándares
Normas y EstándaresNormas y Estándares
Normas y Estándares
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
UNIT III- 1.RPL.pptx
UNIT III- 1.RPL.pptxUNIT III- 1.RPL.pptx
UNIT III- 1.RPL.pptx
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
2-2-Overview of IoT Infrastructure: Prerequisites and Challenges - Dr. Marc I...
2-2-Overview of IoT Infrastructure: Prerequisites and Challenges - Dr. Marc I...2-2-Overview of IoT Infrastructure: Prerequisites and Challenges - Dr. Marc I...
2-2-Overview of IoT Infrastructure: Prerequisites and Challenges - Dr. Marc I...
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 

More from Dilum Bandara

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningDilum Bandara
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeDilum Bandara
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCADilum Bandara
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsDilum Bandara
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresDilum Bandara
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixDilum Bandara
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopDilum Bandara
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsDilum Bandara
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersDilum Bandara
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level ParallelismDilum Bandara
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesDilum Bandara
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsDilum Bandara
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesDilum Bandara
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesDilum Bandara
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionDilum Bandara
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery NetworksDilum Bandara
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingDilum Bandara
 

More from Dilum Bandara (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Recently uploaded

Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 

Recently uploaded (20)

Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 

Wireless Personal Area Networks

  • 1. Wireless Personal Area Networks CS5440 Wireless Access Networks Dilum Bandara Dilum.Bandara@uom.lk Some slides extracted from ZigBee by J. Dohl, F. Diehm, & P. Grosa and ZigBee by E. Ünal CSE 401 Special Topics In Computer Networks
  • 4. OSI vs. TCP/IP 4 Source: http://blog.anuesystems.com/category/span-and-taps/
  • 5. Bluetooth – IEEE 802.15.1  Developed by Ericson  Now managed by Bluetooth Special Interest Group  2.4 – 2.48 GHz ISM band  Range – 10 m  Bandwidth – 2.1 Mbps (shared) (version 2.0)  Version 4.0  Includes Classic Bluetooth, Bluetooth high speed & Bluetooth low energy protocols  Bluetooth high-speed based on Wi-Fi  Classic Bluetooth based on legacy Bluetooth protocols  Low power consumption  Found in mobile phones, laptops, computer peripherals, printers, etc. 5
  • 6. Bluetooth Applications  Cable replacement  Phone to PC connection  Connecting computing devices  Digital imaging  Smart car systems  Multiparty data exchange  Exchange business cards, calendar events  Share presentation material  Synchronize information between multiple terminals  Play multi-player games  Personal trusted device  Reliable e-commerce transactions  Local value added services  Locking & access control 6 Stick N Find
  • 7. Bluetooth Piconet  Through master  No slave-to-slave communication  Up to 7 active slaves 255 parked slaves 7 Source: www.techrepublic.com/article/secure-your-bluetooth- wireless-networks-and-protect-your-data/6139987
  • 8. Bluetooth Scatternet  By connecting 2+ piconets  No direct support at Baseband Layer 8 Source: www.techrepublic.com/article/secure-your-bluetooth- wireless-networks-and-protect-your-data/6139987
  • 9. Bluetooth Protocol Stack 9 Source: http://withfriendship.com/user/sathvi/bluetooth-stack.php
  • 10. Protocols & Usage Models 10 PPP RFCOMM TCP/IP Baseband L2CAP OBEX IrMC TCS-BIN Audio Sync Dial-up net. Usage Models File Transfer AT-commands Fax Headset LAN Access Cordless Phone SDP LMP
  • 12. Bluetooth Applications/Profiles  Set of application protocols  Definitions of possible applications & specify general behaviors  Resides on top of Bluetooth core specification & (optionally) additional protocols  Example profiles  Hands-Free Profile (HFP)  Basic Printing Profile (BPP)  Audio/Video Remote Control Profile (AVRCP)  File Transfer Profile (FTP)  Human Interface Device Profile (HID)  Personal Area Networking Profile (PAN)  Generic Object Exchange Profile (GOEP)  OBEX 12
  • 13. Other Key Layers  Link Management Protocol (LMP)  Set-up & control of radio link between 2 devices  Logical Link Control & Adaptation Protocol (L2CAP)  Multiplex multiple logical connections between 2 devices using different higher-level protocols  Provides segmentation & reassembly of on-air packets  Service Discovery Protocol (SDP)  Allows a device to discover services offered by other devices, & their associated parameters  Baseband layer  Physical layer  Manages physical channels & links  Error correction, data whitening, hop selection, & security 13
  • 14. Physical Channel  Required to use spread spectrum technology as it’s in ISM band  79 RF channels spaced 1 MHz apart  Channel – frequency range in which communication occurs  Frequency hoping  Channel represented by a pseudo-random hopping sequence hopping through 79 channels  Piconet – all devices use same channel  Hopping sequence is unique for the piconet & is determined by device address (BD_ADDR) of master 14
  • 15. Physical Channel (Cont.)  Traffic controlled by master  Master clock used for all timing & scheduling activities  Master transmissions at even slots, slaves always at odd slots  Packet extended over up to 5 slots 15
  • 16. Packets  Access code  Used for timing synchronization, offset compensation, paging & inquiry  Header  Contains information for packet acknowledgement, packet numbering for out-of-order packet reordering, flow control, slave address, & error check for header  Payload  Can contain either voice field, data field, or both 16
  • 17. ZigBee  By ZigBee Alliance  Very low power consumption  long battery life  Low data rate  Low complexity circuits & small size  low cost 17
  • 18. ZigBee Applications Telecom Services m-commerce info services object interaction (Internet of Things) ZigBee Wireless Control that Simply Works TV VCR DVD/CD remote security HVAC lighting control access control irrigation PC& Peripherals asset mgt process control environmental energy mgt Personal Health Care security HVAC AMR lighting control access control patient monitoring fitness monitoring 18 Source: http://zigbee.org/
  • 19. ZigBee Protocol Stack  IEEE 802.15.4 covers physical layer & MAC layer of low-rate WPAN  ZigBee adds network construction, application services, & more on top of IEEE 802.15.4 19 Source: www.sena.com/products/industrial_zigbee/zigbee_summary.php
  • 20. IEEE 802.15.4 Devıce Types  LR-WPAN devices defined by IEEE 802.15.4 1. Full Functional Device (FFD)  Can work as a PAN coordinator, as a coordinator, or as a simple device  Can communicate with either another FFD or a RFD 2. Reduced Functional Device (RFD)  For applications that don’t need to transmit large volumes of data & have to communicate only with a specific FFD 20
  • 22. ZigBee Topologies (Cont.) 1. Star Topology  Pros  Easy to synchronize  Low latency  Cons  Small scale 2. Mesh/P2P Topology  Pros  Robust multi-hop communication  Multi-path communication  Flexible network  Lower latency  Cons  Route discovery is costly  Needs to store routing table 22
  • 23. ZigBee Topologies (Cont.) 3. Cluster Tree Topology  Pros  Low routing cost  Multi-hop communication  Scalable  Cons  Route reconstruction is costly  Latency may be quite long  Root node becomes a single point of failure 23
  • 25. PHY Protocol Data Unit (PPDU)  2 different services  Data service  Controls radio  Management service  Energy detection in the channel  Clear channel assesment before sending messages  Link Quality Indication (LQI) for received packets  Preamble for chip & symbol synchronization  Frame size 8-127 Octets 25
  • 26. MAC Layer  2 services  Data service  Tx & Rx MPDUs  Management service  If coordinator  Manages network beacons, PAN association & disassociation, frame validation, & acknowledgment  CSMA/CA for channel access  Support device security 26
  • 27. Traffic-Modes – Device to PAN Coordinator  Beacon mode  Beacon send periodically  Coordinator & end device can go to sleep  Lowest energy consumption  Precise timing needed  Beacon period (ms-min) 27 Source: IEEE 802.15.4 Standard (2006)
  • 28. Traffic-Modes – Device to PAN Coordinator (Cont.)  Non-Beacon mode  Coordinator/routers have to stay awake  Heterogeneous network  Asymmetric power 28 Source: IEEE 802.15.4 Standard (2006)
  • 29. Data Transfer From PAN Coordınator 29 Source: IEEE 802.15.4 Standard (2006)
  • 30. MAC Layer – Managing PANs  Channel scanning  Active, passive  PAN ID conflict detection & resolution  Starting a PAN  Sending beacons  Device discovery  Device association/disassociation  Synchronization (beacon/nonbeacon)  Orphaned device realignment 30
  • 31. MAC Layer – Frame Security  Provided security features  Access control  Data encryption  Frame integrity  Sequential freshness  Available security modes  Unsecured mode  ACL mode  Secured mode  Available security suites  AES-CTR  AES-CCM  AES-CBC-MAC 31
  • 32. Network Layer  Distributed address assignment  Tree structure or self managed by higher layer  16-bit network space divided among child routers  Child routers divide their space again for their children  Depends on  Maximum child count per parent  Maximum child-routers per parent  Maximum network depth 32
  • 33. Network Layer (Cont.)  Route discovery  Find or update route between specific source & destination  Started if no active route present in routing table  Broadcast routing request (RREQ) packets  Generates routing table entries for hops to source  Endpoint router responds with Routing response (RREP) packet  Routes generated for hops to destination  Routing table entry generated in source device 33
  • 35. Network Layer (Cont.)  Routing  Check if routing table entry exists  Initiate route discovery if possible  Hierarchical routing as fallback  Route maintenance  Track failed deliveries to neighbors  Initiate route repair when threshold reached  Careful with network load!  In case of total connectivity loss  Orphaning procedure  Re-association with network 35
  • 36. ZigBee Profiles  Describes a common language for exchanging data  Defines offered services  Device interoperability across different manufacturers  Standard profiles available from the ZigBee Alliance  Profiles contain device descriptions  Unique identifier (licensed by the ZigBee Alliance) 36
  • 37. ZigBee vs. Bluetooth Feature(s) Bluetooth ZigBee Power Profile days years Complexity complex Simple Nodes/Master 7 64000 Latency 10 seconds 30 ms – 1s Range 10m 70m ~ 300m Extendibility no Yes Data Rate 1 Mbps 250 Kbps Security 64bit, 128bit 128bit AES & Application Layer 37
  • 38. ZigBee vs. BluetoothSHORT<RANGE>LONG LOW < DATA RATE > HIGH PAN LAN Text Graphic s Internet Hi-fi Audio Streaming Video Digital Video Multi-channel Video 802.15.1 Bluetooth1 802.15.1 Bluetooth 2 802.15.4 ZigBee 802.11b 802.11a/HL2 & 802.11g 38
  • 39. Ultra-Wideband  Short-range technology for high-speed WPANs  3.1 – 10.6 GHz, 15 MHz channels (up to 5)  10 m  Applications – Cell phones, HDTV, DVD players, audio players, etc. 39 Source: www.ice.rwth-aachen.de/index.php?id=630&tx_felogin_pi1[forgot]=1&tx_iceprojects_pi1[uid]=155
  • 40. Ultra-Wideband (Cont.)  Emit large no of very-short pluses over a wide bandwidth  Few nanoseconds or less  Gains few 100s of Mbps  Channel capacity proportional to used bandwidth  No specific frequency allocation  Operate on frequency band allocated to other technologies  Secure  Like other spread spectrum technologies 40
  • 41. Protocol Stack  Wireless USB, Wireless IP, Bluetooth over UWB, & IEEE1394 over UWB can be operated over a common radio platform 41 Source: http://research.nokia.com/page/244
  • 42. Summary  Bluetooth  Spread Spectrum  Moderate rate, short-range (10 m)  ZigBee  Low rate, low power, short range (10 m – 100 m)  Ultra-Wideband  High rate, very-short range 42

Editor's Notes

  1. Device participating in both piconets can relay data between members of both ad hoc networks. However, the basic bluetooth protocol does not support this relaying - the host software of each device would need to manage it
  2. Sdp – service discovery protocol TCS (Telephone Control protocol Specification
  3. Mobilkommunikation SS 1998
  4. HVAC (heating, ventilation, and air conditioning Automatic Meter Reading (AMR)
  5. GTS – guaranteed time slots
  6. Transmission from a Coordinator to a Device The coordinator has data to be transmitted to the device. It indicates this in the pending address fields of its beacon. Devices tracking the beacons, decode the pending address fields. If a device finds its address listed among the pending address fields, it realizes it has data to be received from the coordinator. It issues a Data-Request Command to the coordinator. The coordinator replies with an acknowledgement. If there is data to be sent to the device, it would transmit the data. If acknowledgements are not optional, the device would respond with an acknowledgement.