Bluetooth is a wireless technology standard that allows short-range connections between devices like mobile phones, headphones, and laptops using radio waves in the 2.4 GHz spectrum. It uses frequency hopping spread spectrum technology and establishes piconets between one master device and up to seven slave devices to enable communication between connected devices. Bluetooth supports both synchronous and asynchronous connections and can be used to transfer data, voice, and interface with other wireless protocols like TCP/IP.
- Bluetooth allows for connection of peripheral devices like headsets and joysticks through short-range wireless communication. It uses frequency-hopping spread spectrum in the 2.4GHz band for robust connectivity.
- Bluetooth devices can operate in a piconet with one master device and up to seven slave devices. Multiple piconets can interconnect to form a scatternet, allowing many devices to communicate in an area.
- The Bluetooth protocol stack includes layers for radio transmission, baseband control, link management, logical link/multiplexing, service discovery, and adoption of protocols like TCP/IP, OBEX, and telephony control.
This presentation is an introduction to bluetooth technology. Seminar created for the Internet of Things course, with Prof. F. Palmieri at the University of Salerno (UniSa).
Bluetooth is an open standard for wireless communication. It uses for exchanging data between fixed and mobile devices over short distances using short-wavelength UHF radio waves.
The name derives from the Viking king Harald Blatand Gormsson, born around 900, he became famous for having unified the Scandinavian lands, which under his kingdom corresponded almost to today's Denmark, Norway and Sweden.
Fibre Channel is a high-speed network technology primarily used for storage networking. It provides serial data transfer at speeds of 1-8Gbps. Fibre Channel includes the advantages of both channels (speed and reliability) and networks (scalability). It supports various topologies including point-to-point, arbitrated loop (FC-AL), and switched fabric. The switched fabric topology uses 24-bit addressing and can scale to connect over 16 million devices across multiple switches. Fibre Channel operates at seven layers, with the physical layer defining cable types and speeds, and upper layers defining protocols encapsulated for transport.
The document summarizes the key components and protocol architecture of a UMTS network. It describes the domains and reference points that divide a UMTS system. The radio access network (UTRAN) consists of Radio Network Subsystems (RNSs) with Node Bs and Radio Network Controllers (RNCs). The interfaces between these components, such as Iu, Iur, Iub and Uu, have user, control and transport planes with various protocols to support communication and control functions. Key responsibilities are distributed between the RNC for radio resource control and the Node B for lower-level radio access functions.
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
UNIT I WIRELESS LAN 9 Introduction-WLAN technologies: Infrared, UHF narrowband, spread spectrum -IEEE802.11: System architecture, protocol architecture, physical layer, MAC layer, 802.11b, 802.11a – Hiper LAN: WATM, BRAN, HiperLAN2 – Bluetooth: Architecture, Radio Layer, Baseband layer, Link manager Protocol, security - IEEE802.16-WIMAX: Physical layer, MAC, Spectrum allocation for WIMAX UNIT II MOBILE NETWORK LAYER 9 Introduction - Mobile IP: IP packet delivery, Agent discovery, tunneling and encapsulation, IPV6-Network layer in the internet- Mobile IP session initiation protocol - mobile ad-hoc network: Routing, Destination Sequence distance vector, Dynamic source routing UNIT III MOBILE TRANSPORT LAYER 9 TCP enhancements for wireless protocols - Traditional TCP: Congestion control, fast retransmit/fast recovery, Implications of mobility - Classical TCP improvements: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, Transaction oriented TCP - TCP over 3G wireless networks. UNIT IV WIRELESS WIDE AREA NETWORK 9 Overview of UTMS Terrestrial Radio access network-UMTS Core network Architecture: 3G-MSC, 3G-SGSN, 3G-GGSN, SMS-GMSC/SMS-IWMSC, Firewall, DNS/DHCP-High speed Downlink packet access (HSDPA)- LTE network architecture and protocol. UNIT V 4G NETWORKS 9 Introduction – 4G vision – 4G features and challenges - Applications of 4G – 4G Technologies: Multicarrier Modulation, Smart antenna techniques, OFDM-MIMO systems, Adaptive Modulation and coding with time slot scheduler, Cognitive Radio.
Circuit switched telephone networks transmit digitized voice signals over dedicated circuits, while packet switched networks divide voice signals into packets which are transmitted over shared networks. In circuit switched networks, a connection is established end-to-end for each call, while in packet switched networks multiple communications share network bandwidth through packetization. Packetization allows better utilization of bandwidth for bursty data traffic as in computer networks, while circuit switched networks ensure utilization through traffic engineering. Voice can be transmitted over packet networks by digitizing it and transmitting the voice packets alongside data packets.
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
A port is an application-specific or process-specific software construct serving as a communications
endpoint in a computer's host operating system. The purpose of ports is to uniquely identify different
applications or processes running on a single computer and thereby enable them to share a single
physical connection to a packet-switched network like the Internet. In the context of the Internet
Protocol, a port is associated with an IP address of the host, as well as the type of protocol used for
communication.
- Bluetooth allows for connection of peripheral devices like headsets and joysticks through short-range wireless communication. It uses frequency-hopping spread spectrum in the 2.4GHz band for robust connectivity.
- Bluetooth devices can operate in a piconet with one master device and up to seven slave devices. Multiple piconets can interconnect to form a scatternet, allowing many devices to communicate in an area.
- The Bluetooth protocol stack includes layers for radio transmission, baseband control, link management, logical link/multiplexing, service discovery, and adoption of protocols like TCP/IP, OBEX, and telephony control.
This presentation is an introduction to bluetooth technology. Seminar created for the Internet of Things course, with Prof. F. Palmieri at the University of Salerno (UniSa).
Bluetooth is an open standard for wireless communication. It uses for exchanging data between fixed and mobile devices over short distances using short-wavelength UHF radio waves.
The name derives from the Viking king Harald Blatand Gormsson, born around 900, he became famous for having unified the Scandinavian lands, which under his kingdom corresponded almost to today's Denmark, Norway and Sweden.
Fibre Channel is a high-speed network technology primarily used for storage networking. It provides serial data transfer at speeds of 1-8Gbps. Fibre Channel includes the advantages of both channels (speed and reliability) and networks (scalability). It supports various topologies including point-to-point, arbitrated loop (FC-AL), and switched fabric. The switched fabric topology uses 24-bit addressing and can scale to connect over 16 million devices across multiple switches. Fibre Channel operates at seven layers, with the physical layer defining cable types and speeds, and upper layers defining protocols encapsulated for transport.
The document summarizes the key components and protocol architecture of a UMTS network. It describes the domains and reference points that divide a UMTS system. The radio access network (UTRAN) consists of Radio Network Subsystems (RNSs) with Node Bs and Radio Network Controllers (RNCs). The interfaces between these components, such as Iu, Iur, Iub and Uu, have user, control and transport planes with various protocols to support communication and control functions. Key responsibilities are distributed between the RNC for radio resource control and the Node B for lower-level radio access functions.
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
UNIT I WIRELESS LAN 9 Introduction-WLAN technologies: Infrared, UHF narrowband, spread spectrum -IEEE802.11: System architecture, protocol architecture, physical layer, MAC layer, 802.11b, 802.11a – Hiper LAN: WATM, BRAN, HiperLAN2 – Bluetooth: Architecture, Radio Layer, Baseband layer, Link manager Protocol, security - IEEE802.16-WIMAX: Physical layer, MAC, Spectrum allocation for WIMAX UNIT II MOBILE NETWORK LAYER 9 Introduction - Mobile IP: IP packet delivery, Agent discovery, tunneling and encapsulation, IPV6-Network layer in the internet- Mobile IP session initiation protocol - mobile ad-hoc network: Routing, Destination Sequence distance vector, Dynamic source routing UNIT III MOBILE TRANSPORT LAYER 9 TCP enhancements for wireless protocols - Traditional TCP: Congestion control, fast retransmit/fast recovery, Implications of mobility - Classical TCP improvements: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, Transaction oriented TCP - TCP over 3G wireless networks. UNIT IV WIRELESS WIDE AREA NETWORK 9 Overview of UTMS Terrestrial Radio access network-UMTS Core network Architecture: 3G-MSC, 3G-SGSN, 3G-GGSN, SMS-GMSC/SMS-IWMSC, Firewall, DNS/DHCP-High speed Downlink packet access (HSDPA)- LTE network architecture and protocol. UNIT V 4G NETWORKS 9 Introduction – 4G vision – 4G features and challenges - Applications of 4G – 4G Technologies: Multicarrier Modulation, Smart antenna techniques, OFDM-MIMO systems, Adaptive Modulation and coding with time slot scheduler, Cognitive Radio.
Circuit switched telephone networks transmit digitized voice signals over dedicated circuits, while packet switched networks divide voice signals into packets which are transmitted over shared networks. In circuit switched networks, a connection is established end-to-end for each call, while in packet switched networks multiple communications share network bandwidth through packetization. Packetization allows better utilization of bandwidth for bursty data traffic as in computer networks, while circuit switched networks ensure utilization through traffic engineering. Voice can be transmitted over packet networks by digitizing it and transmitting the voice packets alongside data packets.
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
A port is an application-specific or process-specific software construct serving as a communications
endpoint in a computer's host operating system. The purpose of ports is to uniquely identify different
applications or processes running on a single computer and thereby enable them to share a single
physical connection to a packet-switched network like the Internet. In the context of the Internet
Protocol, a port is associated with an IP address of the host, as well as the type of protocol used for
communication.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
This document discusses 5G RAN and NR technology. It provides an overview of 5G targets including peak data rates, latency requirements, and connection densities. It then discusses the 5G RAN approach and requirements, including deployment flexibility, open interfaces, and support for sharing RAN between operators. The document summarizes the 5G NR specifications, including OFDMA, numerology flexibility to support different services, and improved spectral efficiency over LTE. It also outlines the 5G NR protocol architecture, including user and control plane functions.
The document compares PDH and SDH transmission technologies. PDH uses slightly unsynchronized clocks between multiplexers, while SDH uses a common clock, making it fully synchronous. SDH has advantages over PDH like standardized optical interfaces, worldwide frame structure compatibility, excellent network capacity and protection abilities. However, SDH also has disadvantages like lower bandwidth utilization due to management frames and potential security issues due to vulnerabilities in its operation, administration and maintenance software. Overall, SDH is presented as a better technology for high-speed digital signal transmission.
IMS is an IP-based architecture that enables the delivery of multimedia services over both fixed and wireless networks. It provides a common service delivery platform for various access networks and allows for convergence of services. Key benefits of IMS include enabling a user-centric network, reducing costs through network resource sharing, and providing a consistent user experience across multiple devices and access networks through a single user identity and profile.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
Design and Implementation of Bluetooth MAC core with RFCOMM on FPGAAneesh Raveendran
The System-on-Chip (SoC) design of digital circuits makes the technology to be reusable. The current paper describes an aspect of design and implementation of IEEE 802.15.1 (Bluetooth) protocol on Field Programmable Gate Array (FPGA) based SoC. The Bluetooth is a wireless technology designed as a short-range connectivity solution for personal, portable and handheld electronic devices.
This design aims on Bluetooth technology with serial
communication (RS-232) profile at the application layer.
The IP core consists of Bluetooth Medium Access Control
(MAC) and Universal Asynchronous Receiver/Transmitter
(UART). Each module of the design is described and
developed with hardware description language-Very High
Speed Integrated Circuit Hardware Description Language
(VHDL). The final version of SoC is implemented and
tested with ALTERA STRATIX II EP2S15672C3 FPGA.
The document provides information about the IEEE 802.11 WLAN standard and its various layers:
- The PHY layer includes the physical layer convergence protocol and physical medium dependent sublayers. The PHY layer supports FHSS, DSSS and infrared spread spectrum techniques.
- The MAC layer supports distributed coordination function based on CSMA/CA and RTS/CTS, as well as point coordination function controlled by an access point. It defines frame formats and medium access mechanisms.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document analyzes the performance of a turbo coded WiMAX system over different communication channels, including AWGN, Rayleigh, and Rician channels. It describes the key components of the WiMAX physical layer, including randomization, forward error correction, interleaving, symbol mapping, and encoding of turbo codes. Simulation results are presented comparing the performance of the different channels, with AWGN showing better performance at higher numbers of turbo code iterations. With convolution coding alone performance was weaker, but turbo coding provided about a 7dB enhancement.
The document provides information about line transmission and summarizes key details about the European E1 digital transmission format, the VMX0100 versatile multiplexer, and synchronous digital hierarchy (SDH). It describes that the E1 format reserves two channels for signaling and control, with time slot 0 for transmission management and time slot 16 for signaling. It then provides an introduction to the VMX0100 multiplexer, describing its features such as E1 and fractional E1 interfaces, voice ports, and data interfaces. The document discusses transmission mediums, cards, user interfaces, and applications of the VMX0100. It concludes with an introduction to SDH, describing its frame structure and advantages over the plesiochronous digital hierarchy such as support
The document discusses the components and characteristics of wireless local area networks (WLANs). It describes the basic components of a WLAN including access points, WLAN adapters, and software. It discusses characteristics such as typical ranges of access points, the number of users supported, and how multiple access points can be connected. It also covers topics such as roaming between access points, infrastructure versus ad-hoc network architectures, and standards like IEEE 802.11.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
LAN technologies allow computers to communicate over a shared medium. They use hardware addressing and MAC addresses to allow direct communication between any two hosts. Network interface cards connect computers to the physical network and use MAC addresses to identify devices. Common LAN technologies include Ethernet, Fast Ethernet, Gigabit Ethernet, and Wi-Fi, which use CSMA/CD protocols and packet framing to share the transmission medium.
This document discusses the mobile network layer and Mobile IP. It introduces key concepts like mobile nodes, home agents, foreign agents and care-of addresses. It describes the goals of mobility support in the network layer and discusses protocols and mechanisms like agent discovery, registration, tunneling, encapsulation and optimizations to Mobile IP. The document provides details on various message formats and packet headers used in Mobile IP operations.
The document discusses GPRS (General Packet Radio Service) networks. It provides an overview of the evolution of mobile network generations from 1G to 4G. It then describes the key components and protocols of GPRS networks, including the GPRS architecture, interfaces, radio interface protocols, protocol stacks, and functions of network elements like the SGSN and GGSN.
This document discusses network protocols and mobile IP. It provides motivation for mobile IP by explaining the problems with standard IP routing when nodes change networks. It then outlines the requirements for mobile IP, including transparency, compatibility, security, and efficiency. Key terminology is defined, such as mobile node, home agent, foreign agent, and care-of address. The basic operation of mobile IP is described, including registration, encapsulation, and optimization techniques. Issues with mobile IP like security, firewalls, and QoS are also covered. Finally, extensions for IPv6 and approaches for micro-mobility support are discussed.
Bluetooth is a wireless technology standard that was created in 1998 to provide wireless connectivity between devices over short distances. It uses short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz and employs frequency hopping spread spectrum technology to enable communication between multiple devices. Bluetooth devices can operate in piconets with one master device and up to seven active slave devices, and multiple piconets can be joined together to form scatternets. Bluetooth supports both synchronous voice links and asynchronous data links between devices.
This document discusses data center interconnect and virtual private LAN service (VPLS) technologies. It provides an overview of data center edge functions, collapsed WAN and aggregation solutions, data center LAN configurations, and layer 2 loop detection capabilities. It also covers multi-chassis link aggregation, data center WAN connectivity options using IP/MPLS or VPLS, and the advantages of Ethernet VPN (EVPN) over VPLS. Finally, it discusses challenges and solutions related to virtual machine mobility and provides a comparison analysis of PBB-EVPN versus EVPN.
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
The document discusses requirements and specifications for wireless local area networks (WLANs). It notes that the IEEE 802 committee develops standards for wired and wireless networking, including 802.11 for WLANs. The document then describes several 802.11 specifications such as 802.11, 802.11a, 802.11b, and 802.11g that define transmission speeds and frequencies for WLANs. It also discusses modulation techniques like BPSK and QPSK used in wireless communications.
The document lists the 3 largest urban areas by population in each of 7 regions: Asia, South America, North America, Australia, Africa, Europe. For each region, it provides the rank, city, country, urban area population. It also lists each city under its region.
The document lists the 3 largest urban areas in several countries and regions around the world. Seoul, Osaka, and Sao Paulo are listed as the 3 largest urban areas in Korea, Japan, and Brazil respectively. New York, Los Angeles, and Sydney are identified as the top 3 urban areas in the United States, Australia. Cairo, Lagos, and Johannesburg are named as the largest cities in Egypt, Nigeria, and South Africa in that order. Moscow, Koln-Ruhr Area, and Paris are provided as the 3 largest urban centers in Russia, Germany, and France.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
This document discusses 5G RAN and NR technology. It provides an overview of 5G targets including peak data rates, latency requirements, and connection densities. It then discusses the 5G RAN approach and requirements, including deployment flexibility, open interfaces, and support for sharing RAN between operators. The document summarizes the 5G NR specifications, including OFDMA, numerology flexibility to support different services, and improved spectral efficiency over LTE. It also outlines the 5G NR protocol architecture, including user and control plane functions.
The document compares PDH and SDH transmission technologies. PDH uses slightly unsynchronized clocks between multiplexers, while SDH uses a common clock, making it fully synchronous. SDH has advantages over PDH like standardized optical interfaces, worldwide frame structure compatibility, excellent network capacity and protection abilities. However, SDH also has disadvantages like lower bandwidth utilization due to management frames and potential security issues due to vulnerabilities in its operation, administration and maintenance software. Overall, SDH is presented as a better technology for high-speed digital signal transmission.
IMS is an IP-based architecture that enables the delivery of multimedia services over both fixed and wireless networks. It provides a common service delivery platform for various access networks and allows for convergence of services. Key benefits of IMS include enabling a user-centric network, reducing costs through network resource sharing, and providing a consistent user experience across multiple devices and access networks through a single user identity and profile.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
Design and Implementation of Bluetooth MAC core with RFCOMM on FPGAAneesh Raveendran
The System-on-Chip (SoC) design of digital circuits makes the technology to be reusable. The current paper describes an aspect of design and implementation of IEEE 802.15.1 (Bluetooth) protocol on Field Programmable Gate Array (FPGA) based SoC. The Bluetooth is a wireless technology designed as a short-range connectivity solution for personal, portable and handheld electronic devices.
This design aims on Bluetooth technology with serial
communication (RS-232) profile at the application layer.
The IP core consists of Bluetooth Medium Access Control
(MAC) and Universal Asynchronous Receiver/Transmitter
(UART). Each module of the design is described and
developed with hardware description language-Very High
Speed Integrated Circuit Hardware Description Language
(VHDL). The final version of SoC is implemented and
tested with ALTERA STRATIX II EP2S15672C3 FPGA.
The document provides information about the IEEE 802.11 WLAN standard and its various layers:
- The PHY layer includes the physical layer convergence protocol and physical medium dependent sublayers. The PHY layer supports FHSS, DSSS and infrared spread spectrum techniques.
- The MAC layer supports distributed coordination function based on CSMA/CA and RTS/CTS, as well as point coordination function controlled by an access point. It defines frame formats and medium access mechanisms.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document analyzes the performance of a turbo coded WiMAX system over different communication channels, including AWGN, Rayleigh, and Rician channels. It describes the key components of the WiMAX physical layer, including randomization, forward error correction, interleaving, symbol mapping, and encoding of turbo codes. Simulation results are presented comparing the performance of the different channels, with AWGN showing better performance at higher numbers of turbo code iterations. With convolution coding alone performance was weaker, but turbo coding provided about a 7dB enhancement.
The document provides information about line transmission and summarizes key details about the European E1 digital transmission format, the VMX0100 versatile multiplexer, and synchronous digital hierarchy (SDH). It describes that the E1 format reserves two channels for signaling and control, with time slot 0 for transmission management and time slot 16 for signaling. It then provides an introduction to the VMX0100 multiplexer, describing its features such as E1 and fractional E1 interfaces, voice ports, and data interfaces. The document discusses transmission mediums, cards, user interfaces, and applications of the VMX0100. It concludes with an introduction to SDH, describing its frame structure and advantages over the plesiochronous digital hierarchy such as support
The document discusses the components and characteristics of wireless local area networks (WLANs). It describes the basic components of a WLAN including access points, WLAN adapters, and software. It discusses characteristics such as typical ranges of access points, the number of users supported, and how multiple access points can be connected. It also covers topics such as roaming between access points, infrastructure versus ad-hoc network architectures, and standards like IEEE 802.11.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
LAN technologies allow computers to communicate over a shared medium. They use hardware addressing and MAC addresses to allow direct communication between any two hosts. Network interface cards connect computers to the physical network and use MAC addresses to identify devices. Common LAN technologies include Ethernet, Fast Ethernet, Gigabit Ethernet, and Wi-Fi, which use CSMA/CD protocols and packet framing to share the transmission medium.
This document discusses the mobile network layer and Mobile IP. It introduces key concepts like mobile nodes, home agents, foreign agents and care-of addresses. It describes the goals of mobility support in the network layer and discusses protocols and mechanisms like agent discovery, registration, tunneling, encapsulation and optimizations to Mobile IP. The document provides details on various message formats and packet headers used in Mobile IP operations.
The document discusses GPRS (General Packet Radio Service) networks. It provides an overview of the evolution of mobile network generations from 1G to 4G. It then describes the key components and protocols of GPRS networks, including the GPRS architecture, interfaces, radio interface protocols, protocol stacks, and functions of network elements like the SGSN and GGSN.
This document discusses network protocols and mobile IP. It provides motivation for mobile IP by explaining the problems with standard IP routing when nodes change networks. It then outlines the requirements for mobile IP, including transparency, compatibility, security, and efficiency. Key terminology is defined, such as mobile node, home agent, foreign agent, and care-of address. The basic operation of mobile IP is described, including registration, encapsulation, and optimization techniques. Issues with mobile IP like security, firewalls, and QoS are also covered. Finally, extensions for IPv6 and approaches for micro-mobility support are discussed.
Bluetooth is a wireless technology standard that was created in 1998 to provide wireless connectivity between devices over short distances. It uses short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz and employs frequency hopping spread spectrum technology to enable communication between multiple devices. Bluetooth devices can operate in piconets with one master device and up to seven active slave devices, and multiple piconets can be joined together to form scatternets. Bluetooth supports both synchronous voice links and asynchronous data links between devices.
This document discusses data center interconnect and virtual private LAN service (VPLS) technologies. It provides an overview of data center edge functions, collapsed WAN and aggregation solutions, data center LAN configurations, and layer 2 loop detection capabilities. It also covers multi-chassis link aggregation, data center WAN connectivity options using IP/MPLS or VPLS, and the advantages of Ethernet VPN (EVPN) over VPLS. Finally, it discusses challenges and solutions related to virtual machine mobility and provides a comparison analysis of PBB-EVPN versus EVPN.
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
The document discusses requirements and specifications for wireless local area networks (WLANs). It notes that the IEEE 802 committee develops standards for wired and wireless networking, including 802.11 for WLANs. The document then describes several 802.11 specifications such as 802.11, 802.11a, 802.11b, and 802.11g that define transmission speeds and frequencies for WLANs. It also discusses modulation techniques like BPSK and QPSK used in wireless communications.
The document lists the 3 largest urban areas by population in each of 7 regions: Asia, South America, North America, Australia, Africa, Europe. For each region, it provides the rank, city, country, urban area population. It also lists each city under its region.
The document lists the 3 largest urban areas in several countries and regions around the world. Seoul, Osaka, and Sao Paulo are listed as the 3 largest urban areas in Korea, Japan, and Brazil respectively. New York, Los Angeles, and Sydney are identified as the top 3 urban areas in the United States, Australia. Cairo, Lagos, and Johannesburg are named as the largest cities in Egypt, Nigeria, and South Africa in that order. Moscow, Koln-Ruhr Area, and Paris are provided as the 3 largest urban centers in Russia, Germany, and France.
The project is called "Cake Therapy" and was created by Liliana Roman. It involves baking and decorating cakes as a form of creative therapy to help reduce stress and anxiety. The goal is for participants to focus on the relaxing process of baking rather than worries or problems through hands-on cake decorating activities.
The document discusses the importance of protecting personal data and privacy online. With more services moving to cloud-based systems and storing user data, ensuring privacy and security is critical. Companies must implement strong encryption, access controls, and notify users of any breaches to build trust and safeguard sensitive information.
The document discusses the need for companies to focus on sustainability and environmental protection efforts. While profits remain important, businesses must also consider their social responsibility to address issues like climate change and reducing waste. Transitioning to more eco-friendly business practices can help companies appeal to environmentally conscious consumers and investors over the long run.
The document lists the 3 largest urban areas by population in each of 7 regions: Asia, South America, North America, Australia, Africa, Europe. For each region, it provides the rank, city, country, urban area population. Some of the largest cities included are Tokyo, Seoul, Sao Paulo, Mexico City, New York, Sydney, Cairo, Moscow, and Paris.
The document discusses the importance of summarization techniques for extracting key information from lengthy documents or passages of text. Automatic summarization systems aim to analyze documents, identify the most important concepts and events, and generate a short summary that relays the essential ideas while removing unnecessary details. However, accurately summarizing documents continues to present challenges for AI systems due to the complexity of natural language and the need to understand context.
O documento discute a importância das fibras alimentares para pacientes diabéticos. Ele explica que fibras podem ajudar no tratamento da diabetes ao regularizar os níveis de glicose no sangue e promover a sensação de saciedade. O documento também fornece detalhes sobre os diferentes tipos de fibras, como fibras solúveis e insolúveis, e exemplos como a inulina e os frutooligossacarídeos.
This document discusses key concepts in information processing theory related to how information moves from short-term to long-term memory. It explains that working memory holds incoming information and activates related concepts from long-term memory. For information to transfer to long-term memory, it must undergo rehearsal to be repeated and encoding to relate it to existing knowledge through techniques like mnemonics. Long-term memory stores information through various network, feature comparison, propositional and parallel distributed processing models. Retrieval of stored information can occur through recall, recognition or encoding specificity based on the original context. The document also discusses causes of forgetting like failure to encode or retrieve and provides tips to improve learning.
Zigbee is a wireless networking standard for low-power devices that operate within short ranges. It uses small, low-cost transceivers in wireless ad-hoc networks to connect various devices together to form smart networks for applications like home automation, lighting control, and patient monitoring. Zigbee networks are self-organizing, reliable, and can transmit data over long distances by passing data through intermediate devices. This makes Zigbee well-suited for applications requiring long battery life, secure networking, and scalability.
Mobile IP allows users to move between networks while maintaining the same IP address. It uses home and foreign agents and care-of addresses. A mobile node can register its care-of address with its home agent to receive packets when away from home. There are three main processes: agent discovery to find foreign agents, registration of the mobile node's care-of address with its home agent, and data transfer either via indirect routing through home and foreign agents or direct routing from correspondent nodes to the mobile node. Mobile IP supports host mobility across networks in a transparent manner without changing IP addresses.
Mobile IP is an Internet Engineering Task Force (IETF) standard designed to allow mobile device users to move between networks while maintaining a permanent IP address. It uses a home address for identification and a care-of address for routing. Key functions include foreign agent discovery, home agent registration using registration requests and replies, and tunneling via encapsulation to forward packets to the mobile node's care-of address. Route optimization enables direct communication between a correspondent node and the mobile node to improve efficiency.
The document summarizes the key concepts of Mobile IP, which allows devices to maintain the same IP address when connecting to different networks. Mobile IP uses two addresses - the home address that stays fixed, and a care-of address that changes based on the foreign network. A home agent forwards packets to the device's current care-of address, while the device's home address remains the same from the perspective of other devices. This allows seamless internet access for devices that roam across networks while maintaining persistent connectivity and identity.
Mobile IPv6 aims to support mobility in IPv6 networks by allowing devices to maintain ongoing connections while moving between different networks. It operates in two modes: basic operation uses bidirectional tunneling between the mobile node and home agent, while route optimization establishes routes directly between the mobile node and correspondent nodes. Route optimization improves performance but introduces security challenges in authenticating binding updates. Evaluations found Mobile IPv6 reduces problems from triangular routing and ingress filtering compared to Mobile IPv4, but securing neighbor discovery and authorizing binding updates remain vulnerabilities.
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
This document discusses Mobile IP, which allows mobile devices to change their point of attachment between different networks while maintaining ongoing connections. It describes the key entities in Mobile IP including the Mobile Node, Home Agent, Foreign Agent, and Correspondent Node. The operations of Mobile IP are summarized, including agent discovery, registration processes, encapsulation and decapsulation of packets, and the tables maintained on routers. Problems with Mobile IP and its applications are also briefly mentioned.
This document provides an overview of Bluetooth technology. It discusses Bluetooth protocols including the radio, baseband, link manager, L2CAP, and service discovery protocols. It describes Bluetooth piconets and scatternets, error correction schemes, and the inquiry, page, and link establishment procedures. It also summarizes Bluetooth applications areas, usage models, and audio/security features.
This document provides an overview of Bluetooth technology. It describes Bluetooth as a wireless technology standard for short-range communication between devices like mobile phones, laptops, headphones, and other peripherals. It outlines Bluetooth's key features like operating in the 2.4GHz spectrum, using frequency hopping spread spectrum, and supporting ad-hoc network formation between up to 7 devices in a piconet. The document also summarizes Bluetooth's protocol stack and describes functions of layers like L2CAP, SDP, and security services.
This document provides an overview of Bluetooth technology. It discusses Bluetooth protocols including the radio, baseband, link manager, L2CAP, and service discovery protocols. It describes Bluetooth piconets and scatternets, error correction schemes, and the inquiry, page, and link establishment procedures. It also summarizes Bluetooth applications areas, usage models, and audio/security features.
This document discusses Bluetooth and Mobile IP. It provides an overview of Bluetooth including its consortium, scenarios, specifications, and protocol architecture. It then discusses Mobile IP and the motivation for its development to allow for IP mobility as nodes change networks while maintaining ongoing connections and their IP address. The key requirement for Mobile IP is transparency, allowing mobile devices to keep their IP address and continue communication after changing networks.
Bluetooth is a wireless technology standard for exchanging data over short distances. It creates personal area networks (PANs) between devices like mobile phones, computers, and other electronic devices. Bluetooth operates in the unlicensed 2.4 GHz radio frequency band and uses frequency-hopping spread spectrum to avoid interference and jamming. It allows for both point-to-point and point-to-multipoint connections and can connect up to eight devices in a piconet. Common applications of Bluetooth include wireless headphones, connecting devices in cars, and wireless speakers.
This document discusses data networking and client-server communication. It covers distributed systems, network protocols, the OSI reference model, networking terminology like LANs and topologies, transmission networks, Ethernet, connecting to the internet, transport protocols like TCP and UDP, and IP addressing. Key concepts include layered network protocols, circuit-switched vs packet-switched networks, and connection-oriented vs connectionless protocols.
Bluetooth Details
I run a knowledge sharing YouTube channel called (SILICON CHIPS TAMILAN). Please like, share, subscribe, and support me.
YouTube Link : https://www.youtube.com/channel/UCenZp9ho_PP0K5iYrdocvrw
Notes Link Below attached
https://siliconchipstamilan.blogspot.com/2022/12/what-is-outlook-mail.html
My YouTube chancel Link
https://www.youtube.com/channel/UCenZp9ho_PP0K5iYrdocvrw
My Facebook page Link
https://www.facebook.com/profile.php?id=100063722750309
&
https://www.facebook.com/profile.php?id=100063637014376
My Instagram ID
vignesh301992
This document provides an overview of wireless LAN and Bluetooth technologies. It describes IEEE 802.11 standards for wireless LAN including the basic service set, extended service set, infrastructure and ad-hoc modes. It covers the physical layers, MAC protocols and services of 802.11. It also summarizes ATM and its extension to wireless networks, issues in the transition, proposed W-ATM architectures, advantages and disadvantages. Finally it defines Bluetooth technology, the protocol stack and unlicensed frequency band used.
This document provides an overview of wireless personal area networks (WPANs), including Bluetooth, ZigBee, and Ultra-Wideband. It describes the key features and applications of each technology, how their protocols are structured, and how they compare to each other. Bluetooth supports data rates up to 2 Mbps over short ranges and is used in devices like phones, laptops, and printers. ZigBee focuses on low power consumption and supports thousands of nodes in a mesh network for uses like smart homes and buildings. Ultra-Wideband provides high data rates over short ranges and is used in applications like TVs, DVD players, and mobile devices.
Consortium: Ericsson, Intel, IBM, Nokia, Toshiba…
Scenarios:
connection of peripheral devices
loudspeaker, joystick, headset
support of ad-hoc networking
small devices, low-cost
bridging of networks
e.g., GSM via mobile phone - Bluetooth - laptop
Simple, cheap, replacement of IrDA, low range, lower data rates, low-power
Worldwide operation: 2.4 GHz
Resistance to jamming and selective frequency fading:
FHSS over 79 channels (of 1MHz each), 1600hops/s
Coexistence of multiple piconets: like CDMA
CAN (Controller Area Network) is a standard bus system for connecting electronic control units within vehicles. It allows microcontrollers and devices to communicate with each other in applications without a host computer. CAN achieves data transfer rates of up to 1Mbps over distances of 40 meters and supports up to 2032 nodes. It uses a multi-master broadcast type of network with error detection capabilities and prioritizes messages based on identifiers. CAN was introduced in 1986 and standardized in 1993 for automotive applications due to its robustness, reliability and low cost.
Bluetooth is a wireless technology named after the 10th-century Danish king Harald Bluetooth. It allows for short-range wireless connections between devices like headsets, computers, and cell phones. Bluetooth devices operate on a shared frequency hopping spread spectrum that allows multiple devices to operate within range without interference. Devices can operate in a piconet, where one device acts as the master that controls communication, or scatternets, where devices participate in multiple overlapping piconets. Bluetooth provides security features like authentication and encryption to securely transmit data between connected devices.
King Harald Bluetooth unified warring Viking tribes in the 10th century. In the 21st century, a wireless Bluetooth network is named after him. Bluetooth allows for personal ad-hoc networks, cable replacement, and landline data/voice access through access points. It operates in the unlicensed 2.4GHz band using frequency hopping and supports data rates up to 1Mbps.
Bluetooth is a new global standard that allows wireless connectivity between various digital devices like computers, phones and other electronic equipment. It eliminates the need for cables by providing automatic synchronization between devices using a short-range radio link. Bluetooth devices operate in the unlicensed 2.4GHz spectrum and use fast frequency hopping to reduce interference. A Bluetooth network consists of up to eight devices connected to a single master device in a piconet structure. Bluetooth provides reliable data and voice transmission with low power consumption and can enable applications like cordless computer peripherals and wireless headsets.
Bluetooth is an open wireless technology standard for exchanging data over short distances. It was developed in 1994 initially to replace cables connecting devices like mobile phones and laptops. Bluetooth specifications define a protocol stack and use a radio technology called frequency-hopping spread spectrum in the 2.4GHz band. It allows for ad-hoc network topologies like piconets and scatternets. Profiles define how Bluetooth can be used in different applications. Bluetooth is now used in many consumer electronics products and future uses may include applications like home automation and location-based services.
HIPERLAN was a wireless network standard developed in Europe as an alternative to IEEE 802.11. It aimed to provide higher data rates and quality of service compared to early 802.11 standards. HIPERLAN Type 1 achieved data rates up to 2Mbps in the 1990s. HIPERLAN Type 2 was developed later to support connection-oriented networking at up to 54Mbps, with quality of service, security, and flexibility to connect to different wired networks. While prototypes existed, commercial products were still in development in the early 2000s as the standard competed with improving 802.11 variants.
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
This document discusses several wireless network protocols besides TCP/IP, including Bluetooth, Zigbee, and NFC.
Bluetooth is designed for replacing cables and enabling wireless data exchange between devices within 10 meters. It operates in the 2.4GHz band and supports data rates up to 2Mbps. Zigbee is optimized for low data rate, long battery life and secure transmission between devices. It uses the IEEE 802.15.4 standard and supports mesh networking topologies. NFC has a very short range of less than 10cm and operates at 13.56MHz. It enables contactless data exchange between devices like payment and ticketing.
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
WSN protocol 802.15.4 together with cc2420 seminars . It is based on the standand of ieee802.15.4 and data sheet of the radio transceiver cc2420.
Note that some slides are borrowed.
This document summarizes the Bluetooth protocol stack. It discusses the baseband protocols, link manager protocol, L2CAP, service discovery protocol, and various adopted protocols like RFCOMM, TCS, PPP, TCP/IP, WAP, and OBEX. The baseband and link control layer control the physical RF link and links can be either SCO or ACL. The link manager protocol handles link setup and power modes. L2CAP provides multiplexing and segmentation. Service discovery allows finding and searching for Bluetooth services. RFCOMM provides emulation and transport capabilities for cables replacement. TCS deals with telephony control and configurations. Adopted protocols allow communication with other Bluetooth devices and bringing internet to phones.
Bluetooth is a standardized wireless protocol used for short-range communication between electronic devices operating in the 2.4GHz spectrum. It uses frequency hopping and adaptive frequency hopping to avoid interference. Bluetooth devices have a unique 48-bit address and can be identified by a user-friendly name. Bluetooth networks, known as piconets, use a master-slave model where the master device can connect to up to seven slave devices. Connection types include active, sniff, hold, and park modes. The Bluetooth stack consists of various layers including the radio, baseband, LMP, HCI, L2CAP, and application layers.
2. Bluetooth
Consortium: Ericsson, Intel, IBM, Nokia, Toshiba…
Scenarios:
o connection of peripheral devices
• loudspeaker, joystick, headset
o support of ad-hoc networking
• small devices, low-cost
o bridging of networks
• e.g., GSM via mobile phone - Bluetooth - laptop
Simple, cheap, replacement of IrDA, low range, lower data rates,
low-power
o Worldwide operation: 2.4 GHz
o Resistance to jamming and selective frequency fading:
• FHSS over 79 channels (of 1MHz each), 1600hops/s
o Coexistence of multiple piconets: like CDMA
o Links: synchronous connections and asynchronous connectionless
o Interoperability: protocol stack supporting TCP/IP, OBEX, SDP
o Range: 10 meters, can be extended to 100 meters
Documentation: over 1000 pages specification: www.bluetooth.com
Wireless Networks
3. Bluetooth Application Areas
Data and voice access points
o Real-time voice and data transmissions
Cable replacement
o Eliminates need for numerous cable attachments for
connection
Low cost < $5
Ad hoc networking
o Device with Bluetooth radio can establish connection with
another when in range
Wireless Networks
4. Protocol Architecture
Bluetooth is a layered protocol architecture
o Core protocols
o Cable replacement and telephony control protocols
o Adopted protocols
Core protocols
o Radio
o Baseband
o Link manager protocol (LMP)
o Logical link control and adaptation protocol (L2CAP)
o Service discovery protocol (SDP)
Wireless Networks
5. Protocol Architecture
Cable replacement protocol
o RFCOMM
Telephony control protocol
o Telephony control specification – binary (TCS BIN)
Adopted protocols
o PPP
o TCP/UDP/IP
o OBEX
o WAE/WAP
Wireless Networks
6. Protocol Architecture
BT Radio (2.4 GHZ Freq. Band):
Application
Modulation: Gaussian Frequency Shift Keying
Baseband: FH-SS (79 carriers), CDMA (hopping TCP/UDP
Commands
sequence from the node MAC address)
OBEX
Audio: interfaces directly with the baseband. Each
AT
PPP
voice connection is over a 64Kbps SCO link. The
voice coding scheme is the Continuous Variable
Slope Delta (CVSD)
Link Manager Protocol (LMP): link setup and
RFCOMM TCS SDP
control, authentication and encryption
Host Controller Interface: provides a uniform
method of access to the baseband, control L2CAP
registers, etc through USB, PCI, or UART HCI
Logical Link Control and Adaptation Layer (L2CAP):
Audio Link Manager (LMP)
higher protocols multiplexing, packet
segmentation/reassembly, QoS
Baseband
Service Discover Protocol (SDP): protocol of
locating services provided by a Bluetooth device
Bluetooth Radio
Telephony Control Specification (TCS): defines the
call control signaling for the establishment of
speech and data calls between Bluetooth devices
RFCOMM: provides emulation of serial links OBEX: OBject EXchange (e.g., vCard)
(RS232). Upto 60 connections
Wireless Networks
7. Usage Models
File transfer
Internet bridge
LAN access
Synchronization
Three-in-one phone
Headset
Wireless Networks
8. Piconets and Scatternets
Piconet
o Basic unit of Bluetooth networking
o Master and one to seven slave devices
o Master determines channel and phase
Scatternet
o Device in one piconet may exist as master or slave in
another piconet
o Allows many devices to share same area
o Makes efficient use of bandwidth
Wireless Networks
10. Network Topology
Piconet 1 Piconet 2
Slave Master
Master
Scatternet
Piconet = set of Bluetooth nodes synchronized to a master node
o The piconet hopping sequence is derived from the master MAC address
(BD_ADDR IEEE802 48 bits compatible address)
Scatternet = set of piconet
Master-Slaves can switch roles
A node can only be master of one piconet. Why?
Wireless Networks
11. Scatternets
Each piconet has one master and up to 7 slaves
Master determines hopping sequence, slaves have to synchronize
Participation in a piconet = synchronization to hopping sequence
Communication between piconets = devices jumping back and forth
between the piconets
piconets
Wireless Networks
12. Radio Specification
Classes of transmitters
o Class 1: Outputs 100 mW for maximum range
• Power control mandatory
• Provides greatest distance
o Class 2: Outputs 2.4 mW at maximum
• Power control optional
o Class 3: Nominal output is 1 mW
• Lowest power
Frequency Hopping in Bluetooth
o Provides resistance to interference and multipath effects
o Provides a form of multiple access among co-located
devices in different piconets
Wireless Networks
13. Frequency Hopping
Total bandwidth divided into 1MHz physical
channels
FH occurs by jumping from one channel to
another in pseudorandom sequence
Hopping sequence shared with all devices on
piconet
Piconet access:
o Bluetooth devices use time division duplex (TDD)
o Access technique is TDMA
o FH-TDD-TDMA
Wireless Networks
15. Physical Links
Synchronous connection oriented (SCO)
o Allocates fixed bandwidth between point-to-point
connection of master and slave
o Master maintains link using reserved slots
o Master can support three simultaneous links
Asynchronous connectionless (ACL)
o Point-to-multipoint link between master and all slaves
o Only single ACL link can exist
Wireless Networks
16. Bluetooth Packet Fields
Access code – used for timing
synchronization, offset compensation,
paging, and inquiry
Header – used to identify packet type and
carry protocol control information
Payload – contains user voice or data and
payload header, if present
Wireless Networks
17. Bluetooth Piconet MAC
Each node has a Bluetooth Device Address (BD_ADDR). The master
BD_ADDR determines the sequence of frequency hops
f(k) f(k+1) f(k+2) f(k+3) f(k+4) f(k+4) f(k+4) f(k+7)
Master
Slave 1
Slave 2
Types of connections:
Synchronous Connection-Oriented link (SCO) (symmetrical, circuit switched, point-to-point)
Asynchronous Connectionless Link (ACL): (packet switched, point-to-multipoint, master-
polls)
Packet Format:
o Access code: synchronization, when piconet active derived from master
o Packet header (for ACL): 1/3-FEC, MAC address (1 master, 7 slaves), link type,
alternating bit ARQ/SEQ, checksum
72 54 0-2745 bits
access code packet header payload
bits
3 4 1 1 1 8
MAC address type flow ARQN SEQN HEC
Wireless Networks
18. Types of Access Codes
Channel access code (CAC) – identifies a
piconet
Device access code (DAC) – used for
paging and subsequent responses
Inquiry access code (IAC) – used for
inquiry purposes
Preamble+sync+trailer
Wireless Networks
19. Packet Header Fields
AM_ADDR – contains “active mode” address of
one of the slaves
Type – identifies type of packet
o ACL: Data Medium (DM) or Data High (DH), with
different slot lengths (DM1, DM3, DM5, DH1, DH3, DH5)
o SCO: Data Voice (DV) and High-quality voice (HV)
Flow – 1-bit flow control
ARQN – 1-bit acknowledgment
SEQN – 1-bit sequential numbering schemes
Header error control (HEC) – 8-bit error detection
code
Wireless Networks
20. Payload Format
Payload header
o L_CH field – identifies logical channel
o Flow field – used to control flow at L2CAP level
o Length field – number of bytes of data
Payload body – contains user data
CRC – 16-bit CRC code
Wireless Networks
21. Error Correction Schemes
1/3 rate FEC (forward error correction)
o Used on 18-bit packet header, voice field in
HV1 packet
2/3 rate FEC
o Used in DM packets, data fields of DV packet,
FHS packet and HV2 packet
ARQ
o Used with DM and DH packets
Wireless Networks
22. ARQ Scheme Elements
Error detection – destination detects errors,
discards packets
Positive acknowledgment – destination returns
positive acknowledgment
Retransmission after timeout – source retransmits
if packet unacknowledged
Negative acknowledgment and retransmission –
destination returns negative acknowledgement for
packets with errors, source retransmits
Wireless Networks
23. Types of packets
SCO packets: Do not have a CRC (except for the data part of DV)
and are never retransmitted. Intended for High-quality Voice
(HV). Type Payload FEC CRC max-rate kbps
(bytes)
HV1 10 1/3 No 64
HV2 20 2/3 No 64
HV3 30 No No 64
DV 10+(1-10)D 2/3D Yes D 64+57.6D
ACL packets: Data Medium-rate (DM) and Data High-rate (DH)
Type Payload FEC CRC Symm. Asymm.
(bytes) max-rate kbps max-rate (DL/UL)
DM1 0-17 2/3 Yes 108.8 108.8/108.9
DM3 0-121 2/3 Yes 258.1 387.2/54.4
DM5 0-224 2/3 Yes 286.7 477.8/36.3
DH1 0-27 No Yes 172.8 172.8/172.8
DH3 0-183 No Yes 390.4 585.6/86.4
DH5 0-339 No Yes 433.9 723.2/185.6
Wireless Networks
24. Channel Control
Major states
o Standby – default state
o Connection – device connected
Interim substates for adding new slaves
o Page – device issued a page (used by master)
o Page scan – device is listening for a page
o Master response – master receives a page response from
slave
o Slave response – slave responds to a page from master
o Inquiry – device has issued an inquiry for identity of
devices within range
o Inquiry scan – device is listening for an inquiry
o Inquiry response – device receives an inquiry response
Wireless Networks
26. Inquiry Procedure
Potential master identifies devices in range that
wish to participate
o Transmits ID packet with inquiry access code (IAC)
o Occurs in Inquiry state
Device receives inquiry
o Enter Inquiry Response state
o Returns FHS (Frequency Hop Synchrnonization) packet
with address and timing information
o Moves to page scan state
Wireless Networks
27. Inquiry Procedure Details
Goal: aims at discovering other neighboring devices
Inquiring node:
o Sends an inquiry message (packet with only the access code: General
Inquiry Access Code: GIAC or Dedicated IAC: DIAC). This message is sent
over a subset of all possible frequencies.
o The inquiry frequencies are divided into two hopping sets of 16 frequencies
each.
o In inquiry state the node will send upto NINQUIRY sequences on one set of 16
frequencies before switching to the other set of 16 frequencies. Upto 3
switches can be executed. Thus the inquiry may last upto 10.24 seconds.
To be discovered node:
o Enters an inquiry_scan mode
o When hearing the inquiry_message (and after a backoff procedure) enter an
inquiry_response mode: send a Frequency Hop Sync (FHS) packet
(BD_ADDR, native clock)
After discovering the neighbors and collecting information on their
address and clock, the inquiring node can start a page routine to setup
a piconet
Wireless Networks
28. Page Procedure
Master uses devices address to calculate a
page frequency-hopping sequence
Master pages with ID packet and device
access code (DAC) of specific slave
Slave responds with DAC ID packet
Master responds with its FHS packet
Slave confirms receipt with DAC ID
Slaves moves to Connection state
Wireless Networks
29. Page Procedure Details
Goal: e.g., setup a piconet after an inquiry
Paging node (master):
o Sends a page message (i.e., packet with only Device
Access Code of paged node) over 32 frequency hops
(from DAC and split into 2*16 freq.)
o Repeated until a response is received
o When a response is received send a FHS message to
allow the paged node to synchronize
Paged node (slave):
o Listens on its hopping sequence
o When receiving a page message, send a page_response
and wait for the FHS of the pager
Wireless Networks
30. Slave Connection State Modes
Active – participates in piconet
o Listens, transmits and receives packets
Sniff – only listens on specified slots
Hold – does not support ACL packets
o Reduced power status
o May still participate in SCO exchanges
Park – does not participate on piconet
o Still retained as part of piconet
Wireless Networks
31. States of a Bluetooth Device
ACTIVE (connected/transmit): the device is uniquely identified by a 3bits AM_ADDR and
is fully participating
SNIFF state: participates in the piconet only within the SNIFF interval
HOLD state: keeps only the SCO links
PARK state (low-power): releases AM_ADDR but stays synchronized with master
STANDBY unconnected
inquiry page connecting
transmit connected active
BT device addressing: PARK HOLD SNIFF
• BD_ADDR (48 bits) low power
• AM_ADDR ( 3bits): ACTIVE, HOLD, or SNIFF
• PM_ADDR (8 bits): PARK Mode address (exchanged with the AM_ADDR when entering PARK mode )
• AR_ADDR (8 bits): not unique used to come back from PARK to ACTIVE state
Wireless Networks
32. Bluetooth Audio
Voice encoding schemes:
o Pulse code modulation (PCM)
o Continuously variable slope delta (CVSD)
modulation
Choice of scheme made by link manager
o Negotiates most appropriate scheme for
application
Wireless Networks
33. Bluetooth Link Security
Elements:
o Authentication – verify claimed identity
o Encryption – privacy
o Key management and usage
Security algorithm parameters:
o Unit address
o Secret authentication key (128 bits key)
o Secret privacy key (4-128 bits secret key)
o Random number
Wireless Networks
34. Link Management
Manages master-slave radio link
Security Service: authentication,
encryption, and key distribution
Clock synchronization
Exchange station capability information
Mode management:
o switch master/slave role
o change hold, sniff, park modes
o QoS
Wireless Networks
35. L2CAP
Provides a link-layer protocol between entities
with a number of services
Relies on lower layer for flow and error control
Makes use of ACL links, does not support SCO
links
Provides two alternative services to upper-layer
protocols
o Connectionless service
o Connection-oriented service: A QoS flow specification is
assigned in each direction
Exchange of signaling messages to establish and
configure connection parameters
Wireless Networks
38. Motivation for Mobile IP
Routing
o based on IP destination address, network prefix (e.g.
129.13.42) determines physical subnet
o change of physical subnet implies change of IP address to have
a topological correct address (standard IP) or needs special
entries in the routing tables
Specific routes to end-systems?
o change of all routing table entries to forward packets to the
right destination
o does not scale with the number of mobile hosts and frequent
changes in the location, security problems
Changing the IP-address?
o adjust the host IP address depending on the current location
o almost impossible to find a mobile system, DNS updates take
too much time
o TCP connections break, security problems
Wireless Networks
39. Mobile IP Requirements
Transparency
o mobile end-systems keep their IP address
o continuation of communication after interruption of link
possible
o point of connection to the fixed network can be changed
Compatibility
o support of the same layer 2 protocols as IP
o no changes to current end-systems and routers required
o mobile end-systems can communicate with fixed systems
Security
o authentication of all registration messages
Efficiency and scalability
o only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
o world-wide support of a large number of mobile systems in the
whole Internet
Wireless Networks
40. Terminology
Mobile Node (MN)
o system (node) that can change the point of connection
to the network without changing its IP address
Home Agent (HA)
o system in the home network of the MN, typically a router
o registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
o system in the current foreign network of the MN, typically a
router
o forwards the tunneled datagrams to the MN, typically also the
default router for the MN
Care-of Address (COA)
o address of the current tunnel end-point for the MN (at FA or MN)
o actual location of the MN from an IP point of view
o can be chosen, e.g., via DHCP
Correspondent Node (CN)
o communication partner
Wireless Networks
41. Example network
HA
MN
router
home network mobile end-system
Internet
(physical home network
for the MN)
FA foreign
network
router
(current physical network
for the MN)
CN
end-system router
Wireless Networks
42. Data transfer to the mobile
HA
2
MN
home network receiver
3
Internet
FA foreign
network
1. Sender sends to the IP address of MN,
HA intercepts packet (proxy ARP)
1 2. HA tunnels packet to COA, here FA,
CN
by encapsulation
3. FA forwards the packet
sender to the MN
Wireless Networks
43. Data transfer from the mobile
HA
1 MN
home network sender
Internet
FA foreign
network
1. Sender sends to the IP address
of the receiver as usual,
CN
FA works as default router
receiver
Wireless Networks
44. Overview COA
router
home router MN
FA
network HA
foreign
Internet network
CN router
3.
router
home router MN
2. FA
network HA
4.
foreign
Internet network
1.
CN router
Wireless Networks
45. Network integration
Agent Advertisement
o HA and FA periodically send advertisement messages into
their physical subnets
o MN listens to these messages and detects, if it is in the home
or a foreign network (standard case for home network)
o MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
o MN signals COA to the HA via the FA, HA acknowledges via
FA to MN
o these actions have to be secured by authentication
Advertisement
o HA advertises the IP address of the MN (as for fixed
systems), i.e. standard routing information
o routers adjust their entries, these are stable for a longer time
(HA responsible for a MN over a longer period of time)
o packets to the MN are sent to the HA,
o independent of changes in COA/FA
Wireless Networks
46. Agent advertisement
0 7 8 15 16 23 24 31
R: registration required
type code checksum
#addresses addr. size lifetime B: busy
router address 1 H: home agent
preference level 1 F: foreign agent
router address 2 M: minimal encapsulation
preference level 2 G: generic encapsulation
V: header compression
...
type length sequence number
registration lifetime R B H F M G V reserved
COA 1
COA 2
...
ICMP-Type = 0; Code = 0/16; Extension Type = 16
TTL = 1 Dest-Adr = 224.0.0.1 (multicast on link) or 255.255.255.255 (broadcast)
Wireless Networks
47. Registration
MN re FA HA MN r HA
gist egis
requ ration requ tration
es t e st
regi
s
requ tration
es t
tion
stra
regi
y
repl
tion
registra
repl
y t
tion
registra
y
repl
t
Goal: inform the home agent of current location of MN (COA-FA or co-located COA)
Registration expires automatically (lifetime)
Uses UDP port 434
Wireless Networks
48. Mobile IP registration request
0 7 8 15 16 23 24 31
type S B DMG V rsv lifetime
home address
home agent
COA
identification
extensions . . .
UDP packet on port 343
Type = 1 for registration request
S: retain prior mobility bindings
B: forward broadcast packets
D: co-located address=> MN decapsulates packets
Wireless Networks
49. Encapsulation
original IP header original data
new IP header new data
outer header inner header original data
Wireless Networks
50. Encapsulation I
Encapsulation of one packet into another as payload
o e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone)
o here: e.g. IP-in-IP-encapsulation, minimal encapsulation or
GRE (Generic Record Encapsulation)
IP-in-IP-encapsulation (mandatory in RFC 2003)
o tunnel between HA and COA
ver. IHL TOS length
IP identification flags fragment offset
TTL IP-in-IP IP checksum
IP address of HA
Care-of address COA
ver. IHL TOS length
IP identification flags fragment offset
TTL lay. 4 prot. IP checksum
IP address of CN
IP address of MN
TCP/UDP/ ... payload
Wireless Networks
51. Encapsulation II
Minimal encapsulation (optional) [RFC2004]
o avoids repetition of identical fields
o e.g. TTL, IHL, version, TOS
o only applicable for unfragmented packets, no space left
for fragment identification
ver. IHL TOS length
IP identification flags fragment offset
TTL min. encap. IP checksum
IP address of HA
care-of address COA
lay. 4 protoc. S reserved IP checksum
IP address of MN
original sender IP address (if S=1)
TCP/UDP/ ... payload
Wireless Networks
52. Optimization of packet forwarding
Triangular Routing
o sender sends all packets via HA to MN
o higher latency and network load
“Solutions”
o sender learns the current location of MN
o direct tunneling to this location
o HA informs a sender about the location of MN
o big security problems!
Change of FA
o packets on-the-fly during the change can be lost
o new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
o this information also enables the old FA to release
resources for the MN
Wireless Networks
53. Change of foreign agent
CN HA FAold FAnew MN
request
update
ACK
data MN changes
data
location
registration registration
update
ACK
data
data data
warning
update
ACK
data
data
t
Wireless Networks
54. Reverse tunneling (RFC 2344)
HA
2 MN
home network sender
1
Internet
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
Wireless Networks
55. Mobile IP with reverse tunneling
Routers accept often only “topological correct“ addresses
(firewall)
o a packet from the MN encapsulated by the FA is now
topological correct
o furthermore multicast and TTL problems solved (TTL in the
home network correct, but MN is to far away from the receiver)
Reverse tunneling does not solve
o problems with firewalls, the reverse tunnel can be abused to
circumvent security mechanisms (tunnel hijacking)
o optimization of data paths, i.e. packets will be forwarded
through the tunnel via the HA to a sender (double triangular
routing)
The new standard is backwards compatible
o the extensions can be implemented easily and cooperate with
current implementations without these extensions
Wireless Networks
56. Mobile IP and IPv6
security is integrated and not an add-on, authentication of
registration is included
COA can be assigned via auto-configuration (DHCPv6 is one
candidate), every node has address autoconfiguration
no need for a separate FA, all routers perform router
advertisement which can be used instead of the special
agent advertisement
MN can signal a sender directly the COA, sending via HA not
needed in this case (automatic path optimization)
“soft” hand-over, i.e. without packet loss, between two
subnets is supported
o MN sends the new COA to its old router
o the old router encapsulates all incoming packets for the MN and
forwards them to the new COA
o authentication is always granted
Wireless Networks
57. Problems with Mobile IP
Security
o authentication with FA problematic, for the FA typically belongs
to another organization
o no protocol for key management and key distribution has been
standardized in the Internet
o patent and export restrictions
Firewalls
o typically mobile IP cannot be used together with firewalls,
special set-ups are needed (such as reverse tunneling)
QoS
o many new reservations in case of RSVP
o tunneling makes it hard to give a flow of packets a special
treatment needed for the QoS
Security, firewalls, QoS etc. are topics of current research
and discussions!
Wireless Networks
Editor's Notes
Slot duration: 625 seconds Why don’t we transmit during all the slot?