Understanding Differences Between Bluetooth, ZigBee and WiFi.
It's not about what is the best it's just a description, the best you have to choose for your project what is suitable more?
This white paper provides a brief technology introduction on the 802.11ac amendment to the successful 802.11- 2007 standard. 802.11ac provides mechanisms to increase throughput and user experience of existing WLAN and will build on 802.11n-2009.
For more information on wireless connectivity test solutions, visit http://wireless-connectivity-test.com
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Introduction to basics of wireless networks such as
• Radio waves & wireless signal encoding techniques
• Wireless networking issues & constraints
• Wireless internetworking devices
This white paper provides a brief technology introduction on the 802.11ac amendment to the successful 802.11- 2007 standard. 802.11ac provides mechanisms to increase throughput and user experience of existing WLAN and will build on 802.11n-2009.
For more information on wireless connectivity test solutions, visit http://wireless-connectivity-test.com
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Introduction to basics of wireless networks such as
• Radio waves & wireless signal encoding techniques
• Wireless networking issues & constraints
• Wireless internetworking devices
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
Visit www.seminarlinks.blogspot.com to Download
WiMAX is a digital wireless data communication system that can deliver high-speed broadband services up to a large distance of 50KMs.The name WiMAX was created by WiMAX forum, the consortium promoting this standard. The term WiMAX is derived from the phrase Worldwide Interoperability for Microwave Access.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
1. An introduction of LAN.
2. An introduction of VLAN.
3. Properties of VLAN.
4. Types of VLAN.
5. VLAN Identification Method
6. VLAN Trunking Protocol.
7. Inter-VLAN routing.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
Visit www.seminarlinks.blogspot.com to Download
WiMAX is a digital wireless data communication system that can deliver high-speed broadband services up to a large distance of 50KMs.The name WiMAX was created by WiMAX forum, the consortium promoting this standard. The term WiMAX is derived from the phrase Worldwide Interoperability for Microwave Access.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
1. An introduction of LAN.
2. An introduction of VLAN.
3. Properties of VLAN.
4. Types of VLAN.
5. VLAN Identification Method
6. VLAN Trunking Protocol.
7. Inter-VLAN routing.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
Competing technologies have a time-to-market advantage
- Many mobile operators have invested heavily in 3G systems.
Multiple technologies will co-exist as they meet different needs
Mobility may become a powerful differentiating factor when competing with DSL or Cable
In order for the Internet of Things to function properly, a reliable wireless technology needs to be available. Radio frequencies are some of the most popular and effective means for IoT communication.
Similar to The Differences Between Bluetooth, ZigBee and WiFi (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
The Differences Between Bluetooth, ZigBee and WiFi
1. What is the Best?
BlueTooth
ZigBee
WiFi
ZigBee
By: Mostafa Ali
2. Bluetooth[1]
• Bluetooth briefly is a short range and mobility product
• It’s a short-range wireless technology that lets you connect
computers, mobile phones, and handheld devices to each other
it can used in high-quality voice transmission in wireless
headsets
• Creating personal area networks(PANs) with high levels of
security with a medium data rate of 1 to 3Mbps
3. Bluetooth[2]
• Its indoor range is typically 2–10 meters
• Communicating on a frequency between 2.402 and 2.480
• 100+KB memory
• Created by telecom vender Ericsson in 1994
• Transmitting data via low-power radio waves
• Using a radio technology called frequency-hopping
spread spectrum
4. Bluetooth[3]
• Using Point-to-multipoint(Star topology)
• The big draw of Bluetooth are that it is wireless,
inexpensive and automatic
• Connection happen when device come within range of
one another the electronic conversation happens
automatically
• Bluetooth systems create a Personal Area Network(PAN)
after conversation occurred and this called Piconet
5. Bluetooth[4]
• A master Bluetooth device can communicate with up to
seven devices in a Piconet
• Devices can switch roles, by agreement, the slave can
become the master at any time
6. Bluetooth[5]
• It use in a lot of devices like mouse, keyboards, printers
and to communicate between mobile phones and a hands-
free headsets
• Use of Bluetooth is to transfer files, contact details,
reminders, appointment dates between devices
• Removal of traditional wires in test equipment, bar code
scanners and medical equipment
7. ZigBee[1]
• ZigBee is a standard that defines a set of communication
protocols for low-data-rate short-range wireless networking
• ZigBee-based wireless devices operate in 868 MHz, 915 MHz,
and 2.4 GHz frequency bands
• The 868 MHz band is used in Europe, the 915 MHz frequency
band is used mainly in North America, whereas the 2.4 GHz
band is used worldwide.
• The maximum data rate is 250 K bits per second
• ZigBee is targeted mainly for battery-powered applications
where low data rate, low cost, and long battery life are main
requirements
8. ZigBee[2]
• In many ZigBee applications, the total time the wireless
device is engaged in any type of activity is very limited;
the device spends most of its time in a power-saving
mode, also known as sleep mode .
• As a result, ZigBee enabled devices are capable of being
operational for several years before their batteries need to
be replaced.
• Design for wireless controls and sensors networking
• ZigBee provides the most power and the most cost-
efficient solution compared to Bluetooth and IEEE
802.11b
9. ZigBee[3]
Network layers and it’s relationship with IEEE
802.15.4 Standards
• One of the common ways to establish a communication
network (wired or wireless) is to use the concept of
networking layers.
• Each layer is responsible for certain functions in the
network.
• The layers normally pass data and commands only to the
layers directly above and below them.
• These network layers shown in (Figure 1).
11. ZigBee[5]
• As shown in Figure, the bottom two networking layers
are defined by the IEEE 802.15.4 standard. This standard
is developed by the IEEE 802 standards committee and
was initially released in 2003.
• IEEE 802.15.4 defines the specifications for PHY and
MAC layers of wireless networking, but it does not
specify any requirements for higher networking layers.
• The ZigBee standard defines only the networking,
application, and security layers of the protocol and adopts
IEEE 802.15.4 PHY and MAC layers as part of the
ZigBee networking protocol
12. ZigBee[6]
Device types and device roles
• There are two types of devices in an IEEE 802.15.4
wireless network: full-function devices (FFDs) and
reduced-function devices (RFDs).
• In an IEEE 802.15.4 network, an FFD device can take
three different roles: coordinator, PAN coordinator, and
device. A coordinator is an FFD device that is capable of
relaying messages. If the coordinator is also the principal
controller of a personal area network (PAN), it is called a
PAN coordinator . If a device is not acting as a
coordinator, it is simply called a device .
13. ZigBee[7]
Networking Topologies
• In the star topology(point to multi points), every device in
the network can communicate only with the PAN coordinator.
• In a peer-to-peer topology(mesh topology) (see Figure 2),
each device can communicate directly with any other device if
the devices are placed close enough together to establish a
successful communication link. Any FFD in a peer-to-peer
network can play the role of the PAN coordinator
• One way to decide which device will be the PAN coordinator
is to pick the first FFD device that starts communicating as the
PAN coordinator
14. ZigBee[8]
• In a peer-to-peer network, all the devices that participate
in relaying the messages are FFDs because RFDs are not
capable of relaying the messages. However, an RFD can
be part of the network and communicate only with one
particular device (a coordinator or a router) in the
network.
15. WiFi[1]
• Short for wireless fidelity.
• It is a wireless technology that uses radio frequency to
transmit data through the air.
• Wi-Fi is based on the 802.11 standard:
• 802.11a
• 802.11b
• 802.11g
• 802.11n
16. WiFi[2]
• 802.11 is primarily concerned with the lower layers of the OSI
model.
• Physical Layer
Physical Layer Convergence Procedure (PLCP).
• to map the MAC frames onto the medium
Physical Medium Dependent (PMD).
• to transmit those frames.
• Data Link Layer
Logical Link Control (LLC).
Medium Access Control (MAC).
17.
18. WiFi[4]
802.11b Standard
• Well-supported, stable, and cost effective, but runs in the
2.4 GHz range that makes it prone to interference from
other devices (microwave ovens, cordless phones, etc)
and also has security disadvantages.
• Limits the number of access points in range of each other
to three.
• Has 11 channels, with 3 non-overlapping, and supports
rates from 1 to 11 Mbps, but realistically about 4-5 Mbps
max.
• Uses direct-sequence spread-spectrum technology.
19. WiFi[5]
802.11a Standard
• Completely different from 11b and 11g.
• Flexible because multiple channels can be combined for
faster throughput and more access points can be co-
located.
• Shorter range than 11b and 11g.
• Runs in the 5 GHz range, so less interference from other
devices.
• Has 12 channels, 8 non-overlapping, and supports rates
from 6 to 54 Mbps, but realistically about 27 Mbps max
• Uses frequency division multiplexing
20. WiFi[6]
802.11g Standard
• Extension of 802.11b, with the same disadvantages
(security and interference).
• Has a shorter range than 802.11b.
• Is backwards compatible with 802.11b so it allows or a
smooth transition from 11b to 11g.
• Flexible because multiple channels can be combined for
faster throughput, but limited to one access point.
• Runs at 54 Mbps, but realistically about 20-25 Mbps and
about 14 Mbps when b associated
• Uses frequency division multiplexing
21. WiFi[7]
802.11n Standard
• The newest IEEE standard in the Wi-Fi category is 802.11n. It
was designed to improve on 802.11g in the amount of
bandwidth.
• 802.11n adds technology called multiple-input multiple-output
(MIMO), a signal processing and smart antenna technique for
transmitting multiple data streams through multiple antennas.
The result? Up to five times the performance and up to twice
the range compared to the earlier 802.11g standard.
• 802.11n connections support data rates of over 300 Mbps.
• Runs in the 2.4 and 5 GHz range.
22. WiFi[8]
Which one to choose?
• (A) 802.11a
Frequency- 5 GHz
Typical Data Rate - 23
Mbit/s
Max Data rate – 54 Mbit/s
Range –30 m(100ft) outdoors
Cost: highest cost.
• (B) 802.11b
Frequency - 2.4 GHz
Typical Data Rate - 4.5
Mbit/s
Max Data rate – 11 Mbit/s
Range - 95 m(300 ft) outdoors
Cost: lowest cost.
• (G) 802.11g
Frequency - 2.4 GHz
Typical Data Rate – 19
Mbit/s
Max Data rate - 54 Mbit/s
Range – 95 m(300 ft) outdoors
Cost: costs more than 11b.
• (N) 802.11n
Frequency - 5GHz and/or
2.4GHz
Typical Data Rate - 74 Mbit/s
Max Data rate - 300 Mbit/s
(2 streams)
Range–190 m(600 ft) outdoors
Cost: costs more than 11g.
23. WiFi[9]
Basic Security Strategies
• Block your Service Set Identifier (SSID) from being broadcast.
• SSID that allows to identify the service network; it is a 32
bytes character string of a variable size.
• SSID is used in order to guarantee the authentication and the
identification between an AP and a client.
• Wireless beacon so PCs can easily find the access point.
• Change the default network name in the access point.
• Change the default access point password.
• Center the access point in the middle of the building, house or
any other place.
24. WiFi[10]
Media Access Control (MAC) Filtering
• Every network device has a unique MAC address
• Allocated by the manufacturer.
• MAC Filtering only allows certain addresses access.
• Mostly for home use.
• Tedious to implement on a large scale.
25. WiFi[11]
Wired Equivalency Protocol (WEP)
• Basic encryption technology.
• Uses an RC4 stream cipher.
• Pseudo-random bytes.
• Two versions: 64-bit and 128-bit versions.
• Built into Wi-Fi certified equipment.
• Implemented at the MAC level.
• Protects radio signal between device and access point.
• Does not protect data beyond the access point.
• Uses static encryption keys.
• Easy to crack.
• Still better than nothing.
26. WiFi[12]
Wi-Fi Protected Access (WPA)
• Designed to replace WEP.
• Firmware update.
• 128-bit Temporal Key Integrity Protocol (TKIP) encryption.
• Uses a master key that is regularly changed.
• User authentication.
• Data Integrity.
• Protects radio signal between device and access point.
• Built into Wi-Fi certified equipment.
• Implemented at the MAC level.
• Available in two versions:
• WPA2 Personal.
• WPA2 Enterprise.
27. WiFi[13]
&Wi-Fi Protected Access 2 (WPA2)
Extended EAP
• Designed to replace WEP.
• 128-bit Advanced Encryption Standard (AES).
• Based on the IEEE 802.11i standard.
• Provides government level security.
• Also available in two versions:
• WPA2 Personal.
• WPA2 Enterprise.
• EAP - Extensible Authentication Protocol.
• Addition to the Wi-Fi Protected Access.
• Used in internal network.
• Extra security for enterprise and government Wi-Fi LANs.
• Several versions available
28. WiFi[14]
Virtual Private Network (VPN)
• Creates a secure virtual “tunnel” from remote device to VPN
server.
• Creates an encryption scheme.
• Requires authentication.
• Works across the internet.
• Many types and levels of VPN technology.
• May include hardware and software components.
• Some very expensive.
• Windows provides a basic implementation in its server
software.
29. WiFi[15]
Firewall
• Can make the network or computer invisible to the internet.
• Block unauthorized users.
• Monitor and control flow of data to/from a network or computer.
• Many types and levels of firewall technology.
Hardware and software combinations
Software only versions.
• ZoneAlarm
• enables a personal firewall that can be configured with various levels of
security
• Many devices provide basic firewall capability.
Gateways and access points.
Network address translation.
Windows XP operating system.
30. WiFi[16]
Kerberos
• Network authentication based on key distribution.
• Nodes provide their own authentication.
• Checks for data stream integrity.
• Checks for modification.
• Uses Data Encryption Standard (DES).
• Any combination of these security techniques can be
used.
• The more security the more of a hassle.
• Important when supporting users.
31. Distribution of the costs of a WLAN solution (souceWLANA). This
figure illustrates clearly that a great part of the costs relates to the
used physical material (1: downtime, 2: expenses, 3: management, 4:
development of applications, 5: outsourcing, 6: material)
WiFi[17]
32.
33. References
• WI-Fi, Bluetooth, Zigbee and Wimax by Houda Labiod,
Hossam Afifi, Costantino De Santis.
• ZigBee Wireless Networks and Transceivers by Shahin
Farahani
• 802.11® Wireless Networks: The Definitive Guide by
Matthew Gast.
• IEEE Standard for Information technology—
Telecommunications and information exchange between
systems—Local and metropolitan area networks—Specific
requirements Part 11: Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) Specifications.
• Wi-Fi Security by Stewart S. Miller.