Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Size: px
Start display at page:

Download "Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio"

Transcription

1 Slide 1 Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE for 32.5 Kbytes/s transmission in the 2.4 GHz frequency band. 1

2 Slide 2 IEEE MAC Overview Star Topology PAN Coordinator Master/slave Full function device Communications flow Reduced function device 2 Slide 2 Joe Dvorak, Motorola 9/27/05 The IEEE supports different kinds of network topologies and also networks that have some very simple nodes with reduced functionality. The simplest supported topology is the star topology, where a full function node controls many reduced function nodes in a master/slave organisation. Of course, some of the slaves may be overqualified full function nodes.

3 Slide 3 IEEE MAC Overview Peer-Peer Topology Point to point Full function device Cluster tree Communications flow 3 Slide 3 Joe Dvorak, Motorola 9/27/05 At the other end of the complexity spectrum, one can consider peer to peer networks with interconnected full function nodes using routing algorithms to determine the optimal path between nodes.

4 Slide 4 IEEE MAC Overview Combined Topology Clustered stars - for example, cluster nodes exist between rooms of a hotel and each room has a star network for control. Full function device Communications flow Reduced function device 4 Slide 4 Joe Dvorak, Motorola 9/27/05 Of course a combination of the two previous topologies is possible: several full functional nodes constitute a peer to peer network, but some of these nodes are the master of a master slave network, with reduced function nodes.

5 Slide Frame Format Frame Payload (<=102 bytes) Address Information (0 to 20 bytes) Data Sequence Number (1 byte) Frame Control Field (2 bytes) Frame Check Sequence (2 bytes) MAC Protocol Data Unit (6 to 127 bytes) Frame Length (1 byte) Start of Frame Delimiter (1 byte) Preamble (4 bytes) PHY Protocol Data Unit (12 to 133 bytes) 5 The standard defines frames whose length can vary between 12 and 133 bytes. The first 6 bytes of each frame belong to the physical layer: the first 4 bytes are used to synchronize the receiver clock and the 5 th to announce the end of the synchronization phase. The 6 th gives the length of the subsequent part of the frame (MAC protocol Data Unit). This length does not include the length field itself and has a maximum value of 127. The most significant bit of the length field is always 0. All subsequent bytes form the MPDU. The first two bytes of the MPDU are the Frame control field, which defines the format and the meaning of the other parts of the MPDU. The third byte is a data sequence number that can be used to identify successive frames in a connection oriented link. The data sequence number is followed by an optional address field that can have a length of max. 20 bytes, as determined by the frame control field. The two last bytes of the MPDU are the Frame Check Sequence computed over the entire MPDU (not the Frame Length).

6 Slide Frame Control Field Frame Type (3 bits) Security Enabled (1 bit) Frame Pending (1 bit) Ack Request (1 bit) Intra Pan (1 bit) Reserved (2 bits) Destination Addressing Mode (2 bits) Frame Version (2 bits) Source Addressing Mode (2 bits) 6 Bits 0,1 and 2 give the type of the frame (beacon = 000, data = 001, ack = 010, MAC command = 011, other values to be defined). Bit 3 is used to enable or disable optional security features. Bit 4 is set in beacon systems when more frames are waiting to be transmitted Bit 5 tells the receiver that this frame should be acknowledged. Bit 6 gives the format of the Personal Area Network identifiers, if used. Bits 10 and 11 give the format of the destination address (00 = no addresses, 10 = 16 bit, 11 = 64 bit) Bits 12 and 13 give the applicable version of the standard (00 = , 01 = ) Bits 14 and 15 give the format of the source address (00 = no addresses, 10 = 16 bit, 11 = 64 bit)

7 Slide Beacon Frame Format Beacon Payload Pending Address Fields GTS Fields Superframe specifications Source Address Information (4 or 10 bytes) Beacon Sequence Number (1 byte) Frame Control Field (xxxxxxxxxxxxx000) Frame Check Sequence (2 bytes) 7

8 Slide Data Frame Format Frame Payload (<=102 bytes) Address Information (0 to 20 bytes) Data Sequence Number (1 byte) Frame Control Field (xxxxxxxxxxxxx001) Frame Check Sequence (2 bytes) 8

9 Slide Ack Frame Format Frame Check Sequence (2 bytes) Data Sequence Number (1 byte) Frame Control Field (xxxxxxxxxxxxx010) 9

10 Slide Command Frame Format Command Payload Command Type (1 byte) Address Information (0 to 20 bytes) Data Sequence Number (1 byte) Frame Control Field (xxxxxxxxxxxxx011) Frame Check Sequence (2 bytes) 10

11 Slide 11 Z1 Radio Architecture Rx 128 bytes FIFO Bytes/s Tx 128 bytes FIFO CC2420 µcontroller Tx: FL + MPDU (-FCS) in FIFO FIFO underflow detection FCS calculation & insertion PHY header addition Encoding & modulation Sending ack frames Retransmitting frames Rx: Receiver synchronization Discarding PHY header CCA, RSSI and LQI evaluation Discarding corrupted frames Demodulation & decoding Address based frame selection Generation of ACK frames FL+MPDU-FCS+RSSI+LQI in FIFO Higher level protocols Mac functions not supported by CC2420 (Frame Length, Radio Duty Cycle, ) 11 The Z1 motes use the cc2420 radio. The transfer of data between the computer in the mote and the radio is done through two 128 byte fifo stores. To transmit a frame, the computer loads the length of the frame (FL) and its contents, without FCS, in the FIFO buffer. The transmitter adds the 5 bytes of the physical header and the two bytes of the FCS, encodes everything and transmits the frame. If requested, the transmitter keeps the contents of the FIFO buffer and retransmits repeatedly the frame. The receiver checks for incoming radio signals (Clear Channel Assessment), decodes the received signal, computes the RSSI and LQI figures and checks the FCS field. If, according to the FCS, the frame is corrupt, it is discarded. Otherwise, the destination address in the received frame is compared with the address of the receiver and if they match, the frame is pushed in the receiver FIFO. In this FIFO the two bytes of the FCS are replaced by the values of RSSI and LQI computed while the frame was being received. When a frame with the Ack request bit on is received, the receiver instructs directly the transmitter to send an Ack frame (and to stop retransmitting the frame kept in the transmitter fifo).

12 Slide 12 Transmitter byte encoding Bytes/s Symbol delimiter Each byte is split into two four bit symbols. Symbol encoding Symbols/s Chips/s Pseudo-random Sequences (16 different sequences of 32 bits, called chips ) Modulator Each chip is encoded by half a period of a sine 500 KHz phase modulated sine waves in quadrature. 12 The transmitter uses spread spectrum technology for transmitting data. It works at a fixed speed of bytes per second. Each byte is split into two 4 bit entities, called symbols. Each symbol is encoded by means of a predetermined sequence of 32 bits. This results in a transmitted bit rate of 2 Mb/s. By transmitting 8 times more bits as there is information to be transmitted, one uses a lot of bandwidth to transmit a small quantity of information, meaning that, according to the theorem of Shannon, the signal to noise ratio of the radio channel can be pretty bad. The 32 bits used to encode a symbol are called chips.

13 Slide 13 IEEE symbol-to-chip mapping Symbol Chip sequence (C0, C1, C2,, C31) This table gives for all 16 possible symbols, the corresponding chip sequence.

14 Slide 14 Symbol decoding (7 chips instead of 32 are shown) This slide shows a simplified (7 instead of 32 chips) example of symbol recognition. The Hamming distance between the received symbol encoded as and the 16 possible correct symbols is computed. The symbol is identified as the one with the smallest hamming distance (in this case the symbol encoded as ).

15 Slide 15 Frame assembler Receiver byte decoding Contents of received frame. Symbol correlator Frame delimiter LQI Pseudo-random Sequences (16 different sequences of 32 bits, called chips ) Demodulator RSSI, CCA 500 KHz phase modulated sine waves in quadrature. 15 The receiver evaluates the level of incoming radio energy. This is used to generate the Clear Channel Assessment binary information and the RSSI figure associated with each received frame. Next the incoming chips are correlated with the 16 pseudo random sequences representing the 16 possible symbols and the symbol with the highest correlation is selected. The LQI figure is the value of the correlation and gives an indication of the quality of the digital radio link.

16 Slide GHz unlicenced band: WiFi overlapping channels For WiFi non overlapping channels should be chosen The 2.4 GHz unlicenced band is very crowded as many appliances use this band for wireless communications and microwave ovens use it for heating. To help in using it without too much interferences it has been subdivided in 14 overlapping channels. When an application is set up, all participating devices should choose a channel, which is preferably not used by other devices in the neighboorhood. To avoid interferences between overlapping channels, it is recommended to use only a subset of the available channels. In practice only channels 1,6,11,and 14 are used for b, 1,5,9 and 13 for g while n, which requires more bandwidth, uses channel 3 and 11.

17 Slide GHz unlicenced band: or WiFi US WiFi EU For Wireless Sensor and Actuator Networks channel 26 is preferred, provided that no WiFi in channel 13 is being used. Channels that are quite safe in Europe are 15, 16, 21, 22, 25 and 26.

18 Slide 18 CC2420 Radio Tx output: software selectable between 0dBm and 24dBm. Rx input: Minimum input signal = - 94 dbm. Maximum input signal = + 10 dbm. Received Signal Strength Indicator (RSSI) : Average of the signal power at input of receiver Measured over 8 last received symbols (128 µs). Range : from -100 to 0 dbm Offset : - 45 dbm Error : +/- 6 db Linearity : +/- 3 db 18 The output level of the CC2420 transmitter can be adjusted between 0 and -24 dbm. The receiver can work properly with input signals between +10 dbm and -94 dbm.

19 Slide 19 CC2420 Radio Clear Channel Assessment (CCA) : measured over 128 µs 3 conditions can be selected: - Received signal below predefined threshold. - Not receiving an IEEE frame. - Both above conditions simultaneously. Link Quality Indication (LQI): Average of the correlation values obtained when the 8 first symbols are identified. Excellent : 110 Minimal : 55 19

20 Slide 20 LQI vs RSSI LQI Based upon 1000 packets RSSI (dbm) RSSI < -90 dbm : LQI drops quickly RSSI > - 90 dbm: poor correlation 20

21 Slide 21 Address Field Handling The IEEE MAC frame has: Provisions for sender and/or receiver addresses Provisions for 16 (MIME) or 64 bit (6LowPan) addresses Receiver Address = all F for broadcast frames CC2420 receiver can filter frames in function of addresses: leave in Rx FIFO only - frames from specified sender - frames with specified receiver address - broadcast frames 21

22 Slide 22 Long distance range 150 PDR(%) Whip Antenna, 0 dbm RSSI av. PDR 0 Distance(m) RSSI(dBm) In an open field, a range of 160 m is still reliable 22

23 Slide 23 Bushes -15 ± 3 db 23

24 Slide 24 Rain -3 ± 1 db 24

25 Slide 25 Reproducibility -50, Distance (m) -55,0 Whip Antenna, -10 dbm -60,0-65,0 aug/03 aug/06-70,0-75,0 RSSI (dbm) Same measurements differ by 5 db on different days 25

26 Slide 26 Lower Layers PART 2: Radio Duty Cycling (RDC) and MAC protocols in Contiki Jacques Tiberghien Kris Steenhaut 26

27 Slide 27 Contiki RDC & MAC main protocols NullMAC CSMA NullRDC LPP X-MAC ContikiMAC 27 Contiki uses a MAC layer with underneath, above the physical layer, a Radio Duty Cycle layer. For the MAC layer, two options are available: - CSMA : this is the default option, it can retransmit a frame when a collision is detected by the RDC layer. - NullMAC : this MAC layer is just an empty interface between the upper layers and the RDC layer. For the RDC layer, 5 different options are available: - ContikiMAC: this is the default option, heavily optimized for IEEE frames and the CC2420 radio. - X-MAC : Older RDC protocol, with less stringent timing constraints than ContikiMAC, but often less performing from a power point of view. - LPP : Low Power Probing is a simple, receiver initiated, RDC protocol that can be useful to understand the principles of radio-duty-cycling. - NullRDC : is an alternative RDC protocol that leaves the radio always on The MAC and RDC drivers are selected by means of the contiki-conf.h file.

28 Slide 28 Contiki CSMA MAC driver (simplified) contiki/core/net/mac/csma.c Send packet Sending thread Iterate over queues broadcast? YES Dest = n queue n full? NO YES queue i empty? NO send packet p from queue i send YES drop Add to queue n Increment tx count packet p NO Ack? Return NO tx>max Random delay YES YES remove packet p from queue i Directly sends (through the RDC layer) broadcast packets Puts unicast packets in a queue associated with each neighbor. Drops packets when queue is full Whenever possible, sends (through the RDC layer) the first packet of each queue Removes packet from queue when packet is acknowledged When a packet is not acknowledged or if a collision is detected, wait a random time growing linearly with the number of retransmissions and try to retransmit the packet. The linear growth stops after 3 retransmissions, and the packet is dropped. This maximum of 3 retransmissions refers to the number of times a frame is given to the RDC layer for transmission. Some RDC layers transmit themselves a frame many times.

29 Slide 29 Contiki NULLMAC driver contiki/core/net/mac/nullmac.c Send packet send Return No acknowledgments! Directly transmits all packets This set of functions implements the same functions as the CSMA driver, but the functions don t perform any task except the blind transmission of packets

30 Slide 30 Contiki LPP contiki/core/net/mac/lpp.c Sender wants to send to X Sender Rx on, Tx off Tx on Data Packet t Receiver X Receiver wakes up (periodically scheduled) Probe (broadcasted) Ack The sender spends energy while listening possibly a full sleep period before it is allowed to send The receiver has to broadcast its probe as it doesn t now who is waiting to transmit a packet. 30 This is an implementation of the LPP (Low-Power Probing) MAC protocol. LPP is a power-saving MAC protocol that works by broadcasting a probe packet each time the radio is turned on. If another node wants to transmit a packet, it can do so after hearing the probe. To send a packet, the sending node turns on its radio to listen for probe packets.

31 Slide 31 Contiki XMAC (simplified) contiki/core/net/mac/xmac.c Sender wants to send to x Sender Probe with address x Receiver x Receiver wakes up (periodically scheduled) Ack Data Packet t A random delay is inserted between probes to allow other candidate senders to try their chance. 31 The sender, when it needs to send a packet, sends repeatedly a short probe that contains the destination address, leaving a random time interval between probes to allow other candidate senders to try their chance. When the intended receiver wakes up, it answers with an Ack and stays awake. When the sender receives that Ack, it sends its frame. When the receiver has stored the frame it sends an Ack and returns to sleep.

32 Slide 32 Contiki RDC MAC Sending a frame with destination address Sender t ~0.5 ms Receiver ~125 ms ~125 ms The receiver wakes up briefly (< 1 ms) a few times per second for checking radio activity by means of two CCAs. The transmitter sends repeatedly its frame. When the receiver detects radio activity, it remains awake. After receiving a complete frame the receiver sends an Ack and returns to sleep. After receiving an Ack the sender returns to sleep. 32 The contikimac protocol implements an original radio duty cycling protocol. Most of the time the receiver sleeps, but a few times per second (default value = 8) the receiver wakes up to perform two consecutive CCAs. If these CCAs observe no radio-activity above a predetermined threshold the receiver returns to sleep. The transmitter, when it has to transmit a frame, transmits that frame repeatedly, for a duration longer than the interval between two pairs of CCAs. When a CCA detects radio-activity, the receiver stays awake and waits till it has received an entire and correct frame. When that has happened, the receiver requests the transmission of an Ack and returns to sleep and

33 Slide 33 ContikiMAC Broadcasting a frame Sender t Receiver The receiver wakes up briefly (< 1 ms) a few times per second for checking radio activity by means of two CCAs. The transmitter sends repeatedly its frame, during a period that exceeds the interval between receiver wake-ups. When the receiver detects radio activity, it remains awake. After receiving a complete frame the receiver returns to sleep. 33 As broadcast frames can not be acknowledged (the ACKs would collide with each other) the transmitter retransmits the frame for the whole duration of a receiver wake-up cycle.

34 Slide 34 Sender Contiki RDC MAC Detecting Radio Activity by CCA t i Data frame Data frame t s t a t Receiver Ack t r t c t r t d t i = interval between data frame retransmissions. t r = time required for a stable Clear Channel Assessment. t c = time interval between the 2 CCAs performed at a wake-up. t a = time between receiving a frame and sending the Ack. t d = time required for recognizing an Ack. t s = transmission time of shortest frame 34 Why is it necessary to perform two consecutive CCAs? Between retransmissions, the sender waits a predefined time tj. If a CCA would be performed during that interval, no radio-activity would be detected, while the transmitter is attempting to get a frame through! Therefore contikimac uses two consecutive CCAs, separated by a time interval tc larger than tj.

35 Slide 35 Contiki RDC MAC Timing requirements t i t s t a Sender Data frame Data frame t Receiver Ack t r t c t r t d t i < t c (no frame should go undetected by 2 successive CCAs). t s > t c + 2t r (shortest frame should be detectable). t a + t d < t i (Ack should preempt retransmission of frame). t a + t d < t i < t c < t c + 2t r < t s 35 Some other constraints apply to the timing of the CCAs: the time tc between the two consecutive CCAs should be shorter than the duration of the shortest possible frame, otherwise transmission of such a frame could go undetected. To avoid collisions between a retransmitted frame and an Ack for the just transmitted frame, the time necessary to generate the Ack on the receiver side and to recognize it at the sender side should be smaller than the time tj between successive retransmissions.

36 Slide 36 Sender Receiver Contiki RDC MAC Figures for IEEE and CC2420 t i Data frame Data frame Ack t s t a t t r t c t a = 12 symbols = 192 µs (IEEE ) t d = 10 symbols = 160 µs (IEEE ) t r = 12 symbols = 192 µs (CC2420). t s > 736 µs or frame length > 23 bytes, all included. Contiki choices: Receiver wake-up period = 125 ms. t i = 400 µs. t c = 500 µs. t s = 884 µs (padding may be required in case of short addresses) t r t d 36

37 Slide 37 Poweroptimization Fast Sleep: too long frame too long silence no frame header Transmission Phase-Lock Introduced with ContikiMAC Can be used with other RDC protocols 37

38 Slide 38 Contiki RDC MAC Fast Sleep optimizations : too long frame Frame detection by CCA is not reliable: radio activity does not imply that somebody is sending a frame to this receiver! Sender Receiver Radio Noise awake t max frame length = 4.5 ms Receiver wake-up due to noise detected by CCA t Return to sleep 38 When a CCA detects radio-activity, this does not imply that an IEEE frame is being received. It could result from any variety of radio transmission or noise. As the duration of an IEEE frame can not exceed 4.5 ms, the receiver returns to sleep when it did not yet observe any period of radio-silence 4.5 ms after waking up.

39 Slide 39 Contiki RDC MAC Fast Sleep optimizations : too long silence Frame detection by CCA is not reliable: radio activity does not imply that somebody is sending a frame to this receiver! Sender Radio activity Radio activity t Receiver awake t i Radio silence Return to sleep Receiver wake-up due to radio activity detected by CCA 39 When data frames are being transmitted repeatedly, the time interval between successive transmissions is defined by the standard. When the receiver, after being woken-up by a CCA observes a radio-silence longer than the allowed interval between successive frames, it returns to sleep.

40 Slide 40 Contiki RDC MAC Fast Sleep optimizations : no frame header Frame detection by CCA is not reliable: radio activity does not imply that somebody is sending a frame to this receiver! Sender Radio activity Radio activity t Receiver awake t i Radio silence No correct frame header detected! Return to sleep Receiver wake-up due to radio activity detected by CCA 40 After a silence of the correct duration, an IEEE frame should be received. If the header of the frame being received doesn t obey the standards rules, the receiver returns to sleep.

41 Slide 41 Contiki RDC MAC Transmission Phase-Lock From a received Ack, the sender can deduce the phase of the wake-up cycle of a specific receiver and memorize it. Before phase locking Sender t Receiver 125 ms 125 ms Sender After phase locking t Receiver 125 ms 41 To optimize the power at the sender side, it is desirable to minimize the number of retransmissions. When a transmitter receives an Ack, it knows that the receiver was awake just before the transmission of the acknowledged frame. As the wake-ups occur strictly at a fixed rhythm, the transmitter can set up a table giving for each destination the optimal time to start transmitting a frame (phase locking the transmitter and receiver)

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

ZigBee-based Intra-car Wireless Sensor Network

ZigBee-based Intra-car Wireless Sensor Network This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. ZigBee-based Intra-car Wireless Sensor Network Hsin-Mu

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

The Long Range Wide Area Network - LoraWAN

The Long Range Wide Area Network - LoraWAN Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT

More information

Low-Power Interoperability for the IPv6 Internet of Things

Low-Power Interoperability for the IPv6 Internet of Things for the IPv6 Adam Dunkels, Joakim Eriksson, Nicolas Tsiftes Swedish Institute of Computer Science Presenter - Bob Kinicki Fall 2015 Introduction The is a current buzz term that many see as the direction

More information

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

Wireless Network (WLN) Standard

Wireless Network (WLN) Standard 10 February 2011 Page 1 (54 Wireless Network (WLN Standard Part I: Medium Access Control and Physical Layer 10 February 2011 Page 2 (54 CONTENTS 1 SCOPE... 4 1.1 Document overview... 4 1.2 Revision history...

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

EECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world

EECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world EECS 473 Advanced Embedded Systems Lecture 14 Wireless in the real world Team status updates Team Alert (Home Alert) Team Fitness (Fitness watch) Team Glasses Team Mouse (Control in hand) Team WiFi (WiFi

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [IMEC UWB PHY Proposal] Date Submitted: [4 May, 2009] Source: Dries Neirynck, Olivier Rousseaux (Stichting

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

On the Design of Software and Hardware for a WSN Transmitter

On the Design of Software and Hardware for a WSN Transmitter 16th Annual Symposium of the IEEE/CVT, Nov. 19, 2009, Louvain-La-Neuve, Belgium 1 On the Design of Software and Hardware for a WSN Transmitter Jo Verhaevert, Frank Vanheel and Patrick Van Torre University

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

Getting Started Guide

Getting Started Guide MaxEye ZigBee (IEEE 802.15.4) Measurement Suite Version 1.0.5.3 Getting Started Guide Table of Contents 1. Introduction...3 2. Installed File Location...3 3. Soft Front Panel...5 3.1 MaxEye ZigBee Signal

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

An LED-to-LED Visible Light Communication System with Software-Based Synchronization

An LED-to-LED Visible Light Communication System with Software-Based Synchronization An LED-to-LED Visible Light Communication System with Software-Based Synchronization Stefan Schmid, Giorgio Corbellini, Stefan Mangold, Thomas R. Gross Disney Research 8092 Zurich, Switzerland Department

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

IEEE g

IEEE g IEEE P802.15 Wireless Personal Area Networks Project Title IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) TG4g Coexistence Assurance Document Date Submitted April 2011 Source Re:

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 1/2009 Course Title Instructor : ITS323 Introduction to Data Communications

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12

More information

LoRaWAN. All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission.

LoRaWAN. All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission. LoRaWAN All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission. Any end device transmission can be heard by multiple receivers,

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

2320 cousteau court

2320 cousteau court Technical Brief AN139 Rev C22 2320 cousteau court 1-760-444-5995 sales@raveon.com www.raveon.com RV-M7 GX with TDMA Data By John Sonnenberg Raveon Technologies Corporation Overview The RV-M7 GX radio modem

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont. TSTE17 System Design, CDIO Lecture 5 1 General project hints 2 Project hints and deadline suggestions Required documents Modulation, cont. Requirement specification Channel coding Design specification

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Adapting to the Wireless Channel: SampleRate

Adapting to the Wireless Channel: SampleRate Adapting to the Wireless Channel: SampleRate Brad Karp (with slides contributed by Kyle Jamieson) UCL Computer Science CS M38 / GZ6 27 th January 216 Today 1. Background: digital communications Modulation

More information

Seminar on Low Power Wide Area Networks

Seminar on Low Power Wide Area Networks Seminar on Low Power Wide Area Networks Luca Feltrin RadioNetworks, DEI, Alma Mater Studiorum - Università di Bologna Technologies Overview State of the Art Long Range Technologies for IoT Cellular Band

More information

Comparing MAC Layer Implementations using Contiki-OS

Comparing MAC Layer Implementations using Contiki-OS Comparing MAC Layer Implementations using Contiki-OS Shantanoo Desai prepared for: Prof. Dr. Anna Förster Sustainable Communication Networks University of Bremen November 20, 2015 1 Outline Parameters

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 12: Soft Information Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 PPR: Partial Packet Recovery for Wireless Networks ACM SIGOCMM, 2017 Kyle Jamieson and Hari

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: Toshiba Proposal for IEEE802.15.3e CFP (Full Proposal) Date Submitted: 8 July 2015 Source: Ko Togashi Company: Toshiba

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble

More information

Getting Started Guide

Getting Started Guide MaxEye IEEE 0.15.4 UWB Measurement Suite Version 1.0.0 Getting Started Guide 1 Table of Contents 1. Introduction... 3. Installed File Location... 3 3. Programming Examples... 4 3.1. 0.15.4 UWB Signal Generation...

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: Toshiba Proposal for IEEE802.15.3e CFP (Full Proposal) Date Submitted: 8 July 2015 Source: Ko Togashi Company: Toshiba

More information

Real-World Range Testing By Christopher Hofmeister August, 2011

Real-World Range Testing By Christopher Hofmeister August, 2011 Real-World Range Testing By Christopher Hofmeister August, 2011 Introduction Scope This paper outlines the procedure for a successful RF range test that provides quantitative data on how the RF link performs

More information

Applied to Wireless Sensor Networks. Objectives

Applied to Wireless Sensor Networks. Objectives Communication Theory as Applied to Wireless Sensor Networks muse Objectives Understand the constraints of WSN and how communication theory choices are influenced by them Understand the choice of digital

More information

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM)

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM) Final Exam (ECE 407 Digital Communications) Page 1 Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM) Name: Bring calculators. 2 ½ hours. 20% of your final grade. Question 1. (20%,

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

ZigBee Propagation Testing

ZigBee Propagation Testing ZigBee Propagation Testing EDF Energy Ember December 3 rd 2010 Contents 1. Introduction... 3 1.1 Purpose... 3 2. Test Plan... 4 2.1 Location... 4 2.2 Test Point Selection... 4 2.3 Equipment... 5 3 Results...

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 3: Antennas, Propagation, and Spread Spectrum September 30, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Antennas and

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANS) Title: [General Atomics Call For Proposals Presentation] Date Submitted: [4 ] Source: Naiel Askar, Susan Lin, General Atomics-

More information

WiMedia Interoperability and Beaconing Protocol

WiMedia Interoperability and Beaconing Protocol and Beaconing Protocol Mike Micheletti UWB & Wireless USB Product Manager LeCroy Protocol Solutions Group T he WiMedia Alliance s ultra wideband wireless architecture is designed to handle multiple protocols

More information

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved. AEROHIVE NETWORKS 802.11ax DAVID SIMON, SENIOR SYSTEMS ENGINEER 1 2018 Aerohive Networks. All Rights Reserved. 2 2018 Aerohive Networks. All Rights Reserved. 8802.11ax 802.11n and 802.11ac 802.11n and

More information

CRMA: Collision-Resistant Multiple Access

CRMA: Collision-Resistant Multiple Access CRMA: Collision-Resistant Multiple Access Tianji Li 1,2 Mi Kyung Han 1 Apurv Bhartia 1 Lili Qiu 1 Eric Rozner 1 Yin Zhang 1 Brad Zarikoff 2 The University of Texas at Austin 1, National University of Ireland

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling USC/ISI Technical Report ISI-TR-64, July 25. This report is superseded by a later version published at ACM SenSys 6. 1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann

More information

UNIVERSITY OF MICHIGAN DEPARTMENT OF ELECTRICAL ENGINEERING : SYSTEMS EECS 555 DIGITAL COMMUNICATION THEORY

UNIVERSITY OF MICHIGAN DEPARTMENT OF ELECTRICAL ENGINEERING : SYSTEMS EECS 555 DIGITAL COMMUNICATION THEORY UNIVERSITY OF MICHIGAN DEPARTMENT OF ELECTRICAL ENGINEERING : SYSTEMS EECS 555 DIGITAL COMMUNICATION THEORY Study Of IEEE P802.15.3a physical layer proposals for UWB: DS-UWB proposal and Multiband OFDM

More information

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol S. Mahlknecht, M. Spinola Durante Institute of Computer Technology Vienna University of Technology Vienna, Austria {mahlknecht,spinola}@ict.tuwien.ac.at

More information

SNOW: Sensor Network over White Spaces

SNOW: Sensor Network over White Spaces SNOW: Sensor Network over White Spaces Abusayeed Saifullah, Mahbubur Rahman, Dali Ismail, Chenyang Lu, Ranveer Chandra, Jie Liu Department of Computer Science, Missouri University of Science & Technology,

More information

ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu

ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks Chenyang Lu Home Area Network for Smart Energy Connecting power meters, thermostats, HVAC, appliances. Source: AT&T Labs 2 Wireless

More information

Chapter 1 Basic concepts of wireless data networks (cont d.)

Chapter 1 Basic concepts of wireless data networks (cont d.) Chapter 1 Basic concepts of wireless data networks (cont d.) Part 4: Wireless network operations Oct 6 2004 1 Mobility management Consists of location management and handoff management Location management

More information

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) An Opportunistic Frequency Channels Selection Scheme for Interference Minimization 978-1-4799-5233-5/14/$31.00

More information

Chapter XIII Short Range Wireless Devices - Building a global license-free system at frequencies below 1GHz By Austin Harney and Conor O Mahony

Chapter XIII Short Range Wireless Devices - Building a global license-free system at frequencies below 1GHz By Austin Harney and Conor O Mahony Chapter XIII Short Range Wireless Devices - Building a global license-free system at frequencies below 1GHz By Austin Harney and Conor O Mahony Introduction: The term Short Range Device (SRD) is intended

More information

Medium Access Control Protocol for WBANS

Medium Access Control Protocol for WBANS Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Application Note AN041

Application Note AN041 CC24 Coexistence By G. E. Jonsrud 1 KEYWORDS CC24 Coexistence ZigBee Bluetooth IEEE 82.15.4 IEEE 82.11b WLAN 2 INTRODUCTION This application note describes the coexistence performance of the CC24 2.4 GHz

More information

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide Version 3.10 March, 2008 Introduction LeCroy UWBSpekChek Application The UWBSpekChek application operates in conjunction with the UWBTracer/Trainer

More information

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8

More information

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Figure 1. LDC Mode Operation Example

Figure 1. LDC Mode Operation Example EZRADIOPRO LOW DUTY CYCLE MODE OPERATION 1. Introduction Figure 1. LDC Mode Operation Example Low duty cycle (LDC) mode is designed to allow low average current polling operation of the Si443x RF receiver

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

2002 IEEE International Solid-State Circuits Conference 2002 IEEE

2002 IEEE International Solid-State Circuits Conference 2002 IEEE Outline 802.11a Overview Medium Access Control Design Baseband Transmitter Design Baseband Receiver Design Chip Details What is 802.11a? IEEE standard approved in September, 1999 12 20MHz channels at 5.15-5.35

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

Media Independent MAC Enhancements for RF Management of Wireless 802 Networks

Media Independent MAC Enhancements for RF Management of Wireless 802 Networks Media Independent MAC Enhancements for RF Management of Wireless 802 Networks An Introduction Slide 1 Overview Into to 802 Wireless Networks What is RF Management Why a standard is needed Why a common

More information

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A

More information

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt. Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics

More information

Adoption of this document as basis for broadband wireless access PHY

Adoption of this document as basis for broadband wireless access PHY Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Proposal on modulation methods for PHY of FWA 1999-10-29 Source Jay Bao and Partha De Mitsubishi Electric ITA 571 Central

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

Direct Sequence Spread Spectrum Physical Layer Specification IEEE Prepared by Jan Boer, Chair DS PRY Lucent Technologies WCND Utrecht

Direct Sequence Spread Spectrum Physical Layer Specification IEEE Prepared by Jan Boer, Chair DS PRY Lucent Technologies WCND Utrecht Direct Sequence Spread Spectrum Physical Layer Specification IEEE 802.11 Prepared by Jan Boer, Chair DS PRY Lucent Technologies WCND Utrecht Copyright 1996 IEEE, All rights reserved, This contains parts

More information

P. 241 Figure 8.1 Multiplexing

P. 241 Figure 8.1 Multiplexing CH 08 : MULTIPLEXING Multiplexing Multiplexing is multiple links on 1 physical line To make efficient use of high-speed telecommunications lines, some form of multiplexing is used It allows several transmission

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

5 GHz, U-NII Band, L-PPM. Physical Layer Specification

5 GHz, U-NII Band, L-PPM. Physical Layer Specification 5 GHz, U-NII Band, L-PPM Physical Layer Specification 1.1 Introduction This document describes the physical layer proposed by RadioLAN Inc. for the 5 GHz, U-NII, L-PPM wireless LAN system. 1.1.1 Physical

More information

Optimization of QAM-64 Modulation Technique Within WSN

Optimization of QAM-64 Modulation Technique Within WSN J. Appl. Environ. Biol. Sci., 7(3)7-14, 2017 2017, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Optimization of QAM-64 Modulation Technique

More information

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment IEEE 802.11 Wireless Access Method and Physical Layer Specification Title: Author: Proposal For the Use of Packet Detection in Clear Channel Assessment Jim McDonald Motorola, Inc. 50 E. Commerce Drive

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 102 887-1 V1.1.1 (2013-07) Technical Specification Electromagnetic compatibility and Radio spectrum Matters (ERM); Short Range Devices; Smart Metering Wireless Access Protocol; Part 1: PHY layer 2 TS

More information

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks Richard Su, Thomas Watteyne, Kristofer S. J. Pister BSAC, University of California, Berkeley, USA {yukuwan,watteyne,pister}@eecs.berkeley.edu

More information

Mitigating the Adverse Effects of Temperature on Low-Power Wireless Protocols

Mitigating the Adverse Effects of Temperature on Low-Power Wireless Protocols Mitigating the Adverse Effects of Temperature on Low-Power Wireless Protocols Carlo Alberto Boano and Kay Römer Institute for Technical Informatics Graz University of Technology, Austria {cboano, roemer}@tugraz.at

More information