WirelessHART Modeling and Performance Evaluation

Size: px
Start display at page:

Download "WirelessHART Modeling and Performance Evaluation"

Transcription

1 WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

2 WirelessHART [ A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

3 Introduction Control applications switch from wired communication to Wireless reduced installation costs and increased flexibility can be adapted during runtime involves multiple communication hops Challenge is the predictability! Recent work by Alur, Pappas et al. introduces formal syntax and semantics for multi-hop WirelessHart different kinds of link failure models sufficient conditions for stability in control loop if only single link fails A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

4 Introduction Control applications switch from wired communication to Wireless reduced installation costs and increased flexibility can be adapted during runtime involves multiple communication hops Challenge is the predictability! Recent work by Alur, Pappas et al. introduces formal syntax and semantics for multi-hop WirelessHart different kinds of link failure models sufficient conditions for stability in control loop if only single link fails A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

5 This work Proposes to separate failure model from control analysis allows to consider the possible failure of all involved links Computes reachability probabilities for certain messages, paths or networks evaluates influence of different parameters takes into account different failure models could be included into control analysis directly A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

6 This work Proposes to separate failure model from control analysis allows to consider the possible failure of all involved links Computes reachability probabilities for certain messages, paths or networks evaluates influence of different parameters takes into account different failure models could be included into control analysis directly A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

7 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

8 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

9 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

10 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

11 Radio connectivity graph Wireless Control Netowork Plant s1 a1 s2 a2 v1 v2 v4 v5 controller s3 a3 v3 v6 v7 A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

12 Model information flow Wireless Control Netowork Plant s1 a1 s2 a2 v1 v2 v4 v5 controller s3 a3 v3 v6 v7 Static routing v 1 v 4 controller, v 2 v 5 controller, v 3 v 6 v 7 controller Communication schedule with superframe of size 7 η = ( v 1, v 4, v 2, v 5, v 3, v 6, v 4, c, v 5, c, v 6, v 7, v 7, c ). A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

13 Model information flow Wireless Control Netowork Plant s1 a1 s2 a2 v1 v2 v4 v5 controller s3 a3 v3 v6 v7 Static routing v 1 v 4 controller, v 2 v 5 controller, v 3 v 6 v 7 controller Communication schedule with superframe of size 7 η = ( v 1, v 4, v 2, v 5, v 3, v 6, v 4, c, v 5, c, v 6, v 7, v 7, c ). A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

14 WirelessHART parameters Super-frame all field nodes share the same super-frame of size (F s ) slots are specifically allocated to field devices to transmit uplink/downlink Reporting interval frequency at which measurements are taken and communicated (I s ) reduced frequency saves wireless communiciation overhead and extends life-time of field devices Message life cycle Time-to-Live (TTL) defines message life time TTL is decreased with each slot (uplink OR downlink) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

15 WirelessHART parameters Super-frame all field nodes share the same super-frame of size (F s ) slots are specifically allocated to field devices to transmit uplink/downlink Reporting interval frequency at which measurements are taken and communicated (I s ) reduced frequency saves wireless communiciation overhead and extends life-time of field devices Message life cycle Time-to-Live (TTL) defines message life time TTL is decreased with each slot (uplink OR downlink) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

16 WirelessHART parameters Super-frame all field nodes share the same super-frame of size (F s ) slots are specifically allocated to field devices to transmit uplink/downlink Reporting interval frequency at which measurements are taken and communicated (I s ) reduced frequency saves wireless communiciation overhead and extends life-time of field devices Message life cycle Time-to-Live (TTL) defines message life time TTL is decreased with each slot (uplink OR downlink) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

17 Hierarchical path model Information flow each flow periodically generates packets at source passes it through to its destination Time-triggered nature of the protocol iterate through slots of superframe and schedule possible transitions idle slot (if communication schedule does not allow a transmission) successful or unsuccessful transmission Compositional model per path state reflects age of the message at each hop (age 1, age 2,..., age n ) unique initial state (1, 0, 0,..., 0) allows to include failure probabilities A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

18 Hierarchical path model Information flow each flow periodically generates packets at source passes it through to its destination Time-triggered nature of the protocol iterate through slots of superframe and schedule possible transitions idle slot (if communication schedule does not allow a transmission) successful or unsuccessful transmission Compositional model per path state reflects age of the message at each hop (age 1, age 2,..., age n ) unique initial state (1, 0, 0,..., 0) allows to include failure probabilities A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

19 Underlying link model for transient failures p fl 1-p fl UP DOWN 1-p rc p rc successful transmission of each bit with probability 1 BER for WirelessHART message with L bits results in failure proability of p fl = 1 (1 BER) L recovery p rc = 0.9 for transient failures For links in transient state: For links in steady-state: [p s (t), p f (t)] = p(t) = p(0) [ ] t 1 pfl p fl p rc 1 p rc p rc p fl [p s, p f ] = [π(up), π(down)] = [, ] p rc + p fl p rc + p fl A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

20 Underlying link model for transient failures p fl 1-p fl UP DOWN 1-p rc p rc successful transmission of each bit with probability 1 BER for WirelessHART message with L bits results in failure proability of p fl = 1 (1 BER) L recovery p rc = 0.9 for transient failures For links in transient state: For links in steady-state: [p s (t), p f (t)] = p(t) = p(0) [ ] t 1 pfl p fl p rc 1 p rc p rc p fl [p s, p f ] = [π(up), π(down)] = [, ] p rc + p fl p rc + p fl A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

21 Example DTMC for 3-hop path Reporting interval is I s = 1, uplink frame-size F up = 7 and communication schedule η = (, n 1, n 2,,, n 2, n 3,, n 3, G ) R7 p s3 1 6,6,6 7,7,7 p s ,3,- 4,4,- 5,5,- 6,6,- 1 7,7,- 1 1,-,- 2,-,- 3,-, ,-,- 5,-,- 6,-,- 1 7,-,- p f1 p s2 p f2 1 1 p f3 Discard A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

22 Predictability measures Reachability probability that message generated at source reaches gateway before end of given reporting interval Delay time difference between T born and T rec, which equals the age of a message delay distribution τ can be derived from transient distribution of the DTMC Utilization indicates fraction of slots that transmitted irrespective of success directly relates to network communication overhead and power consumption A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

23 Predictability measures Reachability probability that message generated at source reaches gateway before end of given reporting interval Delay time difference between T born and T rec, which equals the age of a message delay distribution τ can be derived from transient distribution of the DTMC Utilization indicates fraction of slots that transmitted irrespective of success directly relates to network communication overhead and power consumption A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

24 Predictability measures Reachability probability that message generated at source reaches gateway before end of given reporting interval Delay time difference between T born and T rec, which equals the age of a message delay distribution τ can be derived from transient distribution of the DTMC Utilization indicates fraction of slots that transmitted irrespective of success directly relates to network communication overhead and power consumption A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

25 Typcial WirelessHART network Real plant settings according to HART Communication Foundation 30% of nodes communicate directly with gateway access points about 50% are two hops away remaining 20% may be 3 or 4 hops away Link layer availability WirelessHART MAC layer payload length is 127 bytes for BER = it follows p fl = and π(up) = A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

26 Typcial WirelessHART network Real plant settings according to HART Communication Foundation 30% of nodes communicate directly with gateway access points about 50% are two hops away remaining 20% may be 3 or 4 hops away Link layer availability WirelessHART MAC layer payload length is 127 bytes for BER = it follows p fl = and π(up) = A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

27 Connectivity graph of a typcial WirelessHART network A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

28 Connectivity graph of a typcial WirelessHART network Parameters reporting interval is 4 superframe size for uplink is 20 η a = ( n1, G, n2, G, n3, G, n4, n1, n1, G, n5, n1, n1, G, n6, n2, n2, G, n7, n3, n3, G, n8, n3, n3, G, n9, n6, n6, n2, n2, G, n10, n7, n7, n3, n3, G ) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

29 Robustness against transient link failures transient UP probability steady state probability when p =0.184 fl transient UP probability when p =0.184 fl steady state probability when p fl =0.05 transient UP probability when p fl = Time slot A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

30 Reachability Table: The reachability probabilities with a link failure lasting one cycle Path number Hop number Reachability (%) without link failure with link failure Bottleneck The longest path with the lowest availability forms the bottleneck of the system. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

31 Reachability Table: The reachability probabilities with a link failure lasting one cycle Path number Hop number Reachability (%) without link failure with link failure Bottleneck The longest path with the lowest availability forms the bottleneck of the system. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

32 Utilization Table: Influence of π(up) on the utilization rate of the example network Link availability Utilization rate Bad links not only degrade the control stability but also introduce more communication overhead and power consumption. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

33 Utilization Table: Influence of π(up) on the utilization rate of the example network Link availability Utilization rate Bad links not only degrade the control stability but also introduce more communication overhead and power consumption. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

34 Overall delay distribution probability delay (ms) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

35 Expected delays with different schedules Schedule η a X= 10 Y= Schedule η b X= 7 Y= expected delays (ms) path A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

36 Reachability probabilities with I s = 2 and I s = 4 A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

37 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

38 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

39 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

40 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization

More information

MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS

MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS Imran Yousaf Master s Degree Thesis 2011 EMBEDDED SYSTEMS MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS Postadress:

More information

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone Politecnico di Milano Facoltà di Ingegneria dell Informazione 3 Basic concepts Wireless Networks Prof. Antonio Capone Wireless Networks Wireless or wired, what is better? Well, it depends on the situation!

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Energy-Efficient Communication Protocol for Wireless Microsensor Networks Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra

More information

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

SELF OPTIMIZING NETWORKS

SELF OPTIMIZING NETWORKS SELF OPTIMIZING NETWORKS An LTE network is controlled by a network management system of a wide range of functions, e.g. sets the parameters that the network elements are using manages their software detects

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Distributed Control-as-a-Service with Wireless Swarm Systems"

Distributed Control-as-a-Service with Wireless Swarm Systems Distributed Control-as-a-Service with Wireless Swarm Systems" Prof. Rahul Mangharam Director, Real-Time & Embedded Systems Lab Dept. Electrical & Systems Engineering Dept. Computer & Information Science

More information

UNIK4230: Mobile Communications. Abul Kaosher

UNIK4230: Mobile Communications. Abul Kaosher UNIK4230: Mobile Communications Abul Kaosher abul.kaosher@nsn.com Multiple Access Multiple Access Introduction FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional

More information

Interference management Within 3GPP LTE advanced

Interference management Within 3GPP LTE advanced Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction

More information

Multiplexing Module W.tra.2

Multiplexing Module W.tra.2 Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

Multiple Access Techniques for Wireless Communications

Multiple Access Techniques for Wireless Communications Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division

More information

Medium Access Control Protocol for WBANS

Medium Access Control Protocol for WBANS Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Physical layer Fundamentals of Communication Networks 1 Disclaimer o The basics of signal characterization (in time and frequency

More information

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,

More information

The Long Range Wide Area Network - LoraWAN

The Long Range Wide Area Network - LoraWAN Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

Evaluation of the 6TiSCH Network Formation

Evaluation of the 6TiSCH Network Formation Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University

More information

LTE systems: overview

LTE systems: overview LTE systems: overview Luca Reggiani LTE overview 1 Outline 1. Standard status 2. Signal structure 3. Signal generation 4. Physical layer procedures 5. System architecture 6. References LTE overview 2 Standard

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 1 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 ECS455: Chapter 4 Multiple

More information

Dependable Wireless Control

Dependable Wireless Control Dependable Wireless Control through Cyber-Physical Co-Design Chenyang Lu Cyber-Physical Systems Laboratory Department of Computer Science and Engineering Wireless for Process Automa1on Emerson 5.9+ billion

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Q&A. Fragmentation EMAC HIMAC PHY. EMAC frames with the same HINOC destination address are combined into a HIMAC data frame

Q&A. Fragmentation EMAC HIMAC PHY. EMAC frames with the same HINOC destination address are combined into a HIMAC data frame Q&A 1 2 3 4 5 EMAC HIMAC1 HIMAC2 HIMAC Fragmentation FEC1 FEC2 PHY EMAC frames with the same HINOC destination address are combined into a HIMAC data frame One (or several) HIMAC data frame is carried

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

Wireless TDMA Mesh Networks

Wireless TDMA Mesh Networks Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

Lecture 8 Mul+user Systems

Lecture 8 Mul+user Systems Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Internet of Things - Exercises. Matteo Cesana

Internet of Things - Exercises. Matteo Cesana Internet of Things - Exercises Matteo Cesana December 16, 2016 Contents 1 Exercises on Energy Consumption 2 2 Exercises on IEEE 802.15.4 Standard 26 3 Exercises on Medium Access Control Solutions 59 4

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

SYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION

SYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION Model name: M200I-RF Introduction: The 200 Series Commercial RF System is designed for use with compatible intelligent fire systems using the System Sensor 200/500 Series CLIP, Enhanced and Advanced communication

More information

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

WiMedia Interoperability and Beaconing Protocol

WiMedia Interoperability and Beaconing Protocol and Beaconing Protocol Mike Micheletti UWB & Wireless USB Product Manager LeCroy Protocol Solutions Group T he WiMedia Alliance s ultra wideband wireless architecture is designed to handle multiple protocols

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell Se Gi Hong, Francesca Cuomo EE Dept., Columbia University CS

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

SC - Single carrier systems One carrier carries data stream

SC - Single carrier systems One carrier carries data stream Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

Lattice Throughput Optimal Scheduling: Learning Contention Patterns and Adapting to Load/Topology

Lattice Throughput Optimal Scheduling: Learning Contention Patterns and Adapting to Load/Topology Lattice Throughput Optimal Scheduling: Learning Contention Patterns and Adapting to Load/Topology Yung Yi, Gustavo de Veciana, and Sanjay Shakkottai Abstract Aggregate traffic loads and topology in multi-hop

More information

Adaptation of MAC Layer for QoS in WSN

Adaptation of MAC Layer for QoS in WSN Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types

More information

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group OFDM sub-channelization improvement and system performance selected topics 2002-11-14 Source(s)

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

3G TS V2.0.0 ( )

3G TS V2.0.0 ( ) 3GPP TSG R1#7(99) e25 3G TS 25.224 V2.0.0 (1999-09) Reference Technical Specification 3 rd Generation Partnership Project (3GPP); Technical Specification Group Radio Access Network; Physical Layer Procedures

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Wireless Sensor Networks, PhD Postdoctoral Researcher DCS Research Group For classroom use only, no unauthorized distribution Wireless sensor networks:

More information

Background: Cellular network technology

Background: Cellular network technology Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Performance Analysis of Time-Critical Peer-to-Peer Communications in IEEE Networks

Performance Analysis of Time-Critical Peer-to-Peer Communications in IEEE Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC proceedings Performance Analysis of Time-Critical Peer-to-Peer

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Multiple Access Techniques

Multiple Access Techniques Multiple Access Techniques Instructor: Prof. Dr. Noor M. Khan Department of Electrical Engineering, Faculty of Engineering, Mohammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +92

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission

More information

MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II

MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II BASICS & CHALLENGES Dr Konstantinos Dimou Senior Research Engineer Ericsson Research konstantinos.dimou@ericsson.com Overview Introduction Definition Vision

More information

Data and Computer Communications. Tenth Edition by William Stallings

Data and Computer Communications. Tenth Edition by William Stallings Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education, 2013 CHAPTER 8 Multiplexing It was impossible

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Reti di Telecomunicazione. Channels and Multiplexing

Reti di Telecomunicazione. Channels and Multiplexing Reti di Telecomunicazione Channels and Multiplexing Point-to-point Channels They are permanent connections between a sender and a receiver The receiver can be designed and optimized based on the (only)

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

WIRELESS body area networks (WBANs) consist of a

WIRELESS body area networks (WBANs) consist of a IEEE SYSTEMS JOURNAL 1 Improving Reliability of Emergency Data Frame Transmission in IEEE 80.15.6 Wireless Body Area Networks Kayiparambil S. Deepak and Anchare V. Babu Abstract Wireless body area networks

More information

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide Version 3.10 March, 2008 Introduction LeCroy UWBSpekChek Application The UWBSpekChek application operates in conjunction with the UWBTracer/Trainer

More information

Data and Computer Communications. Tenth Edition by William Stallings

Data and Computer Communications. Tenth Edition by William Stallings Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education - Prentice Hall, 2013 CHAPTER 8 Multiplexing

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

Sensitivity Analysis of EADARP Multicast Protocol

Sensitivity Analysis of EADARP Multicast Protocol www.ijcsi.org 273 Sensitivity Analysis of EADARP Multicast Protocol Dina Darwish Mutlimedia and Internet Department, International Academy for Engineering and Media Science 6 th October city, Egypt Abstract

More information

One Cell Reuse OFDM/TDMA using. broadband wireless access systems

One Cell Reuse OFDM/TDMA using. broadband wireless access systems One Cell Reuse OFDM/TDMA using subcarrier level adaptive modulation for broadband wireless access systems Seiichi Sampei Department of Information and Communications Technology, Osaka University Outlines

More information

Sensor Network Platforms and Tools

Sensor Network Platforms and Tools Sensor Network Platforms and Tools 1 AN OVERVIEW OF SENSOR NODES AND THEIR COMPONENTS References 2 Sensor Node Architecture 3 1 Main components of a sensor node 4 A controller Communication device(s) Sensor(s)/actuator(s)

More information

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f. Signal Propagation and Power Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f P rcv P snd 1 d 2 f 2 quadratic decrease in distance

More information

Channel partitioning protocols

Channel partitioning protocols Wireless Networks a.y. 2010-2011 Channel partitioning protocols Giacinto Gelli DIBET gelli@unina.it 1 Outline Introduction Duplexing techniques FDD TDD Channel partitioning techniques FDMA TDMA CDMA Hybrid

More information

On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study

On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study Beatrice Tomasi, Prof. James C. Preisig, Prof. Michele Zorzi Objectives and motivations Underwater

More information

Cooperative Coexistence of BLE and Time Slotted Channel Hopping Networks

Cooperative Coexistence of BLE and Time Slotted Channel Hopping Networks Cooperative Coexistence of and Time Slotted Channel Hopping Networks Onur Carhacioglu, Pouria Zand, Majid Nabi Holst Centre / IMEC-NL, High Tech Campus 3, 5656 AE Eindhoven, The Netherlands Department

More information

WIDESTAR II Satellite Base Station Equipment

WIDESTAR II Satellite Base Station Equipment WIDESTAR II Satellite Base Station Equipment Satellite Base Station Higher Data Communications Speed VoIP Transition Special Articles on WIDESTAR II High-speed Mobile Satellite Communications Service for

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information