enabling technologies - cs.mun.cayzchen/teaching/whu_2006/enablers.pdflogic layer control (llc) –...

36
1 Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols Random access principles Case studies n IEEE 802.11, Bluetooth More PHY/MAC standards n WiMax, ZigBee, UWB

Upload: others

Post on 10-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

1

Enabling Technologies

Part 4Mobile Ad Hoc NetworkingWuhan University

Why Enable?

Reliable point-to-point communication via media access control (MAC)Challenges in medium shareCategories of MAC protocolsRandom access principlesCase studiesn IEEE 802.11, Bluetooth

More PHY/MAC standardsn WiMax, ZigBee, UWB

Page 2: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

2

Digital Radio Properties

Higher bit error rate (BER)n Several orders compared to wired medium

Path loss – signal attenuationn At least quadratic of distance; could be 4th

power

Fading effectsn Shadow fading (large-scale) n Doppler and multipath fading (small-scale)

MAC in Wireless Networks

Contention resolution and collision handlingALOHA & CSMA/CD – recallCSMA/CD in Ethernet not working heren Half duplex transceiverMore challengesn Hidden terminal problemn Exposed terminal problems

Page 3: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

3

Hidden Terminal Problem

A, B, C – three nodesB can talk to A and C directly, but A and C

can’t talk to each otherWhen A transmits to B, node C, not aware of

the ongoing transmission, may transmit and collide with A’s transmission

A B C

Exposed Terminal Problem

A, B, C, D – four nodesOnly AB, BC, and CD can talk to each other

directlyWhen B transmits to A, node C, aware of the

ongoing transmission, can’t transmit to D, even though there will not be interference at D

A B C D

Page 4: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

4

A Simple Categorization

WirelessMAC

Distributed

Guaranteed orControlled access

Randomaccess

Centralized

How to Solve Hidden Terminals?

Your inputs …

Page 5: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

5

Busy Tone [Tobagi75,Haas98]

A receiver transmits busy tone when receiving dataAll nodes hearing busy tone keep silentAvoids interference from hidden

terminalsRequires a separate channel for busy

tone

MACA [Karn90]

Three-way handshaken When A wants to transmit to B, it first

sends an RTS (Request-To-Send) packetn After receiving A’s RTC, B sends a CTS

(Clear-To-Send) packetn After receiving B’s CTS, B sends the DATA

packet

A B C

DataRTS CTS

Page 6: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

6

MACA (Cont’d)

When should C reactivate?n Both RTS and CTS contain duration

information for overhearing nodes, e.g. C, to reactivate after specified silent period

A B C

RTSCTSData

MACA (Cont’d)

When should C reactivate?n Both RTS and CTS contain duration

information for overhearing nodes, e.g. C, to reactivate after specified silent period

A B C

Page 7: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

7

MACAW [Bharghavan94]

Simple modification to improve reliabilityFour-way handshakeRTS/CTS/DATA/ACKEssential ingredient of IEEE802.11’s

DCF

A B C D

RTSCTSDataACK

MACAW [Bharghavan94]

Simple modification to improve reliabilityFour-way handshakeRTS/CTS/DATA/ACKEssential ingredient of IEEE802.11’s

DCF

A B C D

Page 8: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

8

802.11 WLAN802.11 WLAN componentsn Access Point (AP) + Mobile Stations (MS) + Distribution

System (DS)

802.11 WLAN Modesn BSS – basic service set (infrastructure mode)

w ESS – extended service set (multiple AP’s)n IBSS – independent BSS (ad hoc mode)

IEEE 802.11– Scope of Standard

Logic Layer Control (LLC) – 802.2

Medium Access Control (MAC)

PHYFH, DS, IR

Data link layer

Physical layer

IEEE

802

.11

Upper layer protocols of OSI

Page 9: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

9

IEEE 802.11 Family802.11 (legacy)1997

2Mbps/2.4GHz

802.11a - 199954Mbps/5.2GHz

802.11b – 199911Mbps/2.4GHz

802.11g - 20254Mbps/2.4GHz

2.4GHz

Yr 1999

54MbpsOFDM

802.11eQoS

802.11hEuropean

802.11iSecurity

IEEE 802.11 Legacy

Standardized1-2Mbps wireless LANMultiple PHY layer choicesCentralized and ad hoc controlGreat start point

Page 10: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

10

PHY – Physical LayerDiffused Infrared (IR)

2.4~2.483GHz ISM band:Frequency-Hopping Spread Spectrum (FHSS)n Dwell time = 20msn 79 1MHz channels with 22 hopping patternsDirect-Sequence Spread Spectrum (DSSS)n Barker sequence – 11-bit chipping sequencen 14 partially overlapping 22MHz channelsw Center frequencies 5MHz apart

n Channels 1~11 available in N. Americaw 1, 6, 11 can operate at the same time with 25 MHz apart

MAC Main RequirementsSingle MAC to support multiple PHYsn Support single and multiple channel PHYsn and PHYs with different Medium Sense Characteristics

Should allow overlap of multiple networks in the same area and channel spacen Need to be able to share the mediumn Allow re-use of the same medium

Need to be robust for interferencen Microwave interferersn Other un-licensed spectrum usersn Co-channel interference

Need mechanisms to deal with Hidden TerminalsNeed provisions for Time Bounded ServicesNeed provisions for Privacy and Access Control

Page 11: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

11

Basic MAC FeaturesUse Distributed Coordination Function (DCF) for efficient medium sharingn Use CSMA/CAn Based on carrier sense function of PHY – Clear Channel Assessment

(CCA)

Robust for interferencen CSMA/CA + ACK for unicast frames – MAC level recoveryn CSMA/CA for broadcast frames

Parameterized use of RTS/CTS to provide virtual carrier sense function to protect against hidden nodesn Duration information is distributed by both sender and receiver

through separate RTS/CTS frames

Support fragmentation to cope different MSDU lengths

Coordination FunctionsPCF – Point Coordination Functionn Infrastructure moden OptionalDCF – Distributed Coordination Functionn Infrastructure and ad hoc modesn Mandatoryn MAC protocol intended to implement ad hoc

networks

Implement different fixed priority levelsn DIFS – distributed inter-frame spacen PIFS – point inter-frame spacen SIFS – short inter-frame space

Page 12: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

12

CSMA/CA Explained

Reduce collision probability where mostly neededn STAs are waiting for medium to become free for longer than DIFS

w CCA from PHY and virtual carrier sense

n Select random backoff in current collision window after a defer, resolving contention to avoid collisions

Efficient backoff algorithm stable at high loadsn Exponential contention window increases for retransmissions (up to max

limit)n Resets to min value when transmission succeeds

CSMA/CA + ACK

Receiver sends ACK after receiving frame with correct CRC

Direct access when medium is sensed free for longer than SIFSn No random backoff needed

SIFS < DISF to give ACK higher priority than a new transmission of data framen Such technique of using different inter-frame spaces to

differentiate priorities is extensively used in 802.11 MAC

Page 13: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

13

Hidden Terminal

Separate control frames (RTS/CTS) between sender and receiver will reserve the mediumfor subsequent data exchangen Duration information included in all frames

Hidden Terminal Resolution

Duration fields in RTS and CTS frames distributes medium reservation information, stored in an overhearing node’s counter– Network Allocation Vector (NAV)Medium “busy” decided by CCA and NAVUse of RTS/CTS is optional but must be implementedn Use is controlled by an RTS_Threshold parameter in each STA to limit

overhead

Page 14: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

14

Optional Point Coordination Function (PCF)

Contention-free service uses PCF on a DCF foundationn PCF can provided lower transfer delay variations to support time

bounded servicesn Async data, voice or mixed implementations are possiblen Point Coordinator resides in APCoexistence of contention and optional contention-free does not burden the implementation

Contention Free operation

Alternating contention-free and contention operation under PCF controlNAV prevents contention traffic until reset by the last PCF transfern Thus, variable length of contention-free period per interval

Both PCF and DCF defer to each other

Page 15: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

15

PCF Burst

CF-burst by “polling” bit set in CF_Down framesImmediate (w/SIFS) response by STA on CF_poll STAs to maintain NAV to protect CF_trafficResponses can be of variable length“reset NAV” by last (CF_End) frame from AP“ACK Previous Frame” bit in headers

Fragment Burst

Long MSDU (MAC Service Data Unit) fragmentedBurst of fragments are ACKed individuallyn Separated by SIFSsn Unicast frames only

Random backoff and retransmission of failing fragment when no ACK is returnedn Can be interruptedDuration information in data fragments and ACKs causes NAV to be set, for medium reservation

Page 16: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

16

Frame Formats

MAC header format differs per frame typen Control frames (several fields are omitted)n Management framesn Data frames

Includes sequence control field for filtering of duplicate caused by ACK and retransmissions

Address Fields Description

Addr1 – all STAs filters on this addressAddr2 – Transmitter Address (TA)n Identifies transmitter to address ACKs to

Addr3 – Depending on To and From DS bitsAddr4 – Only needed to identify the original source of WDS (Wireless Distribution System)

Page 17: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

17

Privacy and Access ControlGoal of 802.11 is to provide “Wired Equivalent Privacy (WEP)”Provides for an authentication mechanismn To aid in access controln Has provisions for “open”, “shared key” or proprietary

authentication extensions

Optional (WEP) privacy mechanism defined by 802.11n Limited to STA to STA, not “end to end”n Only implements “confidentiality” functionn Uses RC4 PRNG algorithm based on

w A 40 bit secret key (no key distribution standardized)w And a 24 bit IV that is sent with the dataw Includes an ICV to allow integrity check

n Only payload of data frames are encryptedw On per MPDU basis

Privacy Mechanism

WEP bit in frame control field indicates WEP in usen Each frame can have a new IV or IV can be reused for a

limited timen If integrity check fails then frame is ACKed but discarded

Page 18: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

18

Support for Mobility

MAC Management LayerSynchronizationn Finding and staying with a WLANn Synchronization functionsw TSF timer, beacon generation

Power managementn Sleeping without missing any messagen Power management functionsw Periodic sleep, frame buffering, traffic indication map

Association and de-associationn Joining a networkn Roaming – moving from AP to APn Scanning

Page 19: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

19

Synchronization in 802.11

Timing Synchronization Function (TSF)Used for power managementn Beacons sent at well known intervalsn All STA timers in BSS are synchronized

Used for PCF timingn To predict CP/CFP alternation period

Used for hop timing for FH PHYn Dwell intervaln STA synchronization

Synchronization ApproachEach STA maintains a local timerTiming Synchronization Function (TSF)n Keeps timers from all STAs in synchn AP controls timing in infrastructure moden Distributed function for ad hoc mode

Timing conveyed by periodic beacon transmissionsn Beacons contain timestamps for the BSSn Timestamps in beacons used to calibrate local clocks

n Not required to hear each beaconn Beacons contain other management information

w Also used in power management and roaming

Page 20: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

20

Infrastructure Beacon Generation

AP’s send beacons in infrastructure mode

Beacons scheduled at beacon intervalsTransmission may be delayed by CSMA deferraln Subsequent transmissions at expected beacon intervaln Not relative to last transmissionn Next beacon sent at target beacon transmission time

Timestamps contains timer values at transmit time

Power ManagementMobile devices are battery poweredn Power management is important for mobility

Current LAN protocols assume stations are always ready to receiven Idle receive state dominates LAN adapter power

consumption over time

How can we power off during idle periods, yet maintain an active session?802.11 power management protocoln Allows transceivers to be off as much as possible

n Transparent to existing protocolsn Flexible to support different applications

w Possible to trade off throughput for battery life

Page 21: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

21

Power Management ApproachAllows idle STAs to go to sleepn STA’s power save mode stored in AP

AP buffers packets for sleeping STAsn AP announces which STA have frames bufferedn Traffic Indication Map (TIM) sent with every beacon

Power saving STAs wake up periodicallyn Listen for beacons

TSF assures AP and power save STAs in synchn STAs will wake up to hear a beacon

n TSF timer keeps running when STAs sleepingn Synchronization allows extreme low power consumption

IBSS also have power managementn Similar in concept, distributed approach

Infrastructure Power Management

Broadcast frames also buffered in APn All broadcasts/multicasts are bufferedn Broadcasts/multicasts only sent after DTIMn Delivery TIM – sent every several TIM intervals

STAs wakeup prior to an expected (D)TIMIf (D)TIM indicates frame bufferedn STA sends PS_Poll and stays awake for the TIM interval

to receive datan Else STA sleeps again

Page 22: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

22

WLAN Infrastructure Network

Each STA is associated with a particular APn STAs 1, 2 and 3 -> An STAs 4 and 5 -> Bn STAs 6 and 7 -> C

Roaming

Mobile devices may move …

Page 23: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

23

Roaming

Mobile devices may move …n Beyond the coverage area of the AP

Roaming

Mobile devices may move …n Beyond the coverage area of the APn But within range of another AP

Page 24: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

24

Roaming

Mobile devices may move …n Beyond the coverage area of the APn But within range of another AP

Re-association allows STA to continue operation

Roaming Approach

STA decides that link to current AP is too weakSTA uses scanning to find another APn Or uses information from previous scans

STA sends re-association request to new APIf re-association response successfuln STA has roamed to new APn Else scans for another AP

If AP accepts re-association requestn AP indicates re-association to the DSn DS information is updated

n Normally old AP is notified through DS

Page 25: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

25

ScanningScanning required for many functionsn Finding and joining a networkn Finding a new AP while roamingn Initializing an IBSS (ad hoc) network

802.11 MAC uses a common mechanism for all PHYn Single/multiple channeln Passive/active scanning

Passive scanningn Find networks simply by listening for beacons

Active scanningn On each channel, send probe and wait for response

Beacon or probe response contains information needed to join the network

Roaming

Initial connection to an AP

Page 26: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

26

Roaming

Initial connection to an AP

Roaming

Initial connection to an AP

Page 27: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

27

Roaming

Initial connection to an AP

Roaming

Initial connection to an AP

Page 28: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

28

Roaming

Initial connection to an APn Re-association follows a similar process

MAC Management FramesBeaconn Timestamp, beacon interval, capabilities, ESSID, supported

rates, parametersn TIM

Proben ESSID, capabilities, supported rates

Probe responsen Timestamp, beacon interval, capabilities, ESSID, supported

rates, parametersn Same as beacon except for TIM

Association requestn Capabilities, listen interval, ESSID, supported rates

Association responsen Capabilities, status code, STA ID, supported rates

Page 29: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

29

More MAC Management FramesRe-association requestn capabilities, listen interval, ESSID, supported

rates, current AP address

Re-association responsen capabilities, status code, STA ID, supported ratesDisassociationn Reason code

Authenticationn Algorithm, sequence, status, challenge text

De-authenticationn Reason

HIPERLAN & HIPERLAN/2

ETSI’s Project BRANn High performance radio LANn Frequency band: 5.2GHz U-NIIn Ver. 1 (1997): 23.5Mbpsn Ver. 2 (2000): 54MbpsComponents:n Distribution System (DS)n Access Point (AP)n Mobile Terminal (MT)

Page 30: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

30

HIPERLAN & HIPERLAN/2PHYn OFDM (like 802.11a and g)

MACn TDMA/TDDn Under control of an AP or CC (central

controller, regular MT acting as AP)n Transmission through AP/CC or directly

between MT’sn Better QoS provisioning

IEEE 802.15 Working Group

Personal Area Network (PAN)n Communication within a persons operating

spaceIEEE 802.15.1 – BluetoothIEEE 802.15.3a – High data rate (UWB)IEEE 802.15.4 – Low energy (ZigBee)(802.15.2 – interoperability between

802.15 and 802.11)

Page 31: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

31

Bluetooth

Originally by Ericsson 1994Cable replacementn Short-range (~m)n Low data rate (<1Mbps)n Low power (~40mA/0.2mA)Bluetooth Special Interest Group (SIG)n 1998 – started with 5 companiesw Ericsson, Nokia, IBM, Toshiba, Intel

n Now – thousands

Bluetooth

Page 32: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

32

Bluetooth PHY

2.4 GHz ISM bandModulation - GFSKFrequency hoppingn Over 79 1MHz carriers world wide (except

for France, Spain and Japan – 23 carriers)n 1600/sec (dwell time = 625µs)Long repetition interval of frequency-

hop sequencen Over 23 hours

Piconet – Basic TopologyStar shape1 master node controls

up to 7 active slave nodesn And controls up to 255

parked nodes (in energy save mode)

All nodes follow the same hopping sequence as the master

Page 33: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

33

Links in Piconet – TDD/TDMASCO – synchronous connection orientedn Period negotiated with mastern Supports symmetric, circuit -switched connectionsn Usually for voice

ACL – asynchronous connectionlessn Master polls each slaven Slave responds immediatelyn Response can take 1, 3, or 5 slots

ScatternetPiconets interconnectedn Slave in multiple piconetsn Master also a slaveNodes in the same

piconet hop with the masterInter-piconet

communication not specified in specification

Page 34: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

34

IEEE 802.15.3 – UWB

High data rate WPANUWBMotivation: The need for higher

bandwidths than currently supported by 802.15.1n 100 Mpbs within 10 metern 400 Mpbs within 5 meterData, High quality TV, Home cinema

IEEE 802.15.4 & ZigBeeShort rangen <30mLow rate n < 250kbpsLow power consumptionn Attractive for sensor networking

Frequency Bands of Operationn 16 channels in 2.4GHzn 10 channels in 915MHzn 1 channel in the European 868MHz band

Page 35: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

35

Selected Comparisons

Low power

Interoperability

Data rate

Stronghold

Sensor networks, remote control

34KB30mA TX.356mA ST

<=250kbpsZigBee

Cable replacement: wireless USB & headset

~100KB40mA TX0.2mA ST

<1MbpsBluetooth

Internet, PC networking

100+KB400mA TX20mA ST

<=54MbpsWi-Fi

ApplicationsProtocol stack size

PowerBandwidthStandard

IEEE 802.16 WiMAX

Broadband MANIEEE 802.16an Wireless last-mile alternativen stationary subscribers, e.g. transceivers mounted

on top of business or residential buildingsn 2-10GHzn Supports thousands of users simultaneouslyn TDMA+OFDM / OFDMA

IEEE 802.16en Support low speed mobile users

Page 36: Enabling Technologies - cs.mun.cayzchen/teaching/whu_2006/Enablers.pdfLogic Layer Control (LLC) – 802.2 Medium Access Control (MAC) PHY FH, DS, IR Data link layer Physical layer

36

IEEE 802.20 Mobile Broadband

Supports mobile users at very high speedn <= 250 km/hr

Operates in licensed 500MHz~3.5GHz bandData rate <= 1Mbps

Other Issues and Techniques

QoS and fairnessDirectional antenna and DMACMulti-channels