Wireless Data Outline History Technology overview
-
Upload
johnsondon -
Category
Documents
-
view
1.018 -
download
4
description
Transcript of Wireless Data Outline History Technology overview
Wireless DataWireless Data
OutlineOutline HistoryHistory Technology overviewTechnology overview Cellular communicationsCellular communications
1G1G: AMPS; : AMPS; 2G2G: GSM; : GSM; 2.5G2.5G: GPRS, EDGE; : GPRS, EDGE; 3G3G: UMTS: UMTS Satellite systemsSatellite systems Wireless LANWireless LAN
802.11, Bluetooth802.11, Bluetooth Mobility supportMobility support
WAPWAP Wireless applicationsWireless applications
HistoryHistory
Local Area Networks (LANS)Local Area Networks (LANS) LAN is a fast (~Mb/s), geographically limited LAN is a fast (~Mb/s), geographically limited
(~km) digital communications network which is (~km) digital communications network which is owned and operated by the user organization.owned and operated by the user organization.
History of LANsHistory of LANs Packet radio networks (Aloha and Slotted Aloha in Packet radio networks (Aloha and Slotted Aloha in
HawaiiHawaii EthernetEthernet
The first LAN was an early version Ethernet in 1976, ~ 3 The first LAN was an early version Ethernet in 1976, ~ 3 Mb/sMb/s
Digital-Intel-Xerox “DIX specification in 1979, 10 Mb/.sDigital-Intel-Xerox “DIX specification in 1979, 10 Mb/.s Ethernet 2 in 1982 Ethernet 2 in 1982
LAN StandardsLAN Standards
Aloha NetAloha Net
One of the first functioning One of the first functioning wireless networkswireless networks in the USA, conceived and implemented at the in the USA, conceived and implemented at the University of HawaiiUniversity of Hawaii campus at Manoa. campus at Manoa.
Its purpose was to link the University Its purpose was to link the University mainframemainframe computer to client computers computer to client computers located on outer islands at University located on outer islands at University campuses. Put in place in the early 1970s, it campuses. Put in place in the early 1970s, it was dubed the Aloha Net. was dubed the Aloha Net. Key punchKey punch cards cards were fed through a reader, and sent over the were fed through a reader, and sent over the commercial phone linescommercial phone lines
Aloha SystemAloha System
First random access system (1971). First random access system (1971). Allowed 7 campuses on 4 islands to access Allowed 7 campuses on 4 islands to access
main computer with terrestrial microwave. main computer with terrestrial microwave. Each station has an FM Each station has an FM
transmitter/receiver. transmitter/receiver. No direct communication between stations. No direct communication between stations. 407.35 MHz for inbound traffic. 407.35 MHz for inbound traffic. Employs Employs
random access.random access. 413.475 MHz for outbound traffic. 413.475 MHz for outbound traffic.
9600 bps transmission speed. 9600 bps transmission speed.
The Pure ALOHA The Pure ALOHA Protocol:Protocol:
Each station is coupled to a single broadcast Each station is coupled to a single broadcast channel. channel.
Station transmits whenever it has a packet to Station transmits whenever it has a packet to send. send.
If there isn't a collision, receiver sends an If there isn't a collision, receiver sends an ackack over a separate channel. over a separate channel.
If there is a collision, no ack is sent and If there is a collision, no ack is sent and transmitter transmitter times outtimes out. Time-out interval is at . Time-out interval is at least as long as 2-way propagation time. least as long as 2-way propagation time.
Station retransmits after Station retransmits after randomrandom amount of amount of time. time.
Slotted ALOHA:Slotted ALOHA:
Packets have equal length of L bits. Packet time is TRANSP = Packets have equal length of L bits. Packet time is TRANSP = L/R seconds, where R is the transmission rate of the channel. L/R seconds, where R is the transmission rate of the channel.
Time is divided into fixed-length slots of length TRANSP. Time is divided into fixed-length slots of length TRANSP. Clocks in stations are synchronized. Clocks in stations are synchronized.
A station can begin transmission only at the beginning of a A station can begin transmission only at the beginning of a slot. slot.
The The efficiencyefficiency of slotted ALOHA is the fraction of slots of slotted ALOHA is the fraction of slots containing successful transmissions when there are many containing successful transmissions when there are many stations and each station has many packets to send. stations and each station has many packets to send.
The maximum efficiency of slotted ALOHA is 1/e = .37. This The maximum efficiency of slotted ALOHA is 1/e = .37. This gives gives 37% successes 37% successes 37% empty slots 37% empty slots 26% collisions 26% collisions
ThroughputThroughput in bits/sec is R * efficiency. in bits/sec is R * efficiency.
Invention of EthernetInvention of Ethernet
““In late 1972, Metcalfe and his Xerox PARC In late 1972, Metcalfe and his Xerox PARC colleagues developed the first experimental colleagues developed the first experimental Ethernet system to interconnect the Xerox Alto, a Ethernet system to interconnect the Xerox Alto, a personal workstation with a graphical user personal workstation with a graphical user interface. interface.
The experimental Ethernet was used to link Altos The experimental Ethernet was used to link Altos to one another, and to servers and laser printers. to one another, and to servers and laser printers.
The signal clock for the experimental Ethernet The signal clock for the experimental Ethernet interface was derived from the Alto's system interface was derived from the Alto's system clock, which resulted in a data transmission rate clock, which resulted in a data transmission rate on the experimental Ethernet of 2.94 Mbps. on the experimental Ethernet of 2.94 Mbps.
Invention of EthernetInvention of Ethernet
Metcalfe's first experimental network was called the Metcalfe's first experimental network was called the Alto Aloha Network. In 1973 Metcalfe changed the Alto Aloha Network. In 1973 Metcalfe changed the name to "Ethernet," to make it clear that the system name to "Ethernet," to make it clear that the system could support any computer--not just Altos--and to could support any computer--not just Altos--and to point out that his new network mechanisms had point out that his new network mechanisms had evolved well beyond the Aloha system. evolved well beyond the Aloha system.
He chose to base the name on the word "ether" as a He chose to base the name on the word "ether" as a way of describing an essential feature of the system: way of describing an essential feature of the system: the physical medium (i.e., a cable) carries bits to all the physical medium (i.e., a cable) carries bits to all stations, much the same way that the old stations, much the same way that the old "luminiferous ether" was once thought to propagate "luminiferous ether" was once thought to propagate electromagnetic waves through space. Thus, Ethernet electromagnetic waves through space. Thus, Ethernet was born.” was born.”
Invention of EthernetInvention of Ethernet
The diagram ... was The diagram ... was drawn by Dr. Robert drawn by Dr. Robert M. Metcalfe in 1976 M. Metcalfe in 1976 to present to present Ethernet ... to the Ethernet ... to the National Computer National Computer Conference in June Conference in June of that year. On the of that year. On the drawing are the drawing are the original terms for original terms for describing Ethernet.describing Ethernet.
Ethernet Topologies and Ethernet Topologies and ProtocolsProtocols
Traditional Ethernet employs a Traditional Ethernet employs a busbus topology, meaning that all devices or topology, meaning that all devices or hostshosts on the network use the same on the network use the same shared communication line. Each shared communication line. Each device possesses an Ethernet address, device possesses an Ethernet address, also known as also known as MAC addressMAC address. Sending . Sending devices use Ethernet addresses to devices use Ethernet addresses to specify the intended recipient of specify the intended recipient of messages. messages.
Ethernet Topologies and Ethernet Topologies and ProtocolsProtocols
Data sent over the Ethernet exists in Data sent over the Ethernet exists in the forms of the forms of framesframes. An Ethernet . An Ethernet frame contains a header, a data frame contains a header, a data section, and a footer having a section, and a footer having a combined length of no more than combined length of no more than 1518 bytes. The Ethernet header 1518 bytes. The Ethernet header contains the addresses of both the contains the addresses of both the intended recipient and the sender. intended recipient and the sender.
Ethernet Topologies and Ethernet Topologies and ProtocolsProtocols
Data sent over the Ethernet is Data sent over the Ethernet is automatically automatically broadcastbroadcast to all devices to all devices on the network. By comparing their on the network. By comparing their Ethernet address against the address in Ethernet address against the address in the frame header, each Ethernet device the frame header, each Ethernet device tests each frame to determine if it was tests each frame to determine if it was intended for them and reads or discards intended for them and reads or discards the frame as appropriate. Network the frame as appropriate. Network adapters incorporate this function into adapters incorporate this function into their hardware. their hardware.
Ethernet Topologies and Ethernet Topologies and ProtocolsProtocols
There are four major types of media in use today: Thickwire, thin There are four major types of media in use today: Thickwire, thin coax, unshielded twisted pair (UTP), and fiber optic.coax, unshielded twisted pair (UTP), and fiber optic.
Ethernet media are used in two basic topologies called "bus" and Ethernet media are used in two basic topologies called "bus" and "star". The topology defines how a node (which is any device such as "star". The topology defines how a node (which is any device such as a computer, printer, or hub) is connected to the network.a computer, printer, or hub) is connected to the network.
A bus topology consists of nodes connected together by a single long A bus topology consists of nodes connected together by a single long cable. Each node "taps" into the bus and directly communicates with cable. Each node "taps" into the bus and directly communicates with all other nodes on the bus. The major advantage of this topology is all other nodes on the bus. The major advantage of this topology is the easy expansion, by adding extra "taps", and the lack a hub. The the easy expansion, by adding extra "taps", and the lack a hub. The major disadvantage is that any break in the cable will cause all nodes major disadvantage is that any break in the cable will cause all nodes on the cable to loose connection to the network.on the cable to loose connection to the network.
A star topology links exactly two nodes together on the network. A A star topology links exactly two nodes together on the network. A hub is used to collection point where many of the connections come hub is used to collection point where many of the connections come together. The major advantage is any single break only disables one together. The major advantage is any single break only disables one host. The major disadvantage is the added cost of a hub. host. The major disadvantage is the added cost of a hub.
Ethernet Topology ChangesEthernet Topology Changes
Ethernet TopologyEthernet Topology
Ethernet TopologyEthernet Topology
Ethernet Packet FormatEthernet Packet Format
preamblestartframe
sourceadrs
destadrs
datapayload
length paddingCRC
Wireless LANsWireless LANs
Why Wireless?Why Wireless? Human freedomHuman freedom
Portability v. MobilityPortability v. Mobility Objective: “anything, anytime, anywhere”Objective: “anything, anytime, anywhere” MobilityMobility
Size, weight, powerSize, weight, power FunctionalityFunctionality ContentContent
Infrastructure requiredInfrastructure required CostCost
Capital, operationalCapital, operational
The m-Commerce The m-Commerce “Revolution”“Revolution”
1.1. High mobile phone penetration: 4 per PC worldwide High mobile phone penetration: 4 per PC worldwide
2.2. Convergence of the Internet and the mobile Convergence of the Internet and the mobile phone phone
3.3. Transition to 3rd Generation Transition to 3rd Generation 4.4. Personalization, location- & context-sensitive Personalization, location- & context-sensitive
applications and services applications and services
Wireless Subscribers Wireless Subscribers WorldwideWorldwide
(in millions)
Year0
200
400
600
800
1000
1200
1400
1600
1800
1995 2000 2005 2010
Rest of World Asia Pacific North America
European Union
SOURCE: UMTS FORUM
Electromagnetic SpectrumElectromagnetic Spectrum
SOURCE: JSC.MIL
SOUND LIGHTRADIO HARMFUL RADIATION
VHF = VERY HIGH FREQUENCYUHF = ULTRA HIGH FREQUENCYSHF = SUPER HIGH FREQUENCY EHF = EXTRA HIGH FREQUENCY
4G CELLULAR56-100 GHz
3G CELLULAR1.5-5.2 GHz
1G, 2G CELLULAR0.4-1.5GHz
Wireless TelephonyWireless Telephony
SOURCE: IEC.ORG
AIR LINK
PUBLIC SWITCHEDTELEPHONE NETWORK
WIRED
Cell ClustersCell Clusters
SOURCE: IEC.ORG
ACTUAL COVERAGEAREA OF CELL 1
ACTUAL COVERAGEAREA OF CELL 3
CELL 1 OVERLAPS 6 OTHERS
DIFFERENT FREQUENCIESMUST BE USED IN ADJACENTCELLS
SEVEN DIFFERENT SETS OFFREQUENCIES REQUIRED
Space Division Multiple Space Division Multiple Access (SDMA)Access (SDMA)
PATTERN CAN BEREPLICATED OVERTHE ENTIRE EARTH
200 FREQUENCIESIN ONE CELL
TOTAL NUM BER OFFREQUENCIES = 1400
WORLDWIDE
MANY CELLS CAN SHARESAME FREQUENCIES IFSEPARATED IN SPACE
Cell HandoverCell Handover
SOURCE: R. C. LEVINE, SMU
AS PHONE MOVES FROM CELL “A” TO CELL “B”: • CELL “A” MUST HAND THE CALL OVER TO “B” • PHONE MUST CHANGE FREQUENCIES • CELL “A” MUST STOP TRANSMITTING
Minimum performancecontour
Handover thresholdcontour
A Bx y
z
Cell SizesCell SizesMACROCELL: $1M
MICROCELL: $250K
SLOW-MOVINGSUBSCRIBERS
FAST-MOVINGSUBSCRIBERS
PICOCELLS
GSM: 100m - 50 km 250 km/hr
Multiple AccessMultiple Access
SOURCE: WASHINGTON UNIV.
Frequency Division Code DivisionTime Division
Cellular GenerationsCellular Generations FirstFirst
Analog, circuit-switched (AMPS)Analog, circuit-switched (AMPS) SecondSecond
Digital, circuit-switched (GSM, Palm) 10 KbpsDigital, circuit-switched (GSM, Palm) 10 Kbps Advanced secondAdvanced second
Digital, Digital, circuit switchedcircuit switched, Internet-enabled (WAP) , Internet-enabled (WAP) 10 Kbps10 Kbps
2.52.5 Digital, Digital, packet-switchedpacket-switched, , TDMATDMA (GPRS, EDGE) (GPRS, EDGE)
40-400 Kbps40-400 Kbps ThirdThird
Digital, Digital, packet-switchedpacket-switched, , wideband CDMAwideband CDMA (UMTS) (UMTS)0.4 – 2 Mbps0.4 – 2 Mbps
FourthFourth Data rate 100 Mbps; achieves “telepresence”Data rate 100 Mbps; achieves “telepresence”
GSM ArchitectureGSM Architecture
SOURCE: UWC
LIST OFROAMINGVISITORS
LIST OF SUBSCRIBERSIN THIS AREA
STOLEN, BROKENCELLPHONE LIST
ENCRYPTION,AUTHENTICATION
INTERFACE TO LANDTELEPHONE NETWORKS
HIERARCHYOF CELLS
CELL TRANSMITTER& RECEIVER
PHONE
SIM:IDENTIFIES ASUBSCRIBER
DATA RATE: 9.6 Kbps
GSM Frame StructureGSM Frame Structure
SOURCE: DANIEL ROLF
From GSM to UMTSFrom GSM to UMTS
HSCSD = High Speed Circuit Switched Data
GPRS = General Packet Radio System
EDGE = Enhanced Data Rates for GSM Evolution
UMTS = UniversalMobile TelecommSystem
HSCSD = High Speed Circuit Switched Data
GPRS = General Packet Radio System
EDGE = Enhanced Data Rates for GSM Evolution
UMTS = UniversalMobile TelecommSystem
SOURCE: HPY
1999 2000 2001 2002 2003
HSCSD
GPRS
EDGE
UMTS
64
170
384
2000
kbit/s
43.2
CIRCUITSW ITCHED
PACKETSW ITCHED
BUILT ON TOPOF GSM
VoIP
WCDMA
TECHNOLOGY
GMSK
GMSK
8 PSK
UMTSUMTS Universal Mobile Telecommunications SystemUniversal Mobile Telecommunications System Data at 2 megabits (> T1) but only indoorsData at 2 megabits (> T1) but only indoors Outdoors same as EDGE (384 Kbps)Outdoors same as EDGE (384 Kbps) Arthur Andersen says no wireless app needs Arthur Andersen says no wireless app needs
more than 300 Kbps. WRONG!more than 300 Kbps. WRONG! Based on WCDMA (wideband CDMA)Based on WCDMA (wideband CDMA) Huge spectrum license costsHuge spectrum license costs
UK 40B€; German 50B€UK 40B€; German 50B€ GSM to EDGE costs 7% of GSM investmentGSM to EDGE costs 7% of GSM investment GSM to UMTS costs 200-300% of GSM GSM to UMTS costs 200-300% of GSM
investmentinvestment SOURCE: WAPLAND
UMTSUMTS ITU open standard: IMT-2000ITU open standard: IMT-2000 Includes satellitesIncludes satellites Different countries use different air Different countries use different air
interfacesinterfaces UMTS Subscriber Identity Module (USIM)UMTS Subscriber Identity Module (USIM)
operating system software for any UMTS operating system software for any UMTS
devicedevice graphic files, electronic signature data, graphic files, electronic signature data,
personal files, fingerprints and biometric data.personal files, fingerprints and biometric data.
SOURCE: WAPLAND
General Packet Radio Service General Packet Radio Service (GPRS) (GPRS)
General Packet Radio Service (GPRS) is a General Packet Radio Service (GPRS) is a new service designed for digital cellular new service designed for digital cellular networks (GSM-Global System for Mobile networks (GSM-Global System for Mobile Communications, DCS, PCS). Communications, DCS, PCS).
It utilises a packet radio principle and can It utilises a packet radio principle and can be used for carrying end user’s packet data be used for carrying end user’s packet data protocol (such as IP and X.25) information protocol (such as IP and X.25) information from/to a GPRS terminals to/from other from/to a GPRS terminals to/from other GPRS terminals and/or external packet data GPRS terminals and/or external packet data networks. networks.
GPRS is standardised in ETSI (European GPRS is standardised in ETSI (European Telecommunications Standards Institute).Telecommunications Standards Institute).
General Packet Radio Service General Packet Radio Service (GPRS) (GPRS)
GPRS uses a packet-mode technique to GPRS uses a packet-mode technique to transfer high-speed and low-speed data and transfer high-speed and low-speed data and signalling in an efficient manner over GSM signalling in an efficient manner over GSM radio networks. GPRS optimises the use of radio networks. GPRS optimises the use of network resources and radio resources. network resources and radio resources. Strict separation between the radio Strict separation between the radio subsystem and network subsystem is subsystem and network subsystem is maintained, allowing the network subsystem maintained, allowing the network subsystem to be reused with other radio access to be reused with other radio access technologies. GPRS does not mandate technologies. GPRS does not mandate changes to an installed MSC base.changes to an installed MSC base.
General Packet Radio Service General Packet Radio Service (GPRS) (GPRS)
GPRS is designed to support from GPRS is designed to support from intermittent and bursty data transfers intermittent and bursty data transfers through to occasional transmission of through to occasional transmission of large volumes of data. Four different large volumes of data. Four different quality of service levels are supported. quality of service levels are supported. GPRS is designed for fast reservation to GPRS is designed for fast reservation to begin transmission of packets, typically begin transmission of packets, typically 0,5 to 1 second. Charging will typically 0,5 to 1 second. Charging will typically be based on the amount of data be based on the amount of data transferred. transferred.
General Packet Radio Service General Packet Radio Service (GPRS) (GPRS)
GPRS introduces the following two new major GPRS introduces the following two new major network elements:network elements: SGSN—Sends data to and receives data from mobile SGSN—Sends data to and receives data from mobile
stations, and maintains information about stations, and maintains information about thelocation of a mobile station (MS). The SGSN thelocation of a mobile station (MS). The SGSN communicates between the MS and the GGSN. SGSNcommunicates between the MS and the GGSN. SGSN
GGSN—A wireless gateway that allows mobile cell GGSN—A wireless gateway that allows mobile cell phone users to access the public data networkphone users to access the public data network
(PDN) or specified private IP networks. The GGSN (PDN) or specified private IP networks. The GGSN function is implemented on the Cisco Systems’ function is implemented on the Cisco Systems’ router.router.
GPRS Network GPRS Network ComponentsComponents
General Packet Radio Service General Packet Radio Service (GPRS) (GPRS)
User sessions are connected from a User sessions are connected from a mobile station to a Base Transceiver mobile station to a Base Transceiver Station (BTS), to a Base Station Station (BTS), to a Base Station Controller (BSC). The combined Controller (BSC). The combined functions of the BTS and BSC are functions of the BTS and BSC are referred to as the Base Station referred to as the Base Station Subsystem (BSS). From there, the SGSN Subsystem (BSS). From there, the SGSN provides access to the GGSN, which provides access to the GGSN, which serves as the gateway to the data serves as the gateway to the data network.network.
Satellite SystemsSatellite Systems
SOURCE: WASHINGTON UNIV.
GEO
M EO
LEO
GEO (22,300 mi., equatorial) high bandwidth, power, latencyMEO high bandwidth, power, latencyLEO (400 mi.) low power, latency more satellites small footprintV-SAT (Very Small Aperture) private WAN
GPS Satellite ConstellationGPS Satellite Constellation
• Global Positioning System• Operated by USAF• 25 satellites• 6 orbital planes at a height of 20,200 km• Positioned so a minimum of 5 satellites are visible at all times• Receiver measures distance to satellite
SOURCE: NAVSTAR
Automatic Vehicle Location Automatic Vehicle Location (AVL)(AVL)
SOURCE: TRIMBLE NAVIGATION
Benefits of AVL• Fast dispatch• Customer service• Safety, security• Digital messaging• Dynamic route optimization• Driver complicance
Sample AVL Users• Chicago 911• Inkombank, Moscow• Taxi companies
GPS and Auto InsuranceGPS and Auto Insurance Need to rate drivers accuratelyNeed to rate drivers accurately
age, residence and driving record not enoughage, residence and driving record not enough driving after midnight is 10 TIMES as risky as at 8:00 driving after midnight is 10 TIMES as risky as at 8:00
a.m.a.m. commuting is the safest kind of drivingcommuting is the safest kind of driving parking in high-crime neighborhoods increases payoutparking in high-crime neighborhoods increases payout
Progressive Insurance (Mayfield, Ohio)Progressive Insurance (Mayfield, Ohio) ““Autograph” policy: car is outfitted with GPS, cellular Autograph” policy: car is outfitted with GPS, cellular
modem, microprocessor + 256KB memorymodem, microprocessor + 256KB memory When ignition is turned on, car records location every six When ignition is turned on, car records location every six
minutesminutes Once a month, uploaded to Progressive by cellphoneOnce a month, uploaded to Progressive by cellphone
GPS and Auto InsuranceGPS and Auto Insurance Customer is billed retrospectively every monthCustomer is billed retrospectively every month
25-50% savings in premiums25-50% savings in premiums Increases Progressive’s share but also gives Increases Progressive’s share but also gives
them the them the rightright share (safe drivers) share (safe drivers)
Location-Aware Location-Aware ApplicationsApplications
Vehicle trackingVehicle tracking Firemen in buildings, vital signs, Firemen in buildings, vital signs,
oxygen remainingoxygen remaining Asset trackingAsset tracking BaggageBaggage Shoppers assistanceShoppers assistance RobotsRobots Corporate visitorsCorporate visitors
Problem: how to obtain data from physical Problem: how to obtain data from physical objectsobjects Examples: product ID, price, serial numberExamples: product ID, price, serial number
Bar codeBar code two-dimensional two-dimensional
Magnetic stripe cardMagnetic stripe card Smart cardSmart card Radio Frequency Identification (RFID)Radio Frequency Identification (RFID) Real-Time Locating Systems (RTLS)Real-Time Locating Systems (RTLS)
Automatic IdentificationAutomatic Identificationand Data Capture (AIDC)and Data Capture (AIDC)
WAND READER
TAGRFID CIRCUIT
AIDC ApplicationsAIDC Applications Highway toll collectionHighway toll collection Freight containersFreight containers Animal identificationAnimal identification Theft detectionTheft detection Inventory, asset managementInventory, asset management Traffic controlTraffic control Gas station billingGas station billing
SOURCE: TSS
Java RingJava Ring
Java-enabled iButtonJava-enabled iButton Communicates by contact at 142 KbpsCommunicates by contact at 142 Kbps 64 KB ROM and 134 KB RAM64 KB ROM and 134 KB RAM Stores 30 digital certificates with 1024-bit keysStores 30 digital certificates with 1024-bit keys Uses: authentication, epayment, accessUses: authentication, epayment, access Cost: $15-30 in unit quantityCost: $15-30 in unit quantity
SOURCE: IBUTTON.COM
Wireless LANWireless LAN Idea: just a LAN, but without wiresIdea: just a LAN, but without wires Not as easy since signals are of limited range Not as easy since signals are of limited range Uses unlicensed frequencies, low powerUses unlicensed frequencies, low power 2.4 GHz2.4 GHz
IEEE 802.11 IEEE 802.11 (wireless ethernet)(wireless ethernet) 802.11a standard (new)802.11a standard (new)
Capable of 54 mb/sCapable of 54 mb/s 802.11b standard - most common form802.11b standard - most common form
Capable of 11 mb/sCapable of 11 mb/s 5.2 GHz5.2 GHz
OFDM (orthogonal FDMA) modem technology (30 OFDM (orthogonal FDMA) modem technology (30 Mbps)Mbps) IEEE 802.11 IEEE 802.11
BluetoothBluetooth
Wireless LAN ComponentsWireless LAN Components
SOURCE: LUCENT
WavePOINT IITransmitter
ExtendedRange
Antenna
EthernetConverter
11 Mbps WaveLANPCMCIA Card
WaveLAN ISA(Industry StandardArchitecture) Card
Wireless LAN Wireless LAN ConfigurationsConfigurations
SOURCE: PROXIM.COM
WIRELESS PEER-TO-PEERCLIENT AND ACCESS POINT
MULTIPLE ACCESS POINTS + ROAMING
BRIDGING WITHDIRECTIONAL ANTENNAS
UP TO 17 KM !
BluetoothBluetooth A standard permitting for wireless A standard permitting for wireless connection of:connection of:
Personal computersPersonal computers PrintersPrinters Mobile phonesMobile phones Handsfree headsetsHandsfree headsets LCD projectorsLCD projectors ModemsModems Wireless LAN devicesWireless LAN devices NotebooksNotebooks Desktop PCsDesktop PCs PDAs PDAs
What is Bluetooth?What is Bluetooth?
A short-range wireless technologyA short-range wireless technology
Designed for several needsDesigned for several needs Interconnecting a computer and peripheralsInterconnecting a computer and peripherals
Clear the snake’s nest behind the desk!Clear the snake’s nest behind the desk! Interconnecting various handheld devicesInterconnecting various handheld devices
Laptop computer, cell phone, palmtopLaptop computer, cell phone, palmtop Preplanning of network is impracticalPreplanning of network is impractical
Any short-range application where low cost is essentialAny short-range application where low cost is essential Goal: $5 parts costGoal: $5 parts cost
Intended to be embedded in other devicesIntended to be embedded in other devices What it is notWhat it is not
Another wireless LANAnother wireless LAN
Bluetooth CharacteristicsBluetooth Characteristics Operates in the 2.4 GHz Industrial-Scientific-Medical (ISM)Operates in the 2.4 GHz Industrial-Scientific-Medical (ISM) (unlicensed)! band. Packet switched. 1 milliwatt. Low (unlicensed)! band. Packet switched. 1 milliwatt. Low cost.cost.
10m to 100m range 10m to 100m range Uses Frequency Hop (FH) spread spectrum, which dividesUses Frequency Hop (FH) spread spectrum, which divides the frequency band into a number of hop channels. During the frequency band into a number of hop channels. During connection, devices hop from one channel to another 1600 connection, devices hop from one channel to another 1600 times per second times per second
Bandwidth 1-2 megabits/secondBandwidth 1-2 megabits/second Supports up to 8 devices in a piconet (two or more Supports up to 8 devices in a piconet (two or more BluetoothBluetooth units sharing a channel). units sharing a channel).
Built-in security. Built-in security. Non line-of-sight transmission through walls and briefcases. Non line-of-sight transmission through walls and briefcases. Easy integration of TCP/IP for networking. Easy integration of TCP/IP for networking.
What is Bluetooth? What is Bluetooth?
What does Bluetooth do for What does Bluetooth do for me?me?
Where Did the Name Come Where Did the Name Come From?From?
Harald Blaatand “Bluetooth” IIHarald Blaatand “Bluetooth” II King of Denmark 940-981King of Denmark 940-981 Son of Gorm the Old (King of Denmark) and Thyra Danebod (daughter of King Ethelred of England)Son of Gorm the Old (King of Denmark) and Thyra Danebod (daughter of King Ethelred of England)
Noted for unifying Denmark and SwedenNoted for unifying Denmark and Sweden This is one of two Runic stones erected in his capitol city of Jelling (central Jutland)This is one of two Runic stones erected in his capitol city of Jelling (central Jutland)
This is the front of the stone depicting the chivalry of Harald.This is the front of the stone depicting the chivalry of Harald. The stone’s inscription (“runes”) say:The stone’s inscription (“runes”) say: Harald christianized the DanesHarald christianized the Danes Harald controlled Denmark and NorwayHarald controlled Denmark and Norway Harald thinks notebooks and cellular phones should seamlessly communicateHarald thinks notebooks and cellular phones should seamlessly communicate
Bluetooth DevicesBluetooth Devices
NOKIA 9110 + FUJIDIGITAL CAMERA
ERICSSONCOMMUNICATOR
ERICSSON R520GSM 900/1800/1900
ALCATELOne TouchTM 700
GPRS, WAP ERICSSONBLUETOOTHCELLPHONE
HEADSET
Connected PCConnected PCConnected Connected FamiliesFamilies
Home and Office of the Home and Office of the FutureFuture
Internet Pipe
Mobile display padElectronic Program guideRead & set security systemHome Theater controlDisplay News headlines
Grandma’sGrandma’s3 cups flour3 cups flour1 cup grated chocolate1 cup grated chocolate1 cup sugar1 cup sugar1 stick butter1 stick butter1/2 cup chopped walnuts1/2 cup chopped walnutsminutes.minutes.
HOMEHOME INDEXINDEX
Fridge PadFamily CalendarRecipe DisplayBuild shopping listsVoice messagingIntercom
Cordless PhoneRemote Speech recognitionCall by nameBuild shopping listsHome PBX
Office LaptopConnect to office LANEmailHome Printer accessSurf from anywhereShare files
Grandma’s Brownies3 cups flour1 cup grated chocolate1 cup sugar1 stick butter
Kids Room PCPrinter accessInternet accessFile access
Ethernet orHomePNA
Broadband
Main Home PC
Additional PC(s)
Family CarTrip Navigation downloadsDownload News/Entertainment
SOURCE: IEEE
Wireless Application Wireless Application SupportSupport
WAP (Wireless Application Protocol) and WAP (Wireless Application Protocol) and iModeiMode
High-level protocols that use cellular High-level protocols that use cellular transporttransport
WAP:WAP: Uses WML (Wireless Markup Language)Uses WML (Wireless Markup Language) Divides content into “cards” equal to one Divides content into “cards” equal to one
telephone screentelephone screen Simplified but incompatible form of HTMLSimplified but incompatible form of HTML To send to a WAP phone, must broadcast WML To send to a WAP phone, must broadcast WML
contentcontent
WAP ApplicationsWAP Applications
Web ContentServer
MobileTerminal
MobileNetwork
Internet
WAP Gateway
Non Mobile Internet User
DatabaseServer
SOURCE: DANETWAP simulator
iNexware
iModeiMode Telephone, pager, email, browser, Telephone, pager, email, browser,
location tracking, location tracking, bankingbanking, , airline ticketsairline tickets, , entertainment ticketsentertainment tickets, games, games
NTT DoCoMo (NTT DoCoMo ( ドコモ ドコモ means means “anywhere”) “anywhere”)
Japan is the wireless Internet leader:Japan is the wireless Internet leader:
SOURCE: EUROTECHNOLOGY JAPAN K.K.
iModeiMode Sits on top of packet voice/data transportSits on top of packet voice/data transport As of January 2001, > 18 million As of January 2001, > 18 million
subscriberssubscribers 50,000 new ones per day50,000 new ones per day
15% of Japan, 40% of DoCoMo users15% of Japan, 40% of DoCoMo users 1380 “official” sites, 665 application 1380 “official” sites, 665 application
partnerspartners 37,000 unofficial sites37,000 unofficial sites Fee based on data transmittedFee based on data transmitted
SOURCES: XML.COM, NTT
iModeiMode Phonetic text input (better for Japanese)Phonetic text input (better for Japanese) SLOW: 9.6 Kbps, but 3G will raise to 384 SLOW: 9.6 Kbps, but 3G will raise to 384
K in 2001K in 2001 Uses cHTML (compact HTML)Uses cHTML (compact HTML)
same rendering model as HTML (whole page same rendering model as HTML (whole page at a time)at a time)
low memory footprint (no tables or frames)low memory footprint (no tables or frames) Java port comingJava port coming Standby time: 400 min., device weight Standby time: 400 min., device weight
2.4 oz. (74g)2.4 oz. (74g)
SOURCES: XML.COM, NTT
iMode OperationiMode Operation
IP
DoCoMoDoCoMoPacketPacket
Network Network (PDC-P)(PDC-P)IP
INFOPROVIDER
INTERNET
iMode Servers
BILLINGDB
USERDB
PACKET DATAHTTP
SOURCE: SAITO & SHIN
Key TakeawaysKey Takeaways Mobile growing very rapidlyMobile growing very rapidly Cell systems need large infrastructureCell systems need large infrastructure Wireless LAN does notWireless LAN does not Content preparation is a problemContent preparation is a problem Wireless business models largely Wireless business models largely
unexploredunexplored Bandwidth, bandwidth, bandwidthBandwidth, bandwidth, bandwidth