Professional Documents
Culture Documents
• Example CSMA/CD
– Carrier Sense Multiple Access with Collision Detection
– send as soon as the medium is free, listen into the medium if a collision
occurs (original method in IEEE 802.3)
• Problems in wireless networks
– signal strength decreases proportional to the square of the distance
– the sender would apply CS and CD, but the collisions happen at the
receiver
– it might be the case that a sender cannot “hear” the collision, i.e., CD does
not work
– furthermore, CS might not work if, e.g., a terminal is “hidden”
• Hidden terminals
– A sends to B, C cannot receive A
– C wants to send to B, C senses a “free” medium (CS fails)
– collision at B, A cannot receive the collision (CD fails)
– A is “hidden” for C
A B C
• Exposed terminals
– B sends to A, C wants to send to another terminal (not A or B)
– C has to wait, CS signals a medium in use
– but A is outside the radio range of C, therefore waiting is not necessary
– C is “exposed” to B
A B C
f
960 MHz 124
20 MHz
915 MHz 124
1
890.2 MHz
t
fu = 890 MHz + i*0.2 MHz
FDD (frequency division duplex)
fd = fu + 45 MHz
417 µs
1 2 3 11 12 1 2 3 11 12
t
downlink uplink
sender A
sender B
sender C
t
• Slotted Aloha collision
sender A
sender B
sender C
t
collision
t
Aloha reserved Aloha reserved Aloha reserved Aloha
sender receiver
idle idle
• If one terminal can be heard by all others, this “central” terminal (a.k.a.
base station) can poll all other terminals according to a certain scheme
– now all schemes known from fixed networks can be used (typical
mainframe - terminal scenario)
• Sender A
– sends Ad = 1, key Ak = 010011 (assign: „0“= -1, „1“= +1)
– sending signal As = Ad * Ak = (-1, +1, -1, -1, +1, +1)
• Sender B
– sends Bd = 0, key Bk = 110101 (assign: „0“= -1, „1“= +1)
– sending signal Bs = Bd * Bk = (-1, -1, +1, -1, +1, -1)
• Both signals superimpose in space
– interference neglected (noise etc.)
– As + Bs = (-2, 0, 0, -2, +2, 0)
• Receiver wants to receive signal from sender A
– apply key Ak bitwise (inner product)
• Ae = (-2, 0, 0, -2, +2, 0) • Ak = 2 + 0 + 0 + 2 + 2 + 0 = 6
• result greater than 0, therefore, original bit was „1“
– receiving B
• Be = (-2, 0, 0, -2, +2, 0) • Bk = -2 + 0 + 0 - 2 - 2 + 0 = -6, i.e. „0“
data A Ad
1 0 1
key A
key
0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1 Ak
sequence A
data ⊕ key 1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
signal A
As
signal A As
data B 1 0 0 Bd
key B
key 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1 Bk
sequence B
1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
data ⊕ key
Bs
signal B
As + Bs
As + Bs
Ak
(As + Bs)
* Ak
integrator
output
comparator 1 0 1
output
As + Bs
Bk
(As + Bs)
* Bk
integrator
output
comparator 1 0 0
output
As + Bs
wrong
key K
(As + Bs)
*K
integrator
output
comparator
output (0) (0) ?
• Aloha has only a very low efficiency, CDMA needs complex receivers
to be able to receive different senders with individual codes at the
same time
• Idea: use spread spectrum with only one single code (chipping
sequence) for spreading for all senders accessing according to aloha
collision
sender A 1 0 1 narrow
sender B 0 1 1 band
send for a
shorter period
with higher power
spread the signal e.g. using the chipping sequence 110101 („CDMA without CD“)
Advantages very simple, increases established, fully simple, established, flexible, less frequency
capacity per km² digital, flexible robust planning needed, soft
handover
Dis- inflexible, antennas guard space inflexible, complex receivers, needs
advantages typically fixed needed (multipath frequencies are a more complicated power
propagation), scarce resource control for senders
synchronization
difficult
Comment only in combination standard in fixed typically combined still faces some problems,
with TDMA, FDMA or networks, together with TDMA higher complexity,
CDMA useful with FDMA/SDMA (frequency hopping lowered expectations; will
used in many patterns) and SDMA be integrated with
mobile networks (frequency reuse) TDMA/FDMA
• Advantages
– very flexible within the reception area
– Ad-hoc networks without previous planning possible
– (almost) no wiring difficulties (e.g. historic buildings, firewalls)
– more robust against disasters like, e.g., earthquakes, fire - or users pulling
a plug...
• Disadvantages
– typically very low bandwidth compared to wired networks
(1 - 10 Mbit/s)
– many proprietary solutions, especially for higher bit-rates, standards take
their time (e.g. IEEE 802.11)
– products have to follow many national restrictions if working wireless, it
takes a vary long time to establish global solutions like, e.g., IMT-2000
• Infrared • Radio
– uses IR diodes, diffuse light, – typically using the license free
multiple reflections (walls, ISM band at 2.4 GHz
furniture etc.) • Advantages
• Advantages – experience from wireless WAN
– simple, cheap, available in many and mobile phones can be used
mobile devices – coverage of larger areas possible
– no licenses needed (radio can penetrate walls,
– simple shielding possible furniture etc.)
• Disadvantages • Disadvantages
– interference by sunlight, heat – very limited license free frequency
sources etc. bands
– many things shield or absorb IR – shielding more difficult,
light interference with other electrical
– low bandwidth devices
• Example • Example
– IrDA (Infrared Data Association) – WaveLAN, HIPERLAN,
interface available everywhere Bluetooth
infrastructure
network
AP: Access Point
AP
AP wired network
AP
ad-hoc network
• Station (STA)
802.11 LAN – terminal with access mechanisms to
802.x LAN
the wireless medium and radio contact
to the access point
STA1 • Basic Service Set (BSS)
BSS1
– group of stations using the same radio
Access Portal
frequency
Point
• Access Point
Distribution System – station integrated into the wireless
LAN and the distribution system
Access
ESS Point • Portal
– bridge to other (wired) networks
BSS2 • Distribution System
– interconnection network to form one
logical network (EES: Extended
Service Set) based
STA2 802.11 LAN STA3 on several BSS
IBSS2
STA5
fixed
terminal
mobile terminal
infrastructure
network
access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
Station Management
LLC
DLC
PLCP
PHY
PHY Management
PMD
80 16 12 4 16 variable bits
synchronization SFD PLW PSF HEC payload
• Synchronization
– synch., gain setting, energy detection, frequency offset compensation
• SFD (Start Frame Delimiter)
– 1111001110100000
• Signal
– data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK)
• Service Length
– future use, 00: 802.11 compliant length of the payload
• HEC (Header Error Check)
– protection of signal, service and length, x16 + x12 + x5 + 1
• Traffic services
– Asynchronous Data Service (mandatory)
• exchange of data packets based on “best-effort”
• support of broadcast and multicast
– Time-Bounded Service (optional)
• implemented using PCF (Point Coordination Function)
• Access methods
– DFWMAC-DCF CSMA/CA (mandatory)
• collision avoidance via randomized „back-off“ mechanism
• minimum distance between consecutive packets
• ACK packet for acknowledgements (not for broadcasts)
– DFWMAC-DCF w/ RTS/CTS (optional)
• Distributed Foundation Wireless MAC
• avoids hidden terminal problem
– DFWMAC- PCF (optional)
• access point polls terminals according to a list
• Priorities
– defined through different inter frame spaces
– no guaranteed, hard priorities
– SIFS (Short Inter Frame Spacing)
• highest priority, for ACK, CTS, polling response
– PIFS (PCF IFS)
• medium priority, for time-bounded service using PCF
– DIFS (DCF, Distributed Coordination Function IFS)
• lowest priority, for asynchronous data service
DIFS DIFS
PIFS
SIFS
medium busy contention next frame
t
direct access if
medium is free ≥ DIFS
contention window
DIFS DIFS (randomized back-off
mechanism)
direct access if t
medium is free ≥ DIFS slot time
– station ready to send starts sensing the medium (Carrier Sense based
on CCA, Clear Channel Assessment)
– if the medium is free for the duration of an Inter-Frame Space (IFS),
the station can start sending (IFS depends on service type)
– if the medium is busy, the station has to wait for a free IFS, then the
station must additionally wait a random back-off time (collision
avoidance, multiple of slot-time)
– if another station occupies the medium during the back-off time of the
station, the back-off timer stops (fairness)
station1
DIFS DIFS DIFS DIFS
boe bor boe bor boe busy
station2
boe busy
station3
busy
station4
boe busy boe bor
station5
boe bor boe busy boe bor
t
busy medium not idle (frame, ack etc.) boe elapsed backoff time
DIFS
data
sender
SIFS
ACK
receiver
DIFS
other data
stations t
waiting time contention
DIFS
RTS data
sender
SIFS SIFS
CTS SIFS ACK
receiver
DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS
CTS SIFS ACK1 SIFS ACK2
receiver
NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations t
contention
t0 t1
SuperFrame
t2 t3 t4
PIFS SIFS
D3 D4 CFend
point
coordinator SIFS
U4
wireless
stations
stations‘ NAV
NAV contention free period contention t
period
• Types
– control frames, management frames, data frames
• Sequence numbers
– important against duplicated frames due to lost ACKs
• Addresses
– receiver, transmitter (physical), BSS identifier, sender (logical)
• Miscellaneous
– sending time, checksum, frame control, data
bytes 2 2 6 6 6 2 6 0-2312 4
Frame Duration/ Address Address Address Sequence Address
Data CRC
Control ID 1 2 3 Control 4
bits 2 2 4 1 1 1 1 1 1 1 1
Protocol To From More Power More
Type Subtype Retry WEP Order
version DS DS Frag Mgmt Data
bytes 2 2 6 4
• Acknowledgement
ACK Frame Receiver
Duration CRC
Control Address
• Synchronization
– try to find a LAN, try to stay within a LAN
– timer etc.
• Power management
– sleep-mode without missing a message
– periodic sleep, frame buffering, traffic measurements
• Association/Reassociation
– integration into a LAN
– roaming, i.e. change networks by changing access points
– scanning, i.e. active search for a network
• MIB - Management Information Base
– managing, read, write
beacon interval
B B B B
access
point
busy busy busy busy
medium
t
value of the timestamp B beacon frame
beacon interval
B1 B1
station1
B2 B2
station2
D B T T d D B
access
point
busy busy busy busy
medium
p d
station
t
T TIM D DTIM awake
ATIM
window beacon interval
B1 A D B1
station1
B2 B2 a d
station2
t
B beacon frame random delay A transmit ATIM D transmit data
96 µs 2, 5.5 or 11 Mbit/s
PLCP header
36 40 44 48 52 56 60 64 channel
5150 5180 5200 5220 5240 5260 5280 5300 5320 5350 [MHz]
16.6 MHz
center frequency =
5000 + 5*channel number [MHz]
149 153 157 161 channel
higher layers
medium access logical link
network layer
control layer control layer
channel access medium access
data link layer
control layer control layer
physical layer physical layer physical layer
• Data transmission
– point-to-point, point-to-multipoint, connectionless
– 23.5 Mbit/s, 1 W power, 2383 byte max. packet size
• Services
– asynchronous and time-bounded services with hierarchical priorities
– compatible with ISO MAC
• Topology
– infrastructure or ad-hoc networks
– transmission range can be larger then coverage of a single node
(„forwarding“ integrated in mobile terminals)
• Further mechanisms
– power saving, encryption, checksums
• Scope
– modulation, demodulation, bit and frame synchronization
– forward error correction mechanisms
– measurements of signal strength
– channel sensing
• Channels
– 3 mandatory and 2 optional channels (with their carrier frequencies)
– mandatory
• channel 0: 5.1764680 GHz
• channel 1: 5.1999974 GHz
• channel 2: 5.2235268 GHz
– optional
• channel 3: 5.2470562 GHz
• channel 4: 5.2705856 GHz
HBR
• Modulationsynchronization
LBR data0 data1 ... datam-1
– GMSK for high bit-rate, FSK for LBR header
elimination survival
synchronization
elimination burst
priority assertion
priority detection
yield listening
user data
verification
• Several terminals can now have the same priority and wish to send
– contention phase
• Elimination Burst: all remaining terminals send a burst to eliminate
contenders (11111010100010011100000110010110, high bit- rate)
• Elimination Survival Verification: contenders now sense the channel, if
the channel is free they can continue, otherwise they have been
eliminated
• Yield Listening: contenders again listen in slots with a nonzero
probability, if the terminal senses its slot idle it is free to transmit at the
end of the contention phase
• the important part is now to set the parameters for burst duration and
channel sensing (slot-based, exponentially distributed)
– data transmission
• the winner can now send its data (however, a small chance of collision
remains)
• if the channel was idle for a longer time (min. for a duration of 1700 bit)
a terminal can send at once without using EY-NPMA
– synchronization using the last data transmission
5 48 [byte]
• ATM cell:
cell header user data
plane management
– three hierarchical layers control user
layer management
plane plane
• physical layer
higher higher
• ATM layer
layers layers
• ATM adaptation layer
• Out-of-Band-Signaling: user data is ATM adaptation layer
transmitted separately from control
information ATM layer
physical layer
layers
planes
end-system A end-system B
service dependent
AAL AAL connections
AAL
service independent
ATM ATM
ATM connections
physical physical
layer layer
ATM network
– ATM layer: application
• service independent transport of ATM cells
• multiplex and demultiplex functionality
– AAL layer: support of different services
• Office environment
– multimedia conferencing, online multimedia database access
• Universities, schools, training centers
– distance learning, teaching
• Industry
– database connection, surveillance, real-time factory management
• Hospitals
– reliable, high-bandwidth network, medical images, remote monitoring
• Home
– high-bandwidth interconnect of devices (TV, CD, PC, ...)
• Networked vehicles
– trucks, aircraft etc. interconnect, platooning, intelligent roads
• LS (Location Server)
EMAS-N
WMT
RAS
EMAS-E
M-NNI
WMT RAS
EMAS-N
LS
AUS
user
user process
process
AAL AAL
ATM
ATM ATM ATM ATM ATM
ATM- ATM-
CL CL
RAL RAL PHY PHY PHY PHY PHY PHY PHY PHY
SIG, SIG,
SIG, SIG, SIG,
M-UNI, PNNI,
M-UNI M-PNNI UNI
M-PNNI UNI
SAAL SAAL SAAL SAAL SAAL
M-ATM
ATM ATM ATM ATM ATM
ATM- ATM-
CL CL
RAL RAL PHY PHY PHY PHY PHY PHY PHY PHY
1 WMT
2 EMAS EMAS
T 5
WMT RAS -E -N
EMAS
-E 6
MT
3 RAS WT
NMAS
MS
RAS
RAS
T
4
• Motivation
– deregulation, privatization, new companies, new services
– How to reach the customer?
• alternatives: xDSL, cable, satellite, radio
• Radio access
– flexible (supports traffic mix, multiplexing for higher efficiency, can be
asymmetrical)
– quick installation
– economic (incremental growth possible)
• Market
– private customers (Internet access, tele-xy...)
– small and medium sized business (Internet, MM conferencing, VPN)
• Scope of standardization
– access networks, indoor/campus mobility, 25 - 155 Mbit/s, 50 m - 5 km
– coordination with ATM Forum, IETF, ETSI, IEEE, ....
Mobile Communications SS2003
Broadband network types
• Common characteristics
– ATM QoS (CBR, VBR, UBR, ABR)
• HIPERLAN/2
– short range (< 200 m), indoor/campus, 25 Mbit/s user data rate
– access to telecommunication systems, multimedia applications, mobility
(<10 m/s)
• HIPERACCESS
– wider range (< 5 km), outdoor, 25 Mbit/s user data rate
– fixed radio links to customers (“last mile”), alternative to xDSL or cable
modem, quick installation
– Several (proprietary) products exist with 155 Mbit/s plus QoS
• HIPERLINK – currently no activities
– intermediate link, 155 Mbit/s
– connection of HIPERLAN access points or connection between
HIPERACCESS nodes
• Independence
– BRAN as access network independent from the fixed network
– Interworking of TCP/IP and ATM under study
• Layered model
– Network Convergence Sub-layer as superset of all requirements for IP and
ATM
Coordination
core network core network
IETF (TCP/IP)
ATM IP
ATM forum (ATM)
network convergence sublayer ETSI (UMTS)
CEPT, ITU-R, ...
BRAN data link control (radio frequencies)
AP
MT1
APT APC Core
1 Network
MT2 (Ethernet,
Firewire,
3 AP ATM,
MT3 APT
UMTS)
APC
2
MT4 APT
AP AP/CC
control control
control
data
data
MT1 MT2 MT1 MT2 MT1 MT2 +CC
data control
Centralized Direct
Higher layers
Physical layer
36 40 44 48 52 56 60 64 channel
5150 5180 5200 5220 5240 5260 5280 5300 5320 5350 [MHz]
16.6 MHz
100 104 108 112 116 120 124 128 132 136 140 channel
5470 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5725
16.6 MHz [MHz]
center frequency =
5000 + 5*channel number [MHz]
2 ms 2 ms 2 ms 2 ms TDD,
MAC frame MAC frame MAC frame MAC frame 500 OFDM
...
symbols
per frame
random
broadcast phase downlink phase uplink phase
access phase
variable variable variable
2 406 24 bit
2 10 396 24 bit
sequence UDCH transfer syntax
LCH PDU type payload CRC
number (long PDU)
54 byte
downlink
UDCH DCCH LCCH ASCH UDCH UBCH UMCH DCCH RBCH LCCH
• Idea
– Universal radio interface for ad-hoc wireless connectivity
– Interconnecting computer and peripherals, handheld devices, PDAs, cell
phones – replacement of IrDA
– Embedded in other devices, goal: 5 €/device (2002: 50 €/USB bluetooth)
– Short range (10 m), low power consumption, license-free 2.45 GHz ISM
– Voice and data transmission, approx. 1 Mbit/s gross data rate
1999:
Ericsson mobile
communications AB
reste denna sten till
minne av Harald
Blåtand, som fick ge
sitt namn åt en ny
teknologi för trådlös,
mobil kommunikation.
Inscription:
"Harald king executes these sepulchral
monuments after Gorm, his father and
Thyra, his mother. The Harald who won the
whole of Denmark and Norway and turned This could be the “original” colors
the Danes to Christianity." of the stone.
Inscription:
Btw: Blåtand means “of dark complexion” “auk tani karthi kristna” (and
(not having a blue tooth…) made the Danes Christians)
S
• One unit acts as master and the others as
M P
slaves for the lifetime of the piconet
SB S
• Master determines hopping pattern, slaves
have to synchronize P SB
M=Master P=Parked
• Participation in a piconet = synchronization
S=Slave SB=Standby
to hopping sequence
S
P
P
M
M
SB S
M=Master P SB SB
S=Slave
P=Parked S
SB=Standby
OBEX TCP/UDP
AT modem
IP
commands
TCS BIN SDP
PPP/BNEP Control
Baseband
Radio
M S M S M S M
t
M S M S M
t
fk fk+1 fk+6
M S M
t
• Piconet/channel definition
• Low-level packet definition
– Access code
• Channel, device access, e.g., derived from master
– Packet header
• 1/3-FEC, active member address (broadcast + 7 slaves), link type,
alternating bit ARQ/SEQ, checksum
(typo in the
68(72) 54 0-2744 bits standard!)
access code packet header payload
4 64 (4) 3 4 1 1 1 8 bits
preamble sync. (trailer) AM address type flow ARQN SEQN HEC
payload (30)
DV audio (10) header (1) payload (0-9) 2/3 FEC CRC (2)
(bytes)
payload (0-343)
SLAVE 1
f1 f7 f9 f13 f19
SLAVE 2
f5 f17 f21
MASTER A C C F H
SLAVE 1 B D E
SLAVE 2 G G
standby unconnected
• Protocol multiplexing
– RFCOMM, SDP, telephony control
• Group abstraction
– Create/close group, add/remove member
Connection-oriented PDU
2 2 0-65535 bytes
length CID payload
1 1 2 ≥0
code ID length data
• RFCOMM
– Emulation of a serial port (supports a large base of legacy applications)
– Allows multiple ports over a single physical channel
• OBEX
– Exchange of objects, IrDA replacement
• WAP
– Interacting with applications on cellular phones
Protocols
– Vertical slice through the protocol stack
– Basis for interoperability
• Generic Access Profile
• Service Discovery Application Profile
• Cordless Telephony Profile
• Intercom Profile Profiles
• Serial Port Profile Additional Profiles
Advanced Audio Distribution
• Headset Profile
PAN
• Dial-up Networking Profile Audio Video Remote Control
• Fax Profile Basic Printing
• LAN Access Profile Basic Imaging
• Generic Object Exchange Profile Extended Service Discovery
• Object Push Profile Generic Audio Video Distribution
• File Transfer Profile Hands Free
• Synchronization Profile Hardcopy Cable Replacement
• 802.15-2: Coexistence
– Coexistence of Wireless Personal Area Networks (802.15) and Wireless
Local Area Networks (802.11), quantify the mutual interference
• 802.15-3: High-Rate
– Standard for high-rate (20 Mbit/s or greater) WPANs, while still low-
power/low-cost
– Data Rates: 11, 22, 33, 44, 55 Mbit/s
– Quality of Service isochronous protocol
– Ad hoc peer-to-peer networking
– Security
– Low power consumption
– Low cost
– Designed to meet the demanding requirements of portable consumer
imaging and multimedia applications
• Function
– Standard: In response to a radio interrogation signal from a reader (base
station) the RFID tags transmit their ID
– Enhanced: additionally data can be sent to the tags, different media access
schemes (collision avoidance)
• Features
– No line-of sight required (compared to, e.g., laser scanners)
– RFID tags withstand difficult environmental conditions (sunlight, cold,
frost, dirt etc.)
– Products available with read/write memory, smart-card capabilities
• Categories
– Passive RFID: operating power comes from the reader over the air which
is feasible up to distances of 3 m, low price (1 €)
– Active RFID: battery powered, distances up to 100 m
• Applications
– Total asset visibility: tracking of goods during manufacturing, localization
of pallets, goods etc.
– Loyalty cards: customers use RFID tags for payment at, e.g., gas stations,
collection of buying patterns
– Automated toll collection: RFIDs mounted in windshields allow
commuters to drive through toll plazas without stopping
– Others: access control, animal identification, tracking of hazardous
material, inventory control, warehouse management, ...
• Security
– Denial-of-Service attacks are always possible
• Interference of the wireless transmission, shielding of transceivers
– IDs via manufacturing or one time programming
– Key exchange via, e.g., RSA possible, encryption via, e.g., AES
• Future Trends
– RTLS: Real-Time Locating System – big efforts to make total asset
visibility come true
– Integration of RFID technology into the manufacturing, distribution and
logistics chain
– Creation of „electronic manifests“ at item or package level (embedded
inexpensive passive RFID tags)
– 3D tracking of children, patients
• Relevant Standards
– American National Standards Institute
• ANSI, www.ansi.org, www.aimglobal.org/standards/rfidstds/ANSIT6.html
– Automatic Identification and Data Capture Techniques
• JTC 1/SC 31, www.uc-council.com/sc31/home.htm,
www.aimglobal.org/standards/rfidstds/sc31.htm
– European Radiocommunications Office
• ERO, www.ero.dk, www.aimglobal.org/standards/rfidstds/ERO.htm
– European Telecommunications Standards Institute
• ETSI, www.etsi.org, www.aimglobal.org/standards/rfidstds/ETSI.htm
– Identification Cards and related devices
• JTC 1/SC 17, www.sc17.com, www.aimglobal.org/standards/rfidstds/sc17.htm,
– Identification and communication
• ISO TC 104 / SC 4, www.autoid.org/tc104_sc4_wg2.htm,
www.aimglobal.org/standards/rfidstds/TC104.htm
– Road Transport and Traffic Telematics
• CEN TC 278, www.nni.nl, www.aimglobal.org/standards/rfidstds/CENTC278.htm
– Transport Information and Control Systems
• ISO/TC204, www.sae.org/technicalcommittees/gits.htm,
www.aimglobal.org/standards/rfidstds/ISOTC204.htm
Mobile Communications SS2003
RFID – Radio Frequency Identification (8)
• ISO Standards
– ISO 15418
• MH10.8.2 Data Identifiers
• EAN.UCC Application Identifiers
– ISO 15434 - Syntax for High Capacity ADC Media
– ISO 15962 - Transfer Syntax
– ISO 18000
• Part 2, 125 - 135 kHz
• Part 3, 13.56 MHz
• Part 4, 2.45 GHz
• Part 5, 5.8 GHz
• Part 6, UHF (860 - 930 MHz, 433 MHz)
– ISO 18047 - RFID Device Conformance Test Methods
– ISO 18046 - RF Tag and Interrogator Performance Test Methods
• Levels of interference
– Physical layer: interference acts like noise
• Spread spectrum tries to minimize this
• FEC/interleaving tries to correct © Fusion Lighting, Inc.
f [MHz] • Bluetooth may act like a rogue member of the 802.11 network
– Does not know anything about gaps, inter frame spacing etc.
2480 802.11b
DIFS
SIFS
DIFS
ACK
1000 byte 3 channels
(separated by
installation)
DIFS
SIFS
DIFS
SIFS
DIFS
ACK
ACK
500 byte 500 byte 500 byte
802.15.1
79 channels
DIFS
SIFS
DIFS
SIFS
DIFS
SIFS
DIFS
SIFS
DIFS
SIFS
ACK
ACK
ACK
ACK
ACK
100 100 100 100 100
byte byte byte byte byte (separated by
2402 hopping pattern)
t
• IEEE 802.15-2 discusses these problems
– Proposal: Adaptive Frequency Hopping
• a non-collaborative Coexistence Mechanism
• Real effects? Many different opinions, publications, tests, formulae, …
– Results from complete breakdown to almost no effect
– Bluetooth (FHSS) seems more robust than 802.11b (DSSS)