Download Wireless Fundamentals 3

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wi-Fi wikipedia , lookup

RS-232 wikipedia , lookup

Low Pin Count wikipedia , lookup

Wireless security wikipedia , lookup

Zigbee wikipedia , lookup

Serial Peripheral Interface Bus wikipedia , lookup

Bluetooth wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Network tap wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Universal Plug and Play wikipedia , lookup

Wireless USB wikipedia , lookup

I²C wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Wireless Fundamentals 3 –
Personal Area and Mobile
Networking
Chapter 6 of Mobile Commerce and
Wireless Computing Systems By Elliott,
G. and Phillips, N.
1
Personal Area and Mobile Networking
Intelligent Gateways
Environments
Personal
Personal
Operating
Space
Personal
Area
Network
Domestic
Information
Appliance
Wire
Replacement
Technology
Master
Bluetooth
Channels
Piconet
Slave
Frequency
Hopping
Establishing
Connection
Scatternet
Service
Discovery
Salutation
uPnP
Timeslots
JINI
2
Personal Operating Space


Refer to the space around a person within the
wireless-enabled devices they carry can
communicate, but it can also be applied to
appliances in that environment
Environments can also define their own
wireless-network operating space, either to
support and enhance the operation of
personal devices within them or to provide
smart environment control, security or
monitoring services
3
Activity on POS

List all the electrical devices in your home
that are, or could be, operated with remote
devices. Try and come up with at least ten. If
each of these devices could communicate
with a handheld device such as a PDA, what
services should they provide?
4
Personal Information Appliances



Devices such as PDAs and mobile telephones,
personal CD players, and digital still or movie
cameras
Wireless capabilities offer the potential for further
change
Using a PAN, a single massive storage appliance
can function as a file server for any number of
different specialist personal devices whose form can
then be adapted to best suit their function – playing
music, taking pictures
5
Personal Information Appliances

Personal


Mobile phone, PDA, camera and MP3
Domestic

Washing machine, fridge, tv, boiler
6
Personal Area Networks (PANs)





A PAN is a network that supports the interoperation of
devices in personal space.
They are small networks of devices with short-range,
low-power and low-cost wireless interaction
capabilities.
Information appliances: mobile phone, personal CD
player and PDA, and embedded information
appliances will reside in radios, TVs, VCRs, washing
machines, central heating and air conditioning units.
It can also be a network that moves about, linking the
swarm of information devices about a person with
each other and with other devices they meet along the
way.
As the network moves about in the world, devices are
constantly coming into and going out of range.
7
Environments
Static
Biddable
Smart

Respond to
devices that
enter it
Respond to devices
that enter it or that
it meets
Control an area
based on
sensed activity
Control an area
based on activity
and location
Mobile wireless environments



Mobile
Personal, PAN, or a car environment, or commercial, on a public
transport service vehicle
Provide workflow and knowledge management in order to maximize
service and customer satisfaction
Static wireless environments



In a predefined area or location, i.e. home and office using wireless
network such as 802.11 and HiperLAN to provide access to the Internet
and home or office network
Airports, hotels,and restaurants offer E-mail facilities to their users.
A wireless approach is much more cost-effective than wire-based
solutions.
8
Environments
Static
Biddable
Smart

Respond to
devices that
enter it
Respond to devices
that enter it or that
it meets
Control an area
based on
sensed activity
Control an area
based on activity
and location
Smart spaces



Mobile
Monitor the behaviour that is taking place within them and
respond appropriately to support and enhance that behaviour e.g.
automatic heating and lighting controls
To share information between appliances in the space but not
with the personal devices of the people within it.
Biddable spaces


Reactive, offer a set of services to anyone who asks
Selective to who or what devices they recognize and will respond
to e.g. POS about a wireless-enabled domestic appliance
9
Personal Area Network Intelligent
Gateways

A gateway is a network connection between two
types of networked computer system, such as a PC
LAN and a mainframes. The gateway provides
suitable translation services between the two
systems.
10
Personal Area Network Intelligent
Gateways



The wireless nature of a PAN means that the same resource sharing
that was the main economic driver behind LAN development can be
applied to personal devices.
The gateway is intelligent in that it can sense the availability of any
wireless LAN and WAN in the locality of the PAN and establish a
connection with any other device that is similarly connected, whether
wired or wireless.
If there are a variety of networks available then the gateway will be
capable of determining the ideal network for the data transfer
requirements of the accessing device and balancing this against power,
priority and pricing consideration as appropriate.
11
Bluetooth Technology






Consist of hardware, in the form of a radio antenna and Radio
Frequency (RF) transceiver logic on a chip and a set of protocols
with which a host of information appliance can interface with
Bluetooth unit
Based on 802.11 ad hoc network standard and also has a lot in
common with the Infrared data transfer standard IrDA
Is ideal for linking together the devices in a room
Link devices without wires, making it easier to install and
rearrange equipment, but it offers much more than simple wire
replacement
Bluetooth devices can discover each other as they come into
range and negotiate to share services.
A Bluetooth-enabled PDA in a department store might become
aware of a Bluetooth port from which it can download a store
plan and which it can query about where to find things – it might
have to ‘pay’ for this service by also downloading an advert for
the store’s latest promotion.
12
Bluetooth Technology



The requirements of a device that can achieve this clearly go
beyond simply determining their capabilities, negotiating
terms for use of those capabilities and creating the network to
support that use.
A Bluetooth-enabled device includes both specialist hardware
and software to manage the interface.
The hardware consists of 3 modules: the Radio Frequency
(RF) transceiver, the Link Controller and the IO Manager.
13
Bluetooth Technology



The hardware consists of 3 modules: the Radio Frequency
(RF) transceiver, the Link Controller and the IO Manager.
The radio transceiver operates in the 2.4GHz range; the
transceiver and its antenna can both be made very small so
that they can easily be incorporated into a device quite
unobtrusively.
The main functionality of the devices is access using three
core protocols: the Logical Link Control and Adaptation
Protocol (L2CAP), the Service Discovery Protocol (SDP) and
the Radio Frequency CoMMunication Protocol (REFCOMM).
14
Bluetooth Technology
15
Bluetooth Technology







The L2CAP provides the main interface to higher-level protocols.
It is essentially the bottom half of the data link layer of the ISO
OSI model and corresponds to the MAC Layer of the 802
standard.
L2CAP converts between the digital electrical signals and the
baseband signal and vice versa.
The SDP supports operations concerned with discovering and
getting information about the identity and characteristics of the
services offered by other devices and informing them of the
characteristics of its devices.
RFCOMM is the actual cable replacement technology. It provides
transport capabilities for all high-level services that use serial line
as the transport mechanism.
Transmission and reception is achieved through the antenna that
forms the ‘air interface’ of the unit.
Transmission is over a band of frequencies in the 2.4 GHz range.
Each device uses the whole band in each transmission, by
employing a frequency-hopping techniques that overcomes noise
in the environment.
16
Bluetooth Radio Frequency Channels

3 meanings:





Refer to the 79 RF-channels 1MHz apart.
Refer to a particular, pseudorandom hopping sequence
through 79 RF-channels
Refer to five logical channels used for control and coordination
Synchronous Connection-Oriented (SCO)
transmissions are point-to-point transmissions
between master and slave. Transmissions are made
in reserved time-slots determined by the master unit
when it set up the link
Asynchronous Connection-Less (ACL) is a multicast link where transmissions provide packetswitched connections between a master and all
connected slaves.
17
Piconets





A piconet is a small ad hoc network of Bluetoothenabled devices.
Up to eight devices can be joined together in a
Bluetooth piconet – 1, and only 1, of these must be
the master that controls the communications for the
duration of their co-operation; the other units are
referred to as slaves.
Slaves in a piconet have no direct communication
with each other.
All communication is between the master and each
slave in turn.
Each device in the piconet has a simple three-bit
address (hence the eight-device limit).
18
Network Master and Slaves in a Piconet







The role of the master is to synchronize communication by
determining a common time for the start of a time-slot sequence
and to determine common pseudo-random frequency-hopping
scheme.
Typically a device wishing to make use of a service will naturally
take the master role and the device offering the service will be
the slave.
All the slaves in a piconet have to adjust their timings to match
the master.
Resembles that a star network with the master playing the role of
hub.
Slaves have an automatic built-in right to overthrow their masters
and reverse the relationship.
It is possible fro a slave to be the master of a piconet without
giving up the role of slave in another.
However, 2 units cannot be both master and slave to each other.
Nor a slave become a master of one of its masters other slaves.
19
Scatternets - Piconet



A slave in one piconet will become a master of
another or a master of a piconet will become a slave
in another. These relationships create extended
networks, in principle, allow communications
between devices in different piconets through these
gateway devices.
A highly structured pyramid network with a supreme
master who has 7 slaves, each of which is in turn a
master with 7 slaves of piconets are called
‘scatternets’.
Due to lower power consumption of devices, callforwarding is not supported.
20
Scatternets



Lacks of research on incidental capability –
re-configurable computerized units that need
sporadic contact with other which will
establish a connect, do the business and
close a connection.
Devices come and go.
These needs a different set of rules for
maintaining it s list.
21
Establishing and Maintaining Wireless
Connections – Different Contexts (1)

An environment such as a room in the home
where devices change infrequently.


A new device needs to introduce itself and learn
about its neighbours or a device will be removed
from the room either for an extended period or
permanently.
The same set of mobile devices will come and go
in the room and all devices will ‘know’ each other.
They will have each other’s ID and capabilities
listed.
22
Establishing and Maintaining Wireless
Connections – Different Contexts (2)

An environment with a number of conventionally
networked, static communication devices with a high
throughput of mobile devices, such as in a
department store, airport or hotel.


The static devices might collect data on each device and
count how often and when they visit but there is a very low
expectation that any particular device will be present at any
particular time so they will always need to ask who is there
before they can make a connection.
Mobile devices that are frequently used to assist their users
with shopping and travel might have geographic awareness,
to know where they are, and the addresses of the static
devices in different locations with services of interest.
23
Establishing and Maintaining Wireless
Connections – Different Contexts (3)

An environment where most of the interaction
is between a person’s personal mobile
devices, e.g. headset, MP3 player, mobile
phone, etc., whose addresses are well known
to all devices, but where occasionally devices
need to interact with unknown, static or
mobile devices, e.g. to make a payment or
exchange a business card or to negotiate a
service such as Interact access or E-mail
facilities.
24
Establishing and Maintaining Wireless
Connections – Different Contexts (4)

An environment where a personal mobile
device is regularly engaging with other static
and mobile devices, e.g. a vehicle guidance
system or a PDA being used to navigate a
shopping precinct, or members at a trade
convention engaged in electronically enhance
networking.
25
Establishing and Maintaining Wireless
Connections – Wireless Operating Modes






4 basic states:
 Unnconnected (Default state)
 Connecting
 Active
 Low Power
In unnconnected state, there is a only STANDBY mode, it can
receive/issue INQUIRY, and PAGE requests.
INQUIRY message is issued when it wants to find out what
devices are in range.
INQUIRY message includes details about itself, such as ID and
type information.
Bluetooth uses a type system so that manufacturers can specify
the types of device it is appropriate for different appliances to
communicate with.
The INQUIRY can also elicit basic details about the purpose and
functioning of any device that responds and give that device
information about its own purpose and functioning.
26
Creating Network Connection in
Bluetooth 1







To create a connection a device sends a PAGE message to the
particular device that it wishes to connect to.
The initiating device broadcasts a message that includes the
address of the device it wants to connect to.
It first sends the message using 16 of the standard 32 wake-up
hop frequencies. If it cannot find its target, it sends the message
using the remaining 16 hop frequencies.
Once a connection has been established, the devices in the new
piconet are in the active state.
In the active state, there are transceiving and connected modes.
In the transceiving mode, data is passed between master and
slave.
In the connected mode, only control and synchronization signals
are exchanged, but the device actively listens for data all the time.
27
Creating Network Connection in
Bluetooth 2


In a dynamic environment, devices will frequently issue INQUIRY
messages to keep themselves up to date on their environment.
 Often they will not actually establish connection unless a
particular unit is able to supply a service requested by a user
application or an application has requested that data is
communicated to a particular device.
In static environment where piconet membership is likely to be
fairly constant, networks might be set up and remain fro
extended periods of time, even if no communication is taking
place.
 For this situation, devices can enter the power-saving state.
 In each low-power mode the salve remains synchronized with the
piconet, but they vary in how engaged they are and, therefore, in
how quickly they can resume fully active membership again.
28
Creating Network Connection in
Bluetooth





In Sniff mode a device listens to the master as normal but at a
reduced rate.
A master can decide to put a device in Hold mode if it knows that
there will be no data to exchange; alternatively a slave can
demand to be put in Hold mode.
A slave might enter Hold mode in one piconet so that it can
create another piconet in order to make use of a service; when
that service is complete it can return by existing Hold.
In Sniff and Hold modes a device is still a full member of the
piconet and can easily return to full participation.
A parked device will occasionally listen to the master device
resynchronize its clock and listen to broadcast message. Parking
provides a way for a master device to deal with more than 7
other devices at a time.
29
The Physical Connection




Bluetooth uses frequency-hopping in time-slots with short
packages and Forward Error Correction in order to maintain
efficient data transfer through multiple channels in noisy
environments.
Separate logical channels are maintained through the use of
time-slots synchronized to the clock of the master device.
Every device uses the full breadth of the available frequency
band by hopping in a coordinated but pseudo-random fashion
between 791 MHz channels.
The frequency-hopping reduces the interference from noisy
appliances such as microwave ovens, while the use of a pseudorandom sequence minimizes the chance of interference between
two piconets in the same space.
30
Time-slots


The communicating devices agree to divide time into fixed-length
periods and each period is assigned a unique identification number.
Time-slots can then be distinguished by simple properties of the
numbers assigned to them to form separate logical channels.



For instance, even-numbered slots can be reserved for the master
device to communicate to its slave devices.
A particular slave device might then be assigned every twelfth pair of
slots for its communication.
It listens for packets from the master every 23rd time-slot and uses every
24th time-slot to respond.
31
Frequency-hopping





Bluetooth divides a broadband of frequencies 791 MHz channels
and hops to a new frequency after transmitting or receiving a single
packet on each channel.
The hop sequence follows a pseudo-random pattern.
Devices employ a limited hop sequence composed of a subset of all
available frequencies to scan their environment while in
unnconnected states.
Once connections are established, the master device dictates a
particular hopping sequence to follow.
Every piconet has a different hopping sequence, so the chances of
the piconet channel being busy are extremely low.
32
Security of Piconets or Scatternets


Two concerns: integrity and privacy
Integrity


Rely on various error-detection and correction
schemes
Bluetooth supports a standard authentication
mechanism to address this problem.
33
Security of Piconets or Scatternets

Error correction enables a
certain number of errors to
be both detected and
correction so that there is
no need for retransmission.


How noisy the environment
a certain number of errors
to be corrected than it does
to encode the same
message for error detection.
Have a higher
computational overload for
both encoding and
decoding

Error detection schemes
identify that an error has
occurred and ask for the
data to be retransmitted.

In noisy environments
where errors are common
the retransmission costs of
only using error detection
can be much more
expensive.
34
Privacy




Is concerned with both accidental and intentional
eavesdropping on transmissions between two
devices.
The particular method of channel hopping and time
divisions used in Bluetooth makes accidental
eavesdropping extremely unlikely.
Bluetooth includes random number generation,
encryption and encryption key management facilities
to ensure secure private transmissions.
The difficulty of intercepting a Bluetooth
communications is probably slightly higher than the
difficulty of intercepting a wired LAN communication.
35
IEEE 802.15




A set of general PAN standards developed by
the IEEE.
802.15b: 3 variations to cope with the needs
of particular usage models
802.15c: concern with power management
and handles much higher data transfer rates
but power consumption is less of an issue
802.15d: aimed at devices that have
extremely limiting power constraints but also
lower data transfer rate requirements
36
Wireless Service Discovery and Use



How can a mobile device discover what other
devices it meets have to offer?
If the user of a device issues a request for a
particular service that requires the device to
interact with another system, how can a
device go about meeting that request?
How does a device tell other devices what it
has to offer and what its owner is interested
in?
37
Wireless Service Discovery and Use – 3
Coordination Frameworks




JINI is a Java-based solution that extends the Java distributed
systems architecture Remote Method Invocation (RMI) into the
mobile domain. JINI is, obviously, language-dependent but
platform- and transport-independent
Universal Plug and Plug (UPnP) is a Microsoft approach, only
tangentially related to Plug and Play under Windows, that aims
for language independence but is reliant on TCP/IP as a
transport mechanism.
Salutation is a non-proprietary approach which aims at both
language and transport independence.
3 approaches JINI emphasizes standardization, while UPnP
emphasizes autonomy and Salutation attempts to walk the
middle road and balance the two.
38
JINI





A collection of autonomous devices in contact with
one another forms a federation.
Members of a federation can become aware of each
other, negotiate and cooperate together.
At least one device must be running a JINI subsystem that provides a look-up service.
The underlying assumption is that these look-up
services will be provided via an access point to a
conventional network or among static devices such
as consumer appliances.
JINI does not provide any means for devices to
configure themselves for appropriate networking.
39
Universal Plug and Play (UPnP)





A much lower level solution than JINI and is based around
extensions to the TCP/IP protocol that can be implemented
locally using native code. (Limited to TCP/IP networks)
Provides a set of defined network protocols and allows
manufacturers to develop their own APIs to implement them
using any language or platform.
Simple Service Discovery Protocol (SSDP) which provides an
interface for devices to announce their presence to a network
and to discover other devices and their capabilities.
SSDP can work with or without a look-up service, called service
in UPnP.
If a proxy service exists then all devices will use it. If no proxy
service exists there is a proxy-less operating mode for them to
follow.
40
Universal Plug and Play (UPnP)





The discovery mechanism uses HyperText Transfer
Protocol (HTTP) over UDP, unicast or multicast.
The registration process sends and receives data in
HTTP format, but with special semantics such as the
ANNOUNCE message and the OPTIONS message
for querying.
Multicasts are sent on a reserved address to which
all participating devices must listen.
Every device must have its own Unique Resource
identifier and an XML file accessible through a URL.
Details of both must be included in a device’s
ANNOUNCE message.
The restriction to TCP/IP makes it possible for UPnP
devices to obtain an IP address using DHCP.
41
Salutation






Both JINI and UPnP clearly have their roots in the wired network
paradigm and conceptually both are extension of established
wire-based solution, i.e. RMI and PnP.
Salutations Manager (SLM) may be part of same device or of a
remote device.
SLMs form ensembles or swarms of agents that coordinate with
one another in order to provide services for their clients.
All requests and communications between client devices are
mediated through SLM agents.
SLM agents behave in a similar way to Object Request Brokers
(ORBs) in wired distributed computing systems.
SLMs discover other SLMs and exchange registration
information. This process can transverse different transport
media.
42