Lesson: Embedded Communications Wireless Communication
Lesson: Embedded Communications Wireless Communication
5 Lesson
27
Embedded
Communications Wireless Communication
Version 2 EE IIT, Kharagpur 1 Version 2 EE IIT, Kharagpur 2
Instructional Objectives
After going through this lesson the student would be able to
x Describe the benefits and issues in wireless communication
x Distinguish between WLAN, WPAN and their different implementations like Ricochet,
HiperLAN, HomeRF and Bluetooth
x Choose a particular wireless communication standard to suit an application
Wireless Communication
Third generation wireless technologies are being developed to enable personal, high-speed
interactive connectivity to wide area networks (WANs). The IEEE 802.11x wireless
technologies finds themselves with an increasing presence in corporate and academic office
spaces, buildings, and campuses. Furthermore, with slow but steady inroads into public areas
such as airports and coffee bars. WAN, LAN and PAN technologies enable device connectivity
to infrastructure-based services - either through campus or corporate backbone intranet. In this lesson we look at the most commonly adopted prospects of different wireless technologies
mentioned above.
The other end of coverage spectrum is occupied by the short-range embedded wireless
connectivity technologies that allow devices to communicate with each other directly without the WLANs-IEEE 802.11X
need for an established infrastructure. At this end of the coverage spectrum the wireless
technologies like Ricochet, Bluetooth etc. offer the benefits of omni-directionality and the This is the most prominent technology standard for WLANs (Wireless Local Area Networks).
elimination of the line-of-sight requirement of RF-based connectivity. The embedded This comprises of a PHY (Physical Layer) and MAC (Physical and Medium Access Control).
connectivity space resembles a communication bubble that follows people around and empowers This allows specific carrier frequencies in the 2.4 GHz range bandwidths with data rates of 1 or 2
them to connect their personal devices with other devices that enter the bubble. Connectivity in Mbps. Further enhancements to the same technology has lead to the modern day protocol known
this bubble is spontaneous and ephemeral and can involve several devices of diverse computing as the 802.11b which provides a basic data rate of 11Mbps and a fall-back rate of 5.5Mbps.All
capabilities, unlike wireless LAN solutions that are designed for communication between these technologies operate in the internationally available 2.4GHz ISM band. Both IEEE 802.11
devices of sufficient computing power and battery. and 802.11b standards are capable of providing communications between a number of terminals
as an ad hoc network using peer-to-peer mode (see figures at the end) or as a client/server (see
The table below shows a short comparison of various technologies in the wireless arena. figures at the end) wireless configuration or a complicated distributed network (see figures at the
end). All these networks require Wireless Cards (PCMCIA-Personal Computer Memory Card
International Association-Cards) and wireless LAN Access points. There are two transmission
types for these technologies: Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence
Spread Spectrum (DSSS). Whereas FHSS is primarily used for low power, low-range
applications, the DSSS is popular with Ethernet-like data rates. In the ad-hoc network mode, as
there is no central controller, the wireless access cards use the CSMA/CA(Carrier Sense Multiple
Access with Collision Avoidance) protocol to resolve shared access of the channel. In the
client/server configuration, many PCs and laptops, physically close to each other (20 to 500
meters), can be linked to a central hub (Known as the access point) that serves as a bridge
between them and the wired network. The wireless access cards provide the interface between
the PCs and the antenna while the access point serves as the wireless LAN hub. The access point
is as high as the ceiling of a roof and can support 115-250 users for receiving, buffering and
transmitting data between the WLAN and the wired network. Access points can be programmed
to select one of the hopping sequences, and he PCMCIA cards tune in to the corresponding
sequence. The WLAN bridge could also be implemented using line-of-sight directional antennas.
Handover and roaming can also be supported across the various access points. Encryption is also
supported using the optional shared-key RC4 (Ron's Code 4 or Rivest's Cipher) algorithm.
Access Point
PDA Station
Station
Advantages of home RF
In HomeRF same connection can be shared for both voice and data among the devices, at the
Modem Wireless
radio
same time. This technology provides a platform for a broad range of interoperable consumer
Access Point devices for wireless digital communication between PCs and consumer electronic devices
Router
anywhere in and around the home.
Services
Richochet provides immediate, dependable, and secure connections without the cost and
complexities of land-based phone lines, dial-up connections, or cellular modems. Richochet
A PICONET
A piconet consists of single master and all slaves in its proximity, which are communicating with
it. The slaves may be in active, sniff, hold or park modes at any instant of time. There can be
upto seven slaves and any number of parked slaves and standby devices in the vicinity of the
master. The above figure shows a typical piconet. The figure shows two spheres. The white filled
A Bluetooth Connection inscribed sphere comprises the piconet where the ellipses represent the devices or slaves and the
box represents the master. Thus, there is only one master and several slaves. The slave names
Bluetooth provides many options to the user. For instance, Bluetooth radio technology built into
starting from `A' represent the Active slaves and these are linked to the master with continuous
both cellular telephone and a laptop replaces the cable used today to connect a laptop to a
lines meaning `ACTIVE'. The slave names starting with `P' represent the parked slaves. Dashed
cellular phone. Printers, desktops, FAX machines, keyboards, joysticks and virtually any other
lines are shown connecting it to the master meaning that the connection is not continuous but the
digital device can be networked by the Bluetooth system. Bluetooth also provides a universal
devices are in the piconet i.e., `PARKED'. Some other slaves with names starting form `S'
bridge to existing data networks and mechanism to form small private ad hoc groups of
indicate the slaves, which are in STAND-BY and these, are actually outside the piconet but
connected devices away from fixed network architectures.
inside the proximity sphere.
“Bluetooth” wireless communication technologies operate in the 2.4 GHz range. There are
certain propositions related to RF Communication in the 2.4 GHz spectrum which the device
developers must follow. This is important for an organized use of the spectrum because it is
globally unlicensed. As such it is bound by specific regulations put forth by various countries in
their respective territories. In context to wireless communications the RF Spectrum has been
divided into 79 channels where bandwidth is limited to 1 MHz per channel. Frequency Hopping
spread spectrum communications must be incorporated. Also proper mechanism for interference
anticipation and removal should also be there. This is essential on account of the fact that the 2.4
GHz spectrum is unlicensed and, hence, more vulnerable to signal congestion because of
increasing number of new users trying to communicate within the bandwidth.
Stand -By
Connection
State Description
x STANDBY —This is the default state and the lowest power consuming one too. Only the
Bluetooth clock operates in the low-power mode.
x INQUIRY — In this state a device seeks and gets familiar with the identity of other devices
in its proximity. The other devices must have their Inquiry Scan state ENABLED if they
want to entertain the query from other devices.
x PAGE — In this state master of a piconet invites other devices to join in. To entertain this
request the invitee must have its Page Scan state ENABLED.
A device may bypass the inquiry state if the identity of the device it is wanting to page is
previously known (see the figure above). The figure above also indicates that any member of a
piconet — not necessarily the master, may still perform INQUIRY and PAGE operations for
additional devices, thus, paving way for a Scatternet.