You are on page 1of 70

UNIT 3: CONNECTIVITY

Wireless connectivity
To transfer information without the use of wires.

3 benefits of Wireless Technologies


Efficient and safe.
Cost Effective.
Safe & convenient.

Advantages :
convey the information quickly to the consumers.
medical centres through wireless
communication.
access Internet anywhere

Common examples of wireless


Equipment

Cellular phones and pagers.


Global Positioning System (GPS).
Baby monitors .
Health care.

BLUETOOTH

What does Bluetooth do for me?

Landline

Cable
Replacement
Data/Voice
Access Points

Personal Ad-hoc
Connectivity

How its works ?


Short range wireless connectivity.
Low power consumption
Automatic recognition.

Reliability
What it really means?

Which device are you connecting to?


How large is the file?
Which version are you using?
Have the two devices been connected before?

Devices

Laptops
Gaming Consoles
Headsets
Cell Phones
Printers

Usage scenarios: Headset

User benefits
Multiple device access
Cordless phone benefits
Hands free operation

Wireless Freedom

Usage scenarios:
Synchronization

User benefits
Proximity synchronization
Easily maintained database
Common information database

Sharing Common Data

Usage scenarios: Data access


pointsPSTN, ISDN,
LAN, WAN,
xDSL

User benefits
No more connectors
Easy internet access
Common connection experience

Remote Connections...

Wireless Positioning
Wireless
LAN

Bluetooth

On-campus:
Office, School,
Airport, Hotel,
Home

Person Space: Office,


Room, Briefcase, Pocket,
Car
Short Range/Low Power
Voice AND Data

Cellular

Low-cost

Off-Campus Global
Coverage

Small form factor


Many Co-located Nets
Universal Bridge

What is Bluetooth?
A cable-replacement technology that can be
used to connect almost any device to any other
device
Radio interface enabling electronic devices to
communicate wirelessly via short range (10
meters) ad-hoc radio connections
a standard for a small , cheap radio chip to be
plugged into computers, printers, mobile
phones, etc

What is Bluetooth?
Uses the radio range of 2.45 GHz
Theoretical maximum bandwidth is 1 Mb/s
Several Bluetooth devices can form an ad hoc
network called a Piconet
In a piconet one device acts as a master (sets
frequency hopping behavior) and the others as
slaves
Example: A conference room with many laptops
wishing to communicate with each other

History
Harald Bluetooth : 10th century Danish King,
managed to unite Denmark and Norway
Bluetooth SIG (Special Interest Group) :
Founded in 1998 by : Ericsson, Intel, IBM, Toshiba and
Nokia
Currently more than 2500 adopter companies
Created in order to promote, shape an define the
specification and position Bluetooth in the market place.

1998 - Bluetooth technology is officially introduced and the


BLUETOOTH SIG is formed. Bluetooth technology's intended
basic purpose is to be a wire replacement technology in order
to rapidly transfer voice and data.
1999 - Bluetooth 1.0 Specification is introduced.
2003 - The BLUETOOTH SIG overhauls the Bluetooth Core
Specification with the announcement of Version 2.1.
2004 - Bluetooth Version 2.0 + EDR (Enhanced Data Rate) is
introduced.
2005 - Devices using Version 2.0 + EDR begin to hit the
market in late 2005.
2007 - Bluetooth Core Specification Version 2.1 + EDR is
adopted by the BLUETOOTH SIG.
2009 - Bluetooth Core Specification Version 3.0 + HS (High
Speed) is adopted by the BLUETOOTH SIG.

Bluetooth Architecture
Piconet
Each piconet has one master and up to 7 simultaneous
slaves
Master : device that initiates a data exchange.
Slave : device that responds to the master

Scatternet
Linking of multiple piconets through the master or slave
devices
Bluetooth devices have point-to-multipoint capability to
engage in Scatternet communication.

Piconet
All devices in a piconet hop together
Master gives slaves its clock and device ID

Non-piconet devices are in standby


P

S
M

SB
P

SB

M=Master P=Parked
S=Slave
SB=Standby

Scatternet
Devices can be slave in one piconet and master of
another
S

P
S

SB
M

SB

S
P

SB
S

Physical links
Between master and slave(s), different types of
links can be established. Two link types have
been defined:
Synchronous Connection-Oriented (SCO) link
Asynchronous Connection-Less (ACL) link

Physical links
Synchronous Connection Oriented (SCO)
Support symmetrical, circuit-switched, point-to-point
connections
Typically used for voice traffic.
Data rate is 64 kbit/s.

Asynchronous Connection-Less (ACL)


Support symmetrical and asymmetrical, packet-switched,
point-to-multipoint connections.
Typically used for data transmission .
Up to 433.9 kbit/s in symmetric or 723.2/57.6 kbit/s in
asymmetric

Baseband link types


Polling-based (TDD) packet transmissions
1 slot: 0.625msec (max 1600 slots/sec)
master/slave slots (even-/odd-numbered slots)

Synchronous connection-oriented (SCO) link


circuit-switched, periodic single-slot packet assignment
symmetric 64Kbps full-duplex

Asynchronous connection-less (ACL) link

packet switching
asymmetric bandwidth, variable packet size (1,3, or 5 slots)
max. 721 kbps (57.6 kbps return channel)
108.8 - 432.6 kbps (symmetric)

10 11 12

13 14

15 16 17

Bluetooth Protocol Stack


Applications
TCS RFCOMM SDP

Data

Audio

Co
ntr
ol

Other

L2CAP
Link Manager

Baseband
RF

Application Framework
and Support
Host Controller
Interface
Link Manager and
L2CAP
Radio & Baseband

Bluetooth Protocol Stack


Bluetooth Radio : specifics details of the air interface,
including frequency, frequency hopping, modulation scheme,
and transmission power.
Baseband: concerned with connection establishment within a
piconet, addressing, packet format, timing and power control.
Link manager protocol (LMP): establishes the link setup
between Bluetooth devices and manages ongoing links,
including security aspects (e.g. authentication and encryption),
and control and negotiation of baseband packet size

Bluetooth Protocol Stack


Logical link control and adaptation protocol (L2CAP): adapts
upper layer protocols to the baseband layer. Provides both
connectionless and connection-oriented services.
Service discovery protocol (SDP): handles device information,
services, and queries for service characteristics between two or
more Bluetooth devices.
Host Controller Interface (HCI): provides an interface method
for accessing the Bluetooth hardware capabilities. It contains a
command interface, which acts between the Baseband controller
and link manager

Bluetooth Protocol Stack


TCS BIN (Telephony Control Service): bit-oriented protocol
that defines the call control signaling for the establishment of
voice and data calls between Bluetooth devices.
OBEX(OBject EXchange) : Session-layer protocol for the
exchange of objects, providing a model for object and
operation representation
WAE/WAP: Bluetooth incorporates the wireless application
environment and the wireless application protocol into its
architecture.

Connection Establishment States


Standby
State in which Bluetooth device is inactive, radio not switched
on, enable low power operation.
Page
Master enters page state and starts transmitting paging messages
to Slave using earlier gained access code and timing information.
Page Scan
Device periodically enters page state to allow paging devices to
establish connections.

Connection Establishment States


Inquiry
State in which device tries to discover all Bluetooth
enabled devices in the close vicinity.
Inquiry scan
Most devices periodically enter the inquiry scan state to
make themselves available to inquiring devices.

Inquiry and Page


Slave

Master
Standby

Inquiry

(1) ID packet (Broadcast)

(2) FHS packet


Page

(3) P
aging

Inquiry
scan

Inquiry
response

ID pa
cket

Page
scan
Master
response

(4) ID packet
(5) F

HS p

acket

Slave
response

(6) ID packet
Connection

Connection
(7) ID packet

Standby

Security: Key generation and


usage
PIN
User Input
PIN

(Initialization)

E2

E2
Authentication
Link Key

Link Key

E3

E3
Encryption

Encryption Key

Encryption Key

(possibly)
Permanent
Storage

Temporary
Storage

Other Short Range Protocols


ZigBee
Z-Wave

ZigBee-Introduction

ZigBee based on IEEE 802.15.4 standard


Specifically for control and sensor networks
For a low data rate WPAN
Also provides low power consumption
Low complexity
Data rate limited to 250 kbps in global 2.4 GHz ISM
band
Remote monitoring and control for sensory network
applications
Created by an organization known as ZigBee Alliance

ZigBee-How it works?

Uses digital radios


A typical ZigBee network consists of several types of
devices
A network coordinator is a device that sets up the
network
Manages-information about each node-information
transmitted or received
Router (FFD)

Devices that interact


with physical world
(FFD)

Network coordinator
(FFD)

Other Full Function Devices (FFD's) may be found in


the network(coordinators ,routers ,other devices)
Several topologies are supported by ZigBee, including

ZigBee-How it Operates?
Zeegbee operates in two major
Beacon mode modes
Non-beacon mode

Fully coordinated mode

Less coordinated mode

All devices know when to


coordinate with one another

Any device can communicate


with the coordinator at will

Network coordinator will


periodically "wake-up to send
out a beacon

This operation can cause


different devices within the
network to interfere

Beacon subsequently wakes up


each device

Coordinator must always be


awake to listen for signals

The device returns to sleep, as


will the network coordinator,
once its job is complete

ZigBee obtains its overall low


power consumption

ZigBee-What does it do?

Designed for wireless controls


and sensors
Could be built into anything
around your home or office
Devices can interact without
wires and you can control
them all
It goes well beyond singlepurpose wireless devices
Such as garage door openers
and "The Clapper" that turns
light on and off
It allows wireless two-way
communications
It travels across greater
distances and handles many
sensors that can be linked to

DATA TRANSFER MODELS


Peer to peer

Star

mesh

Z-Wave Wireless Solution


Z-Wave is a wireless communications protocol
designed for home automation, specifically to remote
control applications in residential
The technology uses a low-power RF radio embedded
into home electronics devices and systems, Bandwidth:
9,600 bit/s or 40 kbit/s, fully interoperable
Range: Approximately 30 meters assuming "open air"
conditions,.
Frequency band: uses the sub-1GHz ISM band
Z-Wave's well suited for home audio and video
applications.

Z-Wave Applications

Compatibility is very
GOOD!

Comparison-ZigBee vs Bluetooth

Zigbee
Remote sensing & control

Bluetooth
Machine to machine

Wireless Application Environment (WAE)

Wireless Application Environment


(WAE)
Goals
device and network independent application environment
for low-bandwidth, wireless devices
considerations of slow links, limited memory, low computing power,
small display, simple user interface (compared to desktops)
integrated Internet/WWW programming model
high interoperability
Minimize the over the air traffic and resource consumption on the
handheld devices

WAP Architecture

WAP Gateway

WML
WMLScript
WTAI
Etc.

Web Server

WML Encoder

WSP/WTP

WMLScript
Compiler
Protocol Adapters

HTTP

CGI
Scripts
etc.

Content

WML Decks
with WML-Script

Client

Source: WAP Forum

WAE: Logical Model


Origin Servers
web
server

other content
server

Client

Gateway
response
with
content

Method proxy

encoded
response
with
content

Push proxy
push
content

request

encoders
&
decoders

encoded
push
content

encoded
request

WTA
user agent

WML
user agent

other
WAE
user agents

Wireless Application Environment


(WAE)

Model is close to www model but assumes an additional gateway


A client issues an encoded request for an operation
Encoding minimizes the data sent over the air.
Gateway
Decodes the encoded request into standard request understood
by the origin servers.
Transfer the request to the appropriate server.
The origin server will respond to the request.
Gateway
Encodes the response
Transfer to the client
Incase the server PUSH content to the gateway then too the
gateway encodes it and PUSHes it to the client.

Wireless Application Environment


(WAE)

Within the client various user agents can reside


Browser
Phonebook
Message editor etc.
WAE does not specify the number of user agents that can reside.
WTA user agent handles the access and interaction with mobile
telephone features (call control etc)

ADVANTAGES
Simplicity of use.
Mobility.
Personalized.
Easy to carry.
Increased sales for devices ,infrastructure & gateway
manufacturer.
Time saving.

DISADVANTAGES

Battery life
Small display screens
Speed of access
Limited availability
Price
Lack of user habit
Limited memory
Limited bandwidth

USAGE/APPLICATIONS
Corporate Applications: Sales force automation
where sales people use their WAP enabled handsets to get
instant, direct access to the latest pricing, latest news,
competitive information any time, anywhere.
Online Services:
-Banking: Users can get their current balance, transfer
funds between accounts and receive fax of a ministatement.
-Electronic Commerce: Subscribers can use their handset
just like their PC to purchase products and services over
the Web.

Tele services
-Prepaid Services: With a WAP-enabled phone, prepaid
subscribers can see their current balance with the press of a
button. By pressing another button, they can also recharge their
account by entering a credit card or voucher number into the
handset.
Personal Productivity
-Email: Using WAP users can keep track of their email right
from their handset.
Others include:
Interactive Chat
Auctions
Games

Middleware

What is Middleware?
Middleware is connectivity software that consists of a set
of enabling services that allow multiple processes running
on one or more machines to interact with each other.
software that allows organizations to share data between
disparate systems that do not communicate easily.

Middleware- Technical Details:


Middleware services are sets of distributed software that
exist between the application and the operating system and
network services on a system node in the network.

Middleware Use
Application

Application

API

Middleware (Distributed System Services)

Platform interface

Platform interface

Platform
OS

Platform
OS

Middleware : Application
Middleware enables applications running across multiple
platforms to communicate with each other .
Middleware shields the developer from dependencies on
Network Protocols, OS and hardware platforms.

Middleware Different Forms

Transaction Processing (TP) monitors.


Remote Procedure Calls (RPC)
Message Oriented Middleware (MOM)
Object Request Brokers (ORBs)

A Transaction Processing Monitor (TP monitor) is a systems


tool for configuration and management of usage of Computing
Resources (terminals, printers, database resources) by users.
Debit
account

Server
1

Client

Transfer
Server
2

Credit
account

Client

DB

DB

Server
1

DB

Server
2

DB

TPM

TP Monitors - Demonstration
Client

Client

Processing
Routines

Client

Client
Transaction
Processing
Monitor
Client
Client Transaction Type Requests

Database

RPC - Demonstration

Application

RPC
Stub

Application
Server

T
R
A
N
S
P
O
R
T

N
E
T
W
O
R
K

Application specific
procedure invocations
and returns

N
E
T
W
O
R
K

T
R
A
N
S
P
O
R
T
RPC
Stub

Remote Procedure Call


RPC is a powerful technique for constructing distributed,
client-server based applications.
Its is a protocol that one program can use to request a
service from a program located in another computer in a
network without having to understand network details

ORB - Demonstration
ORB
Activate service

Locate service
Establish
connection

communicate

Client Application

Remote Service
(Object)

Message Oriented Middleware


MOM (Message Oriented Middleware) is a client / server
infrastructure which allows the application to be distributed
over multiple heterogeneous platforms.
Reduces complexity of applications spanning operating
systems and network protocols by insulating them from unnecessary details.

Message Oriented Middleware


Data is exchanged by message passing and/or message
queuing supporting both synchronous and asynchronous
interactions between distributed computing processes.
The MOM system ensures message delivery by using
reliable queues and by providing the directory, security,
and administrative services required to support
messaging.

MOM - Demonstration
Message

Message

A
P
P
L
I
C
A
T
I
O
N

M
O
M
A
P
I

T
R
A
N
S
P
O
R
T

N
E
T
W
O
R
K

Application A
(Client A)

Queue

MOM Provider

N
E
T
W
O
R
K

T
R
A
N
S
P
O
R
T

M
O
M
A
P
I

Application B
(Client B)

A
P
P
L
I
C
A
T
I
O
N

MOM - Architectural
Significance

Mainframe

J2EE Application
A
P
P
L
I
C
A
T
I
O
N

Process C

Listener
Message

Process B
Message

Process A

Transaction

5
8

Q1

Q2
Message

Listener
Message

Message

Middle Layer
0
9

Database

Advantages of Middleware:
Real time information access among systems
Streamlines business processes and helps raise
organizational efficiency.
Maintains information integrity across multiple systems

Disadvantages of Middleware
Prohibitively high development costs.
Implementations are very time consuming, and need a lot of
resources.
There are few people with experience in the market place.
There exists relatively few satisfying standards.
The tools are not good enough.
Too many platforms to be covered.
Middleware often threatens the real-time performance of a
system.
Middleware products are not very mature.

THANK YOU

You might also like