introduction to pan
TRANSCRIPT
-
8/14/2019 Introduction to Pan
1/53
1.0INTRODUCTION
1.1 Background
In recent years, there have been substantial developments in the acceptance and
functionality of wireless networks. Organisations are finding their workforce
increasingly mobile, often equipped with notebook computers and spending more of
their productive time working away from the standard office-desk or personal-computer
environment. More often than not, many workers find cables to be a hassle as cables get
lost or damaged easily and they add unnecessary bulk and weight when carried around.
Wireless network has been able to solve the problem as wireless networks support
mobile workers by providing the required freedom in their network access. Working
wirelessly also allows these workers to access networked resources from any point
within the range of a wireless access point. For Information Technology managers, the
combination of lowering wireless hardware costs and the ease of implementation into
diverse office environments means that wireless deployment is actively promoted, for it
provides the combination of wired network throughput with mobile access and
configuration flexibility. Thus, it has becomes quite desirable to develop connectivity
solutions for interconnecting personal devices that do not require the use of cables.
1.2 Objective
Going wireless has its disadvantages. There has been discussion about the problems of
interoperation, backwards compatibility and interference between the various
technologies. The most prevalent WLAN technology, Wi-Fi which operates within the
crowded 2.4 GHz ISM band brings about the problem of interference between Wi-Fi and
Bluetooth. Researches done on this interference issue have concluded that, when
1
-
8/14/2019 Introduction to Pan
2/53
separated by two metres or more, there appears to be no significant interference.
However, when the separation distances is less than two metres, the two technologies
can interfere with each other and this can cause severe problems when collocated within
a single device.
Several solutions have already been proposed, ranging from modifications and
extensions to the existing standards, through recommended best practices and
technological advances. The 802.15.3 standard has been recently approved by IEEE as a
high data rate WPAN. This new standard would be able to bring WPAN to greater
heights as it would be able to provide the foundation for a broad range of interoperable
consumer devices by establishing universally adopted standards for wireless digital
communication. The objective of the 802.15.3 is to rapidly create a consensus standard
that has broad market applicability and deals effectively with the issues of coexistence
with other wireless networking solutions. 802.15.3 is not an extension of 802.15.1
because the MAC is different. This project attempts to investigate the compatibility of at
least the coexistence of 802.15.3 with other systems, especially those in similar market
spaces, such as Bluetooth.
1.3 Report overview
The report will attempt to discuss the design and operating characteristics of the
Bluetooth voice transmission and 802.15.3. This report will first give an overview of the
Bluetooth technology as well as that of 802.15.3. Subsequently, a modelling and
simulation of the Bluetooth voice transmission and the operating characteristics of
802.15.3 using the MATLAB software package will be presented. The results of the
Bluetooth voice transmission will also be presented and analysed, together with the
2
-
8/14/2019 Introduction to Pan
3/53
analysis for the operating characteristics of 802.15.3. Finally, recommendations and
conclusions on the results will be made.
3
-
8/14/2019 Introduction to Pan
4/53
2.0 BLUETOOTH
2.1 Overview
Bluetooth SIG was founded in 1998 when several telecommunications and computing
companies noticed that there was a need for a wireless technology to connect portable
devices such as laptops and mobile phones. As infrared technology had its limitations,
thus, a technology based on radio links was conceived.
To avoid the chaos of incompatible proprietary solutions, the major telecommunications
and computing companies, Nokia, Ericsson, IBM, Intel and Toshiba decided to create a
common standard for wireless connectivity called Bluetooth. The consortium, Bluetooth
SIG was established to create and publish specifications, promote the technology and
administer a qualification program to ensure interoperability.
Bluetooth was designed to allow low bandwidth wireless connections to become simple
to use to be integrated into daily life. It uses a short-range radio link that has been
optimised for power-conscious, battery-operated, small size, lightweight personal
devices. An example of a Bluetooth application is the updating of phone directory of the
mobile phone. Today, one would have to either manually enter the names and phone
numbers of all contacts or use a cable or IR link between the phone and the PC and start
an application to synchronise the contact information. With Bluetooth, this could all
happen automatically and without any user involvement as soon as the phone comes
within range of the PC.
2.2 Purpose
Bluetooth technology was invented to replace cables between small personal devices
4
-
8/14/2019 Introduction to Pan
5/53
such as mobile phones, pagers, PDAs (refer to Figure 2.1). As such, Bluetooth wireless
technology is optimised for short-range, low-power, voice and data communication.
Although some Bluetooth profiles describe methods to connect personal devices to
networks, Bluetooth technology is not a bona fide networking technology.
In contrast to WLAN technologies such as IEEE 802.11, Bluetooth wireless
communications consume significantly less power because Bluetooth links operate over
shorter distances and at lower data rates. The nominal data rate and range for Bluetooth
technology are each about one-tenth that of the IEEE 802.11. Although this does not
necessarily mean that Bluetooth communication uses only 1 percent of the power
required for WLAN communication, it does indicate that significantly less power is
required for Bluetooth communications.
Figure 2.1: Bluetooth environment (Sturman 2003)
2.3 WPAN architecture
A Bluetooth WPAN is created in an ad-hoc manner whenever an application in a device
desires to exchange data with matching applications in other devices. The Bluetooth
5
-
8/14/2019 Introduction to Pan
6/53
WPAN ceases to exist when the applications involved have completed their tasks and is
no longer need for the exchange of data.Bluetooth devices use FHSS, moving through
1,600 different frequencies per second or 625us per frequency hop to reduce
interferences and fading. There are 79 or 23 RF channels of 1MHz with a symbol rate of
1Mbps Radio power between 0 and 20 dBm. A typical Bluetooth device has a range of
about 10 metres. Bluetooth devices use TDMA scheme where the master starts its
transmission in even numbered slots only, whereas the slave starts its transmission solely
in odd numbered slots. On the channel, information is exchanged through packets. Each
packet is transmitted on a different frequency in the hopping sequence. A packet
nominally covers a single slot, although it can be extended up to either three or five slots.
A Bluetooth WPAN supports both synchronous communication channels for telephony-
grade voice communication and asynchronous communications channels for data
communications. The supported channel configurations are as shown in Table 2.1.
Configuration Max. Data Rate
(Upstream)
Max. Data Rate
(Downstream)
3 Simultaneous Voice
Channels
64 kb/sec X 3 channels 64 kb/sec X 3 channels
Symmetric Data 433.9 kb/sec 433.9 kb/sec
Asymmetric Data 723.2 kb/sec
or 57.6 kb/sec
723.2 kb/sec
or 57.6 kb/sec
Table 2.1: Channel configuration (Blankenbeckler n.d.)
The synchronous voice channels are provided using circuit switching with a slot
reservation at fixed intervals while the asynchronous data channels are provided using
6
-
8/14/2019 Introduction to Pan
7/53
packet switching utilising a polling access scheme. A combined data-voice SCO packet
is also defined and can provide 64 kb/sec voice and 64 kb/sec data in each direction.
2.3.1 The Bluetooth WPAN piconet
A piconet is a WPAN formed by a Bluetooth device serving as a master in the piconet
with one or more Bluetooth devices serving as slaves. Each piconet is defined by the
address of the master based on a frequency-hopping channel. All devices participating in
communications in a given piconet are synchronised to the frequency-hopping channel
for the piconet, using the clock of the master of the piconet. Usage scenarios may dictate
that certain devices act always as masters or slaves. However, a slave device could be
used as a master during one communications session and vice versa. Slaves
communicate only with their master in a point-to-point fashion under the control of the
master while the masters transmissions may be either point-to-point or point-to-
multipoint. Multiple piconets with overlapping coverage areas form a scatternet.
2.3.2 The Bluetooth WPAN scatternet
A scatternet is a collection of operational Bluetooth piconets overlapping in time and
space. A Bluetooth device may participate in several piconets at the same time, thus
allowing for the possibility that information could flow beyond the coverage area of the
single piconet. A Bluetooth unit can act as a slave in several piconets but only as a
master in a single piconet. To participate on the proper channel, it should use the
associated master device address and proper clock offset to obtain the correct phase.
Figures 2.2 and 2.3 show the various ways Bluetooth devices interconnect to form a
communicating system.
7
-
8/14/2019 Introduction to Pan
8/53
Figure 2.2: A piconet (Blankenbeckler n.d.)
SM
S M
SS
S
S
Figure 2.3: Scatternet consisting of 2 piconet (Tzamaloukas n.d.)
M Master S Slave
2.4 Physical layer
The PHY is the first layer of the seven-layer OSI model and is responsible for
transmitting bits over adjacent system over the air. Bluetooth operates in the 2.4 GHz
ISM band. In a majority of countries around the world, the range of this frequency band
8
-
8/14/2019 Introduction to Pan
9/53
is between 2400 MHz to 2483.5 MHz. In the United States and Europe, a band of 83.5
MHz width is available with 79 RF channels spaced 1 MHz apart being defined. France,
on the other hand has a smaller band with 23 RF channels spaced 1 MHz apart being
defined.
2.4.1 Transmitter characteristic
Each device is classified into three power classes, namely Power Class 1, 2 and 3.
1. Power Class 1 is designed for long range (approximately 100m) devices, with a
maximum output power of 20 dBm,
2. Power Class 2 is for ordinary range devices (approximately 10m) devices, with a
maximum output power of 4 dBm,
3. Power Class 3 is for short range devices (approximately 10cm) devices, with a
maximum output power of 0 dBm.
The Bluetooth radio interface is based on a nominal antenna power of 0dBm and each
device can optionally vary its transmitted power.
2.4.2 Modulation
The Bluetooth radio module uses GFSK where a binary one is represented by a positive
frequency deviation and a binary zero, by a negative frequency deviation. Bluetooth
bandwidth time is set to 0.5 and the modulation index must be between 0.28 and 0.35.
2.4.3 Receiver characteristic
2.4.3.1 Sensitivity level
The receiver must have a sensitivity level for which the bit error rate 0.1 percent is met.
For Bluetooth this means an actual sensitivity level of -70dBm or better.
9
-
8/14/2019 Introduction to Pan
10/53
2.4.3.2 Interference performance
The interference performance on Co-channel and adjacent 1 MHz and 2 MHz are
measured with the wanted signal 10 dB over the reference sensitivity level. On all other
frequencies, the wanted signal should be 3 dB over the reference sensitivity level. If the
frequency of an interfering signal lies outside the band of 2400 MHz to 2497 MHz, the
out-of-band blocking specification shall apply.
2.4.3.3 Out-of-band blocking
The out-of-band blocking is measured with the wanted signal 3 dB over the reference
sensitivity level and the interfering signal shall be a continuous wave signal. The BER
shall be less than or equal to 0.1 percent and the out-of-band blocking should fulfil the
requirements as stated in Table 2.2.
Interfering Signal frequency (GHz) Interfering Signal Power (dBm)
0.030 2.000 -10
2.000 2.399 -27
2.498 3.000 -27
3.000 12.750 -10
Table 2.2: Out of band blocking requirements (IEEE 802.15.1 2002)
2.5 Baseband layer
The baseband layer lies on top of the Bluetooth physical layer in the Bluetooth stack.
The baseband protocol is implemented as a link controller, which works with the link
manager for the carrying out of link level routines such as link connection and power
10
-
8/14/2019 Introduction to Pan
11/53
control. The baseband also manages asynchronous and synchronous links, handles
packets and does paging and inquiry to access and inquire Bluetooth devices in the area.
For full duplex transmission, a Time-Division Duplex scheme is used. On the channel,
information is exchanged through packets with each packet being transmitted on a
different hop frequency. A packet nominally covers a single slot, but can be extended to
cover up to five slots.
2.5.1 Packets
Thirteen different packet types are defined for the baseband layer of the Bluetooth
system. All higher layers use these packets to compose higher level PDU's. The ID,
NULL, POLL, FHS, DM packets are defined for both SCO and ACL links while the DH,
AX1, DM3, DH3, DM5, DH5 packets are defined for ACL links only and the HV1,
HV2, HV3, DV for SCO links only.
Each packet consists of three entities, namely the access code (68/72 bits), the header
(54 bits) and the payload (0-2745 bits) as shown in Table 2.3.
Table 2.3: Standard packet format (Nokia 2003)
The first entity, the access code are used for timing synchronisation, offset compensation,
paging and inquiry. There are three different types of access code, namely Channel
Access Code (CAC), Device Access Code (DAC) and Inquiry Access Code (IAC). The
channel access code identifies a unique piconet and the DAC is used for paging while
11
-
8/14/2019 Introduction to Pan
12/53
the IAC is used for inquiry purpose.
The second entity, the header contains information for packet acknowledgement, packet
numbering for out-of-order packet reordering, flow control, slave address and error
check for header.
The third entity, the packet payload can contain either voice field, data field or both. It
has a data field and the payload will also contain a payload header.
12
-
8/14/2019 Introduction to Pan
13/53
3.0 IEEE 802.15.3
3.1 Overview
The IEEE 802.15 Working Group, a part of the IEEE 802 LAN/MAN Standards
Committee, develops the Personal Area Network consensus standards for short distance
wireless networks known as WPAN. These WPANs address wireless networking of
portable and mobile computing devices such as PCs, PDAs, peripherals, cell phones,
pagers and consumer electronics; allowing these devices to communicate and
interoperate with one another. The 802.15 Working Group also develops low-power
standards for personal area networks with long battery life and low cost requirements.
Some of the interesting sub-groups include:
1. 802.15.1, a derivative of Bluetooth
2. 802.15.2 offers similar abilities to those of Bluetooth and 802.15.1, but it is
designed to coexist with 802.11b, WLAN without causing interference
3. 802.15.3 aims to increase the data rate similar to those of Bluetooth and 802.15.1.
The target was originally 20Mbit/sec.
4. 802.15.3a is follow-on of 802.15.3 and it support up to 110 Mbps.
5. 802.15.4 is a low power version, with low data rate and long battery life. It is
intended for smart card, security tag and other embedded devices (Khirat & Kadhi 2002).
IEEE 802.15.3 was designed to enable wireless connectivity of high-speed, low-power,
low-cost, multimedia-capable portable consumer electronic devices. This standard
provides data rates from 11 to 55 Mb/s at distances of greater than seventy metres while
maintaining quality of service (QoS) for the data streams. It also addresses the QoS
capabilities required to support multimedia data types and focuses on power
13
-
8/14/2019 Introduction to Pan
14/53
management, quality of service and security. Additionally, this standard is designed to
provide simple, ad-hoc connectivity similar to Bluetooth that allows the devices to
automatically form networks and exchange information without the direct intervention
of the user. Products compliant with this standard will complement, not compete with,
products compliant with IEEE 802.11, because 802.11 is a standard for Local Area
Networks, and 802.15.3 will be a standard for Personal Area Networks. The difference is
similar to that in the wired world of Ethernet and USB or Firewire, which provide for
connectivity to the network and to peripheral devices respectively (Dornan 2002).
As Bob Heile of IEEE 802.15 (cited in IEEE 2004), pointed out, One of the major goals
for 802.15, as well as for the Bluetooth SIG, is global use of WPAN technology. The
802.15.3 standard allows networks based on this specification to coexist with other
802.15 WPANs, such as Bluetooth systems, and with 802.11 WLANs, especially
802.11b and 802.11g, which also operate in the 2.4-GHz band. Devices using IEEE
802.15.1 WPAN and Bluetooth technology will provide country-to-country usage for
travellers. They will be able to be used in cars, airplanes and boats on a global basis.
3.2 Purpose
A goal of this standard will be to achieve a level of interoperability or coexistence with
other 802.15 standards. It is also the intent of this standard to work towards a level of
coexistence with other wireless devices in conjunction with coexistence task groups such
as 802.15.2.
Based on the previous calls for applications collected for 802.15, there remains a
significant group of applications that could not be addressed by 802.15.1. High data
14
-
8/14/2019 Introduction to Pan
15/53
rates are required for time dependent and large file transfer applications such as video or
digital still imaging, without sacrificing the requirements of 802.15.3. 20 Mb/s is
proposed to be the lowest rate for these types of data.It is not and extension of 802.15.1,
because the MAC needs are different.
The purpose of 802.15.3 is to provide for low complexity, low cost, low power
consumption that are comparable to the goals of 802.15.1 and high data rate wireless
connectivity among devices within or entering the personal operating space. The data
rate is high enough, 20 Mb/s or more, to satisfy a set of consumer multimedia industry
needs for WPAN communications (IEEE 802.15.3 2003).
3.3 Communication environment
WPANs are used to convey information over relatively short distances among a
relatively few participants. Unlike WLANs, connections effected via WPANs involve
little or no infrastructure. This allows small, power efficient, inexpensive solutions to be
implemented for a wide range of devices.
The data rate must be high enough, that is, greater than 110 Mbps, to satisfy a set of
consumer multimedia industry needs for WPAN communications. It uses time division
multiple access to allocate channel time among devices to prevent conflicts and only
provides new allocations for an application if enough bandwidth is available.
Devices included in the definition of PAN are those that are carried, worn or located
near the body. Specific examples of devices include those that are thought of as
traditionally being networked, such as computers, PDAs, handheld personal computers,
15
-
8/14/2019 Introduction to Pan
16/53
and printers. Other devices include digital imaging systems, microphones, speakers,
headsets, bar code readers, sensors, display and pagers.
3.3.1 Piconet
A piconet is a set of devices within a personal operation space operating under the
control of a PNC in order to share a wireless resource. The PNC always provides the
basic timing for the WPAN. Additionally, the PNC manages the QoS requirements of
the WPAN. This wireless ad-hoc communication covers at least ten metres in all
directions and envelops the person or a thing, whether stationary or in motion. This
standard allows a device to request the formation of a subsidiary piconet. The original
piconet is referred to as the parent piconet while the subsidiary piconet is referred to as
either a child or neighbour piconet, depending on the method the DEV is used to
associate with the parent PNC. Child and neighbour piconets are also referred to as
dependent piconets since they rely on the parent PNC to allocate channel time for the
operation of the dependent piconet. An independent piconet is a piconet that does not
have any dependent piconets. Parent and child piconets share common frequency
channel while an independent piconet is either far enough apart or on different frequency
channel and operates independently of other piconets. Child piconet controller can
exchange data with parent piconet controller while a neighbour piconet controller only
shares frequency channel. Unassociated device listens for presence of other piconets and
associates with existing piconet or forms independent, child or neighbour piconet
depending on directives from host controller and presence of other piconets (refer to
Figure 3.1).
16
-
8/14/2019 Introduction to Pan
17/53
Parent Piconet Controller
Piconet Device
Child/Neighbour Piconet Controller
Piconet Relationship
Peer to Peer Data Transmission
Independent Piconet Controller
Figure 3.1: A WPAN topology (Barr 2002)
3.4 MAC layer
IEEE 803.15.3 MAC is designed to support the fast connection, ad-hoc networks,
quality of service with data transport, security, channel robust for multimedia traffic
over the WPAN and peer to peer communication. The device in the piconet are able to
employ power saving techniques to reduce their power consumption.
3.4.1 Superframe
Figure 3.2: Superframe structure (IEEE 802.15.3 2003)
Superframe #m-1 Superframe #m Superframe #m+1
Channel Time Allocation Period
CTA CTA
n-1 n
MCTA MCTA CTA CTA
1 2 1 2
ContentionAccess
Period
Beacon
# m
17
-
8/14/2019 Introduction to Pan
18/53
Channel time in the 802.15.3 piconet is divided into a superframe, which is illustrated in
Figure 3.2. The superframe is composed of three parts, namely the beacon, contention
access period and the channel time allocation period. The beacon, which is used to set
the timing allocations and to communicate management information for the piconet
consists of the beacon frame, as well as any Announce commands sent by the PNC as a
beacon extension. The contention access period (CAP) is used for
authentication/association for request/response while the channel time allocation period
(CTAP), which consist of CTAs, and MCTAs. CTAs are used for commands,
isochronous streams and asynchronous data connections.
The length of the CAP is determined by the PNC and communicated to the devices in
the piconet via the beacon. However, the PNC is able to replace the functionality
provided in the CAP with management CTAs, except in the case of the 2.4 GHz PHY,
where the PNC is required to allow the device to use the CAP. MCTAs are a type of
CTA that is used for communications between the devices and the PNC.
The CAP uses CSMA/CA for the medium access. The CTAP, on the other hand, uses a
standard TDMA protocol where devices have specified time windows. MCTAs, are
either assigned to a specific source or destination pair and use TDMA for access or they
are shared CTAs that are accessed using the slotted aloha protocol.
3.5 Physical layer
The PHY operates in the 2.4 2.4835 GHz frequency range. It specifies raw data rates
of 11, 22, 33, 44 and 55M bit/sec, with the respective modulation type QPSK, DQPSK,
16-QAM, 32-QAM, and 64-QAM. The base rate of 22M bit /sec is uncoded while 11, 33,
18
-
8/14/2019 Introduction to Pan
19/53
44 and 55M bit/sec use trellis coded modulation. Distance plays a role in transmission
speed. The closer the device is to the access point, the higher the bandwidth. For
instance, a device up to fifty metres away from an access point can transmit data at a
speed of 55M bit/sec, while the transmission speed of a device one hundred metres away
drops to 22M bit/sec. The highest rate, 55M bit/sec, is necessary for low-latency,
multimedia connections and large-file transfers, while 11M bit/sec and 22M bit/sec rates
are ideal for long-range connectivity for audio devices (Barr 2002).
3.5.1 Channels
The on-air bandwidth is limited to 15 MHz in order to allow more channels as well as to
decrease the interference to other systems and to decrease the susceptibility to
interference from other systems. The transmit power is approximately 8dBm.
A total of five channels in two sets are assigned for operation. The first set allocates four
channels for high-density application while the second allocates three channels to enable
better co-existence with IEEE Std 802.11b -1999. Since the two outer channels of the
sets overlap, there are a total of five channels allowed for operation. The assigned
channels are shown in Table 3.1. A compliant 802.15.3 implementation shall support all
five channels.
19
-
8/14/2019 Introduction to Pan
20/53
CHNL_ID Centre frequency High-density 802.11b coexistence
1 2.412 GHz X X
2 2.428 GHz X
3 2.437 GHz X
4 2.445 GHz X
5 2.462 GHz X X
Table 3.1: GHz channel plan (IEEE 802.15.3 2003)
A device may, in the course of a scan, change to an 802.11b channel for the purpose of
detecting the presence of 802.11b networks. When a device is scanning to start a piconet,
it should scan all five channels to decrease the probability of choosing an occupied
channel. If a device is capable of identifying an 802.11b network and it does identify an
802.11b network while scanning, it should use the 802.11b coexistence channel set. It
should also rate the channels where 802.11b networks were identified as the worst
channels. If multiple 802.11b networks are detected, the device should order them based
on an estimate of the amount of traffic and the power level in the channel.
3.5.2 Modulation and coding
The 2.4-GHz physical layer standard specifies uncoded DQPSK modulation as well as
QPSK, 16/32/64-QAM with trellis coding (refer to Figure 3.3). An 802.15.3-compliant
DEV shall, at a minimum, support DQPSK modulation. In addition, if an 802.15.3 DEV
supports a given modulation format other than DQPSK, it shall also support all of the
lower modulation formats. For example, if an 802.15.3 implementation supports 32-
20
-
8/14/2019 Introduction to Pan
21/53
QAM, it shall also support 16-QAM and QPSK-TCM as well as the DQPSK modulation
formats.
64-QAM TCM (55 Mbit/s)
16-QAM TCM (33
Mbit/s)
DQPSK, QPSK
32-QAM TCM (44 Mbit/s)
(22 Mbit/s uncoded, 11
Mbit/s coded
Figure 3.3: DQPSK, QPSK, 16/32/64 QAM signal constellations
(IEEE 802.15.3 2003)
3.5.2.1 DQPSK modulation
No coding shall be applied to the DQPSK modulation. The mapping of the bit pairs to
DQPSK symbols shall be implemented as specified in Table 3.2. In Table 3.2, phase
change shall be defined as a counter clockwise rotation. The differential encoding
applies only to the DQPSK mode. In this mode, the entire frame, with the exception of
the PHY preamble shall be encoded differentially.
21
-
8/14/2019 Introduction to Pan
22/53
Bit pattern d0, d1 Phase change
0,0 0
0,1 /21,0
1,1 -/2
Table 3.2:DQPSK encoding table (IEEE 802.15.3 2003)
3.5.3 Base data rate
The base data rate of the 802.15.3, 2.4-GHz PHY shall be 22 Mb/s operating in the
uncoded DQPSK mode. The DQPSK mode is used as a base rate instead of the 11 Mb/s
QPSK-TCM mode to reduce the overhead due to the duration of the PHY and MAC
headers. Also, DQPSK capability is necessary to implement the PHY preamble.
3.6 Coexistence, interoperability and interference
Coexistence, in this context, refers to the co-location of IEEE P802.15.3 devices with
other, non-802.15.3 devices. The criteria described in this section focuses only on the
impact the 802.15.3 devices have on other non-P802.15.3 devices that may be sharing
the same frequency bands. The following IEEE wireless protocols are allowed to operate
in an operational area that overlaps with the operational area of an 802.15.3 piconet, but
could experience reduced throughput:
1. 802.11 DSSS
2. 802.11 FHSS
3. 802.11b
22
-
8/14/2019 Introduction to Pan
23/53
4. 802.15.1
with some networks, the throughput could be reduced and so under certain conditions,
overlapping operation might be undesirable.
3.6.1 Interoperability with 802.11b
802.11b and 802.15.3 share the same frequency band, which makes interoperability of
radio modules much simpler and cheaper. Additionally, the 802.15.3 PHY layer uses 11
Mbaud, DQPSK modulation for the base rate, which is the same as the chip rate and
modulation for 802.11b. However, 802.11b uses either a Barker code, CCK or PBCC as
a spreading code, which is not a part of the 802.15.3 standard. The 802.15.3 PHY was
also chosen with the same frequency accuracy, allowing the reuse of reference frequency
source and frequency synthesisers. While the 802.11b and 802.15.3 frequency plans are
slightly different, the synthesisers that would normally be used in either radio would be
capable of 1 MHz frequency step size and so would be capable of supporting either
frequency plan. The RX/TX turnaround time is also the same for both protocols (Gilb
2001). However, the TX/RX turnaround for 802.11b is 5 micro seconds versus a 10
micro seconds for 802.15.3, which could have an impact on the architecture of a dual-
mode radio. Thus, the similarities between 802.15.3 and 802.11b are as follows:
1. DQPSK modulation
2. 11 MBaud symbol (chip) rate.
3. Frequency and symbol timing accuracy of +/- 25 ppm.
4. RX/TX turnaround time
5. Power ramp up/down
Some of the differences include:
23
-
8/14/2019 Introduction to Pan
24/53
1. Barker, CCK or PBCC spreading code
2. Power spectral density
3. Frequency plan
4. Performance criteria
5. TX/RX turnaround time.
6. PHY preamble, header, frame structure
7. MAC
3.6.2 Coexistence with 802.11b
The 802.15.3 PHY faces two problems in coexisting with 802.11b.
1. Both use the same frequency range
2. 802.11b uses CSMA/CA and a polling method with the point coordination function
while 802.15.3 uses a hybrid CSMA/CA and TDMA.
802.15.3 piconets use two access methods in the superframe; CSMA/CA during the
CAP and TDMA during the CTAP. The CAP provides the best method of coexistence
with 802.11b networks, since the CSMA/CA algorithm used in the CAP is similar to the
CSMA/CA algorithm used in 802.11b, that is, the transmitter uses a listen-before-talk
mechanism.
In the case of 802.11, there is more than one CCA method allowed and some of them
would not recognise an 802.15.3 frame. In this case, the 802.11b transmission might
collide with 802.15.3 frames. However, an 802.11b station which implemented energy
above threshold for CCA, that is, CCA mode 1 or CCA mode 5, would signal that the
medium is busy when a sufficiently strong 802.15.3 signal is present. The 2.4 GHz PHY
24
-
8/14/2019 Introduction to Pan
25/53
of 802.15.3 requires energy detection as a part of the CCA process. A sufficiently strong
802.11b signal would result in the 802.15.3 DEV signalling that the medium is busy,
which would improve the coexistence performance. A sufficiently strong 802.11b signal
would result in the 802.15.3 DEV signalling that the medium is busy, which would
improve the coexistence performance.
3.7 Comparisons between the two standards
A comparison between some characteristics of the IEEE 802.15.3 and Bluetooth is given
by Table 3.3 below.
Bluetooth 802.15.3
Centre frequency 2.4 GHz 2.4 GHz
Baud rate 1 MHz 11 MHz
Modulation GFSK DQPSK
Tx Power 0 dBm 0 dBm
Rx Antenna Gain 0 dBi 0 dBi
Rx Sensitivity -70 dBm -75 dBmRange 10m 10m
No of video channel 0 5
Cost Low Medium
Regional support World wide World wide
Target application Voice + data Voice + data +
multi media
Piconet structure 1 PNC, 255
active nodes
1 master, 7 slaves
Table 3.3: Bluetooth versus 802.15.3
(Adapted from IEEE 802.15.1 2002, IEEE 802.15.3 2003)
25
-
8/14/2019 Introduction to Pan
26/53
From this table, it is clear that the 802.15.3 WPAN operates in a more daunting
intimidating environment than Bluetooth, in terms of required capabilities. From a
security perspective, the operating environments are, however, quite similar.
26
-
8/14/2019 Introduction to Pan
27/53
4.0 SIMULATION RESULTS
4.1 Bluetooth voice transmissions
The Bluetooth Voice Transmission, models part of a Bluetooth system. Bluetooth is a
short-range radio link technology that operates in the 2.4 GHz Industrial, Scientific, and
Medical (ISM) band. The model modulates the signal using Gaussian frequency shift
keying (GFSK) over a radio channel with maximum capacity of 1Mbps. The Simulink
model modelled transmission of Synchronous Connection Oriented (SCO) voice packets
HV1, HV2 and HV3. It covers the signal processing characteristics of the baseband
section of the Bluetooth specification and some of the radio section. This includes
typical physical layer components, such as speech processing, framing, coding,
modulation, and frequency hopping, which are implemented in digital hardware or DSP
software. The physical layer of a communication system is ideally represented as a block
diagram and this is why Simulink is an appropriate tool for developing this model
(McGarrity 2001).
Bluetooth voice transmission uses synchronous connection-oriented packets to provide
full-duplex voice communication between two devices. The timing of voice and data
transmission is organised around a slot framework. Each slot is 625 microseconds long,
with six slots defining an SCO period. As voice is transmitted at 64 Kbits/second, 240
bits are required to be transmitted during each SCO period. The high-quality voice (HV)
packet types differ according to how much forward error correction (FEC) coding they
use. The packet types range from HV1, employing one-third repeat coding and
transmitting every second slot, to HV3, employing no coding and transmitting every
sixth slot.
27
-
8/14/2019 Introduction to Pan
28/53
Interoperability of wireless devices is a growing concern, due to therise in popularity ofsystems using unlicensed bands, spread spectrum and frequency hopping. One particular
area of investigation is Bluetooth and 802.11b, which share the 2.4-GHz ISM band.
Interference can occur when Bluetooth and 802.11b devices are in close proximity, and
the Bluetooth frequency hops to within the 22-MHz 802.11b channel while the 802.11b
device is transmitting. For example, if an 802.11b transmitter and a Bluetooth
transmitter are equidistant from a Bluetooth receiver, the carrier-to-interference ratio,
such as -2 dB, is considerably lower that the 18-dB signal-to-noise ratio usually required
for a Bluetooth receiver. The Bluetooth FEC on the header or payload cannot protect the
bits and the whole packet can be corrupted. The next packet of voice data will be
transmitted at a new hop frequency, usually not in the same vicinity as the 802.11b
transmitter. But 802.11b transmission is very different from Bluetooth's. Packets are of
variable length and can be more than 4,000 bytes long, equivalent to more than 50
Bluetooth slots. Transmission is asynchronous with the media-access control layer using
a carrier-sense multiple-access with collision-avoidance technique similar to that used
by Ethernet. The physical layer of 802.11b uses a combination of differential binary
phase shift keying, differential quaternary phase shift keying, Barker code spreading and
complementary code keying in one of 11 possible overlapping channels, each with a
fixed bandwidth of 22 MHz. The transmit power of 802.11b is also higher than
Bluetooth's, with a maximum of 1 W in the United States.
4.1.1 Structure of the model
The model consists of a master transmitter, radio channel, slave receiver, 802.11.b
interferer. The transmitter subsystem performs speech coding, buffering, framing, header
28
-
8/14/2019 Introduction to Pan
29/53
error control (HEC), forward error correction, GFSK modulation and frequency hopping.
Channel effects modelled include thermal noise, path loss and interference. The Free
Space Path Loss block, from the RF Impairments library, models path loss. The IEEE
802.11b interferer is a masked subsystem that opens up a mask dialog for user input on
double-clicks. Mean packet rate, packet length, power and frequency location in the ISM
band can be specified in the mask dialog while the slave receiver recovers speech from
the transmitted signal, performing all the complementary operations that the transmitter
does, but in reverse order.
4.1.2 Frequency hopping
Radio Frequency technology allows devices to be in different rooms or even buildings.
The limited range of radio signals restricts the use of this kind of network. RF
technology can be on single or multiple frequencies. A single radio frequency is
subjected to outside interference and geographic obstructions. Furthermore, a single
frequency is easily monitored by others, which makes the transmissions of data insecure.
Spread spectrum avoids the problem of insecure data transmission by using multiple
frequencies to increase the immunity to noise and to make it difficult for outsiders to
intercept data transmissions (Cisco Systems 2003).
There are two common forms of spread spectrums, namely direct spectrum, where the
data sequence is multiplied by the pseudo noise sequence, and frequency hopping, where
the narrowband signal is hopped over different carrier frequencies based on the pseudo
noise sequence. Both techniques result in a transmit signal bandwidth that is much larger
than the original signal bandwidth, hence the name spread spectrum (Walrand & Varaiya
2000, p. 330). The hopping of the carrier produces the desired spreading of the
29
-
8/14/2019 Introduction to Pan
30/53
transmitted signal spectrum. The changes in the carrier frequency do not affect the
performance in additive noise and the AWGN performance remain exactly the same as
the performance of the digitally modulated system without frequency hopping.
Just as with DSSS technique, the FHSS technique can allow coexistence of several
systems with orthogonal codes in the same frequency band and can provide a degree of
user-signal privacy by association of each users signal with a randomly selected
hopping pattern. One difference between the two spreading methods is that the DSSS
technique uses the full system bandwidth throughout the entire transmission time
whereas FHSS uses only a portion of the band at a time. In a FHSS system, each user
employs different hopping pattern; in this system, interference occurs when two
different user land on the same hop frequency. If codes are random and independent of
one another, the hit will occur with some calculable probability. If the codes are
synchronised and the hopping patterns selected so that two users never hop to the same
frequency at the same time, the multiple user interference is eliminated. Figures 4.1 and
4.2 show the block diagram of a transmitter and receiver for a FHSS system.
Carrier frequency
FH clock
Highpass
filter
Data
modulator
Frequency
synthesizer
Code generator
3 . . .2 k1
Figure 4.1: Block diagram of FHSS transmitter (Pahlavan & Levesque 1995, p. 370)
30
-
8/14/2019 Introduction to Pan
31/53
-
8/14/2019 Introduction to Pan
32/53
f1 f1 f1 f1 f1 f1 f1 f1
5
Energy
8 3 7 1 4 6 2
Frequency
Figure 4.3: Channel assignment (Stallings 2004 p. 278)
f8
f7
f6
f4
f3
f5
f2
f1
Frequency
Figure 4.4: Channel use (Stallings 2004 p. 278)
Figures 4.3 and 4.4 are examples of a frequency hopping signal. A number of channels
are allocated for the FH signal. Typically there are 2 carrier frequencies forming 2
channels. The spacings between carrier frequencies and hence the width of each channel
32
-
8/14/2019 Introduction to Pan
33/53
usually correspond to the bandwidth of the input signal. The transmitter operates in one
channel at a time for a fixed interval. The sequence of channel used is dictated by a
spreading code. Both transmitter and receiver use the same code to tune into a sequence
of channels in synchronisation. Spectrum of the transmitted Bluetooth signal with IEEE
802.11b interference is shown in Figure 4.5. The blue lines are the Bluetooth
transmissions, while the red lines are from 802.11b transmission. A dynamic plot of
packet frequency versus time is shown by the Spectrogram plot. Most of the time, due to
frequency hopping, there is not much overlap of these slots. In a few cases, the signals
do collide, as shown by Figure 4.6.
Figure 4.5: Integration of two waveforms
Frequency
hopping
Figure 4.6: Spectrogram with collision
33
-
8/14/2019 Introduction to Pan
34/53
4.1.3 Error rate
The error rate display in Figure 4.7 shows three types of error rates, namely, Raw bit
error rate, Residual bit error rate and Frame error rate. The raw bit error rate displays the
inconsistencies between the bits in the transmitted signal and the received signal while
frame error rate refers to the ratio of frame failure to the total number of frames. Frame
failure, caused by noise and interference, is determined if the HEC fails to match the
header info or if less than 57 bits are correct in the access code. If the frame fails, this is
captured by a zero-valued Frame OK signal, which is used in the FER calculation as
well as to exclude bad frames from the residual BER calculation.
Figure 4.7: Error rate display
34
-
8/14/2019 Introduction to Pan
35/53
4.1.4 Additive white gaussian noise
The noise in a communication channel exits as unwanted random signal that interferes
with the information signal being transmitted. It may be due to external factors such as
atmospheric noise or due to internal factors such as shot noise from the hardware. An
additive white Gaussian noise channel is used to model the effect of channel and
receiver noise on the transmitted signal. The AWGN Channel block adds white Gaussian
noise to a real or complex input signal. When the input signal is real, this block adds real
Gaussian noise and produces a real output signal. When the input signal is complex, this
block adds complex Gaussian noise and produces a complex output signal. This block
inherits its sample time from the input signal. As seen from Figure 4.8 and 4.9, noisy
channel increase the magnitude of the signal. AWGN channel is used because it
represents a completely random process since any two samples in the noise process are
uncorrelated and statically independent
Figure 4.8:Frequency spectrum AWGN off
35
-
8/14/2019 Introduction to Pan
36/53
Figure 4.9: Frequency spectrum AWGN on
4.2 802.15.3
The cost or complexity of the device must be as minimal as possible for use in the
personal area space. The PHY operates in the 2.4 2.4835 GHz frequency range. It
specifies raw data rates of 11, 22, 33, 44 and 55M bit/sec; with the respective
modulation type QPSK, DQPSK, 16-QAM, 32-QAM, and 64-QAM. The base rate of
22M bit /sec is uncoded while 11, 33, 44 and 55M bit/sec uses trellis coded modulation.
Distance plays a role in transmission speed. The closer the device is to the access point,
the higher the bandwidth. The highest rate, 55M bit/sec, is necessary for low-latency,
multimedia connections and large-file transfers, while 11M bit/sec and 22M bit/sec rates
are ideal for long-range connectivity for audio devices. Figure 4.10 shows a logical
block diagram of a transceiver.
36
-
8/14/2019 Introduction to Pan
37/53
Figure 4.10: Logical blocks in the transceiver PHY
4.2.1 Structure of the model
The model consists of six main components. They are, the Bernoulli Binary Generator
block, the DQPSK Modulator Baseband block, Transmitter/Receiver, the AWGN
Channel block, the Free Space Path Loss block, DQPSK Demodulator Baseband block
and the Error Rate Calculation block.
The Bernoulli Binary Generator block generates random binary numbers using a
Bernoulli distribution. The Bernoulli distribution with parameter p produces zero with
probability p and one with probability 1-p. The Bernoulli distribution has mean value 1-
p and variance p (1-p). The Probability of a zero parameter specifies p, and can be any
real number between zero and one. The DQPSK Modulator Baseband block modulates
37
-
8/14/2019 Introduction to Pan
38/53
digital data to analog format using the differential quaternary phase shift keying method.
The output is a baseband representation of the modulated signal. The
Transmitter/Receiver shows the transition of the signal to and from the channel while the
AWGN Channel block adds white Gaussian noise to a real or complex input signal. This
block can process multichannel signals that are frame-based or sample-based. Variance
of the noise like signal to noise ratio is simulate through this channel. The Free Space
Path Loss block simulates the loss of signal power due to the distance between
transmitter and receiver. The block reduces the amplitude of the input signal by an
amount that is determined in either of two ways: By the Distance (km) and Frequency
(MHz) parameters, if you specify Distance and Frequency in the Mode field By the Loss
(dB) parameter, if you specify Decibels in the Mode field. The DQPSK Demodulator
Baseband block demodulates a signal that was modulated using the differential
quaternary phase shift keying method. The input is a baseband representation of the
modulated signal. The Error Rate Calculation block compares input data from a
transmitter with input data from a receiver. It calculates the error rate as a running
statistic, by dividing the total number of unequal pairs of data elements by the total
number of input data elements from one source. This block can be used to compute
either symbol or bit error rate, because it does not consider the magnitude of the
difference between input data elements. If the inputs are bits, then the block computes
the bit error rate. If the inputs are symbols, then it computes the symbol error rate.
4.2.2 Free space path loss
For any type of wireless communication, the signal disperses with distance. Therefore an
antenna with a fixed area will receive less signal power the further it is from the
38
-
8/14/2019 Introduction to Pan
39/53
transmitting antenna. Even with no other sources of attenuation or impairment are
assumed, a transmitted signal attenuates over distance because the signal is being spread
over a larger and larger area (Stallings 2004, p. 119). Figure 4.11 shows the losses
against distance travelled.
180
170
160
150
140
130
120
110
100
90
80
70
60
f = 30 MHz
f = 300 MHz
f = 30 MHz
f = 30 GHz
f = 300 GHz
Loss
(dB)
1 5 10 50 100
Distance (km)
Figure 4.11 Free space loss (Stallings 2004, p. 121)
This form of attenuation is known as free space loss,which can be express in terms of
the ration of the radiated powerPtto the powerPrreceive by the antenna or in decibels,
by taking 10 times the log of that ratio. For the ideal isotropic antenna free space loss is
Pt /Pr = (4 d) / = (4 d) / c
39
-
8/14/2019 Introduction to Pan
40/53
where Pt = signalpower at the transmitting antenna
Pr = signalpower at the receiving antenna
= carrier wavelength
d = progation distance between antennas
c = speed of light (3x108
m/s)
4.2.3 Quadrature amplitude modulation
QAM is a popular analog signalling technique that is used in the asymmetric digital
subscriber line (ADSL) in some wireless standards. This modulation technique is a
combination of ASK and PSK. QAM can also be considered as a logical extension of
QPSK. QAM takes advantage of the fact that it is possible to send two different signals
simultaneously on the same carrier frequency, by using two copies of the carrier
frequency, one shifted by 90 with respect to the other. For QAM, each carrier is ASK
modulated. The two independent signals are simultaneously transmitted over the same
medium. At the receiver, the two signals are demodulated and the results combined to
produce the original binary input (Stallings 2004, p. 151).
-/2
~
QAM output
s (t)
cos 2fct
phase
shift
sin 2fct
carrier
d2(t) R/2 bps
d1(t) R/2 bps
Binary input
d (t) R bps
2 bit serial to
parallel
converter
40
-
8/14/2019 Introduction to Pan
41/53
Figure 4.12: QAM modulator (Stallings 2004, p. 152)
Figure 4.12 shows the QAM modulation scheme in general terms. The input is a stream
of binary digits at a rate of R bps. The stream is converted into two separate stream bits
of R/2 bps each, by taking alternate bits for the two streams. In the diagram, the upper
stream is ASK modulated on a carrier of frequency fcby multiplying the bit stream by
the carrier. Thus, a binary zero is represented by the absence of the carrier wave and a
binary one is represented by the presence of the carrier wave at a constant amplitude.
This same carrier wave is shifted by 90 and used for ASK modulation of the lower
binary stream. The two modulated signal are then added together and transmitted. The
transmitted signal can be express as follow:
S(t) = d1(t) cos 2fct + d2(t) sin 2fct
If two level ASK is used, then each of the two streams can be one of two states and the
combined stream can be in on of 4 = 2 x 2 states. This is essentially QPSK. If four level
ASK is used, then the combined stream can be in one of 16 = 4 x 4 states. Systems using
64 and even 256 states have been implemented. The greater the number of states, the
higher the data rate that is possible within a given bandwidth. However, it also means
that the greater the number of states, the higher the potential error rate due to noise and
attenuation.
Figure 4.13 uses the 16-QAM Modulator Baseband to modulate random data. Because
the modulation technique is 16-QAM, the plot shows 16 clusters of points and there
were no noise, the plot shows the 16 exact constellation points instead of clusters around
the constellation points. The results are shown in Figure 4.14.
41
-
8/14/2019 Introduction to Pan
42/53
Figure 4.13: 16-QAM ideal model
Figure 4.14: Ideal scatter diagram of 16-QAM
42
-
8/14/2019 Introduction to Pan
43/53
The model in Figure 4.15 shows a random integer modulated using 16-QAM Modulator.
After passing the data through a noisy channel, the model produces a scatter diagram of
the noisy data. Figure 4.16 suggests what the underlying signal constellation looks like
and shows that the noise distorts the modulated signal from the constellation. The SNR
in the AWGN is set to 20 dB with an input signal of 1watt.
Figure 4.15: 16-QAM model with AWGN channel
43
-
8/14/2019 Introduction to Pan
44/53
Figure 4.16: 16-QAM model with AWGN channel noise
4.2.4 Quadrature phase shift keying modulation
The term quadrature implies that there are four possible phases (4-PSK) which the
carrier can have at a given time. In QPSK, information is conveyed through phase
variations. In each time period, the phase can change once. QPSK is a modulation
scheme that transmits 2 bit information using four states of the phase (Shafi, Ogose &
Hattori 2002, p. 221). Figure 4.17 shows a phasor diagram of the QPSK. The rate of
change (baud) in this signal determines the signal bandwidth, but the throughput or bit
rate for QPSK is twice the baud rate, thus effectively doubling the bandwidth of the
carrier. The four phases are labelled {A, B, C, D} corresponding to the {0, 90, 180, 270}
degrees (Tervo 1998).
44
-
8/14/2019 Introduction to Pan
45/53
-
8/14/2019 Introduction to Pan
46/53
This signal has undergone the following phase transitions as shown in Table 4.2.
PHASE A D A B A A D C C A ...
Change - A-to-D D-to-A A-to-B B-to-A A-to-A A-to-D D-to-C C-to-C C-to-A ...
Degrees - 270 90 90 270 0 270 270 0 180
Dibit - 11 00 00 11 01 11 11 01 10
Table 4.2: Phase transitions (Tervo 1998)
Therefore the transmitted information is 110000110111110110.
Another option of QPSK modulation scheme is differential QPSK. DQPSK is a
differential quadrature modulation technique that alternates between two quadrature
symbol constellations which are offset by Pi/4 radians every other symbol period. A
block diagram for the modulator is shown in Figure 4.19. In the modulator, a uniform
random number generator produces symbols which are then differentially encoded and
upsampled in order for the output to approximate a pulse train of delta functions. Gray
encoding was used so that most symbol errors were 1 bit errors instead of 2 bit errors.
The upsampled, differentially encoded, symbol stream is then pulse-shaped by a square-
root raised cosine filter with a rolloff factor of 0.35. The modulator output is left at
baseband since the introduction of a carrier would only introduce spurious errors in the
calculation of the Irreducible BER and since the Irreducible BER is determined by the
multipath fading, the multipath delay spread, and the modulation technique irrespective
of particular value of the carrier frequency.
46
-
8/14/2019 Introduction to Pan
47/53
Figure 4.19: Block diagram of DQPSK modulator (Anderson n.d.)
Random data is generated using DQPSK modulator. The model in Figure 4.20 below
plots the output of the DQPSK Modulator Baseband block with an offset of pi/4 shown
in Figure 4.21.
Figure 4.20: DQPSK modulation
47
-
8/14/2019 Introduction to Pan
48/53
-
8/14/2019 Introduction to Pan
49/53
Figure 4.22: Block diagram of demodulator (Anderson n.d.)
49
-
8/14/2019 Introduction to Pan
50/53
5.0 CONCLUSION
The objectives of this project have been achieved to a certain extent. A comparison
between Bluetooth and 802.15.3 were analysed and discussed. The simulation in the
previous chapter was carried out with the aim of testing the functionality of the
transmission model. The accuracy of the results of the performance of the simulation
model is dependent on how closely the simulation model resembles the actual system
being modelled. The model is fully functional and produced close correct results.
Different inputs were tested and the according output was produced. Based on this
finding, a logical block diagram of the 802.15.3 transceiver had been made. Some
characteristic of the 802.15.3 such as the modulation and AWGN channel were
examined and presented. Implementing devices using IEEE 802.15.3 is clearly feasible.
Compatibility and coexistence with other system especially those in similar market
spaces, such as Bluetooth are also feasible.
In addition, a better understanding and appreciation of the wireless technology was
obtained through this research as well as through simulating them and studying their
responses.
5.1 Recommendations
Although the objectives of the project have been achieved to a certain extent, there are
some areas that can be improved upon. One of the areas is to implement devices using
the new 802.15.3 standard. Three targeted areas could benefit from short-range wireless
connections. These include PC and peripheral devices, mobile devices and consumer
electronics. Many devices in each of these three areas frequently communicate
significant amounts of data over very short distances with other complementary devices,
50
-
8/14/2019 Introduction to Pan
51/53
usually by means of an interconnect cable. For example, a digital still camera, with a
large storage capacity, typically requires a high-speed serial connection to the PC to
transfer images. At the time of transfer, the distance between the PC and the camera is
typically a few metres at most. Implementing devices using the IEEE 802.15.3 allows
users to create a wireless link by enabling the necessary data rates in a radio suitable for
cost-sensitive, battery-powered mobile devices, like a camera or PDA. Similar examples
are smart phones, home entertainment centers, printers, handheld computers, camcorders,
video projectors and MP3 players. By eliminating the need for a physical cable
connection, a new level of user convenience and mobility is provided. Because 802.15.3
is being positioned as a high-speed wireless PAN, implementing this new standard,
brings a step higher in the technology of WPAN. There is a need for this WPAN because
it is designed to provide QoS for real time distribution of multimedia contents, like video
and music as it is ideally suited for a home multimedia wireless network.
51
-
8/14/2019 Introduction to Pan
52/53
6.0 REFERENCES
Anderson, E.P., (n.d.),Determination of the irreducible BER for Pi/4-DQPSK. Retrieved:March 3, 2004, from
http://www.stanford.edu/~eandersn/ee359/block.html#modulator.
Barr, J.R. 2002,IEEE 802.15 TG3 andSG3a. Retrieved: January 10, 2004, from
http://www.fcc.gov/oet/tac/april26-02-docs/FCC-TAC-802.15.3-
overviewNOPICT.ppt.
Blankenbeckler, D., (n.d.), An introduction to bluetooth.Retrieved: March 10, 2004,
from http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html.
Cisco Systems 2003, CCNA1 network basic v3.0. Retrieved: February 24, 2004, from
http://www.ece.curtin.edu.au/%7Ecisco/ccna/en_CCNA1_v30/start.html.
Dornan, A. 2002, Standards spotlight: four standards out of the blue. Retrieved: January10, 2004, from
http://www.networkmagazine.com/shared/article/showArticle.jhtml?articleId=8703364&pgno=3.
Gilb, P.K. 2001,IEEE P802.15 working groups for wireless personal area networks(WPANs). Retrieved: April 24, 2004, fromhttp://grouper.ieee.org/groups/802/19/pub/2002/Jan02/COEX-02004r0_TG3-
Coexistence-Capabilities.ppt.
IEEE 2004,Bluetooth specification serves as foundation for IEEE 802.15 WPAN
standard. Retrieved: April 23, 2004, fromhttp://standards.ieee.org/announcements/bluespec.html.
IEEE 802.15.1 2002,IEEE standard for information technology--telecommunications
and information exchange between systems--local and metropolitan area networks--
specific requirements part 15.1: wireless medium access control (MAC) and physical
layer (PHY) specifications for wireless personal area networks (WPANs(TM)).Retrieved: January 24, 2004, from http://standards.ieee.org/catalog/olis/lanman.html.
IEEE 802.15.3 2003.IEEE standard for information technology--telecommunications
and information exchange between systems--local and metropolitan area networks--
specific requirements part 15.3: wireless medium access control (MAC) and physicallayer (PHY) Specifications for high rate wireless personal area networks (WPAN).
Retrieved: September 21, 2003, fromhttp://standards.ieee.org/catalog/olis/lanman.html.
Khirat, S. & Kadhi, A. 2002. Wireless personal area network and home RF. Retrieved:August 23, 2003, from http://dessr2m.adm-eu.uvsq.fr/wpan.pdf.
52
-
8/14/2019 Introduction to Pan
53/53
McGarrity, S. 2001, Bluetooth control logic design with stateflow. Retrieved: August 23,
2003, fromhttp://www.mathworks.com/company/newsletters/digest/sept02/bluetooth.shtml.
Nokia 2003,Bluetooth technology overview. Retrieved: March 3, 2004, from
http://ncsp.forum.nokia.com/downloads/nokia/documents/Bluetooth_Technology_Overview_v1_0.pdf?ref=wdn.
Pahlavan, K. & Levesque, A.H. 1995, Wireless information networks, John Wiley &Sons, New York.
Shafi, M., Ogose, S. & Hattori, T. (ed), 2002, Wireless communications in the 21st
century, IEEE Press, New Jersey.
Stallings, W. 2004,Data and computer communications, 7th
ed. Pearson Education, New
Jersey.
Sturman, C.F. 2003, Ubiquitous wireless communications. Retrieved: April 2, 2004,
from http://www.same-conference.org/images/documents/tutorials/Tutorial_7.pdf.
Tervo, R. 1998, EE4253 digital communications. Retrieved: February 12, 2004, fromhttp://www.ee.unb.ca/tervo/ee4253/qpsk.htm.
Tzamaloukas, M., (n.d.),An introduction to bluetooth architecture. Retrieved: April 4,2004, from www.svcwireless.org/programs/seminar030301/ bluetooth_present-03-
03-2001.ppt.
Walrand, J. & Varaiya, P. 2000,High-performance communication networks, 2nd
ed.
Academic Press, San Diego.