SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012



             COEXISTENCE MODEL OF ZIGBEE&
            IEEE 802.11b (WLAN) IN UBIQUITOUS
                 NETWORK ENVIRONMENT
                                 Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar


                                                                        modulating scheme with half pulse shaping. Zigbee uses
    Abstract— IEEE 802.15.4 standard is used for low rate, short         data rates of 250kbps, 40 kbps and 20 kbps. It supports low
distance wireless communication. However due to its low power            latency devices. Zigbee uses dynamic device addressing
it is greatly affected by interference provided by other wireless        and use fully handshake protocol for transfer reliability. It
technology working on same ISM( industrial, scientific &                 has extremely low duty cycle (<0.1%). IEEE 802.11b
medical ) band, such as IEEE 802.11b/g & Bluetooth. In                   [1]and zigbee both uses CSMA/CA [5] for media access
ubiquitous network environment we have two different
heterogeneous communication systems coexists in single place.
                                                                         control, and most important zigbee uses interference
In this paper we use an analytic model and an experimental set           mitigation mechanism (DSSS and "listen before
up for the coexistence among Zigbee, &WLAN. The model                    send").Zigbee focus on low power consumption and low
focuses on two aspects, namely Power & Timing. These two                 data rates. It also provides reduced complexity and device
jointly impacts on the performance of IEEE 802.15.4 wireless             size.802.15.4 technology is mature, basis of commercial
network. Zigbee is main component of wireless sensor network,            products. Zigbee has multi-level security and works well
so therefore to study about performance of network should be             for long battery life, selectable latency for controllers,
need in interference environment.                                        sensors, remote monitoring and portable electronics.
                                                                         Because operating frequency band is same for WLAN, and
  Index Terms— CCK, CCA, IEEE 802.15.4 Zigbee, PER,                      Bluetooth (IEEE 802.15.1), which causes degradation on
IEEE 802.11b (WLAN),
                                                                         QOS, and packet delivery performance of Zigbee. WLAN
                                                                         (IEEE 802.11b standard defines the MAC and PHY sub
    INTRODUCTION                                                         layer for wireless LAN. This standard operates on 13
    Ubiquitous networking allows many devices or objects to              overlapping channel in 2.4GHz ISM band having
connects and communicate with each other. IEEE 802.15.4                  bandwidth of each channel is 22 MHz This standard also
(Zigbee) [2] is low rate wireless personal area network. It              use Carrier Sense multiple Access with collision avoidance
uses unlicensed 2.4 GHz ISM band. Its major applications in              mechanism. Channel sensing is important to determine
Wireless sensor networks, Home automation, medical                       whether another node is transmitting or not, before
                                                                         transmission. For getting higher data rate we use 8-chip
instruments and RF4CE (radio frequency for consumer
                                                                         complementary code keying scheme (CCK) as modulation
electronics).Because Zigbee, IEEE 802.11b and Bluetooth
                                                                         scheme. Before transmission IEEE 802.11b [1][2] node
network operates on same ISM band, which causes
                                                                         sense the channel, is another node transmitting or not? If the
significant interference on Zigbee network.                              medium is sensed idle for distributed coordination function
Zigbee is low cost, low power wireless mesh networking                   inter-frame space (DIFS) time interval then transmission
standard. Low cost allows the technology to be widely used               will start. Also if medium is sensed busy then node discards
in sensor network as monitoring and control. Low power                   its transmission. So during idle mode for DIFS interval,
allows longer battery life of device, and mesh networking                node will generate a random backoff [2] delay in [0, W].
allows high reliability and more wide range. IEEE802.15.4                This time interval is known as contention window, where
specification describes 3 topologies: Star, Peer-to-Peer, and            W is size of contention window. Minimum value of W
cluster-tree topology.                                                   is 𝐶𝑊 𝑚𝑖𝑛 which is initially set. The backoff timer is
                                                                         decremented by one as long as medium is sensed idle for
                                                                         backoff time slot. Backoff counter is off when transmission
    I.      IEEE 802.15.4 AND IEEE 802.11B OVERVIEW
                                                                         is detected and resumed when channel is sensed idle again.
    Zigbee is based on IEEE 802.15.4 standard defines 16                 When backoff timer is reached to zero, the node transmits a
    channels which are 5 MHz apart from each other and                   DATA packet. After receiving a data packet, destination
    having bandwidth of 2 MHz each channel. It uses OQPSK                node waits for a short inter frame spacing (SIFS) interval
                                                                         and then immediately transmits ACK signal back to the
   Manuscript received May, 2012.                                        sender or source node. Table 1 shows different parameters
    Neha Gandotra, Electronics & Communication Department,               of IEEE 802.11b and IEEE 802.15.4 network. Table shows
Uttarakhand Technical University DIT., (e-mail: nhgandotra@gamil.com).   different parameter values e.g. transmit power, receiver
Dehradun, India, Vishwanath Bijalwan, Electronics & Communication
Uttarakhand Technical University/DIT, Dehradun, India 08126937623,       sensitivity, payload size etc. In IEEE 802.15.4 channel is
(e-mail:vishwanath.bijalwan@gmail.com).                                  not sensed during backoff period but sensed in clear
   Manohar Panwar, Department of Computer Science, Uttarakhand           channel assessment (CCA) period. Also contention window
Technical    University   DIET,    Rishikesh,    India,   09634011389,   in IEEE 802.15.4 is doubled when the channel is busy
(e-mail:mca.mannu@gmail.com).


                                                                                                                                   680
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                            Volume 1, Issue 4, June 2012
 during CCA. In IEEE 802.11b contention window is same                Converting bit noise density 𝐸 𝑏 /𝑁0 to symbol noise
 when channel is busy but get doubled when ACK is not                 density𝐸 𝑠 /𝑁0 .
                                                                       𝐸𝑠              𝐸    𝐸
 received. Figure 1 shows the spectrum of IEEE 802.11b and                = log 2 (𝑀) 𝑏 = 4 𝑏      (2)
 IEEE 802.15.4 network.                                                𝑁0                     𝑁0              𝑁0
                                                                      SER 𝑃𝑠 is computed for non coherent MFSK
                                                                              1         𝑀       𝑗         𝑀                   𝐸𝑠   1
                                                                       𝑃𝑠 =            𝑗 =2(−1)           𝑗
                                                                                                                   𝑒𝑥𝑝                 −1   (3)
                                                                              𝑀                                               𝑁0   𝑗

                                                                      Finally converting 𝑃𝑠 to BER 𝑃 𝑏
                                                                                𝑀/2         8
                                                                       𝑃 𝑏 = 𝑃𝑠       = 𝑃𝑠         (4)
                                                                                𝑀−1        15
                                                                      Rolling these together produces BER function.
                                                                                  8       1         𝑀               𝑗    16                    1
                                                                       𝑃𝑏 =                        𝑗 =2   −1              𝑗
                                                                                                                                   𝑒𝑥𝑝 10𝑆𝑁𝑅       −1   (5)
                                                                                  15     16                                                    𝑗

 Fig 1. IEEE 802.15.4 and IEEE 802.11 spectrum usage in 2.4 GHz ISM   Temporal Mode
band                                                                  All packets are assumed 32 bytes whether belongs to AWN
In terms of transmission we know that transmission power of           or IWN and maximum PSDU size should be 128 bytes. It is
WLAN is 100 times larger than that of Zigbee networks, so             assumed that all 915 MHz devices have whether operating
that’s why we focus on interference from WLAN to Zigbee.              AWN or IWN have duty cycle should high nearly equal to
       Parameters           IEEE            IEEE                      10%.
                          802.11b         802.15.4                    Packet size of 32 bytes and duty cycle of 10%, the channel
     Transmit Power         20dBm           0dBm                      will occupied for
                                                                      packet size ×8    256
     Receiver               -76dBm          -85dBm                                   =       S = 1.024ms (6)
                                                                      bits per second          250000
     Sensitivity
                                                                      Channel will idle for 90 x 1.024 = 92.16 ms
     Transmit Rate          11 Mbps         250 Kbps
                                                                      Coexistence method results
     Bandwidth              22 MHz          2 MHz                     Figure 6 shows coexistence methodology results for 915
     Back off unit 𝑇 𝑏𝑠     20 µs           320 µs                    MHz O-QPSK PHY
       SIFS                 10 µs           192 µs
       DIFS                 50 µs           N/A
       CCA                  N/A             128 µs
        𝐶𝑊 𝑚𝑖𝑛              31              7
     Center Frequency       2412 MHz        2410 MHz
       Payload Size         1024 bytes      1 byte
     Table 1: IEEE 802.15.4 and IEEE 802.11b System parameters and
     some other parameters



         II.        COEXISTENCE MODEL OF 802.11B AND IEEE
                                  802.15.4
   The coexistence assurance Methodology predicts the PER
of an affected wireless network (AWN, or victim) in the
presence of an interfering wireless network (IWN, or
assailant). Method says that an AWN and an IWN each
composed of a single transmitter and receiver. The method
takes as input a path loss model, a BER function for the
AWN, and predicted temporal models for packets generated                      Fig 2. Coexistence results for 915 MHz O-QPSK PHY
by the AWN and packets generated by the IWN. The method               We assume saturated IEEE 802.11b interference in our work.
predicts the PER of the AWN as a function of physical                 Under WLAN interference Zigbee packet is successfully
spacing between the IWN transmitter and the AWN receiver.             received if one of the below conditions is satisfied.
Coexistence can be seen by these three parameters.                        (a) When IEEE 802.15.4 packets overlaps WLAN (b)
   • Bandwidth of AWN and IWN devices.                                         packet the in band interference power from the
   • BER as a function of SIR of AWN devices.                                  WLAN packet is lower than the IEEE 802.15.4
   • Path loss model for the network.                                          packet at an IEEE 802.15.4 receiver. According to
                                                                               specification, if interference is weak enough so that
915 MHz O-QPSK PHY                                                             the in band (signal to interference ratio) SIR is
At 915 MHz IEEE 802.15.4 uses O-QPSK modulation uses a                         greater than 5-6dB, an IEEE 802.15.4 packet is
chip rate of 𝑅 𝑐 of 1000 𝑘 𝑐 /𝑠 bit rate 𝑅 𝑏 of 250 kb/s and a                 successfully received with a probability of 99%.
code block of M=16 symbols [1]. Conversion from SNR to                    (b) The transmission time of IEEE 802.15.4 packet is
 𝐸 𝑏 /𝑁0 assume matched filtering and half pulse shaping.                      less than the inter frame idle time 𝑇𝑖𝑑𝑙𝑒 between
                                                                               two nearer WLAN packets so that IEEE 802.15.4
𝐸𝑏       .625𝑅 𝑐            .625×1000000
     =              𝑆𝑁𝑅 =                  = 2.5 SNR (1)                       packet will not overlap WLAN packet.
𝑁0             𝑅𝑏             250000
                                                                       Our model involves two aspects, namely Power & Timing.

                                                                                                                                                        681
                                                    All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012
                                                                          So based upon above ranges we have 3 scenario for
                                                                          determining the throughput.

Power Aspect:
We use a path loss model recommended in IEEE 802.11b
specification, for determining a power of received signal in              Timing Aspect:
free space propagation.                                                   Range R1 : In this scenario CSMA/CA mechanism
We know that transmission power of IEEE 802.11b and
                                                                          works of both standards, therefore one is transmitting
802.15.4 nodes are different. The difference in transmit
power and receiver sensitivity leads to different                         and other has to wait. We know that IEEE 802.15.4
ranges 𝑅1 , 𝑅2 , and 𝑅3 .                                                 nodes have 10-20 times longer timing than WLAN
We quantify these ranges accordingly                                      nodes. Shorter timing gives IEEE 802.11b nodes
 𝑅1 : In this range both IEEE 802.15.4 node and IEEE                      priority over IEEE 802.15.4 nodes and therefore
802.11b both nodes can sense each other,
 𝑅2 : In this range IEEE 802.15.4 node can sense IEEE                     interference arise to IEEE 802.15.4 nodes. Sufficient
802.11 node but not vice versa,                                           coexistence condition for this range R1 is that CCA [8]
 𝑅3 : In this range both nodes can't sense each other but IEEE            of IEEE 802.15.4 happens during idle time of two
802.15.4 node still suffers interference.                                 consecutive IEEE 802.11b packets. Scenario is shown
                                                                          in fig 3.

                                                                                 𝑡 𝑖𝑑𝑙𝑒 ≜ 𝐷𝐼𝐹𝑆 + 𝑡 𝑏𝑜 = 𝐷𝐼𝐹𝑆 + 𝑚. 𝑇 𝑏𝑠 (8)
                                                                          Where 𝑇 𝑏𝑠 is backoff unit, m is random inter uniformly
                                                                          distributed over [0, 𝐶𝑊 𝑚𝑖𝑛 ],
                                                                           𝑡 𝑏𝑜 is random period for an additional deferral time before
                                                                          transmitting.
    Fig 3: Coexistence ranges of IEEE 802.11b and IEEE 802.15.4           When m≥ 4 for IEEE 802.11b, 𝑡 𝑖𝑑𝑙𝑒 ≥ CCA.
                                                                          Thus value of m should be taken in [4, 31], 𝑡 𝑖𝑑𝑙𝑒 is long
    The path loss follows free space propagation up to 8m                 enough for performing CCA.
    and then attenuates rapidly with coefficient of 3.3 which
                                                                          Range 𝑅2 : In this range IEEE 802.11b nodes are transmitting
    is taken 4 in accordance with 32m indoor transmission
    distance of IEEE 802.15.4 nodes.                                      and IEEE 802.15.4 nodes are waiting, but when IEEE
    The path loss[2] [8] is given as:                                     802.15.4 nodes are transmitting, IEEE 802.11b nodes are not
                 20 𝑙𝑜𝑔10    4𝜋𝑑                       𝑖𝑓 𝑑 ≤ 𝑑𝑜          aware and try to transmit, which cause overlapping in packets
     𝑃𝐿 𝑑 =                   𝜆
                                                                   (7)    transmission. This is shown in fig 4.
                 20 𝑙𝑜𝑔10   4𝜋𝑑𝑜
                                   +
                                       40 𝑙𝑜𝑔10    𝑑   𝑖𝑓 𝑑 > 𝑑𝑜
                              𝜆                   𝑑𝑜

    Here d= distance between transmitter and receiver, 𝑑𝑜
    is the length of line of sight =8m
     We assume here that Power spectral density of WLAN
    is uniformly distributed across 22 MHz bandwidth, also
    taking receiver sensitivity as received power and SIR at
    6dB.
                  Table II
    Coexistence Ranges of IEEE 802.15.4 AND IEEE802.11b/g
                                                                          Fig 5. In Range𝑅2 IEEE 802.11b nodes fail to sense IEEE 802.15.4 nodes
       Ranges                 IEEE                       IEEE             In this scenario to ensure non overlapping transmission the
                            802.11b                    802.11g            below condition must be satisfied.
            𝑅1                22m                        32m               𝑡 𝑖𝑑𝑙𝑒 ≜ 𝐷𝐼𝐹𝑆 + 𝑚. 𝑇 𝑏𝑠 ≥ 𝐶𝐶𝐴 + 𝑡 𝑝 + 𝑆𝐼𝐹𝑆 +
            𝑅2                67m                        67m                𝐴𝐶𝐾𝑡 𝑝 is the transmission time of an IEEE 802.15.4 packet.
            𝑅3                95m                        95m              For successful transmission of IEEE 802.15.4 equation (7)
                                                                          should be satisfied.
                                                                          Range 𝑅3 : In this range neither IEEE802.11b nodes nor
                                                                          IEEE 802.15.4 nodes can sense each other. But
                                                                          IEEE802.15.4 nodes can still suffer interference from
                                                                          IEEE802.11b nodes, because a range where wireless devices
                                                                          can cause interference to other is usually larger than a range
                                                                          where it is sensed by other wireless devices. In this range
                                                                          both IEEE 802.11b and IEEE 802.15.4 node are transmitting
    Fig 4: In Range 𝐑 𝟏 IEEE 802.11b/g nodes have priority over           without deferring each other, this means blind transmission is
    IEEE 802.15.4 nodes                                                   happening. Also for successful transmission of packets,
                                                                          power condition (7) should be satisfied. In case of ACK is not


                                                                                                                                           682
                                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                          Volume 1, Issue 4, June 2012
employed successful transmission of IEEE 802.15.4 packets                   We see that in a valid range interference (Packet loss ratio)
could happen if and only if timing condition (8) is satisfied               decreases as the distance between WLAN access point and
while power condition (7) is not necessary.                                 Zigbee coordinator increases. See figure 8.
Thus by these 3 scenario we see that how interference is
affecting the throughput of IEEE 802.15.4 network.

  III.     Experimental setup
  We construct a experimental setup for measurement the
  throughput of IEEE 802.15.4 (zigbee) under WLAN
  interference. WLAN is constructed by two laptops and one
  WLAN access point. Zigbee network is constructed using
                                                                            Fig.8 Received signal strength indication (RSSI) at zigbee coordinator
  Zigbee evaluation kit which contains one display board and
  three RCB (radio controller board). One RCB is mounted
                                                                                                     IV.        CONCLUSION
  on display board which acts as Zigbee coordinator and
  other two RCB acts as zigbee end devices, these forms                     Based upon model analysis and measurement setup we see
  Zigbee network.                                                           how IEEE 802.15.4(Zigbee) network performance reduces in
                                                                            the IEEE 802.11b network environment.
                                                                            Our Model suggests the different ranges for analysis of
                                                                            throughput in interference environment, and measurement
                                                                            suggests two different results which are shown in Test case 1
                                                                            and 2. We conclude interference calculation on IEEE
                                                                            802.15.4 in IEEE 802.11b network environment but we know
                                                                            that at 2.45 GHZ IEEE 802.15.3 and IEEE 802.11g network
                                                                            also works so that if the entire network exists in a valid range
                                                                            there will a significant drop in IEEE 802.15.4 network’s
                                                                            Throughput. An optimum solution for this problem is that we
                                                                            can use adaptive interference-aware multi-channel clustering
                                                                            algorithm [7].


                 FIG. 6 MEASUREMENT SETUP                                                            ACKNOWLEDGMENT
WLAN packets are continuously transmitting from one                         The Authors wish to thanks Dr. Sandipvijay, Dr. S.C Gupta,
laptop to access point which sends data packets to another                  & Mr. Mukesh Pathela for their helpful comments during the
laptop.                                                                     course of this study.
Test case 1:-we conclude some facts from above fig.6.In
frequency domain we know that signal power is concentrated
around center frequency[6] and weaker away from the center.                                                 REFERENCES
Suppose we choose 4 IEEE 802.15.4 channels overlapping
with one WLAN channel with 2MHz, 3 MHZ, 7MHz, and                           [1] IEEE 802.11b Specification, Wireless LAN Medium
8MHz frequency offsets from WLAN channel center                             Access Control (MAC) and Physical Layer (PHY)
frequency then we investigate that IEEE 802.15.4 channel                    specifications: Higher-Speed Physical Layer Extension in the
with 2 MHz offset is close to WLAN channel center                           2.4 GHz Band, Sep. 16, 1999
frequency, That’s why it suffer serious interference, and 8                 [2] IEEE 802.15.4 Specification, Wireless Medium Access
MHz channel offset suffers least interference as an                         Control (MAC) and Physical Layer (PHY) Specifications for
overlapping channel [6]. As conclusion, when the frequency                  Low Rate Wireless Personal Area Networks (LR-WPANs),
offset is larger, the interference power is less, and impact is             Oct. 1, 2003.
less [6]. See figure 7.                                                     [3] Soo Young Sin, “Packet error rate analysis of zigbee
                                                                            under WLAN and Bluetooth interferences” IEEE transaction
                                                                            on wireless communication, VOL. 6, NO. 8, August 2007
                                                                            [4] Khaled shuaib, “performance Evaluation of IEEE
                                                                            802.15.4 Experimental and Simulation results” Journal of
                                                                            communication VOL.2, NO.4, JUNE 2007
                                                                            [5] J.G. proakis, Digital communications, McGraw-Hill,
                                                                            1995
                                                                            [6] Guang Yang,“Zigbee network performance under WLAN
                                                                            802.11b/g interference” IEEE conference on Wireless
                                                                            pervasive computing, 2009, ISWPC 2009.11-13 Feb, 2009.
Fig. 7 Packet loss ratio when distance between Zigbee coordinator to WLAN   [7] Min Suk Kang, “Adaptive Interference-Aware
(802.11b) Access point is 3 meters.
                                                                            Multi-Channel Clustering Algorithm in a zigbee Network in
Test case 2:-Fixed zigbee network to work on two  non-                      the Presence of WLAN Interference” IEEE conference on
overlapping channels: 21(2455 MHz) and 16(2430 MHz)                         wireless pervasive computing, 2007, ISPWC. 5-7 FEB, 2007.


                                                                                                                                                     683
                                                    All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                     Volume 1, Issue 4, June 2012
[8] Wei Yuan, “A Coexistence model of IEEE 802.15.4 and
IEEE 802.11b/g” 14th symposium on communication and
vehicular technology in Benelux, 2007




                                                            Neha Gandotra- Presently working as Assistant Professor
                                                          in Electronics & Communication Department at DIT
                                                          Dehradun. She has more than 5 years of teaching experience.
                                                          Her area of interest is Digital Communication, wireless
                                                          Adhoc Network, Wireless communication.




                                                            Vishwanath Bijalwan –A student member of IAENG,
                                                          UACEE & Student of M.Tech final semester at Dehradun
                                                          Institute of Technology Dehradun. His area of Interest is
                                                          Wireless Adhoc Network, Digital Image Processing, Spread
                                                          Spectrum systems.




                                                             Manohar Panwar –presently he is working as a Assistant
                                                          Professor in Department of Computer Science at Doon
                                                          Institute of Engineering & Technology Rishikesh. His area
                                                          of Interest is wireless network, Cryptography, Adhoc
                                                          Network. He is active member of IAENG, UACEE. He is
                                                          currently working on advance security protocol
                                                          establishment on Zigbee network.




                                                                                                                 684
                                       All Rights Reserved © 2012 IJARCET

Más contenido relacionado

La actualidad más candente

HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11Adeel Mirza
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocolumardanjumamaiwada
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Assembling And Cabling Cisco Devices
Assembling And Cabling Cisco DevicesAssembling And Cabling Cisco Devices
Assembling And Cabling Cisco DevicesRavi Shairaywal
 

La actualidad más candente (20)

HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Seminar
SeminarSeminar
Seminar
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Mod8
Mod8Mod8
Mod8
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
WiFi 802.11
WiFi 802.11WiFi 802.11
WiFi 802.11
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Assembling And Cabling Cisco Devices
Assembling And Cabling Cisco DevicesAssembling And Cabling Cisco Devices
Assembling And Cabling Cisco Devices
 

Destacado (20)

22 27
22 2722 27
22 27
 
119 128
119 128119 128
119 128
 
Historia De Java
Historia De JavaHistoria De Java
Historia De Java
 
358 365
358 365358 365
358 365
 
320 324
320 324320 324
320 324
 
Prueba
PruebaPrueba
Prueba
 
Multigenerational Ministry
Multigenerational MinistryMultigenerational Ministry
Multigenerational Ministry
 
521 524
521 524521 524
521 524
 
Bridging the Generation Gap
Bridging the Generation GapBridging the Generation Gap
Bridging the Generation Gap
 
Cap Year10
Cap Year10Cap Year10
Cap Year10
 
Dolor
DolorDolor
Dolor
 
Ttttttttt
TttttttttTtttttttt
Ttttttttt
 
Disability Awareness
Disability AwarenessDisability Awareness
Disability Awareness
 
Tema 13
Tema 13Tema 13
Tema 13
 
Afstudeerverslag Lange Termijn Kaatser Ontwikkelingsplan
Afstudeerverslag Lange Termijn Kaatser OntwikkelingsplanAfstudeerverslag Lange Termijn Kaatser Ontwikkelingsplan
Afstudeerverslag Lange Termijn Kaatser Ontwikkelingsplan
 
NL - Boekwerk Slotpresentatie “De Spiegelnisse” - Joost de Wit
NL - Boekwerk Slotpresentatie “De Spiegelnisse” - Joost de WitNL - Boekwerk Slotpresentatie “De Spiegelnisse” - Joost de Wit
NL - Boekwerk Slotpresentatie “De Spiegelnisse” - Joost de Wit
 
Autodeterminacion de las pcdi
Autodeterminacion de las pcdiAutodeterminacion de las pcdi
Autodeterminacion de las pcdi
 
Mainstreaming conflict
Mainstreaming conflictMainstreaming conflict
Mainstreaming conflict
 
2014 01-30 contribuição 01 zp-16
2014 01-30 contribuição 01 zp-162014 01-30 contribuição 01 zp-16
2014 01-30 contribuição 01 zp-16
 
Womenviolence
WomenviolenceWomenviolence
Womenviolence
 

Similar a 680 684

Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricComparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricIRJET Journal
 
IoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptxIoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptxkhushali32
 
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGYON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGYijmnct
 
A comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gA comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gAlexander Decker
 
A comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gA comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gAlexander Decker
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxjainam bhavsar
 
Design of an efficient binary phase-shift keying based IEEE 802.15.4 transce...
Design of an efficient binary phase-shift keying based IEEE  802.15.4 transce...Design of an efficient binary phase-shift keying based IEEE  802.15.4 transce...
Design of an efficient binary phase-shift keying based IEEE 802.15.4 transce...IJECEIAES
 
Ethernet Technology
Ethernet Technology Ethernet Technology
Ethernet Technology Ali Usman
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESVLSICS Design
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesVLSICS Design
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topicDurgaDeviP2
 

Similar a 680 684 (20)

Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricComparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
 
J010216776
J010216776J010216776
J010216776
 
IoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptxIoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptx
 
I017554954
I017554954I017554954
I017554954
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGYON IEEE 802.11: WIRELESS LAN TECHNOLOGY
ON IEEE 802.11: WIRELESS LAN TECHNOLOGY
 
IEEE 802
IEEE 802IEEE 802
IEEE 802
 
Iot module2
Iot module2Iot module2
Iot module2
 
A comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gA comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11g
 
A comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11gA comparative analysis of 802.11b and 802.11g
A comparative analysis of 802.11b and 802.11g
 
05173187
0517318705173187
05173187
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
Design of an efficient binary phase-shift keying based IEEE 802.15.4 transce...
Design of an efficient binary phase-shift keying based IEEE  802.15.4 transce...Design of an efficient binary phase-shift keying based IEEE  802.15.4 transce...
Design of an efficient binary phase-shift keying based IEEE 802.15.4 transce...
 
Ethernet Technology
Ethernet Technology Ethernet Technology
Ethernet Technology
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless Devices
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 

Más de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Más de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

680 684

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 COEXISTENCE MODEL OF ZIGBEE& IEEE 802.11b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar  modulating scheme with half pulse shaping. Zigbee uses Abstract— IEEE 802.15.4 standard is used for low rate, short data rates of 250kbps, 40 kbps and 20 kbps. It supports low distance wireless communication. However due to its low power latency devices. Zigbee uses dynamic device addressing it is greatly affected by interference provided by other wireless and use fully handshake protocol for transfer reliability. It technology working on same ISM( industrial, scientific & has extremely low duty cycle (<0.1%). IEEE 802.11b medical ) band, such as IEEE 802.11b/g & Bluetooth. In [1]and zigbee both uses CSMA/CA [5] for media access ubiquitous network environment we have two different heterogeneous communication systems coexists in single place. control, and most important zigbee uses interference In this paper we use an analytic model and an experimental set mitigation mechanism (DSSS and "listen before up for the coexistence among Zigbee, &WLAN. The model send").Zigbee focus on low power consumption and low focuses on two aspects, namely Power & Timing. These two data rates. It also provides reduced complexity and device jointly impacts on the performance of IEEE 802.15.4 wireless size.802.15.4 technology is mature, basis of commercial network. Zigbee is main component of wireless sensor network, products. Zigbee has multi-level security and works well so therefore to study about performance of network should be for long battery life, selectable latency for controllers, need in interference environment. sensors, remote monitoring and portable electronics. Because operating frequency band is same for WLAN, and Index Terms— CCK, CCA, IEEE 802.15.4 Zigbee, PER, Bluetooth (IEEE 802.15.1), which causes degradation on IEEE 802.11b (WLAN), QOS, and packet delivery performance of Zigbee. WLAN (IEEE 802.11b standard defines the MAC and PHY sub INTRODUCTION layer for wireless LAN. This standard operates on 13 Ubiquitous networking allows many devices or objects to overlapping channel in 2.4GHz ISM band having connects and communicate with each other. IEEE 802.15.4 bandwidth of each channel is 22 MHz This standard also (Zigbee) [2] is low rate wireless personal area network. It use Carrier Sense multiple Access with collision avoidance uses unlicensed 2.4 GHz ISM band. Its major applications in mechanism. Channel sensing is important to determine Wireless sensor networks, Home automation, medical whether another node is transmitting or not, before transmission. For getting higher data rate we use 8-chip instruments and RF4CE (radio frequency for consumer complementary code keying scheme (CCK) as modulation electronics).Because Zigbee, IEEE 802.11b and Bluetooth scheme. Before transmission IEEE 802.11b [1][2] node network operates on same ISM band, which causes sense the channel, is another node transmitting or not? If the significant interference on Zigbee network. medium is sensed idle for distributed coordination function Zigbee is low cost, low power wireless mesh networking inter-frame space (DIFS) time interval then transmission standard. Low cost allows the technology to be widely used will start. Also if medium is sensed busy then node discards in sensor network as monitoring and control. Low power its transmission. So during idle mode for DIFS interval, allows longer battery life of device, and mesh networking node will generate a random backoff [2] delay in [0, W]. allows high reliability and more wide range. IEEE802.15.4 This time interval is known as contention window, where specification describes 3 topologies: Star, Peer-to-Peer, and W is size of contention window. Minimum value of W cluster-tree topology. is 𝐶𝑊 𝑚𝑖𝑛 which is initially set. The backoff timer is decremented by one as long as medium is sensed idle for backoff time slot. Backoff counter is off when transmission I. IEEE 802.15.4 AND IEEE 802.11B OVERVIEW is detected and resumed when channel is sensed idle again. Zigbee is based on IEEE 802.15.4 standard defines 16 When backoff timer is reached to zero, the node transmits a channels which are 5 MHz apart from each other and DATA packet. After receiving a data packet, destination having bandwidth of 2 MHz each channel. It uses OQPSK node waits for a short inter frame spacing (SIFS) interval and then immediately transmits ACK signal back to the Manuscript received May, 2012. sender or source node. Table 1 shows different parameters Neha Gandotra, Electronics & Communication Department, of IEEE 802.11b and IEEE 802.15.4 network. Table shows Uttarakhand Technical University DIT., (e-mail: nhgandotra@gamil.com). different parameter values e.g. transmit power, receiver Dehradun, India, Vishwanath Bijalwan, Electronics & Communication Uttarakhand Technical University/DIT, Dehradun, India 08126937623, sensitivity, payload size etc. In IEEE 802.15.4 channel is (e-mail:vishwanath.bijalwan@gmail.com). not sensed during backoff period but sensed in clear Manohar Panwar, Department of Computer Science, Uttarakhand channel assessment (CCA) period. Also contention window Technical University DIET, Rishikesh, India, 09634011389, in IEEE 802.15.4 is doubled when the channel is busy (e-mail:mca.mannu@gmail.com). 680 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 during CCA. In IEEE 802.11b contention window is same Converting bit noise density 𝐸 𝑏 /𝑁0 to symbol noise when channel is busy but get doubled when ACK is not density𝐸 𝑠 /𝑁0 . 𝐸𝑠 𝐸 𝐸 received. Figure 1 shows the spectrum of IEEE 802.11b and = log 2 (𝑀) 𝑏 = 4 𝑏 (2) IEEE 802.15.4 network. 𝑁0 𝑁0 𝑁0 SER 𝑃𝑠 is computed for non coherent MFSK 1 𝑀 𝑗 𝑀 𝐸𝑠 1 𝑃𝑠 = 𝑗 =2(−1) 𝑗 𝑒𝑥𝑝 −1 (3) 𝑀 𝑁0 𝑗 Finally converting 𝑃𝑠 to BER 𝑃 𝑏 𝑀/2 8 𝑃 𝑏 = 𝑃𝑠 = 𝑃𝑠 (4) 𝑀−1 15 Rolling these together produces BER function. 8 1 𝑀 𝑗 16 1 𝑃𝑏 = 𝑗 =2 −1 𝑗 𝑒𝑥𝑝 10𝑆𝑁𝑅 −1 (5) 15 16 𝑗 Fig 1. IEEE 802.15.4 and IEEE 802.11 spectrum usage in 2.4 GHz ISM Temporal Mode band All packets are assumed 32 bytes whether belongs to AWN In terms of transmission we know that transmission power of or IWN and maximum PSDU size should be 128 bytes. It is WLAN is 100 times larger than that of Zigbee networks, so assumed that all 915 MHz devices have whether operating that’s why we focus on interference from WLAN to Zigbee. AWN or IWN have duty cycle should high nearly equal to Parameters IEEE IEEE 10%. 802.11b 802.15.4 Packet size of 32 bytes and duty cycle of 10%, the channel Transmit Power 20dBm 0dBm will occupied for packet size ×8 256 Receiver -76dBm -85dBm = S = 1.024ms (6) bits per second 250000 Sensitivity Channel will idle for 90 x 1.024 = 92.16 ms Transmit Rate 11 Mbps 250 Kbps Coexistence method results Bandwidth 22 MHz 2 MHz Figure 6 shows coexistence methodology results for 915 Back off unit 𝑇 𝑏𝑠 20 µs 320 µs MHz O-QPSK PHY SIFS 10 µs 192 µs DIFS 50 µs N/A CCA N/A 128 µs 𝐶𝑊 𝑚𝑖𝑛 31 7 Center Frequency 2412 MHz 2410 MHz Payload Size 1024 bytes 1 byte Table 1: IEEE 802.15.4 and IEEE 802.11b System parameters and some other parameters II. COEXISTENCE MODEL OF 802.11B AND IEEE 802.15.4 The coexistence assurance Methodology predicts the PER of an affected wireless network (AWN, or victim) in the presence of an interfering wireless network (IWN, or assailant). Method says that an AWN and an IWN each composed of a single transmitter and receiver. The method takes as input a path loss model, a BER function for the AWN, and predicted temporal models for packets generated Fig 2. Coexistence results for 915 MHz O-QPSK PHY by the AWN and packets generated by the IWN. The method We assume saturated IEEE 802.11b interference in our work. predicts the PER of the AWN as a function of physical Under WLAN interference Zigbee packet is successfully spacing between the IWN transmitter and the AWN receiver. received if one of the below conditions is satisfied. Coexistence can be seen by these three parameters. (a) When IEEE 802.15.4 packets overlaps WLAN (b) • Bandwidth of AWN and IWN devices. packet the in band interference power from the • BER as a function of SIR of AWN devices. WLAN packet is lower than the IEEE 802.15.4 • Path loss model for the network. packet at an IEEE 802.15.4 receiver. According to specification, if interference is weak enough so that 915 MHz O-QPSK PHY the in band (signal to interference ratio) SIR is At 915 MHz IEEE 802.15.4 uses O-QPSK modulation uses a greater than 5-6dB, an IEEE 802.15.4 packet is chip rate of 𝑅 𝑐 of 1000 𝑘 𝑐 /𝑠 bit rate 𝑅 𝑏 of 250 kb/s and a successfully received with a probability of 99%. code block of M=16 symbols [1]. Conversion from SNR to (b) The transmission time of IEEE 802.15.4 packet is 𝐸 𝑏 /𝑁0 assume matched filtering and half pulse shaping. less than the inter frame idle time 𝑇𝑖𝑑𝑙𝑒 between two nearer WLAN packets so that IEEE 802.15.4 𝐸𝑏 .625𝑅 𝑐 .625×1000000 = 𝑆𝑁𝑅 = = 2.5 SNR (1) packet will not overlap WLAN packet. 𝑁0 𝑅𝑏 250000 Our model involves two aspects, namely Power & Timing. 681 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 So based upon above ranges we have 3 scenario for determining the throughput. Power Aspect: We use a path loss model recommended in IEEE 802.11b specification, for determining a power of received signal in Timing Aspect: free space propagation. Range R1 : In this scenario CSMA/CA mechanism We know that transmission power of IEEE 802.11b and works of both standards, therefore one is transmitting 802.15.4 nodes are different. The difference in transmit power and receiver sensitivity leads to different and other has to wait. We know that IEEE 802.15.4 ranges 𝑅1 , 𝑅2 , and 𝑅3 . nodes have 10-20 times longer timing than WLAN We quantify these ranges accordingly nodes. Shorter timing gives IEEE 802.11b nodes 𝑅1 : In this range both IEEE 802.15.4 node and IEEE priority over IEEE 802.15.4 nodes and therefore 802.11b both nodes can sense each other, 𝑅2 : In this range IEEE 802.15.4 node can sense IEEE interference arise to IEEE 802.15.4 nodes. Sufficient 802.11 node but not vice versa, coexistence condition for this range R1 is that CCA [8] 𝑅3 : In this range both nodes can't sense each other but IEEE of IEEE 802.15.4 happens during idle time of two 802.15.4 node still suffers interference. consecutive IEEE 802.11b packets. Scenario is shown in fig 3. 𝑡 𝑖𝑑𝑙𝑒 ≜ 𝐷𝐼𝐹𝑆 + 𝑡 𝑏𝑜 = 𝐷𝐼𝐹𝑆 + 𝑚. 𝑇 𝑏𝑠 (8) Where 𝑇 𝑏𝑠 is backoff unit, m is random inter uniformly distributed over [0, 𝐶𝑊 𝑚𝑖𝑛 ], 𝑡 𝑏𝑜 is random period for an additional deferral time before transmitting. Fig 3: Coexistence ranges of IEEE 802.11b and IEEE 802.15.4 When m≥ 4 for IEEE 802.11b, 𝑡 𝑖𝑑𝑙𝑒 ≥ CCA. Thus value of m should be taken in [4, 31], 𝑡 𝑖𝑑𝑙𝑒 is long The path loss follows free space propagation up to 8m enough for performing CCA. and then attenuates rapidly with coefficient of 3.3 which Range 𝑅2 : In this range IEEE 802.11b nodes are transmitting is taken 4 in accordance with 32m indoor transmission distance of IEEE 802.15.4 nodes. and IEEE 802.15.4 nodes are waiting, but when IEEE The path loss[2] [8] is given as: 802.15.4 nodes are transmitting, IEEE 802.11b nodes are not 20 𝑙𝑜𝑔10 4𝜋𝑑 𝑖𝑓 𝑑 ≤ 𝑑𝑜 aware and try to transmit, which cause overlapping in packets 𝑃𝐿 𝑑 = 𝜆 (7) transmission. This is shown in fig 4. 20 𝑙𝑜𝑔10 4𝜋𝑑𝑜 + 40 𝑙𝑜𝑔10 𝑑 𝑖𝑓 𝑑 > 𝑑𝑜 𝜆 𝑑𝑜 Here d= distance between transmitter and receiver, 𝑑𝑜 is the length of line of sight =8m We assume here that Power spectral density of WLAN is uniformly distributed across 22 MHz bandwidth, also taking receiver sensitivity as received power and SIR at 6dB. Table II Coexistence Ranges of IEEE 802.15.4 AND IEEE802.11b/g Fig 5. In Range𝑅2 IEEE 802.11b nodes fail to sense IEEE 802.15.4 nodes Ranges IEEE IEEE In this scenario to ensure non overlapping transmission the 802.11b 802.11g below condition must be satisfied. 𝑅1 22m 32m 𝑡 𝑖𝑑𝑙𝑒 ≜ 𝐷𝐼𝐹𝑆 + 𝑚. 𝑇 𝑏𝑠 ≥ 𝐶𝐶𝐴 + 𝑡 𝑝 + 𝑆𝐼𝐹𝑆 + 𝑅2 67m 67m 𝐴𝐶𝐾𝑡 𝑝 is the transmission time of an IEEE 802.15.4 packet. 𝑅3 95m 95m For successful transmission of IEEE 802.15.4 equation (7) should be satisfied. Range 𝑅3 : In this range neither IEEE802.11b nodes nor IEEE 802.15.4 nodes can sense each other. But IEEE802.15.4 nodes can still suffer interference from IEEE802.11b nodes, because a range where wireless devices can cause interference to other is usually larger than a range where it is sensed by other wireless devices. In this range both IEEE 802.11b and IEEE 802.15.4 node are transmitting Fig 4: In Range 𝐑 𝟏 IEEE 802.11b/g nodes have priority over without deferring each other, this means blind transmission is IEEE 802.15.4 nodes happening. Also for successful transmission of packets, power condition (7) should be satisfied. In case of ACK is not 682 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 employed successful transmission of IEEE 802.15.4 packets We see that in a valid range interference (Packet loss ratio) could happen if and only if timing condition (8) is satisfied decreases as the distance between WLAN access point and while power condition (7) is not necessary. Zigbee coordinator increases. See figure 8. Thus by these 3 scenario we see that how interference is affecting the throughput of IEEE 802.15.4 network. III. Experimental setup We construct a experimental setup for measurement the throughput of IEEE 802.15.4 (zigbee) under WLAN interference. WLAN is constructed by two laptops and one WLAN access point. Zigbee network is constructed using Fig.8 Received signal strength indication (RSSI) at zigbee coordinator Zigbee evaluation kit which contains one display board and three RCB (radio controller board). One RCB is mounted IV. CONCLUSION on display board which acts as Zigbee coordinator and other two RCB acts as zigbee end devices, these forms Based upon model analysis and measurement setup we see Zigbee network. how IEEE 802.15.4(Zigbee) network performance reduces in the IEEE 802.11b network environment. Our Model suggests the different ranges for analysis of throughput in interference environment, and measurement suggests two different results which are shown in Test case 1 and 2. We conclude interference calculation on IEEE 802.15.4 in IEEE 802.11b network environment but we know that at 2.45 GHZ IEEE 802.15.3 and IEEE 802.11g network also works so that if the entire network exists in a valid range there will a significant drop in IEEE 802.15.4 network’s Throughput. An optimum solution for this problem is that we can use adaptive interference-aware multi-channel clustering algorithm [7]. FIG. 6 MEASUREMENT SETUP ACKNOWLEDGMENT WLAN packets are continuously transmitting from one The Authors wish to thanks Dr. Sandipvijay, Dr. S.C Gupta, laptop to access point which sends data packets to another & Mr. Mukesh Pathela for their helpful comments during the laptop. course of this study. Test case 1:-we conclude some facts from above fig.6.In frequency domain we know that signal power is concentrated around center frequency[6] and weaker away from the center. REFERENCES Suppose we choose 4 IEEE 802.15.4 channels overlapping with one WLAN channel with 2MHz, 3 MHZ, 7MHz, and [1] IEEE 802.11b Specification, Wireless LAN Medium 8MHz frequency offsets from WLAN channel center Access Control (MAC) and Physical Layer (PHY) frequency then we investigate that IEEE 802.15.4 channel specifications: Higher-Speed Physical Layer Extension in the with 2 MHz offset is close to WLAN channel center 2.4 GHz Band, Sep. 16, 1999 frequency, That’s why it suffer serious interference, and 8 [2] IEEE 802.15.4 Specification, Wireless Medium Access MHz channel offset suffers least interference as an Control (MAC) and Physical Layer (PHY) Specifications for overlapping channel [6]. As conclusion, when the frequency Low Rate Wireless Personal Area Networks (LR-WPANs), offset is larger, the interference power is less, and impact is Oct. 1, 2003. less [6]. See figure 7. [3] Soo Young Sin, “Packet error rate analysis of zigbee under WLAN and Bluetooth interferences” IEEE transaction on wireless communication, VOL. 6, NO. 8, August 2007 [4] Khaled shuaib, “performance Evaluation of IEEE 802.15.4 Experimental and Simulation results” Journal of communication VOL.2, NO.4, JUNE 2007 [5] J.G. proakis, Digital communications, McGraw-Hill, 1995 [6] Guang Yang,“Zigbee network performance under WLAN 802.11b/g interference” IEEE conference on Wireless pervasive computing, 2009, ISWPC 2009.11-13 Feb, 2009. Fig. 7 Packet loss ratio when distance between Zigbee coordinator to WLAN [7] Min Suk Kang, “Adaptive Interference-Aware (802.11b) Access point is 3 meters. Multi-Channel Clustering Algorithm in a zigbee Network in Test case 2:-Fixed zigbee network to work on two non- the Presence of WLAN Interference” IEEE conference on overlapping channels: 21(2455 MHz) and 16(2430 MHz) wireless pervasive computing, 2007, ISPWC. 5-7 FEB, 2007. 683 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [8] Wei Yuan, “A Coexistence model of IEEE 802.15.4 and IEEE 802.11b/g” 14th symposium on communication and vehicular technology in Benelux, 2007 Neha Gandotra- Presently working as Assistant Professor in Electronics & Communication Department at DIT Dehradun. She has more than 5 years of teaching experience. Her area of interest is Digital Communication, wireless Adhoc Network, Wireless communication. Vishwanath Bijalwan –A student member of IAENG, UACEE & Student of M.Tech final semester at Dehradun Institute of Technology Dehradun. His area of Interest is Wireless Adhoc Network, Digital Image Processing, Spread Spectrum systems. Manohar Panwar –presently he is working as a Assistant Professor in Department of Computer Science at Doon Institute of Engineering & Technology Rishikesh. His area of Interest is wireless network, Cryptography, Adhoc Network. He is active member of IAENG, UACEE. He is currently working on advance security protocol establishment on Zigbee network. 684 All Rights Reserved © 2012 IJARCET