21ECO101T SRWC Unit1 r1
21ECO101T SRWC Unit1 r1
E
A
R
N
L
E
A
P
L
E
A
D
             21ECO101T
SHORT RANGE WIRELESS COMMUNICATION
                                                                          Dr. D. Tharani
                                                                          ECE
https://lotusarise.com/qna/upsc/q-consider-the-following-communication-   tharanid@srmist.edu.in
technologies
                  SHORT RANGE WIRELESS COMMUNICATION
References
• Each channel has a fixed frequency bandwidth and capacity (bit rate).
*GSM- describe the protocols for second-generation digital cellular networks used
by mobile devices such as mobile phones and tablets.
*CDMA-method of encoding several sources of data so they may all be transmitted
over a single RF carrier by one transmitter, or by using a single RF carrier
frequency with multiple transmitters.
              Typical Frequencies
•   FM Radio ~ 88 MHz
•   TV Broadcast ~ 200 MHz
•   GSM Phones ~ 900 MHz
•   GPS ~ 1.2 GHz
•   Bluetooth ~ 2.4 GHz
•   WiFi      ~ 2.4 GHz
                    Why Wireless?
•   Benefits
    • Mobility: Ability to communicate anywhere!!
    • Easier configuration, set up and lower installation cost
•   Difficulties
    • Communication medium: Free space
         • Noisy and unpredictable channel
         • Broadcast channel, more user ->less BW per user
    • Higher equipment cost
    • Usually regulated spectrum and limited BW
    • Need backbone systems in order to function properly
                         Challenges
•   Efficient Hardware
     •   Low power transmitters, receivers
     •   Low power signal processing tools
•   Efficient use of finite radio spectrum
     •    Cellular frequency reuse, medium access control (MAC) protocols
•   Integrated Services
     •    Voice, data, multimedia over the same network
     •    Service differentiation, priorities, resource sharing
•   Network support for user mobility (mobile scenarios)
     •    Location identification, Handoffs,..
•   Maintaining quality of service over unreliable links.
•   Connectivity and coverage (internetworking)
•   Cost efficiency
                         Challenges
•   Fading-variation of signal attenuation over variables like time,
    geographical position, and radio frequency.
•   Multipath-
     the propagation phenomenon that
    results in radio signals reaching the
    receiving antenna by two or more
    paths.
•   Higher probability of data
    corruption
     • Hence, need for stronger
     channel codes
•   Need for stronger security
    mechanisms
     • Privacy, Authentication.
 Introduction to Wireless Systems
•A wireless system refers to a network or communication system
that transmits and receives data or information without the use
of physical cables or wired connections.
•It utilizes electromagnetic waves or radio frequencies to
transmit signals between devices, allowing for convenient and
flexible communication and connectivity.
•Wireless systems have become an integral part of modern life,
enabling various technologies such as mobile phones, Wi-Fi
networks, Bluetooth devices, wireless sensors, and many other
applications.
•These systems have revolutionized the way we communicate,
access information, and interact with our environment.
Advantages of Wireless system:-
1. Mobility: Users can access and communicate wirelessly from
virtually anywhere within the coverage area, providing freedom
of movement and flexibility.
2. Convenience: Wireless systems eliminate the need for physical
cables, reducing clutter and simplifying device connectivity.
3. Scalability: Wireless networks can be easily expanded or
modified to accommodate new devices or users without the
need for additional infrastructure.
4. Cost-Effectiveness: In many cases, deploying wireless systems
can be more cost-effective than laying physical cables or wiring.
Online Quiz 1
https://quizizz.com/admin/quiz/665c029803e0dab0e5ae9fa9?source=admin
&trigger=quizPage
                  SHORT RANGE WIRELESS COMMUNICATION
 Overview
•Short-range wireless communications typically refers to a wide variety
of technologies with communication ranges from a few centimeters to
several hundreds of meters.
•While the last three decades of the wireless industry have been
mostly dominated by cellular systems, short-range wireless devices
have gradually become a more integrated part of our everyday lives
over the last decade.
•The Wireless World Research Forum (WWRF) envisions that this trend
will accelerate in the upcoming years: by the year 2017, it is expected
that seven billion people in the world will be using seven trillion
wireless devices.
•The majority of these devices will be short-range wireless devices
that interconnect people with each other and their environments.
                  SHORT RANGE WIRELESS COMMUNICATION
                                        1. Data source
                                        2. RF generating
                                        section
                                        3. RF conduction and
                                        radiation
                                        4. Radio channel
                                        5. Receivers
                                        6. Power supply
   Elements of Wireless Communication Systems
1. Data source:
   • Analog/ Digital
   • Simple on/off info security intrusion detector, panic button, manual
   remote control unit
   • Change of state of data cause message frame modulated on RF carrier
                                                                   COMPANDER:
                                                                   combination of a
                                                                   COMPressor and
                                                                   an exPANDer.
                                           DSL(Digital subscriber
                                           line)used to transmit digital
                                           data over telephone lines.
                                Bluetooth
•   Open Wireless Protocol, WPAN standard
•   Operates ISM (industrial, scientific, and
    medical) band at 2.4-2.4835 GHz
•   Uses radio technology called frequency-
    hopping spread spectrum (FHSS)
•   Modulation - Gaussian Frequency-Shift Key
    Modulation
•   Frequency- Hopping Spread Spectrum
      Chunks of data transmitted
      Spread-spectrum signals are highly
       resistant to narrowband interference
      Difficult to intercept
      Transmissions share a frequency band
       with minimal interference
     Bluetooth: https://www.youtube.com/watch?v=jzxZUJmOu3o
    Quiz2:
    https://www.mentimeter.com/app/presentation/almanmn3acz3d2brcis8o1e4vb1h3c4p/pq9jjpingi
    wh
                             Bluetooth
•    Data rate up to 1Mb/s – 3 Mb/s
•    Use in mobile phones, laptops,
     telephones, printers, GPS, video game
     consoles
•    Bluetooth USB dongle – must use if
     computer is not Bluetooth enabled
•    Advantages:
      – Wireless, Inexpensive, Automatic
      – Low energy and power consumption
•    Disadvantages:
      – Security
      – Viruses over the years
      – Bluejacking
      – Health Concerns (same as mobile
         phones)
    Bluejacking is when an attacker sends
    unsolicited messages to a victim's Bluetooth-
    enabled device.
Bluetooth Architecture
 IQ modulation
 https://www.youtube.com/watch?v=zNbWTiKEl30
Bluetooth modes
•Bluetooth has three modes for achieving different degrees of power consumption during
operation: sniff, hold, and park.
•Even in the normal active mode, some power saving can be achieved.
1. Active mode:
    •During normal operation, a slave can transmit in a particular time slot only if it is
    specifically addressed by the master in the proceeding slot.
    • As soon as it sees that its address is not contained in the header of the master’s
    message, it can “go to sleep,” or enter a low-power state until it’s time for the next
    master transmission.
    •The master also indicates the length of its transmission (one, three, or five slots) in its
    messageheader, so the slave can extend its sleep time during a multiple slot interval.
2. Sniff mode:
    •In this mode, sleep time is increased because the slave knows in advance the time
    interval between slots during which the master may address the slave.
    •If it’s not addressed during the agreed slot, it returns to its low-power state for the
    same period and then wakes up and listens again.
    •When it is addressed, the slave continues listening during subsequent master
    transmission slots as long as it is addressed, or for an agreed time-out period.
Bluetooth modes
3. Hold mode:
 •The master can put a slave in the hold mode when data transfer between
 them is being suspended for a given period of time.
 •The slave is then free to enter a low-power state, or do something else, like
 participate in another piconet.
 • It still maintains its membership in the original piconet, however.
 •At the end of the agreed time interval, the slave resynchronizes with the
 traffic on the piconet and waits for instructions from the master.
 4. Park mode:
 •Park has the greatest potential for power conservation, but as opposed to hold
 and sniff, it is not a directly addressable member of the piconet.
 •While it is outside of direct calling, a slave in park mode can continue to be
 synchronized with the piconet and can rejoin it later, either on its own initiative
 or that of the master, in a manner that is faster than if it had to join the piconet
 from scratch.
 •In addition to saving power, park mode can also be considered a way to virtually
 increase the network’s capacity from eight devices to 255, or even more.
Bluetooth modes
4. Park mode:
    •When entering park mode, a slave gives up its active piconet address and
    receives an 8-bit parked member address.
    •It goes into low-power mode but wakes up from time to time to listen to
    the traffic and maintain synchronization.
    • The master sends beacon transmissions periodically to keep the network
    active. (Beacon kind of like a lighthouse: it repeatedly transmits a constant
    signal that other devices can see)
    •Broadcast transmissions to all parked devices can be used to invite any of
    them to rejoin the network.
    •Parked units themselves can request reassociation with the active network
    by way of messages sent during an access window that occurs a set time
    after what is called a “beacon instant”
    •A polling technique is used to prevent collisions.
    •Park mode was removed in Version 5 of the Bluetooth specification.
Parameters that affect interference between Bluetooth and Wi-Fi:
Parameters that affect interference between Bluetooth and Wi-Fi
  •Frequency and time overlap:
      •A collision occurs when the interferer transmits at the same time as the
      desired transmitter and is strong enough to cause a bit or symbol error in
      the received packet.
  •Packet length:
  :
      • The longer the packet length of the Wi-Fi system, relative to a constant
      packet length and hop rate of Bluetooth, the longer the victim may be
      exposed to interference from one or more collisions and the greater the
      probability of a packet error.
  •Bit rate:
      •Higher the bit rate, the lower the receiver sensitivity and therefore the
      more susceptible the victim will be to packet error for given desired and
      interfering signal strengths.
      •Higher bit rates usually result in reduced packet length, with the opposite
      effect.
Parameters that affect interference between Bluetooth and Wi-Fi
  •Use factor:
       •More often the interferer transmits, the higher the probability of packet error.
       •When both communicating terminals of the interferer are in the interfering
       vicinity of the victim, the use factor is higher than if the terminals are further
       apart and one of them does not have adequate strength to interfere with the
       victim.
  :
  • Relative distances and powers:
       •The received power depends on the power of the transmitter and its distance.
       •Generally, Wi-Fi systems use more power than Bluetooth, typically 20 mW
       compared to 1 mW.
       •Bluetooth Class 1 systems may transmit up to 100 mW, but their output is
       controlled to have only enough power to give a required signal level at the
       receiving terminal.
  • Signal-to-interference ratio of the victim receiver, SIR, for a specified symbol or
  frame error ratio.
  • Type of modulation, and whether error-correction coding is used.
                                    ZigBee
• High-level communication protocol
• The Name
   – Zig-zagging of bees from flower to flower
   – Analogous to mesh networking
            https://youtu.be/QXV_HgGO--g?si=-YOB-22gOHflQv2B
  Zigbee
•IEEE specification 802.15.4 associated with Zigbee, but it should be seen as a separate
entity.
•Low data rate WPAN which describes the physical and data link layers that typically
address remote monitoring and control applications.
•An association of committed companies, the Zigbee Alliance, has defined the network,
security, and application layers above the 802.15.4 physical and medium access control
(MAC) layers, and deals with interoperability certification and testing
•Distinguishing features are:
     •Low data rates—raw rates between 20 and 250 kbps
     •Low power consumption—several months up to two years on standard primary
     batteries
     • Network topology appropriate for multisensor monitoring and control applications
     •Low complexity for low cost and ease of use
     • Very high reliability and security
  Zigbee
•Applications:
    •consumer electronics
    •Home and building
    automation and
    security systems
    •industrial controls
    • PC peripherals
    •medical and industrial
    sensor applications
    •toys and games
                 Source: http://www.zigbee.org/imwp/idms/popups/pop_download.asp?ContentID=7092
Zigbee Architecture
Zigbee Architecture
   •Similar to that of other IEEE standards, Wi-Fi and Bluetooth
   •On the bottom are the physical layers, showing two alternative options for the
   RF transceiver functions of the specification.
   • Both of these options are not expected to exist in a single device, and indeed
   their transmission characteristics—frequencies, data rates, modulation system—
   are quite different.
   •Embedded firmware and software layers above them will be essentially the
   same no matter what physical layer is applied.
   • Just above the physical layers (PHY) is the MAC layer which is responsible for
   management of the physical layer and delivering data to and from the applications
   through the layer above it.
        •MAC layer functions channel access, keeping track of slot times, and
        message delivery acknowledgement.
   •The higher layers are not part of IEEE 802.15.4.
Zigbee Architecture
   •Functions of the network layer forming a network, managing
   association with the network and disassociation from it, and routing.
   • Its functions and the application services above it are defined by the
   Zigbee Alliance.
   •Application software is not a part of the IEEE 802.15.4 specification.
   •Zigbee Alliance prepares profiles, or programming guidelines and
   requirements for various functional classes in order to assure product
   interoperability and vendor independence.
       These profiles define network formation, security, and application
       requirements while keeping in mind the basic Zigbee features of low
       power and high reliability.
Zigbee Frame structure
   •Purpose of the preamble permit acquisition of chip and symbol timing.
  • One partial answer to the range question is the deployment of the Zigbee
  network in a cluster-tree configuration.
  •Adjacent nodes serve as repeaters so that large areas can be covered, as long
  as the greatest distance between any two directly communicating nodes does
  not exceed IEEE 802.15.4 basic range capability.
  •For Eg, in a multi-floor building, sensors on the top floor can send alarms to
  the control box in the basement by passing messages through sensors located
  on every floor and operating as relay stations.
  •There is competition between Bluetooth and Zigbee for use in certain
  applications, but the overall extent of deployment and the reliability of
  wireless control systems are higher because of it.
  •The proportion of wireless security and automation systems has increased
  because adherence to the 802.15.4 standard provides high reliability, security,
  and reduced development costs compared to many proprietary solutions.
Ultra-wideband Technology
  •Ultra-wideband :
       •UWB is a radio technology use a very low energy level for short-range,
       high-bandwidth communications over a large portion of the radio
       spectrum.
       •UWB has traditional applications in non-cooperative radar imaging. Most
       recent applications target sensor data collection, precise locating, and
       tracking.
  •Ultra-wideband Technology:
       •Creates a radio spectrum that is spread over a very wide bandwidth—
       much wider than the bandwidth used in the spread-spectrum systems.
       • UWB transmissions are virtually undetectable by ordinary radio
       receivers and therefore can exist concurrently with existing wireless
       communications without demanding additional spectrum or exclusive
       frequency bands.
  •Advantages of UWB technology:
       •Very low spectral density—very low probability of interference with
       other radio signals over its wide bandwidth
       • High immunity to interference from other radio systems
       •Low probability of interception/detection by other than the desired
       communication link terminals
       •LP consumption
       •Ultra fast 1000X fatser, seamless user interface
         https://youtu.be/pE-WbKLMElI?si=7xsJpiM1_hoWKySN
Ultra-wideband Technology
 Advantages of UWB technology—Cont…
     • High multipath immunity
     • Many high data rate UWB channels can operate
     concurrently
     • Fine range-resolution capability
     • Relatively simple, low-cost construction, based on nearly
     all-digital architectures.
 •Transmission and reception methods are unique
 •UWB “carrier” is a Gaussian monopulse
 Applications
 • Air tags  get accurate location
 •Smart car access
 •Wearable health sensors
 •Wireless printers to contactless payments
Ultra-wideband Technology- Bit Sequence detection
 •A “1” monopulse is represented by a negative line followed by a positive line, and a
 “0” monopulse by the inverse—a positive line and a negative line.
 •The synchronized sequence generated in the receiver is drawn on the second line and
 below it the result of the correlation operation
     •∫f(t)g(t)dt
     •where f(t) is the received signal and g(t) is the locally generated sequence.
 •By sampling this output at the end of each bit period and then resetting the correlator,
 the transmitted sequence is reconstructed in the receiver.
 •This is shown as the “Logic Output” which is delayed by one symbol period.
Ultra-wideband Technology- Bit Sequence detection
  Quiz 3: https://quizizz.com/admin/quiz/6662a5a3590eea703e28c2b8
Comparison between various short range wireless technologies