`AND NETWORKS
`SECOND EDITION
`
`Williant Stallings
`
`• Upper Saddle River, NJ 07458
`
`CELLSPIN
`EX. 2014, Page 1
`
`
`
`-
`
`Library of Congress Cataloging-in-Publication Data on file
`
`Vice President and Editorial Director, ECS:
`Marcia J Horton
`Publisher: Alan Apt
`Associate Editor: Toni D. Holm
`Editorial Assistant: Patrick Lindner
`Vice President and Director of Production and
`Manufacturing, ESM: David W Riccardi
`Executive Managing Editor: Vince O'Brien
`Managing Editor: Camille Trentacoste
`Production Editor: Rose Kernan
`Cover Photo: Brand X Pictures
`
`Director of Creative Services: Paul Belfanti
`Art Director: Heather Scott
`Cover Designer: Tamara Newnam
`Managing Editor,AV Management
`and Production: Patricia Burns
`Art Editor: Gregory Dulles
`Manufacturing Manager: Trudy Pisciotti
`Manufacturing Buyer: Lynda Castillo
`Marketing Manager: Pamela Hersperger
`Marketing Assistant: Barrie Reinhold
`
`• .
`
`© 2005, 2002 Pearson Education, Inc.
`Pearson Prentice Hall
`Pearson Education, Inc.
`Upper Saddle River, NJ 07458
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission
`in writing from the publisher.
`
`Pearson Prentice Hall® is a trademark of Pearson Education, Inc.
`
`The author and publisher of this book have used their best efforts in preparing this book. These efforts include the
`development, research, and testing of the theories and programs to determine their effectiveness. The author and
`publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation
`contained in this book. The author and publisher shall not be liable in any event for incidental or consequential
`damages in connection with, or arising out of, the furnishing, performance, or use of these programs.
`
`Printed in the United States of America
`10987654321
`
`ISBN: 0-13-191835-4
`
`Pearson Education Ltd., London
`Pearson Education Australia Pty. Ltd., Sydney
`Pearson Education Singapore, Pte. Ltd.
`Pearson Education North Asia Ltd., Hong Kong
`Pearson Education Canada, Inc., Toronto
`Pearson Educacion de Mexico, S.A. de C. V.
`Pearson Education~apan, Tokyo
`Pearson Education Malaysia, Pte. Ltd.
`Pearson Education Inc., Upper Saddle River, New Jersey
`
`CELLSPIN
`EX. 2014, Page 2
`
`
`
`As always)
`for my loving wife
`and her constant companions
`Geoffroi and Helma
`
`CELLSPIN
`EX. 2014, Page 3
`
`
`
`CONTENTS
`
`Preface xi
`
`Chapter 1
`1.1
`1.2
`1.3
`1.4
`1.5
`1.6
`1.7
`1.8
`
`Introduction 1
`Wireless Comes of Age 2
`The Cellular Revolution 3
`The Global Cellular Network 4
`Broadband 5
`Future Trends 5
`The Trouble with Wireless 7
`Outline of the Book 7
`Internet and Web Resources 10
`
`PART ONE TECHNICAL BACKGROUND 13
`Chapter 2
`Transmission Fundamentals 14
`2.1
`Signals for Conveying Information 15
`2.2
`Analog and Digital Data Transmission 22
`2.3
`Channel Capacity 27
`2.4
`Transmission Media 31
`2.5
`Multiplexing 36
`2.6
`Recommended Readings and Web Sites 40
`2.7
`Key Terms, Review Questions, and Problems 41
`Appendix 2A Decibels and Signal Strength 43
`Communication Networks 46
`LANs,MANs,andWANs 47
`Switching Techniques 49
`Circuit Switching 50
`Packet Switching 54
`Asynchronous Transfer Mode 60
`Recommended Readings and Web Sites 65
`Key Terms, Review Questions, and Problems 66
`Protocols and the TCP /IP Suite 69
`The Need for a Protocol Architecture 70
`The TCP/IP Protocol Architecture 71
`The OSI Model 75
`Internetworking 77
`Recommended Readings and Web Sites 83
`Key Terms, Review Questions, and Problems 83
`Appendix 4A Internet Protocol 85
`Appendix 4B Transmission Control Protocol 88
`Appendix 4C User Datagram Protocol 92
`
`Chapter 3
`3.1
`3.2
`3.3
`3.4
`3.5
`3.6
`3.7
`Chapter 4
`4.1
`4.2
`4.3
`4.4
`4.5
`4.6
`
`.. vu
`
`CELLSPIN
`EX. 2014, Page 4
`
`
`
`-
`
`...
`
`Vlll CONTENTS
`
`PART TWO WIRELESS COMMUNICATION TECHNOLOGY 94
`Antennas and Propagation 95
`Chapter 5
`5.1
`Antennas 96
`5.2
`Propagation Modes 101
`5.3
`Line-of-Sight Transmission 105
`5.4
`Fading in the Mobile Environment 115
`5.5
`Recommended Readings and Web Sites 122
`5.6
`Key Terms, Review Questions, and Problems 123
`Chapter 6
`Signal Encoding Techniques 127
`6.1
`Signal Encoding Criteria 129
`6.2
`Digital Data, Analog Signals 131
`6.3
`Analog Data, Analog Signals 142
`6.4
`Analog Data, Digital Signals 148
`6.5
`Recommended Readings 155
`6.6
`Key Terms, Review Questions, and Problems 155
`Spread Spectrum 159
`Chapter 7
`7.1
`The Concept of Spread Spectrum 160
`7.2
`Frequency Hopping Spread Spectrum 161
`7.3
`Direct Sequence Spread Spectrum 166
`7.4
`Code Division Multiple Access 170
`7.5
`Generation of Spreading Sequences 173
`7.6
`Recommended Readings and Web Sites 186
`7.7
`Key Terms, Review Questions, and Problems 186
`Coding and Error Control 192
`Chapter 8
`8.1
`Error Detection 193
`8.2
`Block Error Correction Codes 200
`Convolutional Codes 216
`8.3
`8.4
`Automatic Repeat Request 223
`8.5
`Recommended Readings 230
`8.6
`Key Terms, Review Questions, and Problems 231
`
`PART THREE WIRELESS NETWORKING 236
`Satellite Communications 23 7
`Chapter 9
`9.1
`Satellite Parameters and Configurations 238
`9.2
`Capacity Allocation-Frequency Division 250
`9.3
`Capacity Allocation-Time Division 256
`9.4
`Recommended Readings and Web Sites 261
`9.5
`Key Terms, Review Questions, and Problems 262
`Cellular Wireless Networks 264
`Chapter 10
`10.1
`Principles of Cellular Networks 265
`10.2
`First-Generation Analog 282
`10.3
`Second-Generation TDMA 285
`10.4
`Second-Generation CDMA 298
`10.5
`Third-Generation Systems 304
`
`CELLSPIN
`EX. 2014, Page 5
`
`
`
`CONTENTS
`
`.
`
`IX
`
`10.6
`10.7
`Chapter 11
`11.1
`11.2
`11.3
`11.4
`11.5
`
`Recommended Readings and Web Sites 311
`Key Terms, Review Questions, and Problems 314
`Cordless Systems and Wireless Local Loop 317
`Cordless Systems 318
`Wireless Local Loop 329
`WiMAX and IEEE 802.16 Broadband Wireless Access Standards 342
`Recommended Readings and Web Sites 354
`Key Terms, Review Questions, and Problems 355
`Appendix 11A Linear Predictive Filters 356
`Chapter 12 Mobile IP and Wireless Access Protocol 358
`12.1
`Mobile IP 359
`12.2
`Wireless Application Protocol 373
`12.3
`Recommended Readings and Web Sites 394
`12.4
`Key Terms, Review Questions, and Problems 396
`Appendix 12A Internet Control Message Protocol 397
`Appendix 12B Message Authentication 401
`Appendix 12C Service Primitives and Parameters 402
`
`PART FOUR WIRELESS LANS 404
`Chapter 13 Wireless Lan Technology 405
`13 .1
`Overview 406
`13.2
`Infrared LANs 413
`13.3
`Spread Spectrum LANs 417
`13.4
`Narrowband Microwave LANs 418
`13.5
`Recommended Readings and Web Sites 419
`13.6
`Key Terms, Review Questions, and Problems 419
`Chapter 14
`Wi-Fi and the IEEE 802.11 Wireless Lan Standard 421
`14.1
`IEEE 802 Protocol Architecture 422
`14.2
`IEEE 802.11 Architecture and Services 428
`14.3
`IEEE 802.11 Medium Access Control 433
`14.4
`IEEE 802.11 Physical Layer 442
`14.5
`Other IEEE 802.11 Standards 451
`14.6
`Recommended Readings and Web Sites 458
`14.7
`Key Terms, Review Questions, and Problems 459
`Appendix 14A Scrambling 460
`Bluetooth and IEEE 802.15 463
`Overview 464
`Radio Specification 471
`Baseband Specification 4 72
`Link Manager Protocol 491
`Logical Link Control and Adaptation Protocol 495
`IEEE 802.15 501
`Recommended Readings and Web Sites 508
`Key Terms, Review Questions, and Problems 509
`
`Chapter 15
`15.1
`15.2
`15.3
`15.4
`15.5
`15.6
`15.7
`15.8
`
`CELLSPIN
`EX. 2014, Page 6
`
`
`
`r X CONTENTS
`
`APPENDICES 511
`Appendix A
`Traffic Analysis 511
`A.1
`Basic Traffic Concepts 512
`A.2
`Multiserver Models 513
`A.3
`Recommended Reading 519
`Appendix B
`Fourier Analysis 520
`B.1
`Fourier Series Representation of Periodic Signals 521
`B.2
`Fourier Transform Representation of Aperiodic Signals 522
`B.3
`Recommended Readings 525
`Appendix C
`Data Link Control Protocols 526
`C.1
`High-Level Data Link Control 527
`Glossary 533
`References 540
`Index 547
`
`CELLSPIN
`EX. 2014, Page 7
`
`
`
`'¥
`
`·\.,.
`';-J-,+<>t'
`'
`. ~ ' ; ~
`
`PREFACE
`
`Wireless technology has become the most exciting area in telecommunications and network(cid:173)
`ing. The rapid growth of mobile telephone use, various satellite services, and now the wireless
`Internet and wireless LANs are generating tremendous changes in telecommunications and
`networking. This book explores the key topics in the field in the following general categories:
`• Technology and architecture: There is a small collection of ingredients that serves to char(cid:173)
`acterize and differentiate wireless communication and networking, including frequency
`band, signal encoding technique, error correction technique, and network architecture.
`• Network type: This book covers the important types of wireless networks, including
`satellite, cellular, fixed wireless access, and wireless LANs.
`• Design approaches: The book examines alternative design choices and assesses their
`relative merits.
`• Applications: A number of key technologies and applications have been developed on
`top of wireless infrastructures, especially mobile IP and wireless Web access.
`Throughout, there is an emphasis on both technology and on standards. The book pro(cid:173)
`vides a comprehensive guide to understanding specific wireless standards, such as those pro(cid:173)
`mulgated by ITU and IEEE 802, as well as standards developed by other organizations. This
`emphasis reflects the importance of such standards in defining the available products and
`future research directions in this field.
`
`This book is intended for a broad range of readers who will benefit from an understanding
`of wireless communications and networks, and the associated technologies. This includes stu(cid:173)
`dents and professionals in the fields of data processing and data communications, designers
`and implementers, and data communication and networking customers and managers. For
`the professional interested in this field, the book serves as a basic reference volume and is
`suitable for self-study.
`As a textbook, it is suitable for an advanced undergraduate or graduate course. It cov(cid:173)
`ers the material in the CS332 Wireless and Mobile Computing advanced course of the joint
`ACM/IEEE Computing Curricula 2001. The chapters and parts of the book are sufficiently
`modular to provide a great deal of flexibility in the design of courses.
`
`The book treats a number of advanced topics and provides a brief survey of the required ele(cid:173)
`mentary topics. For the reader with little or no background in data communications, Part
`One and the appendices cover a number of basic topics. The book is divided into four parts:
`• Technical Background
`• Wireless Communication Technology
`
`XI
`
`CELLSPIN
`EX. 2014, Page 8
`
`
`
`xii PREFACE
`
`• Wireless Networking
`• Wireless LAN s
`In addition, the book includes an extensive glossary, a list of frequently used acronyms,
`and a bibliography. Each chapter includes problems, suggestions for further reading, and a
`list of relevant Web sites. Each chapter also includes, for review, a list of key words and a
`number of review questions.
`
`INTERNET SERVICES FOR INSTR.UCTOR.S AND STUDENTS
`
`There is a Web site for this book that provides support for students and instructors. The site
`includes links to other relevant sites, transparency masters of figures and tables from the book
`in PDF (Adobe Acrobat) format, PowerPoint slides, and sign-up information for the book's
`Internet mailing list. The Web page is at WilliamStallings.com/Wireless/Wireless2e.html; see
`Section 1.8 for more information. An Internet mailing list has been set up so that instructors
`using this book can exchange information, suggestions, and questions with each other and with
`the author. As soon as typos or other errors are discovered, an errata list for this book will be
`available at WilliamStallings.com. I also maintain the Computer Science Student Resource
`Site at WilliamStallings.com/StudentSupport.html.
`
`In the three years since the first edition of this book was published, the field has seen con(cid:173)
`tinued innovations and improvements. In this new edition, I try to capture these changes
`while maintaining a broad and comprehensive coverage of the entire field. To begin the
`process of revision, the first edition of this book was extensively reviewed by a number of
`professors who teach the subject. The result is that, in many places, the narrative has been
`clarified and tightened, and illustrations have been improved. Also, a number of new "field(cid:173)
`tested" problems have been added.
`Beyond these refinements to improve pedagogy and user friendliness, the technical
`content of the book has been updated throughout, to reflect the ongoing changes in this
`exciting field. Every chapter has been revised. Highlights include the following:
`• Minimum shift keying: MSK is a form of modulation that is found in some mobile
`communications systems. This material is now covered.
`• CDMA2000: The first 3G (third generation) wireless system to be deployed commercially
`is known as CDMA2000 lxEV-DO. A discussion of this important standard is included.
`• WiMAX and IEEE 802.16a: Work on wireless local loop has evolved, including the intro(cid:173)
`duction of the WiMAX specification to provide interoperability specifications for 802.16.
`Chapter 11 includes new material on 802.16, including the recent 802.16a standard.
`• Orthogonal frequency division multiplexing: The popularity of OFDM is increasing
`and is used in a variety of local and wide area wireless standards. The material on
`OFDM has been updated and expanded.
`• Wi-Fi and IEEE 802.11: The coverage of 802.lla and 802.llb has been expanded
`significantly, and treatment of 802.llg had been added.
`• Data scrambling: Scrambling is a technique often used to improve signal quality. An
`overview of data scrambling is provided in Chapter 14.
`
`CELLSPIN
`EX. 2014, Page 9
`
`
`
`...
`PREFACE Xlll
`
`• Wi-Fi protected access: WPA has replaced Wireless Equivalent Privacy (WEP) as
`the specification for providing security in wireless LANs. Chapter 14 provides
`coverage of WPA.
`• IEEE 802.15 and personal area networks: The initial 802.15.1 standard provides an
`official specification for Bluetooth, which was covered in the first edition as well as
`this edition. This edition also covers two new standards: the 802.15.3 high-speed
`wireless PAN standard and the 802.15.4 low-speed wireless PAN standard.
`• Trellis-coded modulation: TCM is a technique that provides for efficient use of
`bandlimited channels; it is described in Chapter 15.
`In addition, throughout the book, virtually every topic has been updated to reflect the
`developments in standards and technology that have occurred since the publication of the
`first edition.
`
`This new edition has benefited from review by a number of people, who gave generously of
`their time and expertise. The following people reviewed all or a large part of the manuscript:
`Dr. Albert Cheng (University of Houston-University Park), Dale W. Callahan (University of
`Alabama, Birmingham), Ravi Sankar (University of South Florida, Tampa), Pei Zheng
`(Arcadia University, Pennsylvania), and Anne Cox (Austin Community College, Texas).
`Thanks also to the many people who provided detailed technical reviews of a single
`chapter: Lars Poulsen, Howard Eisenhauer, D. E. Jennings, Paul Robichaux, John Adams,
`Jerry Huang, Andreas Kasenides, Munira Ahmed, Hossein Izadpanah, Aaron King, Benoit
`d'Udekem, Marco Casole, Kevin Peterson, Dinesh Lal Pradhan, and Catha! Mc Daid.
`Finally, I would like to thank the many people responsible for the publication of the
`book, all of whom did their usual excellent job. This includes the staff at Prentice Hall, par(cid:173)
`ticularly my editors Alan Apt and Toni Holm; their assistant Patrick Lindner: production
`manager Rose Kernan; and supplements manager Sarah Parker. Also, Jake Warde of Warde
`Publishers managed the reviews; and Patricia M. Daly did the copy editing.
`
`CELLSPIN
`EX. 2014, Page 10
`
`
`
`15.l Overview
`
`15.2 Radio Specification
`
`15.3 Baseband Specification
`
`15.4 Link Manager Specification
`
`15.5 Logical Link Control and Adaptation Protocol
`
`15.6 IEEE 802.15
`
`15. 7 Recommended Readings and Web Sites
`
`15.8 Key Terms, Review Questions, and Problems
`
`.... ·············---·--·-- ... ·····-······----------------------+-----'----'----'--~.......,_~-
`
`463
`
`CELLSPIN
`EX. 2014, Page 11
`
`
`
`464 CHAPTER 15 / BLUETOOTH AND IEEE 802.15
`
`Bluetooth1 is an always-on, short-range radio hookup that resides on a microchip.
`It was initially developed by Swedish mobile-phone mak1 r Ericsson in 1994 as a
`way to let laptop computers make calls over a mobile ph ne. Since then, several
`thousand companies have signed on to make Bluetootl
`the low-power short(cid:173)
`range wireless standard for a wide range of devices. The ] luetooth standards are
`published by an industry consortium known as the Blueto< th SIG (special interest
`group). This chapter provides an overview.
`Following the discussion of Bluetooth, the chapter co ers IEEE 802.15, which
`is concerned with personal area networks (PANs). PANs are local networks in
`which all of the devices are controlled by a single user o a family. IEEE 802.15
`covers Bluetooth plus two other PAN standards, knowr as IEEE 802.15.3 and
`IEEE 802.15.4.
`
`The concept behind Bluetooth is to provide a universal sho t-range wireless capabil(cid:173)
`ity. Using the 2.4-GHz band, available globally for unlicer sed low-power uses, two
`Bluetooth devices within 10 m of each other can share ui: to 720 kbps of capacity.
`Bluetooth is intended to support an open-ended list of ai: lications, including data
`( e.g., schedules and telephone numbers), audio, graphics, anc even video. For example,
`audio devices can include headsets, cordless and standard I hones, home stereos, and
`digital MP3 players. The following are examples of some o: the capability Bluetooth
`can provide consumers:
`
`• Make calls from a wireless headset connected remot, ly to a cell phone.
`11 Eliminate cables linking computers to printers, keyb, ards, and the mouse.
`* Hook up MP3 players wirelessly to other machines t download music.
`* Set up home networks so that a couch potato can re1 otely monitor air condi(cid:173)
`tioning, the oven, and childrens' Internet surfing.
`11 Call home from a remote location to tum appliances on and off, set the alarm,
`and monitor activity.
`
`Bluetooth Applications
`
`Bluetooth is designed to operate in an environment of many users. Up to eight
`devices can communicate in a small network called a piconet. Ten of these
`piconets can coexist in the same coverage range of the Bluetooth radio. To pro(cid:173)
`vide security, each link is encoded and protected ag, inst eavesdropping and
`interference.
`
`1The name comes from King Harald Blaatand (Bluetooth) of Denmarl , who lived in the tenth century
`A.D. Unlike his Viking counterparts, King Harald had dark hair (thus he name Bluetooth, meaning a
`dark complexion) and is credited with bringing Christianity to Scandia ia along with uniting Denmark
`and Norway. The blue logo that identifies Bluetooth-enabled devict s is derived from the runes of
`his initials.
`
`L
`
`CELLSPIN
`EX. 2014, Page 12
`
`
`
`i 5.1 / 0\ ERVIEW 465
`
`Bluetooth provides support for three general application areas using short(cid:173)
`range wireless connectivity:
`
`w Data and voice access points: Bluetooth facilitates real-time voice and data trans(cid:173)
`missions by providing effortless wireless connection of portable and stationary
`communications devices.
`• Cable replacement: Bluetooth eliminates the need for numeroL s, often propri(cid:173)
`etary, cable attachments for connection of practically any kind of ~ommunication
`device. Connections are instant and are maintained even when ~evices are not
`within line of sight. The range of each radio is approximately 1 ) m but can be
`extended to 100 m with an optional amplifier.
`• Ad hoc networking: A device equipped with a Bluetoc~th radio can
`establish instant connection to another Bluetooth radio as sot,n as it comes
`into range.
`
`Table 15.1 gives some examples of Bluetooth uses.
`
`Table 15.1 Bluetooth User Scenarios [HAAR98]
`
`Three-in-one phone
`When you are in the office, your phone
`functions as an intercom (no telephony
`charge). At home, it functions as a cordless
`phone (fixed-line charge). When you are on the
`move, it functions as a mobile phone ( cellular
`charge).
`
`Internet bridge
`Use your portable PC to surf the Internet
`anywhere, whether you are connected
`wirelessly through a mobile phone (cellular) or
`through a wired connection (PSTN, ISDN,
`LAN,xDSL).
`
`Interactive conference
`In meetings and at conferences, you can share
`information instantly with other participants.
`You can also operate a projector remotely
`without wire connectors.
`
`The ultimate headset
`Connect a headset to your mobile PC or to any
`wired connection and free your hands for more
`important tasks at the office or in your car.
`
`Portable PC speakerphone
`Connect cordless headsets to your portable PC,
`and use it as a speaker phone regardless of
`whether you are in the office, your car, or at
`home.
`
`Briefcase e-mail
`Access e-mail while your portat le PC is still in
`the briefcase. When your PC rec~ives an e-mail
`message, you are notified by y01 r mobile
`phone. You can also use the phone to browse
`incoming e-mail and read messa~es.
`
`Delayed messages
`Compose e-mail on your PC wh le you are on
`an airplane. When you land and are allowed to
`switch on your mobile phone, tb~ messages are
`sent immediately.
`
`Automatic synchronization
`Automatically synchronize your desktop
`computer, portable PC, notebock, and mobile
`phone. As soon as you enter the office, the
`address list and calendar in yorn notebook
`automatically updates the files < n your desktop
`computer or vice versa.
`
`Instant digital postcard
`Connect a camera cordlessly to wour mobile
`phone or to any wire-bound cor nection. Add
`comments from you mobile phcoe, a notebook,
`or portable PC and send them ii~stantly.
`
`Cordless desktop
`Connect your desktop/laptop cc mputer
`cordlessly to printers, scanner, klc!yboard,
`mouse, and the LAN.
`
`CELLSPIN
`EX. 2014, Page 13
`
`
`
`466 CHAPTER .. 15 / BLUETOOTH AND IEEE 802.15
`
`Blu.etooth Standards
`
`The Bluetooth standards present a formidable bulk-well o, er 1500 pages, divided
`into two groups: core and profile. The core specifications des ribe the details of the
`various layers of the Bluetooth protocol architecture, from the radio interface to
`link control. Related topics are covered, such as interoperat ility with related tech(cid:173)
`nologies, testing requirements, and a definition of various Bluetooth timers and
`their associated values.
`The profile specifications are concerned with the use o Bluetooth technology
`to support various applications. Each profile specificatio1 discusses the use of
`the technology defined in the core specifications to implen ent a particular usage
`model. The profile specification includes a description of wl ich aspects of the core
`specifications are mandatory, optional, and not applicable. The purpose of a pro(cid:173)
`file specification is to define a standard of interoperability so that products from
`different vendors that claim to support a given usage mo, el will work together.
`In general terms, profile specifications fall into one of two c, tegories: cable replace(cid:173)
`ment or wireless audio. The cable replacement profiles prov de a convenient means
`for logically connecting devices in proximity to one anotl er and for exchanging
`data. For example, when two devices first come within ran e of one another, they
`can automatically query each other for a common profile. Tl is might then cause the
`end users of the device to be alerted, or cause some automat c data exchange to take
`place. The wireless audio profiles are concerned with establ shing short-range voice
`connections.
`
`Protocol Architecture
`
`Bluetooth is defined as a layered protocol architecture (Figme 15.1) consisting of core
`protocols, cable replacement and telephony control protocol , and adopted protocols.
`The core protocols form a five-layer stack consisting o the following elements:
`
`• Radio: Specifies details of the air interface, including• requency, the use of fre(cid:173)
`quency hopping, modulation scheme, and transmit po er.
`• Baseband: Concerned with connection establishment ' ithin a piconet, address(cid:173)
`ing, packet format, timing, and power control.
`111 Link manager protocol (LMP): Responsible for li k setup between Blue(cid:173)
`tooth devices and ongoing link management. This i eludes security aspects
`such as authentication and encryption, plus the co trol and negotiation of
`baseband packet sizes.
`• Logical link control and adaptation protocol (L2C1 P): Adapts upper-layer
`protocols to the baseband layer. L2CAP provides oth connectionless and
`connection-oriented services.
`" Service discovery protocol (SOP): Device informatic n, services, and the char(cid:173)
`acteristics of the services can be queried to enabl<
`the establishment of a
`connection between two or more Bluetooth devices.
`
`RFCOMM is the cable replacement protocol include in the Bluetooth specifi(cid:173)
`cation. RFCOMM presents a virtual serial port that is desi~ ned to make replacement
`
`CELLSPIN
`EX. 2014, Page 14
`
`
`
`r
`'
`
`D = Core protocols
`~ = Cable replacement protocol
`~ = Telephony control protocols
`D ~ Adopted protocols
`
`vCard/vCal
`OBEX
`
`WAE
`WAP
`
`UDP/TCP
`IP
`PPP
`
`Audio
`
`Control
`
`Host-controller interface
`
`= attention sequence (modem prefix)
`= Internet Protocol
`= Object Exchange Protocol
`= Point-to-Point Protocol
`= radio frequency communications
`= Transmission Control Protocol
`Figmc 15.1 Bluetooth Protocol Stack
`
`AT
`IP
`OBEX
`PPP
`RFCOMM
`C'nD
`TCP
`
`- C'n-.. :nn n:~nmm_., D-nfnnnl
`
`TCS BIN = telephony control specification-binary
`= User Datagram Protocol
`UDP
`= virtual calendar
`vCal
`= virtual card
`vCard
`= wireless application environment
`WAE
`UIAD
`
`llf:rnJ.,.c,c, A ..,,..,,J;r,,o,f;n.~ Drnfn..,...nl
`
`-
`
`CELLSPIN
`EX. 2014, Page 15
`
`
`
`468 CHAPTER I 5 / BLUETOOTH AND IEEE 8U2. 15
`
`of cable technologies as transparent as possible. Serial port are one of the most
`common types of communications interfaces used with corr puting and communi(cid:173)
`cations devices. Hence, RFCOMM enables the replacemen of serial port cables
`with the minimum of modification of existing devices. RFCO~ M provides for binary
`data transport and emulates EIA-232 control signals ove
`the Bluetooth base(cid:173)
`band layer. EIA-232 (formerly known as RS-232) is a widel) used serial port inter(cid:173)
`face standard.
`Bluetooth specifies a telephony control protocol. TCS 1 IN (telephony control
`specification-binary) is a bit-oriented protocol that defines the call control signal(cid:173)
`ing for the establishment of speech and data calls betweer Bluetooth devices. In
`addition, it defines mobility management procedures for ha dling groups of Blue(cid:173)
`tooth TCS devices.
`The adopted protocols are defined in specifications iss1 ed by other standards(cid:173)
`making organizations and incorporated into the overall Blm tooth architecture. The
`Bluetooth strategy is to invent only necessary protocols anc use existing standards
`whenever possible. The adopted protocols include the follo~ ing:
`
`• PPP: The point-to-point protocol is an Internet stanc ard protocol for trans(cid:173)
`porting IP datagrams over a point-to-point link.
`• TCP/UDP/IP: These are the foundation protocols cf the TCP/IP protocol
`suite (described in Chapter 4).
`• OBEX: The object exchange protocol is a session-leve protocol developed by
`the Infrared Data Association (IrDA) for the exchang1 of objects. OBEX pro(cid:173)
`vides functionality similar to that of HTTP, but in a simpler fashion. It also
`provides a model for representing objects and opera ions. Examples of con(cid:173)
`tent formats transferred by OBEX are vCard and v( alendar, which provide
`the format of an electronic business card and persor al calendar entries and
`scheduling information, respectively.
`• WAE/WAP: Bluetooth incorporates the wireless a, plication environment
`and the wireless application protocol into its arc itecture ( described in
`Chapter 12).
`
`Usage Models
`
`A number of usage models are defined in Bluetooth profil documents. In essence,
`a usage model is set of protocols that implement a particula Bluetooth-based appli(cid:173)
`cation. Each profile defines the protocols and protocol feat res supporting a partic(cid:173)
`ular usage model. Figure 15.2, taken from [METT99], illust ates the highest-priority
`usage models:
`
`• File transfer: The file transfer usage model supports tl e transfer of directories,
`files, documents, images, and streaming media forma s. This usage model also
`includes the capability to browse folders on a remote device.
`• Internet bridge: With this usage model, a PC is w relessly connected to a
`mobile phone or cordless modem to provide dial-up 1 etworking and fax capa(cid:173)
`bilities. For dial-up networking, AT commands are med to control the mobile
`
`CELLSPIN
`EX. 2014, Page 16
`
`
`
`15.1 / 0' 7ER.VIEW 469
`
`File transfer application
`
`Modem emulation or driver application
`
`AT commands
`
`~ - - - ---1
`: ___ PP_!.1 __ ...!
`
`(a) File transfer
`
`(b) Dial-up network ng
`
`LAN access application
`:-;.;., IP--:
`--- ----
`
`(c) LAN access
`
`(d) Synchronizatio
`
`HS gateway or headset ap lication
`
`(e) Cordless phone and intercom
`
`(f) Headset
`
`flgure 15.2 Bluetooth Usage Models
`
`phone or modem, and another protocol stack (e.g., PPP over RFCOMM) is
`used for data transfer. For fax transfer, the fax software op rates directly
`over RFCOMM.
`• LAN access: This usage model enables devices on a piconet to access a LAN.
`Once connected, a device functions as if it were directly corn ected (wired)
`to the LAN.
`• Synchronization: This model provides a device-to-device synchronization of
`PIM (personal information management) information, such a phone book,
`calendar, message, and note information. IrMC (Ir mobile com1 unications) is
`an IrDA protocol that provides a client/server capability f< r transferring
`updated PIM information from one device to another.
`• Three-in-one phone: Telephone handsets that implement thi usage model
`may act as a cordless phone connecting to a voice base station, s an intercom
`device for connecting to other telephones, and as a cellular pho e.
`• Headset: The headset can act as a remote device's audio ini:ut and output
`interface.
`
`CELLSPIN
`EX. 2014, Page 17
`
`
`
`470 CHAPTER 15 / BLUETOOTH AND IEEE 802.15
`
`Piconets and Scatternets
`
`As was mentioned, the basic unit of networking in Bluetooth ·s a piconet, consisting
`of a master and from one to seven active slave devices. The r dio designated as the
`master makes the determination of the channel (frequency-topping sequence) and
`phase (timing offset, i.e., when to transmit) that shall be usec by all devices on this
`piconet. The radio designated as master makes this detern ·nation using its own
`device address as a parameter, while the slave devices must tu e to the same channel
`and phase. A slave may only communicate with the master aJ d may only communi(cid:173)
`cate when granted permission by the master. A device in one piconet may also exist
`as part of another piconet and may function as either a slave or master in each
`piconet (Figure 15.3). This form of overlapping is called a :,catternet. Figure 15.4,
`based on one in [HAAROOa], contrasts the piconet/scatternet architecture with other
`forms of wireless networks.
`The advantage of the piconet/scatternet scheme i~ that it allows many
`devices to share the same physical area and make efficient use of the bandwidth.
`A Bluetooth system uses a frequency-hopping scheme wi:h a carrier spacing of
`1 MHz. Typically, up to 80 different frequencies are used for a total bandwidth of
`80 MHz. If frequency hopping were not used, then a singlE channel would corre(cid:173)
`spond to a single 1-MHz band. With frequency hoppin;~ a logical channel is
`defined by the frequency-hopping sequence. At any give 1 time, the bandwidth
`available is 1 MHz, with a maximum of eight devices sharilg the bandwidth. Dif(cid:173)
`ferent logical channels (different hopping sequences) car. simultaneously share
`the same 80-MHz bandwidth. Collisions will occur when devices in different
`
`Figure 15.3 Master/Slave Relationships
`
`CELLSPIN
`EX. 2014, Page 18
`
`
`
`15.2 I R..ADIO SPECHICATION 471
`-/
`
`/
`
`/
`
`/ . I
`-' ' e\
`•
`•
`\ ', . ' '
`
`I
`I
`I
`I
`I
`I
`I
`\
`
`\
`I
`I
`I
`I
`I
`I
`I
`I