Вы находитесь на странице: 1из 10

INFRA RED DATA ACCESS :

It is designed to support data transmission between two


devices over a short range point to point
communication.
The speeds of data transmission is from 9.6kbps to
4Mbps.
This hardware is incorporated in note books, cell
phones, public phones.

Because of lack of drivers the IrDA is not gained popular


in the field.
INFRA RED DATA ACCESS :
Micro soft windows CE 1.0 was the first OS to provide
built in IRDA .

IRDAS implementation are being available on several


popular embedded systems.

Windows 2000, windows CE supports IrDA


BLUETOOTH
The protocol is based on the low cost short range
radio link.

The radio frequency used by Bluetooth is globally


available when the devices close to each other i.e.
10mts apart.

It does not require line of sight communication.

It is used in all pcs, laptops and various electronic


devices.
IEEE 802.11
IEEE proposed standard for wireless LAN.

Adhoc configuration : computes are brought together


to form network on fly.
Infrastructure :
INFRASTRUCTURE COMMUNICATION

These network access points are connected to land


line to widen the LANs capability by bridging wireless
nodes.

The structure is similar to present day cellular


networks.
Physical layer handles the transmission of data
between nodes uses direct sequence spread spectrum,
frequency hopping spread spectrum, infrared pulse
position modulation.

Date transfer rate 1 Mbps or 2 Mbps and frequencies


of operation is 2.4 GHz to 2.4835 GHz.
(it is unlicensed band fro industrial, medical and scientific applications)

It requires 300 to 428000GHz. It is more secure and


eavesdropping as it requires line of sight links.

Infra red TX can be adversely effected by sunlight.


Mac layer :
It is set of protocols responsible for maintaining order in the use of shared
medium.

The 802.11 standard specifies CSMA/CA protocol

When ever a packet is to be transmitted the transmitting node first sends out
a short ready to send RTS packet containing information on the length of the
packet.

It responds with CTS packet.

After this exchange the TX node sends a packet.

The received packets under go cyclic redundancy check.

After the check is successful then in response to it we receive the ACK packet.
MAC Layer CSMA/CA Protocol

The node receives a packet to be transmitted.

It ensures no other node transmits

If the channel is clear then transmits a packet.

Otherwise it chooses random backoff factor.

Back off factor determines the amount of time it


must wait.
During the period in which the channel is clear the tx node determines the backoff
counter.

When the backoff counter reaches to zero the node transmits the packet.

Since the probability the nodes to have same backoff factor is very small collisions
between packets are minimized. This can be applicable to ether net

In case 802.11 when node is transmitting it can not hear any other node in the
system.

Вам также может понравиться