0% found this document useful (0 votes)
1 views66 pages

Unit 1

The document outlines a course on Short Range Wireless Communication, detailing course and program outcomes, as well as key units covering wireless systems, antennas, RF transceivers, and wireless standards. It discusses the characteristics, benefits, and challenges of short-range wireless technologies, including Wi-Fi and Bluetooth, and the elements of wireless communication systems. The document also includes references and links to quizzes for further engagement.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views66 pages

Unit 1

The document outlines a course on Short Range Wireless Communication, detailing course and program outcomes, as well as key units covering wireless systems, antennas, RF transceivers, and wireless standards. It discusses the characteristics, benefits, and challenges of short-range wireless technologies, including Wi-Fi and Bluetooth, and the elements of wireless communication systems. The document also includes references and links to quizzes for further engagement.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

LE

A
R
N
LE
A
P
LE
A
D
21ECO101T
SHORT RANGE WIRELESS
COMMUNICATION

https://lotusarise.com/qna/upsc/q-consider-the-following-communication-
technologies
Course Outcome(s)

1 Familiarize the various forms of signals used for information


transmission and modulation, and overall wireless system properties
2 Present various component types that can be used to implement a
short-range radio system
3 Describe the various kinds of transmitters and receivers
4
Aware the regulations and standards of ISM band communications
5 Gain the knowledge of the most important new developments in short-
range radio like UWB and Visible light

Program Outcome(s)
PO1- Engineering knowledge
PO3- Design/development of solutions
PO4-Conduct investigations of complex problems
• Unit-1: Wireless systems
• Unit-2: Antennas and Baseband coding basics
• Unit-3: RF transceivers
• Unit-4: Wireless standards
• Unit-5: Optical wireless technologies

References

1. Alan Bensky, “Short range Wireless Communications-Fundamentals of


RF system design and Applications”, Elsevier Inc, 2004
3. Rolf Kraemer and Marcos Katz, “Short-range wireless communications
emerging technologies and applications”, Wiley WWRF series, March
2009
• Unit-1: Wireless systems
• Unit-2: Antennas and Baseband coding basics
• Unit-3: RF transceivers
• Unit-4: Wireless standards
• Unit-5: Optical wireless technologies

References

1. Alan Bensky, “Short range Wireless Communications-Fundamentals of


RF system design and Applications”, Elsevier Inc, 2004
3. Rolf Kraemer and Marcos Katz, “Short-range wireless communications
emerging technologies and applications”, Wiley WWRF series, March
2009
Unit 1-Wireless systems
•Introduction to wireless systems
•Reasons for the Spread of Wireless Applications
•Characteristics of Short-range Radio Wireless Applications
• Elements of Wireless Communication Systems-Transmitter,
Elements of Wireless Communication Systems-Receiver
• Wireless Local Area Networks (WLAN)- WiFi, Network Architecture
• Bluetooth Transceiver, Bluetooth Modes
• Zigbee Architecture, Frame Structure, Applications and conflicts
• Ultra-wideband Technology-Bit Sequence detection, UWB Block
Diagram
• Case study: Design and analyze the WLAN hardware module
What is Wireless Communication?

• Transmitting/receiving voice and data using electromagnetic waves


in free space.

• The information from sender to receiver is carried over a well


defined frequency band (channel).

• Each channel has a fixed frequency bandwidth and capacity (bit


rate).

• Different channels can be used to transmit information in parallel


Why Wireless?
• Benefits
• Freedom from wires
• Better global coverage
• Mobility: Ability to communicate anywhere!!
• Easier configuration, set up and lower installation cost
• Flexible
• Data transmission is fast
• Low maintenance
• Scalability
• Accessed from anywhere and anytime
• Cost-effectiveness
Why Wireless?
• Difficulties
• Communication medium: Free space
• Noisy and unpredictable channel
• Broadcast channel, more user ->less BW per user
• Higher equipment cost
• Usually regulated spectrum and limited BW
• Need backbone systems in order to function properly
Challenges
• Efficient Hardware
• Low power transmitters, receivers
• Low power signal processing tools
• Efficient use of finite radio spectrum
• Cellular frequency reuse, medium access control (MAC) protocols
• Integrated Services
• Voice, data, multimedia over the same network
• Service differentiation, priorities, resource sharing
• Network support for user mobility (mobile scenarios)
• Location identification, Handoffs,..
• Maintaining quality of service over unreliable links.
• Connectivity and coverage (internetworking)
Challenges
• Fading-variation of signal attenuation over variables like time,
geographical position, and radio frequency.
• Multipath- the propagation phenomenon that results in radio signals
reaching the receiving antenna by two or more paths.
• Higher probability of data corruption
• Hence, need for stronger channel codes
• Need for stronger security mechanisms
• Privacy, Authentication.

Online Quiz 1
https://quizizz.com/admin/quiz/665c029803e0dab0e5ae9fa9?source=admin&trigger=quizPage
Introduction
• Short-range wireless communications typically refers to a wide
variety of technologies with communication ranges from a few
centimeters to several hundreds of meters.
• While the last 3 decades of the wireless industry have been mostly
dominated by cellular systems, short-range wireless devices have
gradually  a more integrated part of our everyday lives over the
last decade.
• The Wireless World Research Forum (WWRF) envisions that this
trend will accelerate in the upcoming years: by the year 2017, it is
expected that seven billion people in the world will be using seven
trillion wireless devices.
• The majority of these devices will be short-range wireless devices
that interconnect people with each other and their environments.
Reasons for spread of Wireless Applications
• Employment of higher and higher frequencies in spectrum
which was expensive previously
• SSD (solid state devices) amplify at mm(millimeter)
wavelengths or 10’s of GHz
• Efficient and compact antennas (planar antennas) are available
used in short-range devices.
• Development of SAW (Surface Acoustic Wave) frequency
determining components allows generation of UHF with very
simple circuits
• Digital modulation techniques permits multiplication of number
of communication channels
• Progress in circuit miniaturization  Hybrid IC (Integrated
Circuits) combining analog and digital functions on one chip and
RFIC (Radio Frequency IC) responsible for compact size of
cellular handsets.
Characteristic of Short Range Radio
•RF output  several microWatts up to 100 milliWatts
•Communication range several cm up to several 100 m
•Indoor operation
•Omnidirectional built-in antennas
•Simple construction and low price  consumer applications
•Unlicensed operation
•UHF operation
•Battery operated Tx/Rx

Omnidirectional antenna which


radiates equal radio power in all
directions perpendicular to an axis, with
power varying with angle to the axis,
Short range radio applications
Elements of Wireless Communication Systems

1.Data source
2.RF generating
section
3.RF conduction
and radiation
4.Radio channel
5.Receivers
6.Power supply

LNA- Low noise


Elements of Wireless Communication Systems
1.Data source:
•Analog/ Digital
•Simple on/off info security intrusion detector, panic button, manual
remote control unit
•Change of state of data cause message frame modulated on RF carrier

•Address field  identifies unit that is transmitting


•Data field conveys specific info (on/off form)
•Parity bit  detect false messages
•Computer accessories and WLAN send continuous digital data over
short –range link
–Data are organized protocol including sophisticated error
detection and correction technique
•Audio devices wireless microphone and headsets send analog data to
modulator.
–These data specially processed for better pefromance over
wireless channel
Elements of Wireless Communication Systems-Data source-cont…
•FM transmission: pre-emphasis filter increases HF before txion
–Receiver : De-emphasis filter will also reduce HF noise
–Dynamic range is increased by use of compander
–Txer: weak sounds are amplified more and strong signals are amplified less
–Rxer: Opposite procedure reduces background noise while retaining weak
sounds to their proper relative level
•RFID: different aspect of data source
–Data not available in Txer but added to RF signal in an intermediate receptor
called Transducer ( may be active/passive)

COMPANDER:
combination of a
COMPressor and
an exPANDer.

–Txed RF is modified by transducer and detected by Rxer that deciphers data


added and passes to host computer
Elements of Wireless Communication Systems
2. Radio frequency (RF) generating section:
•Part of Txer consists of RF source (oscillator), modulator, and
amplifier.
•Simplest short range devices  all 3 functions included in a
single circuit of only one transistor.
•RFID is different from other applications modulation is
carried out remotely from RF source

3. RF conduction and radiation:


•Built-in antennas transmission lines are relatively short &
simple
•Antennas of short range devices must be small fraction of
wavelength and omnidirectional mostly

•Modulation: The process of varying the properties of RF carrier wave (either


amplitude, frequency or phase) in accordance with the information.
Elements of Wireless Communication Systems
4. Radio channel
•Range channel is short and equipment is used indoors
•RF power is relatively low and regulated by telecom authorities
•Devices often operated close to or attached to human bodyaffects
communication performance
•Reliable operating range difficult to predict
•Lack of knowledge of special propagation characteristics by manufactures,
sellers and users  dominant reason for unreliable
•Short range devices often used to replace hard wiring when similar
performance is expected, limitations of radio propagation compared to wires
must be accounted for each application
5. Receivers
•Similar blocks to Txer but operation is reversed antenna, Txion line, RF
amplifiers and oscillators
•Weak signals intercepted by antenna amplified above the circuit noise by
low noise amplifier(LNA)
Elements of Wireless Communication Systems-Rxer-cont…
•Desired signal is separated from all others and shifted lower in frequency in
downconverter more effectively amplified to level required for demodulation or
detection
•Demodulator conversion of data source implanted on RF wave in Txer back to
original form
•Txer power is limited by authorities, Rxer sensitivity is not
•To improve system performance improve sensitivity and selectivity to reduce
interference from unwanted sources must be done under constraints of physics, cost,
size and power consumption
•Important factor in Low Power system design and controversial one type of
modulation
•Simpler systems security and medical alarms choice is between amplitude shift
keying (ASK), parallel to amplitude modulation (AM) in analog system and frequency
shift keying (FSK) analogous to frequency modulation (FM)
•Downconverter takes a radio frequency (RF) signal and converts it to a lower,
intermediate frequency (IF) signal that is suitable for digital processing.
•Selectivity is the ability of radio receiver to reject signals close to desired frequency.
•Sensitivity of a radio receiver is its ability to amplify the desired weak signal.
AM and FM

AM and FM modulation video link


https://www.youtube.com/watch?v=QEubAxBfqKU
Elements of Wireless Communication Systems-Power supply
6. Power supply
•Short range devices, @least one side of wireless link must be completely
untethered( unattached to any data or power source by wire or fiber)
•When size limited, in hand-operated remote control Txers and security
detectors, battery size and energy is limited
•Need to change batteries not only highly inconvenient but also expensive
•Low current consumption is important design aim for wireless devices 
harder to achieve for Rxer than Txers
•Many short range app.  intermittent Txer operation …
•Eg. security systems : Txers  kept in very low current standby status
until data needs to be send.. …Rxer  doesn’t know when data will be sent 
must be alert all the time
•Techniques to reduce Rxer duty cycle doesn’t draw full current all time
•Another way for reducing Rxer power consumption to operate in reduced
power standby mode, operation goes to normal when beginning of signal is
detected reduced sensitivity
Wireless Fidelity Wi-Fi

• IEEE 802.11g
– Data Rate: Maximum 54 Mbps
– Range: up to 100 meters
– Operating Frequency: 2.4 GHz
– Security: Password Encryption
– Modulation: OFDM

In telecommunications, orthogonal frequency-division multiplexing (OFDM)is a type of


digital transmission used in digital modulation for encoding digital data on multiple
carrier frequencies.
WiFi :https://www.youtube.com/watch?v=St0V1yYxpv4
Wi-Fi
Applications
• Modem for internet
– Cable
– DSL
• Device to device communication
Advantages:
– Comparatively higher data
transfer rates than other
similar technologies.
– Low infrastructure
– Wide availability
Disadvantages:
– Cost
– Limited range: Restricted to
“Hot Spots”

DSL(Digital subscriber
line)used to transmit digital
data over telephone lines.
Wireless Local Area Networks (WLAN)
• Three Wi-Fi network configurations are shown in Figs. 11.1–11.3.
• Fig. 11.1 shows two unattached basic service sets (BSS), each with two
stations (STA).
• The BSS is the basic building block of an 802.11 WLAN. A station can make
adhoc connections with other stations within its wireless communication
range but not with those in another BSS that is outside of this range.
• In order to interconnect terminals that are not in direct range one with the
other, the distributed system shown in Fig. 11.2 is needed.

WLAN and WiFi:


WLAN https://www.youtube.com/watch?v=RBc7MyE9RTQ https://www.youtube.com/watch?v=xt0YqqbvSFQ
Wireless Local Area Networks (WLAN)
• Here, terminals that are in range of a station designated as an AP can
communicate with other terminals not in direct range but who are
associated with the same or another AP.
• Two or more such APs communicate between themselves either by a
wireless or wired medium, and therefore data exchange between all
terminals in the network is supported.
• Important thing media connecting the STAs with the APs, and connecting
the APs among themselves are totally independent.
Wireless Local Area Networks (WLAN)
• STA is an addressable destination, not necessarily at a fixed location. STA’s
may have varied characteristics and functions.
• A STA AP terminal, a mobile terminal, or it may have another specified
function.
• A network of arbitrary size and complexity can be maintained through the
architecture of the extended service set (ESS), shown in Fig. 11.3.
• STAs have full mobility and may move from one BSS to another while
remaining in the network.
Wireless Local Area Networks (WLAN)
• Fig. 11.3 shows another element type—a portal. The portal is a gateway
between the WLAN and a wired LAN.
• It connects the medium over which the APs communicate to the medium of
the wired LAN—coaxial cable or twisted pair lines.
• In addition to the functions Wi-Fi provides for distributing data throughout the
network, two other important services, although optionally used, are provided.
• They are authentication and encryption.
• Authentication is the procedure used to establish the identity of a station as a
member of the set of stations authorized to associate with another station.
• Encryption applies coding to data to prevent an eavesdropper from
intercepting it.
• 802.11 details the implementation of these services in the MAC(Media Access
Control).
• Further protection of confidentiality provided by higher software layers in the
network that are not part of 802.11.
Bluetooth
• Open Wireless Protocol, WPAN standard
• Operates ISM (industrial, scientific, and
medical) band at 2.4-2.4835 GHz
• Uses radio technology called frequency-
hopping spread spectrum (FHSS)
• Modulation - Gaussian Frequency-Shift Key
Modulation
• Frequency- Hopping Spread Spectrum
 Chunks of data transmitted
 Spread-spectrum signals are highly
resistant to narrowband interference
 Difficult to intercept
 Transmissions share a frequency band
with minimal interference
Bluetooth: https://www.youtube.com/watch?v=jzxZUJmOu3o
Quiz2:
https://www.mentimeter.com/app/presentation/almanmn3acz3d2brcis8o1e4vb1h3c4p/
pq9jjpingiwh
Bluetooth
• Data rate up to 1Mb/s – 3 Mb/s
• Use in mobile phones, laptops,
telephones, printers, GPS, video game
consoles
• Bluetooth USB dongle – must use if
computer is not Bluetooth enabled
• Advantages:
– Wireless, Inexpensive, Automatic
– Low energy and power consumption
• Disadvantages:
– Security
– Viruses over the years
– Bluejacking
– Health Concerns (same as mobile
phones)
Bluejacking is when an attacker sends
unsolicited messages to a victim's Bluetooth-
enabled device.
Bluetooth Architecture

•Bluetooth is an example of a WPAN. (wireless personal area networks


(WPAN), which typically serve a communication range of 10 m).
•It’s based on the creation of ad hoc, or temporary, on-the-fly
connections between digital devices associated with an individual person
and located in the vicinity of around 10 m from him.
•Bluetooth devices in a network have the function of a master or a
slave, and all communication is between a master and one or more slaves,
never directly between slaves.
•The basic Bluetooth network is called a piconet. It has one master
and from one to seven slaves.
• A scatternet is an interrelated network of piconets where any
member of a piconet may also belong to an adjacent piconet.
•Conceptually, a Bluetooth network is infinitely expandable.
Bluetooth Architecture

•Fig. 12.2 shows a scatternet made up of three piconets.


•A node may be a slave in one piconet and a master in another.
•A device may be a master in one piconet only.
Bluetooth Transceiver
• Three basic parts: RF, baseband, and application software
• A Bluetooth chip set will usually include the RF and baseband parts, with the
application software being contained in the system’s computer or controller.
Bluetooth Transceiver
• The user data stream originates and terminates in the application software.
• The baseband section manipulates the data and forms frames or data bursts
for transmission. It also controls the frequency synthesizer according to the
Bluetooth frequency-hopping protocol.
• The Gaussian low-pass filter block before the modulatorimplemented
digitally as part of a complex signal I/Q modulation unit or it may be a discrete
element filter whose output is applied to the frequency control line of a
VCO(Voltage-controlled oscillator electronic oscillator whose oscillation
frequency is controlled by a voltage input)
• Receiver may be one of several types.
• If a superheterodyne configuration is chosen, the filter at the output of the
downconverter will be a bandpass type.
• A direct conversion receiver will use low pass filters in complex I and Q
outputs of the downconverter.

IQ modulation
https://www.youtube.com/watch?v=zNbWTiKEl30
Bluetooth modes
• Bluetooth has three modes for achieving different degrees of power consumption during
operation: sniff, hold, and park.
• Even in the normal active mode, some power saving can be achieved.
1. Active mode:
• During normal operation, a slave can transmit in a particular time slot only if it is
specifically addressed by the master in the proceeding slot.
• As soon as it sees that its address is not contained in the header of the master’s
message, it can “go to sleep,” or enter a low-power state until it’s time for the next
master transmission.
• The master also indicates the length of its transmission (one, three, or five slots) in its
message header, so the slave can extend its sleep time during a multiple slot interval.
2. Sniff mode:
• In this mode, sleep time is increased because the slave knows in advance the time
interval between slots during which the master may address the slave.
• If it’s not addressed during the agreed slot, it returns to its low-power state for the
same period and then wakes up and listens again.
• When it is addressed, the slave continues listening during subsequent master
transmission slots as long as it is addressed, or for an agreed time-out period.
Bluetooth modes
3. Hold mode:
• The master can put a slave in the hold mode when data transfer between
them is being suspended for a given period of time.
• The slave is then free to enter a low-power state, or do something else, like
participate in another piconet.
• It still maintains its membership in the original piconet, however.
• At the end of the agreed time interval, the slave resynchronizes with the
traffic on the piconet and waits for instructions from the master.
4. Park mode:
•Park has the greatest potential for power conservation, but as opposed to hold
and sniff, it is not a directly addressable member of the piconet.
•While it is outside of direct calling, a slave in park mode can continue to be
synchronized with the piconet and can rejoin it later, either on its own initiative
or that of the master, in a manner that is faster than if it had to join the piconet
from scratch.
•In addition to saving power, park mode can also be considered a way to virtually
increase the network’s capacity from eight devices to 255, or even more.
Bluetooth modes
4. Park mode:
• When entering park mode, a slave gives up its active piconet address and
receives an 8-bit parked member address.
• It goes into low-power mode but wakes up from time to time to listen to the
traffic and maintain synchronization.
• The master sends beacon transmissions periodically to keep the network
active. (Beacon kind of like a lighthouse: it repeatedly transmits a constant
signal that other devices can see)
• Broadcast transmissions to all parked devices can be used to invite any of
them to rejoin the network.
• Parked units themselves can request reassociation with the active network by
way of messages sent during an access window that occurs a set time after
what is called a “beacon instant”
• A polling technique is used to prevent collisions.
• Park mode was removed in Version 5 of the Bluetooth specification.
Parameters that affect interference between Bluetooth and Wi-Fi:
Parameters that affect interference between Bluetooth and Wi-Fi

1. Frequency and time overlap:


• A collision occurs when the interferer transmits at the same time as the
desired transmitter and is strong enough to cause a bit or symbol error in
the received packet.
2. Packet length:
:
• The longer the packet length of the Wi-Fi system, relative to a constant
packet length and hop rate of Bluetooth, the longer the victim may be
exposed to interference from one or more collisions and the greater the
probability of a packet error.
3. Bit rate:
• Higher the bit rate, the lower the receiver sensitivity and therefore the
more susceptible the victim will be to packet error for given desired and
interfering signal strengths.
Parameters that affect interference between Bluetooth and Wi-Fi

3. Use factor:
• More often the interferer transmits, the higher the probability of packet
error.
• When both communicating terminals of the interferer are in the
interfering vicinity of the victim, the use factor is higher than if the
terminals are further apart and one of them does not have adequate
strength to interfere with the victim.

4. Relative distances and powers:


• The received power depends on the power of the transmitter and its
distance.
• Generally, Wi-Fi systems use more power than Bluetooth, typically 20 mW
compared to 1 mW.

5. Signal-to-interference ratio of the victim receiver, SIR, for a specified


symbol or frame error ratio.

6. Type of modulation, and whether error-correction coding is used.


Zigbee
• IEEE specification 802.15.4 associated with Zigbee.
• Low data rate WPAN which describes the physical and data link layers that
typically address remote monitoring and control applications.
• An association of committed companies, the Zigbee Alliance, has defined the
network, security, and application layers above the 802.15.4 physical and medium
access control (MAC) layers, and deals with interoperability certification and
testing
• Distinguishing features are:
• Low data rates—raw rates between 20 and 250 kbps
• Low power consumption—several months up to two years on standard primary
batteries
• Network topology appropriate for multisensor monitoring and control
applications
• Low complexity for low cost and ease of use
• Very high reliability and security
Zigbee
• Applications:
• consumer electronics
• Home and building
automation and
security systems
• industrial controls
• PC peripherals
• medical and industrial
sensor applications
• toys and games

Source: http://www.zigbee.org/imwp/idms/popups/pop_download.asp?ContentID=7092
Zigbee Architecture
Zigbee Architecture
• On the bottom are the physical layers, showing two alternative options
for the RF transceiver functions of the specification.
• Both of these options are not expected to exist in a single device, and
indeed their transmission characteristics—frequencies, data rates,
modulation system—are quite different.
• Embedded firmware and software layers above them will be essentially
the same no matter what physical layer is applied.
• Just above the physical layers (PHY) is the MAC layer which is
responsible for management of the physical layer and delivering data
to and from the applications through the layer above it.
• MAC layer functions channel access, keeping track of slot times,
and message delivery acknowledgement.
• The higher layers are not part of IEEE 802.15.4.
Zigbee Architecture
• Functions of the network layer forming a network, managing
association with the network and disassociation from it, and routing.
• Its functions and the application services above it are defined by the
Zigbee Alliance.
• Application software is not a part of the IEEE 802.15.4 specification.
• Zigbee Alliance prepares profiles, or programming guidelines and
requirements for various functional classes in order to assure product
interoperability and vendor independence.
These profiles define network formation, security, and application
requirements while keeping in mind the basic Zigbee features of low
power and high reliability.
Zigbee Frame structure
• Purpose of the preamble permit acquisition of chip and symbol timing.

• PHY header, PHR, which is signaled by a delimiter byte SFD (Start-of-frame


deliminator), notifies the baseband software in the receiver of the length of the
subsequent data.
• PSDU (PHY service data unit) is the message that has been passed down
through the higher protocol layers.
• can have a maximum of 127 bytes although monitoring and control
applications will typically be much shorter.
Each of the new coded bits is called a chip. The complete group of chips
representing a data bit is called a symbol
Zigbee Frame structure
• Included in the PSDU are information on the format of the message frame, a
sequence number, address information, the data payload itself, and at the end,
two bytes that serve as a frame check sequence.
• Reliability is assured since the receiver performs an independent calculation of
this frame check sequence and compares it with the value received.
• If any bits have been changed by interference or noise, the numbers will not
match.
• Only when a match occurs, the receiving side returns an acknowledgement to
the originator of the message.
• Lacking an acknowledgement, the transmission will be repeated until it is
successfully received.
• In order to avoid two or more stations trying to transmit at the same time, a
carrier sense multiple access with collision avoidance (CSMA-CA) routine is
employed, similar to that used in Wi-Fi, IEEE 802.11.
Zigbee Applications
• Promoters of Zigbee aim to cover a very large market for those applications that
require relatively low data rates.
• open specification and a recognized certification of conformity are an advantage in
many situations.
Eg. home burglar alarm system would accept wireless sensors produced by different
manufacturers, which will facilitate future expansion or allow installers to add sensors
of types not available from the original system manufacturer.
• Use of devices approved according to a recognized standard gives the consumer
some security against obsolescence.
• Although Zigbee claims to be appropriate for most control applications, its declared
maximum range of some 50–75m will fall short of the requirements of many
systems.
• Under the constraint of low power output for low power consumption, greater
range means reduced bandwidth and reduced data rate.
• In fact, a great many of the applications envisaged by Zigbee can get by very well
with data rates of hundreds or a few thousand bits per second, and by matching
receiver bandwidth to these rates for maximum sensitivity, ranges of hundreds of
meters can be achieved.
https://youtu.be/THtVeaxnd9E?si=M0oXbmXDVS0aXSAQ
Zigbee Applications
Zigbee Applications
Zigbee Applications
Zigbee Applications and conflicts
• One partial answer to the range question is the
deployment of the Zigbee network in a cluster-tree
configuration.
• Adjacent nodes serve as repeaters so that large areas
can be covered, as long as the greatest distance
between any two directly communicating nodes does
not exceed IEEE 802.15.4 basic range capability.
• For Eg, in a multi-floor building, sensors on the top
floor can send alarms to the control box in the
basement by passing messages through sensors
located on every floor and operating as relay stations.
• There is competition between Bluetooth and Zigbee
for use in certain applications, but the overall extent of
deployment and the reliability of wireless control
systems are higher because of it.
• The proportion of wireless security and automation
systems has increased because adherence to the
802.15.4 standard provides high reliability, security,
and reduced development costs compared to many
proprietary solutions.
Ultra-wideband Technology
• Ultra-wideband :
• UWB is a radio technology use a very low energy level for short-
range, high-bandwidth communications over a large portion of the
radio spectrum.
• UWB has traditional applications in non-cooperative radar
imaging. Most recent applications target sensor data collection,
precise locating, and tracking.
•Ultra-wideband Technology:
•Creates a radio spectrum that is spread over a very wide
bandwidth—much wider than the bandwidth used in the spread-
spectrum systems.
• UWB transmissions are virtually undetectable by ordinary radio
receivers and therefore can exist concurrently with existing
wireless communications without demanding additional spectrum
or exclusive frequency bands.

https://youtu.be/pE-WbKLMElI?si=7xsJpiM1_hoWKySN
Ultra-wideband Technology
Advantages of UWB technology:
• Very low spectral density—very low probability
of interference with other radio signals over its
wide bandwidth
• High immunity to interference from other radio
systems
•Low probability of interception/detection by Applications:
other than the desired communication link • Air tags (apple
terminals brand get accurate
• LP consumption location
• Ultra fast 1000X fatser, seamless user interface • Indoor navigation
• High multipath immunity • Smart car access
• Many high data rate UWB channels can • Wearable health
operate concurrently sensors
• Fine range-resolution capability • Wireless printers to
• Relatively simple, low-cost construction, contactless
based on nearly all-digital architectures. payments
• Transmission and reception methods are unique
• UWB “carrier” is a Gaussian monopulse
Ultra-wideband Technology- Bit Sequence detection
• A “1” monopulse is represented by a negative line followed by a positive
line, and a “0” monopulse by the inverse—a positive line and a negative
line.
• The synchronized sequence generated in the receiver is drawn on the
second line and below it the result of the correlation operation
• ∫f(t)g(t)dt
• where f(t) is the received signal and g(t) is the locally generated
sequence.
• By sampling this output at the end of each bit period and then resetting the
correlator, the transmitted sequence is reconstructed in the receiver.
• This is shown as the “Logic Output” which is delayed by one symbol period.
Ultra-wideband Technology- Bit Sequence detection

• Individual bit can be represented by more than one sequential monopulse.


• Doing so increases the processing gain by the number of monopulses per bit.
Ultra-wideband block diagram

Correlation
Ultra-wideband block diagram

• The pulse generator block creates short impulse or step functions with rise
times on the order of tens or at the most hundreds of picoseconds which
are conditioned in the shaping network to produce the required output
spectrum.
• High speed integrated circuits or special circuit elements such as tunnel
diodes or step recovery diodes, can be employed in the pulse generator.
• The receiver produces a replica of the known transmitted pulse sequence
which is synchronized with the incoming pulse stream in the acquisition and
tracking block.
• The baseband mixer (multiplier), integrator and sample and hold blocks
Correlation acts as a powerful for measuring the similarity between a received
perform
signal and athe correlation
known function
reference signal.and data are output.
Quiz 3: https://quizizz.com/admin/quiz/6662a5a3590eea703e28c2b8
Comparison between various short range wireless technologies

You might also like