Sunday, June 20, 2010

Bluetooth Technology Contd..

Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization

Implementation

Bluetooth uses a radio technology called frequency hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands of 1 MHz width in the range 2402-2480 MHz. This is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band.

Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet, all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 µs intervals. Two clock ticks make up a slot of 625 µs; two slots make up a slot pair of 1250 µs. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit will begin in even slots and the slave transmit in odd slots.

Bluetooth provides a secure way to connect and exchange information between devices such as faxes, mobile phones, telephones, laptops, personal computers, printers, Global Positioning System (GPS) receivers.

The Bluetooth specifications are developed and licensed by the Bluetooth Special Interest Group (SIG). The Bluetooth SIG consists of more than 13,000 companies in the areas of telecommunication, computing, networking, and consumer electronics.

To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG.


Communication and connection

A master Bluetooth device can communicate with up to seven devices in a Wireless User Group. This network group of up to eight devices is called a piconet. The devices can switch roles, by agreement, and the slave can become the master at any time.

At any given time, data can be transferred between the master and one other device.

The master switches rapidly from one device to another in a round-robin fashion. Simultaneous transmission from the master to multiple other devices is possible via broadcast mode, but not used much.

The Bluetooth Core Specification allows connecting two or more piconets together to form a scatternet, with some devices acting as a bridge by simultaneously playing the master role in one piconet and the slave role in another.

Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited services, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth, but they do not offer much in the way of services that modern adapters do.


List of applications

  • Wireless control of and communication between a mobile phone and a hands free headset This was one of the earliest applications to become popular.
  • Wireless networking between PCs in a confined space and where little bandwidth is required.
  • Wireless communication with PC input and output devices, the most common being the mouse,keyboard and printer.
  • Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX.
  • Replacement of traditional wired serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices.
  • For controls where infrared was traditionally used.
  • For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired.
  • Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices.
  • Wireless bridge between two Industrial Ethernet networks.
  • Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem like NOVATEL mifi,
  • Short range transmission of health sensor data from medical devices to mobile phones, set top box or dedicated telehealth devices.

Computer requirements

A personal computer that does not have embedded Bluetooth can be used with a Bluetooth adapter or "dongle" that will enable the PC to communicate with other Bluetooth devices (such as mobile phones,mice and keyboards). While some desktop computers and most recent laptops come with a built-in Bluetooth radio, others will require an external one in the form of a dongle.

Unlike its predecessor, IrDA, which requires a separate adapter for each device, Bluetooth allows multiple devices to communicate with a computer over a single adapter.

Operating system support

For Microsoft platforms, Windows XP Service Pack 2 and SP3 releases have native support for Bluetooth 1.1, 2.0 and 2.0+EDR.Previous versions required users to install their Bluetooth adapter's own drivers, which were not directly supported by Microsoft. Microsoft's own Bluetooth dongles (packaged with their Bluetooth computer devices) have no external drivers and thus require at least Windows XP Service Pack 2. Windows Vista RTM/SP1 with the Feature Pack for Wireless or Windows Vista SP2 support Bluetooth 2.1+EDR. Windows 7 supports Bluetooth 2.1+EDR and Extended Inquiry Response (EIR).

The Windows XP and Windows Vista/Windows 7 Bluetooth stacks support the following Bluetooth profiles natively: PAN, SPP, DUN, HID, HCRP. The Windows XP stack can be replaced by a third party stack which may support more profiles or newer versions of Bluetooth. The Windows Vista/Windows 7 Bluetooth stack supports vendor-supplied additional profiles without requiring the Microsoft stack to be replaced.

Linux has two popular Bluetooth stacks, BlueZ and Affix. The BlueZ stack is included with most Linux kernels and was originally developed by Qualcomm. The Affix stack was developed by Nokia. FreeBSD features Bluetooth support since its 5.0 release. NetBSD features Bluetooth support since its 4.0 release. Its Bluetooth stack has been ported to OpenBSD as well.

Mobile phone requirements

A Bluetooth-enabled mobile phone is able to pair with many devices. To ensure the broadest support of feature functionality together with legacy device support, the Open Mobile Terminal Platform (OMTP) forum has published a recommendations paper, entitled "Bluetooth Local Connectivity" The Bluetooth SIG Web site offers additional information about use cases for Bluetooth-enabled mobile phones.

Specifications and features

The Bluetooth specification was developed in 1994 by Jaap Haartsen and Sven Mattisson, who were working for Ericsson in Lund, Sweden. The specification is based on frequency-hopping spread spectrum technology.

The specifications were formalized by the Bluetooth Special Interest Group (SIG) . The SIG was formally announced on May 20, 1998. Today it has a membership of over 13,000 companies worldwide. It was established by Ericsson, IBM, Intel, Toshiba, and Nokia , and later joined by many other companies.

Introduction To Bluetooth Technology

What is Bluetooth ?

Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment together with little or no work by the user.

Bluetooth is the name for a short-range radio frequency (RF) technology that operates at 2.4 GHz and is capable of transmitting voice and data. The effective range of Bluetooth devices is 32 feet (10 meters). Bluetooth transfers data at the rate of 1 Mbps, which is from three to eight times the average speed of parallel and serial ports, respectively. It is also known as the IEEE 802.15 standards. It was invented to get rid of wires. Bluetooth is more suited for connecting two point-to-point devices, whereas Wi-Fi is an IEEE standard intended for networking.

Why is the technology called Bluetooth

The heart of the Bluetooth brand identity is the name, which refers to the Danish king Harald "Bluetooth" Blaatand who unified Denmark and Norway. In the beginning of the Bluetooth wireless technology era, Bluetooth was aimed at unifying the telecom and computing industries.

Bluetooth can be used to wirelessly synchronize and transfer data among devices. Bluetooth can be thought of as a cable replacement technology. Typical uses include automatically synchronizing contact and calendar information among desktop, notebook and palmtop computers without connecting cables. Bluetooth can also be used to access a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone.


Types of Bluetooth Devices

Bluetooth Dongle

Bluetooth Dongle : Installing a Bluetooth dongle is easy; simply insert the CD that came with it, follow the on screen prompts and then plug the dongle into a free USB port. If you had a Bluetooth compatible laptop you could just plug the dongle into an internet enabled personal computer and check your e-mail, download Windows updates, or transfer files. On the same lines you could also synchronize your PDA with your personal computer and download the latest appointments, e-mails or send text messages.


Bluetooth Headset

Bluetooth Headset : Bluetooth headsets are mainly used with compatible cell phones, place the headset on your ear and roam freely while talking to colleagues, friends and family. You could also connect to a dongle on a personal computer and use it for voice conferencing for example. A number of products exist on the market today, which all offer good sound quality and have a similar variety of features. Prices vary depending on manufacturer but usually you can get a decent one for around $75 to $150.



Other Examples


It comprises of a base band processor, a radio and an antenna. The base-band processor converts the data into signals, which radios can decipher. The antenna of another blue tooth device, within at least 30 feet distance, receives a transmitted signal in the air. The signals are processed in the reverse order.

Bluetooth technology provides a 10-meter personal bubble that supports simultaneous transmission of both voice and data for multiple devices. Up to 8 data devices can be connected in a piconet, and up to 10 piconets can exist within the 10-meter bubble. Each piconet supports up to3 simultaneous full duplex voice devices (CVSD).The gross data rate is 1Mb/s, but the actual data rates are 432Kbps for full duplex transmission, 721/56Kbps for asymmetric transmission, and 384 Kbps for TMS2000 transmission. A Time-Division Duplex scheme is used for full-duplex transmission.

Blue tooth specification is a de facto standard, which contains the information needed to ensure that the devices supporting the Blue tooth wireless technology can communicate with each other worldwide. It uses a frequency hopping spread spectrum technique (FHSS) - which is one of two basic modulation techniques used in spread spectrum signal transmission. Frequencies are switched repeatedly during radio transmission to help reduce unlawful access or other means of telecommunications to cross paths and cause interruption. It also makes Bluetooth communication more robust and secure. Interference from other devices will not cause the transmission to stop, but the speed to be reduced.



Friday, January 8, 2010

Ethernet Switch

An Ethernet Switch is a LAN interconnection device which operates at the data link layer (layer 2) of the OSI refrence model. A switch is fundamentally similar to a bridge, but usually supports a larger number of connected LAN segments and has a richer management capability.

Modern LANs have increasingly replaced the shared media with a switched media, by installing Ethernet switches and bridges in place of hubs and repeaters. These logically partition the traffic to travel only over the network segments on the path between the source and the destination. This reduces the wastage of bandwidth which results from sending the packet to parts of the network which do not need to receive the data. There are also benefits from improved security (users are less able to tap-in into other user's data), better management (the ability to control who receives what information (i.e. Virtual LANs) and to limit the impact of network problems), and the ability to operate some links in full duplex (rather than half duplex required for shared access).

Architecture

At the centre of a Switch is a type of switching element which controls the ports to which each frame is forwarded. Three types of switching element have been used, each has some merits in terms of cost/performance:

  • Matrix Switches
  • Shared bus
  • Shared Memory

In addition, many switches include processing capability beyond that required for forwarding. This may be used to implement additional features.

Switches and Multicast Traffic

Many Ethernet switches handle multicast traffic as if were broadcast traffic. When a multicast packet reaches such a bridge/switch, it forwards the packet to all active interfaces, effectively flooding the network. This ensures all clients receive the multicast data, but has the drawback that every LAN segment carries all the multicast traffic, even when the directly connected clients do not require the data. This mitigates most of the advantages of switching when considering multicast traffic.

Multicast Traffic from F is delivered to all output interfaces (ports)

A bridge/switch may be designed to provides multicast support by implementing filters at the output ports of the device which remove the packets for which the clients attached to the ports have no registered interest. This operation resembles the processing for Virtual LANs (VLANs) and may be performed using the same/similar processing engine. Three approaches are possible when configuring this style of operation:

  1. Manual table configuration The network manager determines which clients should receive which multicast packets, in the same manner that VLAN membership is configured. Many multicast applications however select their multicast groups dynamically as the application executes.
  2. "Snooping" the multicast "Join" and "Leave"messages sent by clients. Clients use a protocol called the Internet Group Management Protocol (IGMP) to register the address groups in which they have an interest with their local multicast router. Some switches (e.g. FORE, 3COM) are able to monitor/emulate these packets and use the information to configure the switch filters dynamically
  3. Down-loading a switch filter table from the local multicast router. Each IP multicast network must have at least one multicast. The router must track the multicast membership of each client, and may utilise this information to inform the switch which clients require which packets. In practice, this may be as simple as down-loading a multicast address filter table to all attached switches. Most CISCO equipment support the CISCO Group Management Protocol (CGMP) to provide this function.
With multicast Filtering. The multicast traffic form F is only forwarded to those interfaces which have equipment connected that wishes to receive the multicast packets. In this case, only E and H.

Some level of multicast filtering is highly desirable within a bridge/switch handling multicast traffic. These procedures allow a the device to selectively forward multicast packets only to hosts which register an interest in the corresponding multicast group address. Without the addition of such procedures, Level 2 bridges/switches are forced to broadcast multicast packets to all connected LANs. While manual configuration may suffice for applications such as multicast file transfer, or multicast distribution to network news/web cache clients. For the majority of multicast applications, one of the two dynamic schemes is recommended.

Some level of multicast filtering is highly desirable within a bridge/switch handling multicast traffic. These procedures allow a the device to selectively forward multicast packets only to hosts which register an interest in the corresponding multicast group address. Without the addition of such procedures, Level 2 bridges/switches are forced to broadcast multicast packets to all connected LANs. While manual configuration may suffice for applications such as multicast file transfer, or multicast distribution to network news/web cache clients. For the majority of multicast applications, one of the two dynamic schemes is recommended..

Network Switching

What is a Switch?

Switches occupy the same place in the network as hubs. Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports. Switches map the Ethernet addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass through the switch. When a packet is received by the switch, the switch examines the destination and source hardware addresses and compares them to a table of network segments and addresses. If the segments are the same, the packet is dropped ("filtered"); if the segments are different, then the packet is "forwarded" to the proper segment. Additionally, switches prevent bad or misaligned packets from spreading by not forwarding them.

Filtering of packets, and the regeneration of forwarded packets enables switching technology to split a network into separate collision domains. Regeneration of packets allows for greater distances and more nodes to be used in the total network design, and dramatically lowers the overall collision rates. In switched networks, each segment is an independent collision domain. In shared networks all nodes reside in one, big shared collision domain.

Easy to install, most switches are self learning. They determine the Ethernet addresses in use on each segment, building a table as packets are passed through the switch. This "plug and play" element makes switches an attractive alternative to hubs.

Switches can connect different networks types (such as Ethernet and Fast Ethernet) or networks of the same type. Many switches today offer high-speed links, like Fast Ethernet or FDDI, that can be used to link the switches together or to give added bandwidth to important servers that get a lot of traffic. A network composed of a number of switches linked together via these fast uplinks is called a "collapsed backbone" network.

Dedicating ports on switches to individual nodes is another way to speed access for critical computers. Servers and power users can take advantage of a full segment for one node, so some networks connect high traffic nodes to a dedicated switch port.

Full duplex is another method to increase bandwidth to dedicated workstations or servers. To use full duplex, both network interface cards used in the server or workstation, and the switch must support full duplex operation. Full duplex doubles the potential bandwidth on that link, providing 20 Mbps for Ethernet and 200 Mbps for Fast Ethernet.

Ethernet Capacity

Network Congestion

As more users are added to a shared network or as applications requiring more data are added, performance deteriorates. This is because all users on a shared network are competitors for the Ethernet bus. A moderately loaded 10 Mbps Ethernet network is able to sustain utilization of 35% and throughput in the neighborhood of 2.5 Mbps after accounting for packet overhead, interpacket gaps and collisions. A moderately loaded Fast Ethernet shares 25 Mbps of real data in the same circumstances. With shared Ethernet and Fast Ethernet, the likelihood of collisions increases as more nodes and/or more traffic is added to the shared collision domain.

Network LoadingEthernet itself is a shared media, so there are rules for sending packets to avoid conflicts and protect data integrity. Nodes on an Ethernet network send packets when they determine the network is not in use. It is possible that two nodes at different locations could try to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result. Both packets are retransmitted, adding to the traffic problem. Minimizing collisions is a crucial element in the design and operation of networks. Increased collisions are often the result of too many users or too much traffic on the network, which results in a lot of contention for network bandwidth. This can slow the performance of the network from the users point of view. Segmenting, where a network is divided into different pieces joined together logically with switches or routers, reduces congestion in an overcrowded network.

Collision rates measure the percentage of packets that are collisions. Some collisions are inevitable, with less than 10% common in well running networks.


The Factors Affecting
Network Efficiency

- Amount of traffic
- Number of nodes
- Size of packets
- Network diameter


Measuring Network Efficiency
- Average to peak load devition
- Collision Rate
- Utilization Rate


Utilization rate is another widely accessible statistic about the health of a network. This statistic is available in Novell's Console monitor and WindowsNT performance monitor as well as any optional LAN analysis software. Utilization in an average network above 35% indicates potential problems. This 35% utilization is near optimum, but some networks experience higher or lower utilization optimums due to factors such as packet size and peak load deviation.

A switch is said to work at "wire speed" if it has enough processing power to handle full ethernet speed at minimum packet sizes. Most switches on the market are well ahead of network traffic capabilities supporting full "wire speed" of ethernet, 14,480 pps (packets per second).

Routers

Routers work in a manner similar to switches and bridges in that they filter out network traffic. Rather than doing so by packet addresses they filter by specific protocol. Routers were born out of the necessity for dividing networks logically instead of physically. An IP router can divide a network into various subnets so that only traffic destined for particular IP addresses can pass between segments. Routers recalculate the checksum, and rewrite the MAC header of every packet. The price paid for this type of intelligent forwarding and filtering is usually calculated in terms of latency, or the delay that a packet experiences inside the router. Such filtering takes more time than that exercised in a switch or bridge which only looks at the Ethernet address but in more complex networks network efficiency is improved. An additional benefit of routers is their automatic filtering of broadcasts, but overall they are complicated to setup.

Switch Benefits
- Isolates traffic, relieving congestion
- Separates collision domains, reducing collisions
- Segments, restarting distance and repeater rules

Switch Costs
- Price: currently 3 to 5 times the price of a hub
- Packet processing time is longer than in a hub
- Monitoring the network is more complicated


General Benefits of Switching

Switches replace hubs in networking designs, and they are more expensive. So why is the desktop switching market doubling ever year with huge numbers sold? The price of switches is declining precipitously, while hubs are a mature technology with small price declines. This means that there is far less difference between switch costs and hub costs than there used to be, and the gap is narrowing.

Since switches are self learning, they are as easy to install as a hub. Just plug them in and go. And they operate on the same hardware layer as a hub, so there are no protocol issues.

There are two reasons for switches being included in network designs. First, a switch breaks one network into many small networks so the distance and repeater limitations are restarted. Second, this same segmentation isolates traffic and reduces collisions relieving network congestion. It is very easy to identify the need for distance and repeater extension, and to understand this benefit of switching. But the second benefit, relieving network congestion, is hard to identify and harder to understand the degree by which switches will help performance. Since all switches add small latency delays to packet processing, deploying switches unnecessarily can actually slow down network performance. So the next section pertains to the factors affecting the impact of switching to congested networks.

Switching in Your Network

The benefits of switching vary from network to network. Adding a switch for the first time has different implications than increasing the number of switched ports already installed. Understanding traffic patterns is very important to switching - the goal being to eliminate (or filter) as much traffic as possible. A switch installed in a location where it forwards almost all the traffic it receives will help much less than one that filters most of the traffic.

Networks that are not congested can actually be negatively impacted by adding switches. Packet processing delays, switch buffer limitations, and the retransmissions that can result sometimes slows performance compared with the hub based alternative. If your network is not congested, don't replace hubs with switches. How can you tell if performance problems are the result of network congestion? Measure utilization factors and collision rates.

Good Candidates for
Performance Boosts from Switching
- Utilization more than 35%
- Collision rates more than 10%

Utilization load is the amount of total traffic as a percent of the theoretical maximum for the network type, 10 Mbps in Ethernet, 100 Mbps in Fast Ethernet. The collision rate is the number of packets with collisions as a percentage of total packages

Network response times (the user-visible part of network performance) suffers as the load on the network increases, and under heavy loads small increases in user traffic often results in significant decreases in performance. This is similar to automobile freeway dynamics, in that increasing loads results in increasing throughput up to a point, then further increases in demand results in rapid deterioration of true throughput. In Ethernet, collisions increase as the network is loaded, and this causes retransmissions and increases in load which cause even more collisions. The resulting network overload slows traffic considerably.