16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44 Chapter 2<br />

while asynchronous transfers are delay-tolerant and are able to wait for available<br />

bandwidth. USB control protocols are designed specifically to give a low protocol<br />

overhead, resulting in highly effective utilization of the available bandwidth.<br />

This available bandwidth is shared among all connected devices and is allocated using<br />

“ pipes, ” with each pipe representing a connection between the host and a single device.<br />

The bandwidth for a pipe is allocated when the pipe is established, and a wide range of<br />

different device bit rates and device types can be supported concurrently. For example,<br />

digital telephony devices can be concurrently accommodated ranging from 1 “ bearer ”<br />

plus 1 “ demand ” channel (64 kbps—see ISDN above) up to T1 capacity (1.544 Mbps).<br />

USB employs NRZI (non return to zero inverted) as a data encoding scheme. In NRZI<br />

encoding, a 1-bit is represented by no change in output voltage level and a 0-bit is<br />

represented by a change in voltage level ( Figure 2.12 ). A string of 0-bits therefore causes<br />

the NRZI output to toggle between states on each bit cycle, while a string of 1-bits causes<br />

a period with no transitions in the output.<br />

NRZI has the advantage of a somewhat improved noise immunity compared with the<br />

straight encoding of the input data stream as output voltages.<br />

2.4.2 Physical Layer Technologies—<strong>Wireless</strong> Networks<br />

The PHY layer technologies that provide the Layer 1 foundation for wireless networks<br />

will be described further in Parts III, IV and V, where LAN, PAN and MAN technologies<br />

and their implementations will be covered in detail.<br />

Data bits<br />

1 0 1 1 0 0 1 0 1 0<br />

Non return<br />

to zero (NRZ)<br />

Non return<br />

to zero<br />

inverted (NRZI)<br />

Bit<br />

period<br />

Figure 2.12 : USB NRZI data encoding scheme<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!