1. | Introduction and overview | Personal Area Networks (W)PAN and Body Area Network Body Network BAN Signals Communication Standards Bluetooth Interoperability BAN Challenges |
||
2. | WLANs – 802.11 standards, QoS (802.11e), Security (802.11i, 802.11f) | Communication Standards IEEE 802.11 Standards 802.11-Physical 802.11 a/b Physical Infrastructure Mode IEEE 802.11 Ad Hoc Mode Terminology MAC Format IEEE 802.11 MAC or WMAC Basic Carrier Sense Approach CSMA in Wireless Networks Backoff Algorithm |
||
3. | WLANs – 802.11 standards, QoS (802.11e), Security (802.11i, 802.11f) | IEEE 802.11 Standards Infrastructure Mode Backoff Algorithm Software Defined Radio(SDR) Cognitive Radio GNU Radio GNU Radio Components Architecture Dial Tone Exaple GRC(GNU Radio Companion) |
||
4. | Bluetooth - Core specification, Profiles, Security, Future | Software Defined Radio(SDR) GNU Radio Bluetooth |
||
5. | 802.15 – 802.15.3 (HR WPAN), Very HR WPAN (UWB, DS-UWB, MB-OFDM), 802.15.4 (LR WPAN), ZigBee-1 | IEEE 802.15.2 IEEE 802.15.3 PHY PHY Format Data Communication Quality of Service(QoS) Contention Access Period(CAP) Backoff Procedure in CAP MAC Format Power Management Security Keys 802.11 MAC |
||
6. | Wireless communication - Inductive coupling, RF comm. in body, antenna, ultra-low power signal processing | Enabling Technology for PAN/BSN Wireless Sensor Networks(WSN) Typical WSN Structure WSN Scenarios Application Types Participants in WSN Data Centric Networking Radio Transceivers Tiny OS Basics Tiny OS Application Tiny OS Components ing Components |
||
7. | 802.15 – 802.15.3 (HR WPAN), Very HR WPAN (UWB, DS-UWB, MB-OFDM), 802.15.4 (LR WPAN), ZigBee-2 | IEEE 802.15.4 IEEE 802.15.4 / ZigBee Architecture Bluetooth vs IEEE 802.15.4 802.15.4 / ZigBee Architecture PHY Data MAC MAC Format Communication Methods |
||
8. | Security/Privacy-1 | Security Basics Pseudo-random Generator(PRG) 802.11. Security: WEP WEP Vulnerability 802.15 Security End-to-end security Security in pervasive health |
||
9. | Security/Privacy-2 | Security Basics Pseudo-random Generator(PRG) 802.11. Security: WEP WEP Vulnerability 802.15 Security End-to-end security Security in pervasive health |
||
10. | Security/Privacy-3 | Security Basics Pseudo-random Generator(PRG) 802.11. Security: WEP WEP Vulnerability 802.15 Security End-to-end security Security in pervasive health |
||
11. | BAN-systems(micro systems, energy scavenging)BAN-systems(micro systems, energy scavenging)-1 | "Ultra" Low Power BAN Systems Switching between Modes Radio Transmitter Radio Receiver Energy-aware Transceivers 802.11/a/b Physical Computation vs Communication Sensor-MAC(S-MAC) IEEE 802.15.4 MAC Evolution of Signal Processing Compressive Sampling(Sensing) Amulet: Asynchronous Logic Analog vs Digital Processing |
||
12. | BAN-systems(micro systems, energy scavenging)BAN-systems(micro systems, energy scavenging)-2 | Biosensors Vital parameters to be measured CMOS-d Biosensors Biosensor Requirements Conclusion: Pervasive Healthcare PAN/BAN BAN Design |