SMART SENSOR
SENSOR CIRCUIT: PROVEE ACONDICONAMIENTO
DE LA SEAL QUE ENTREGA EL SENSOR. ESTO LE
CONVIERTE A LA TARJETA EN NICA.
SMART SENSOR
SENSOR CIRCUIT: CONVIERTE LA SEAL
ANALOGA A DIGITAL
SMART SENSOR
NETWORK CHIP: ES EL QUE PORVEE EL
PROTOCOLO DE COMUNICACIONES, P.E.
ETHERNET.
SMART SENSOR
NETWORK TRANSCEIVER: ES EL QUE COVIERTE
LA SEAL DIGITAL LGICA EN VALORES REALES
DE VOLTAJE, DEPENDIENDO DEL MEDIO.
SMART SENSOR
SI EL MEDIO ES COBRE: CONVIERTE A VOLTIOS.
FIBRA PTICA: CONVIERTE A LUZ
INLMBRICA: CONVIERTE A ONDAS
ELECTROMAGNTICAS.
SMART SENSOR
UN PROBLEMA QUE SE TIENE CON LOS
SENSORES Y ACTUADORES INTELIGENTES ES LA
OBTENCIN DE LA ALIMENTACIN ELCTRICA.
SMART SENSOR
UN SENSOR O ACTUADOR CARECE DE
ALIMENTACIN ELCTRICA Y TOCA ALIMENTAR AL
CONJUNTO POR EL MISMO CABLE DE DATOS.
SMART SENSOR
UNA SOLUCIN MUY CONOCIDA EL PoE.
POWER OVER ETHERNET.
HAY SWITCHES ESPECIALES QUE PROPORCIONAN ESTA
ALTERNATIVA.
10
http://earlyradiohistory.us/1920au.htm
11
What is a
wireless LAN?
More later!
12
13
Wi-Fi
Wi-Fi Alliance
WECA changed its name to Wi-Fi
Wireless Fidelity Alliance
170+ members
Over 350 products certified
Wi-Fis Mission
Certify interoperability of WLAN products (802.11)
Wi-Fi is the stamp of approval
Promote Wi-Fi as the global standard
14
15
Why Wireless?
16
WLAN Evolution
Warehousing
Retail
Healthcare
Education
Businesses
Home
Speed
860 Kbps
Network
Radio
900 MHz
2.4 GHz
1986
Standards-based
Proprietary
1988
11 Mbps 54 Mbps
1 and
1 and
2 Mbps
2 Mbps
1990
IEEE 802.11Begins
Drafting
1992
1994
5 GHz
2.4 GHz
1996
802.11
Ratified
802.11a,b 802.11g
Ratified
Drafted
1998
2000
2002
17
Current Standards a, b, g
Speed
860 Kbps
Radio
900 MHz
2.4 GHz
1986
Standards-based
Proprietary
Network
1988
11 Mbps 54 Mbps
1 and
1 and
2 Mbps
2 Mbps
1990
IEEE 802.11Begins
Drafting
1992
1994
5 GHz
2.4 GHz
1996
802.11
Ratified
802.11a,b 802.11g
Ratified
Ratified
1998
2000
802.11a
More later!
Up to 54 Mbps
5 GHz
Not compatible with either 802.11b or 802.11g
802.11b
Up to 11 Mbps
802.11g is backwards compatible
2.4 GHz
with 802.11b, but with a drawback
802.11g
(later)
Up to 54 Mbps
2.4 GHz
Luis Corrales, PhD EPN-DACI
18
2003
Speed
Radio
900 MHz
2.4 GHz
1986
Standards-based
Proprietary
Network
1988
1990
IEEE 802.11Begins
Drafting
1992
1994
5 GHz
2.4 GHz
1996
802.11
Ratified
802.11a,b 802.11g
Ratified
Ratified
1998
2000
2003
More later!
Infrared light
Three types of radio transmission within the unlicensed 2.4-GHz frequency
bands:
Frequency hopping spread spectrum (FHSS) 802.11b (not used)
Direct sequence spread spectrum (DSSS) 802.11b
Orthogonal frequency-division multiplexing (OFDM) 802.11g
One type of radio transmission within the unlicensed 5-GHz frequency bands:
Orthogonal frequency-division multiplexing (OFDM) 802.11a
Luis Corrales, PhD EPN-DACI
19
20
WLAN Devices
In-building Infrastructure
1200 Series (802.11a and 802.11b)
Bridging
350 Series (802.11b)
BR350
WGB350
1400 Series (802.11a)
21
Antennas
Antenna
2.4GHz Antennas
5 GHz Antennas
22
1.
2.
3.
4.
23
Other requirements
Security It is essential to encrypt data packets transmitted through the air.
For larger installations, centralized user authentication and centralized
management of encryption keys are also required.
Cost Customers expect continued reductions in price of 15 to 30 percent
each year, and increases in performance and security. Customers are
concerned not only with purchase price but also with total cost of ownership
(TCO), including costs for installation.
24
25
implemented.
Because the 802.11 standards use unlicensed spectrum, changing
channels is the best way to avoid interference.
If someone installs a link that interferes with a wireless link, the
interference is probably mutual.
26
27
Power Consumption
28
Interoperability
29
Lessons:
30
31
32
33
Health Issues
34
5GHz, 54Mbps
2.4GHz, 11Mbps
Multiple regulatory domains
Quality of Service (QoS)
Inter-Access Point Protocol (IAPP)
2.4GHz, 54Mbps
Dynamic Frequency Selection (DFS)
and Transmit Power Control (TPC)
802.11i: Security
802.11j: Japan 5GHz Channels (4.9-5.1 GHz)
802.11k: Measurement
Luis Corrales, PhD EPN-DACI
35
802.11 Standards
36
Overview of
Standardization
37
39
40
41
43
44
45
What if you want to be able to move between access points without the
latency of re-association and re-authentication (these will be explained)?
Roaming gives stations true mobility allowing them to move seamlessly
between BSSs. (More later)
APs need to be able to communicate between themselves since stations can
only associate with one AP at a time.
Currently, inter-access point communication can only be achieved with
proprietary, non-standard technologies.
IEEE 802.11 working group (Task Group F) is working on standardizing IAPP
(Inter-Access
Point Protocol)
Luis
Corrales, PhD EPN-DACI
46
Access Points
47
48
SSID
49
Your operating system (Windows) or wireless NIC client (Aironet) will tell you
whether or not you have successfully connected (associated).
50
51
In Windows this is done from the Start -> Control Panel -> Network
Connections (amongst other methods).
Luis Usually,
need to have wired Ethernet
disconnected or disabled.
Corrales, PhD EPN-DACI
52
53
802.11 Frames
802.11 Frames
Data Frames (most are PCF)
Data
Null data
Data+CF+Ack
Data+CF+Poll
Data+CF+Ac+CF+Poll
CF-Ack
CF-Poll
CF-Cak+CF-Poll
Control Frames
RTS
CTS
ACK
CF-End
CF-End+CF-Ack
Luis Corrales, PhD EPN-DACI
54
Management Frames
Beacon
Probe Request
Probe Response
Authentication
Deauthentication
Association Request
Association Response
Reassociation Request
Reassociation Response
Disassociation
Announcement Traffic
Indication
CSMA/CD
CSMA/CA
CSMA/CD
CSMA/CA
The 802.11 standard makes it mandatory that all stations implement the DCF
(Distributed Coordination Function), a form of carrier sense multiple access with
collision avoidance (CSMA/CA).
CSMA is a contention-based protocol making sure that all stations first sense the
medium before transmitting (physically and virtually).
The main goal of CSMA/CA is to avoid having stations transmit at the same time,
which will then result in collisions and eventual retransmissions.
However, collisions may still occur and when they do stations may or may not be able
detect
them (hidden node problem). 56
Luis to
Corrales,
PhD EPN-DACI
57
DCF Operation
58
Duration Field
NAV Timer
62
What if a station is in range of the AP but not other hosts, like the
transmitting host?
Wireless networks have fuzzy boundaries, sometimes where may not be able
to communicate/see every other node.
Hidden nodes can be caused by:
Hosts are in range of the AP but not each other.
An obstacle is blocking the signal between the hosts.
Luis Corrales, PhD EPN-DACI
63
64
Solutions:
Move the node
Remove the obstacle
Use RTS/CTS (Request to Send / Clear to Send)
65
66
RTS/CTS Solution
67
RTS/CTS Solution
68
RTS/CTS Solution
RTS/CTS consumes a fair amount of capacity
and overhead, resulting in additional latency.
Normally used in high capacity environments.
The RTS/CTS procedure can be
enabled/controlled by setting the RTS threshold
on the 802.11 client NIC.
RTS/CTS is also used during frame
fragmentation.
Luis Corrales, PhD EPN-DACI
69
70
RTS/CTS Example
HN-A
RTS/CTS
E
C
AP
HN-B
RTS/CTS
71
72
Frame Fragmentation
73
Frame Fragmentation
74
Frame Fragmentation
Frame fragmentation can increase the reliability of frame transmissions but there is
additional overhead:
Each frame fragment includes the 802.11 MAC protocol header.
Each frame fragment requires a corresponding acknowledgement.
If a frame fragment encounters errors or a collision, only that fragment needs to be
retransmitted, not the entire frame.
The frame control field includes information that this is a fragmented frame.
Luis Corrales, PhD EPN-DACI
75
76
Y
Distribution System (DS)
Access Point 1
Access Point 2
xxx
yyy
C
D
yyy
xxx
yyy
IP Packet
77
78
Access Point 2
C
B
80
Function
IBSS (no AP)
To AP
From AP
Luis Corrales, PhD EPN-DACI
Wireless
bridge to bridge
0
1
ToDS
0
1
1
1 81
FromDS
0
0
Note: Some
documentation is
misleading stating that the
ToDS is set to 1 only when
the destination is on the
wired side of the AP.
Y
Distribution System (DS)
Access Point 1
Access Point 2
111
C
D
aaa
bbb
aaa
bbb
111
Options:
Host A to Host B
Host A to Host X
Frames to and from a BSS (Basic Service Set) must go via the access point.
The access point is a layer 2 bridge (translation bridge) between the 802.11
network and the 802.3 network.
Luis Corrales, PhD EPN-DACI
82
802.11 MAC
Addressing
X
The BSSID
xxx
Y
Distribution System (DS)
Access Point 1
Access Point 2
111
B
aaa
bbb
83
802.11 MAC
Addressing
X
xxx
Y
Distribution System (DS)
The BSSID
Access Point 1
aaa
Access Point 2
111
B
bbb
Besides the BSSID MAC address, the access point has a MAC address for
other interfaces.
Ethernet (LAN)
Ethernet (WAN)
802.11a for dual mode APs
Luis Corrales, PhD EPN-DACI
84
802.11 MAC
Addressing
Host A to Host B
X
xxx
Y
Distribution System (DS)
Access Point 1
Access Point 2
111
B
General 802.11 Frame
aaa
bbb
85
802.11 MAC
Addressing
X
xxx
Host A to Host B
Y
Distribution System (DS)
Access Point 1
A
aaa
Host A to AP 1
Trans.
111
aaa
Rec.
Trans.
bbb
111
DA
111
B
bbb
bbb
AP1 to Host B
Rec.
Access Point 2
SA
aaa
802.11 MAC
Addressing
X
xxx
Y
Distribution System (DS)
Host A to Host X
Access Point 1
A
aaa
Host A to AP 1
802.11 Frame
Rec.
Trans.
111
aaa
DA
Access Point 2
111
C
D
bbb
xxx
0
copied
Host A to AP 1
xxx
aaa
The Ethernet DA and SA are the source and destination addresses just like on
traditional Ethernet networks.
Destination Address Host X
Luis Corrales,
PhD EPN-DACI
88
Source
Address Host A
89
The only word of caution is that there are two types of LLC encapsulation, RFC
1042 and 802.1h.
On a rare occasion, you might find a problem with a client associating to an AP
when their LLCs do not match.
90
Station Connectivity
Successful
Authentication
State 1
Unauthenticated
Unassociated
Successful
Association
State 2
Authenticated
Unassociated
Deauthentication
State 3
Authenticated
Associated
Disassociation
91
Station Connectivity
Probe
process
Authentication process
Successful
Authentication
State 1
Unauthenticated
Unassociated
Association process
Successful
Association
State 2
Authenticated
Unassociated
Deauthentication
State 3
Authenticated
Associated
Disassociation
Three processes:
Probe Process (or scanning)
The Authentication Process
The Association Process
Only after a station has both authenticated and associated with the access
point can it use the Distribution System (DS) services and communicate with
devices beyond the access point.
Luis Corrales, PhD EPN-DACI
92
93
94
95
96
AP features (options)
The SSID can be hidden or cloaked in the beacon frame (can be done
on Cisco APs)
Do not send AP broadcast beacons (not an option with Cisco APs)
From some mailing lists:
SSID cloaking and beacon hiding isn't necessarily a bad thing, but too many
places use it as the only protection because it leads to a false sense of security.
Obscurity != security. Too many companies blindly trust that no beaconing or
hiding their SSID means they're automatically safe.
Luis Corrales, PhD EPN-DACI
97
98
From the AP
99
1
3
100
Station Connectivity
Hey, I didnt
do anything
and I am on
the Internet!
No SSID
Probe Request
Broadcast (no) SSID
ACK
Probe Response
SSID = tsunami
Access Points can be configured whether or not to allow clients with broadcast SSIDs
to continue the connectivity process.
If there is no authentication on the AP, then the client will most likely associate
and be on their network!
Cisco APs use a default SSID of tsunami known as the guest mode SSID. (coming)
Unless this feature is disabled or authentication is enabled, anyone can easily
associate with your AP and access your network (or the Internet).
101
Station Connectivity
Probe
process
Authentication process
Successful
Authentication
State 1
Unauthenticated
Unassociated
Association process
Successful
Association
State 2
Authenticated
Unassociated
Deauthentication
State 3
Authenticated
Associated
Disassociation
102
Authentication Process
103
104
Shared-key authentication uses WEP (Wired Equivalent Privacy) and can only be used
on products that support WEP.
WEP is a Layer 2 encryption algorithm based on the RC4 algorithm.
802.11 requires any stations that support WEP to also support shared-key
authentication.
WEP and WPA will be examined more closely when we discuss security.
For now both the client and the AP must have a shared-key, password.
105
Authentication Process
Authentication Process
Authentication
Open-System
Shared-Key (WEP)
or
Encryptiononly
None
WEP
107
Station Connectivity
Probe
process
Authentication process
Successful
Authentication
State 1
Unauthenticated
Unassociated
Association process
Successful
Association
State 2
Authenticated
Unassociated
Deauthentication
State 3
Authenticated
Associated
Disassociation
108
Association Process
1. Association Request
2. Association Response
109
Association Process
110
Station Connectivity
Probe
process
Authentication process
Successful
Authentication
State 1
Unauthenticated
Unassociated
Association process
Successful
Association
State 2
Authenticated
Unassociated
Deauthentication
State 3
Authenticated
Associated
Disassociation
Traffic can now flow between the client and the AP.
Disassociation and deauthentication can be due to:
Inactivity
The AP cannot handle all currently associated stations
Station has left BSS
etc.
Luis Corrales, PhD EPN-DACI
111
Roaming
Not yet covered under
802.11.
112
Roaming
Initial Association:
Probing (Probe Request, Probe Response)
Note: 802.11 does not specify how the client determines which AP to
associate with , so it depends on vendor implementation.
Authentication (Authentication Request, Authentication Response)
Association (Association Request, Association Response)
802.11 does not allow associating with more than one AP.
Luis Corrales, PhD EPN-DACI
113
Roaming
114
IAPP: Please
send buffered
frames for
Roaming
IAPP: Ok!
* Packet - Source
MAC of client
Roaming
When Adapter Has Been Associated for at LeastThe number of seconds the client
adapter waits after connecting before searching for a better access point. This threshold
keeps the client adapter from jumping from one access point to another too quickly
after the initial connection.
Signal Strength is Less ThanThe signal strength threshold below which the client
adapter should search for a better access point. This threshold keeps the client adapter
from jumping from one access point to another when both have strong signals.
Example: When using the default values of 20 seconds and 50%, the client adapter
monitors the signal level 20 seconds after connecting and every second thereafter. If the
client detects that the signal strength is below 50%, it scans for a better access point.
After the access point connects to a better access point, this scanning process repeats.
116
Scalability
APs are on
different channels
Scalability is the ability to locate more than one access point in the same
area.
This will increase the available bandwidth of that area for all users local to
that access point.
The current Cisco Aironet products are frequency agile.
This means that they can look for and use the best channel.
Three non-overlapping and non-interfering channels, up to a theoretical 33
Mbps per cell.
Users still only operate at a maximum theoretical value of 11 Mbps
Luis Corrales, PhD EPN-DACI
117
Scalability
APs are on
different channels
118
Scalability
Specifies the channel number and frequency that the client adapter uses for
communications. The channels conform to the IEEE 802.11 Standard for your
regulatory domain.
In infrastructure mode, this option is set automatically and cannot be
changed. The client adapter listens to the entire spectrum, selects the best
access point, and then uses the same channel as that access point.
In ad hoc mode, the channel of the client adapter must match the channel
used by the other clients in the wireless network. If the client adapter does
not find any other ad hoc client adapters, this option specifies the channel on
which the client adapter broadcasts beacons.
Luis Corrales, PhD EPN-DACI
119
As a client roams away from the access point, the transmission signals
between the two attenuate (weaken).
Rather than decreasing reliability, the AP shifts to a slower data rate, which
gives more accurate data transfer.
This is called data rate or multi-rate shifting.
As a client moves away from an 802.11b access point, the data rate will go
from 11 Mbps, to 5.5Mbps, to 2 Mbps, and, finally, to 1 Mbps.
This happens without losing the connection, and without any interaction from
the
user.
Luis
Corrales,
PhD EPN-DACI
120
The Cisco Aironet 2.4 GHz radio delivers 100 mW of output and offers a high
degree of receiver sensitivity.
The 5 GHz client radio has a 20 mW transmit power and the 5 GHz access
point has a 40 mW transmit power.
It is possible to adjust the power level down, to create pico-cells, or smaller
coverage cells.
This would be done, for example, to prevent the coverage area of one AP
from extending too far into the coverage area of another AP.
Luis Corrales, PhD EPN-DACI
121
Sets the transmit power level of the radio. Select a value for Transmit Power
that is no greater than the maximum allowed by the regulatory body in your
country (FCC in the United States, ETSI in Europe, and MKK in Japan).
Reducing the transmit power conserves battery power, but it reduces the
range of the radio. The default power level is the maximum power allowed by
the regulatory agency in your country.
Note: If World Mode is enabled, the transmit power is limited to the
maximum level allowed by the regulatory agency of the country where the
adapter is used.
Luis Corrales, PhD EPN-DACI
122
Multirate implementation
123
Remember that the 802.11 standard uses the unlicensed spectrum and,
therefore, anyone can use these frequencies.
Luis Corrales, PhD EPN-DACI
124
Bridge Topologies
More on Bridges Later
125
Distance limitations
The 802.11 standard sets a time limit for the acknowledgement of packets.
Remember that 802.11 also defines a Local Area Network, which means a typical
wireless range of up to 305 m (1000 ft), not several kilometers or miles.
The bridge products have a parameter that increases this timing, whereas the
workgroup bridge and AP does not.
The timing is increased, by violating the 802.11 standard.
This allows the Cisco devices to operate at greater distances.
Any wireless bridge that supports distances over one mile must violate 802.11.
This means that radios of other 802.11 vendors may not work with the Cisco bridges
when the distances are greater than 1.6 km (1 mile).
126
Root modes
Cisco Aironet access points and bridges have two different root modes, in
which to operate the following:
Root = ON
The bridge or AP is a root.
If it is a bridge, then it is called the master bridge.
Root = OFF
The bridge or AP is not a root, non-root.
Luis Corrales, PhD EPN-DACI
127
Root modes
128
Root modes
on
on
off
off
off
off
129
Point-to-point configuration
130
Point-to-point configuration
131
Point-to-multipoint configuration
root
Non-root
Non-root
132
Basic Topologies
Basic Infrastructure
Topology (BSS)
Extended
Infrastructure
Topology (ESS)
133
BLUETOOTH
Es una tecnologa desarrollada por Ericsson en 1994,
que hace factible la conectividad inalmbrica entre
dispositivos a corta distancia, stos pueden llegar a
formar redes con diversos equipos de comunicacin:
computadoras mviles, radiolocalizadores, telfonos
celulares, PDAs, e, inclusive, electrodomsticos.
134
135
BLUETOOTH
The lower communications layers of Bluetooth
have been published as IEEE standard 802.15.1.
For the original task of device connection, Bluetooth
offers a rich suite of functionalities, including enabling
walk-up linking without user interaction and
establishing voice connection.
136
BLUETOOTH
La tecnologa CMOS utilizada en el chip permite
reducir tanto los costos como el consumo de energa;
de esta forma se reduce a aproximadamente del 97%
el uso de energa, comparado con un telfono mvil.
137
BLUETOOTH
Bluetooth networking is intentionally limited to a
maximum of eight Bluetooth nodes, which together
form a piconet (Figura abajo).
138
BLUETOOTH
Se puede formar una Scatter net a travs de la tcnica
de multiplexacin de divisin de tiempo dplex (TimeDivision Duplex TDD). Esta tcnica de multiplexacin
emplea intervalos de tiempo de 625s, para lograr
una transmisin bidireccional (full-dplex) entre los
dispositivos conectados.
139
BLUETOOTH
When a node is included in more than one piconet,
that node then assumes the task of forwarding
messages to/from the other piconet, adding
to the complexity of Bluetooth networking.
140
BLUETOOTH
141
BLUETOOTH
The most attractive feature of Bluetooth for industrial
automation purposes is its use of forward error
correction (FEC) for delivering messages without error
and without requiring retransmission.
The drawback of FEC is loss of efficiency: a 1 Mbps
communications channel can deliver only 721 Kbps.
142
BLUETOOTH
A multivendor consortium defined Bluetooth, not a
standards organization. Just like 802.11b and 802.11g,
it operates in the unlicensed 2.4 GHz frequency band,
but uses frequency-hopping spread-spectrum
technology that hops faster than the original FHSS of
802.11.
As a result, the presence of Bluetooth in close
proximity to Wi-Fi nodes causes the signal for the
WLAN to degrade, spelling disaster for Wi-Fi
transmissions.
Luis Corrales, PhD EPN-DACI
143
BLUETOOTH
La distancia nominal de un enlace puede variar desde
10 centmetros a 10 metros, pero se puede aumentar
a ms de 100 m elevando la potencia de transmisin.
144
BLUETOOTH
While there is no protocol yet to help such nodes
avoid signal degradation, many early suppliers of
nodes with both Bluetooth and Wi-Fi have been able
to synchronize transmissions to avoid degradation.
Suppliers of 802.11a, which operates in the 5 GHz
unlicensed band, are quick to point out that they
avoid signal degradation from Bluetooth completely.
Nevertheless, 802.11g suffers the same problems as
802.11b in the presence of Bluetooth.
Luis Corrales, PhD EPN-DACI
145
146
147
148
149
150
151
152
153
Star
The most typical or default arrangement for a wireless
network is a star cluster in which the wireless access
point is at the center, as illustrated in the nest Figure.
Each wireless device then communicates only with the
common access point, which is usually connected via
wires to a network switch. This arrangement then
places all of the wireless devices into the same
collision domain, presuming that this is an Ethernetbased network. Usually, this arrangement presents no
problem since the access point itself will be unable to
receive more than one message at a time and will
ignore whichever began second.
Luis Corrales, PhD EPN-DACI
154
Star
155
Tree
As in wired networks, wireless networks can be
organized into a tree topology.
Each field unit is configured to a network that
is connected to a specific switch/access point. That
access pointis then hierarchically connected to
another access point closer to the wired network.
156
Tree
157
Mesh
The newest and most revolutionary form of network is
called a mesh. In a mesh network each station is both
an end device and a network forwarding element.
Mesh networks are naturally self-healing and
redundant exactly the property needed for
industrial automation networks.
In a mesh network, each station is responsible for
forwarding a network transmission not intended for
itself to other stations within its radio range.
158
Mesh
Those stations, in turn, send the transmission
to at least one other station within its radio range, as
illustrated in the next Figure.
Therefore, the network becomes very redundant,
fault-tolerant, and extended in range. The drawback
is that each station must remove redundant
messages.
159
Mesh
160
Mesh
Since mesh networks that are intended for industrial
automation tend to have 256 or fewer nodes, routing
tables can be small and the routing simple. Routing
tables need to be updated when new nodes appear in
the mesh or for any reason fail to respond to
forwarded messages.
Mesh networks are not new. The Internet itself is a
very large wired mesh network with very complex
routing algorithms.
Since IP addresses do not imply anything about
location, messages routed on the Internet hop from
one node to another that is (hopefully) closer to the
desired destination. Luis Corrales, PhD EPN-DACI
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180