𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4 (Wireless Communications and Mobile Computing)

✍ Scribed by Jelena Misic, Vojislav Misic


Year
2008
Tongue
English
Leaves
337
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.Β Wireless Personal Area Networks:Provides a comprehensive, in-depth look at the issues surrounding WPAN network operation and performance.Investigates multi-cluster networks and compares how they can be implemented.Analyzes the performance of a single cluster under different traffic and power management regimes including uplink vs. downlink traffic, acknowledged vs. unacknowledged traffic, saturation vs. non-saturation, and the like.Discusses security issues in WPANs such as different security threats, their impact on performance, standard security mechanisms, and security policies.Compares the IEEE 802.15.4 standard with the related Bluetooth IEEE 802.15.1 standard in terms of suitability for implementing wireless sensor networks.This reference is a valuable tool for developers and researchers getting acquainted with various aspects of IEEE 802.15.4 technology. Graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory will also find this book very insightful.

✦ Table of Contents


Wireless Personal Area Networks......Page 3
Contents......Page 9
About the Series Editors......Page 13
List of Figures......Page 15
List of Tables......Page 19
Preface......Page 21
Part I WPANS and 802.15.4......Page 25
1.1 Wireless Ad Hoc Networks......Page 27
1.2 Design Goals for the MAC Protocol......Page 28
1.3 Classification of MAC Protocols for Ad Hoc Networks......Page 30
1.4 Contention-Based MAC Protocols......Page 33
1.6 Sensor Networks......Page 36
2.1 Physical Layer Characteristics......Page 41
2.2 Star Topology and Beacon Enabled Operation......Page 44
2.3 Slotted CSMA-CA Medium Access......Page 46
2.4 Acknowledging Successful Transmissions......Page 48
2.5 Downlink Communication in Beacon Enabled Mode......Page 49
2.6 Guaranteed Time Slots......Page 52
2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation......Page 53
2.8 Device Functionality and Cluster Formation......Page 55
2.9 Format of the PHY and MAC frames......Page 59
Part II Single-Cluster Networks......Page 63
3.1 The System Model – Preliminaries......Page 65
3.2 Superframe with an Active Period Only......Page 68
3.3 Superframe with Both Active and Inactive Periods......Page 75
3.4 Probability Distribution of the Packet Service Time......Page 81
3.5 Probability Distribution of the Queue Length......Page 83
3.6 Access Delay......Page 85
3.7 Performance Results......Page 89
4.1 The System Model......Page 95
4.2 Modeling the Behavior of the Medium......Page 108
4.3 Probability Distribution for the Packet Service Time......Page 110
4.4 Performance of the Cluster with Bidirectional Traffic......Page 115
5.1 Congestion of Packets Deferred to the Next Superframe......Page 119
5.2 Congestion after the Inactive Period......Page 122
5.3 Congestion of Uplink Data Requests......Page 123
5.4 Blocking of Uplink Data and Data Requests......Page 124
5.5 Possible Remedies......Page 126
6.1 The Need for Activity Management......Page 135
6.2 Analysis of Activity Management......Page 136
6.3 Analysis of the Impact of MAC and PHY Layers......Page 140
6.4 Controlling the Event Sensing Reliability......Page 145
6.5 Activity Management Policy......Page 147
7.1 The Need for Admission Control......Page 155
7.2 Performance under Asymmetric Packet Arrival Rates......Page 157
7.3 Calculating the Admission Condition......Page 159
7.4 Performance of Admission Control......Page 163
Part II Summary and Further Reading......Page 167
Part III Multi-cluster Networks......Page 169
8 Cluster Interconnection with Master-Slave Bridges......Page 171
8.1 Analysis of Bridge Operation......Page 173
8.2 Markov Chain Model for a Single Node......Page 182
8.3 Performance of the Network......Page 189
8.4 Network with a Single Source Cluster/Bridge......Page 190
8.5 Network with Two Source Clusters/Bridges......Page 197
8.6 Modeling the Transmission Medium and Packet Service Times......Page 203
9.1 Modeling the Clusters......Page 211
9.2 Distributed Activity Management......Page 214
9.3 Energy Consumption in Interconnected Clusters......Page 218
9.4 Performance of Activity Management......Page 222
10 Cluster Interconnection with Slave-Slave Bridges......Page 227
10.1 Operation of the SS Bridge......Page 229
10.2 Markov Chain Model for the SS Bridge......Page 241
10.3 Markov Chain for Non-Bridge Nodes......Page 248
10.4 Performance Evaluation......Page 254
10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge......Page 255
10.6 Thou Shalt Not Acknowledge: The GTS Bridge......Page 258
10.7 Modeling the Transmission Medium and Packet Service Times......Page 264
Part III Summary and Further Reading......Page 275
Part IV Security......Page 277
11 Security in 802.15.4 Speci.cation......Page 279
11.1 Security Services......Page 280
11.2 Auxiliary Security Header......Page 281
11.3 Securing and Unsecuring Frames......Page 282
11.4 Attacks......Page 284
12 The Cost of Secure and Reliable Sensing......Page 289
12.1 Analytical Model of a Generic Key Update Algorithm......Page 291
12.2 Analysis of the Node Buffer......Page 297
12.3 Success Probabilities......Page 300
12.4 Key Update in a Multi-Cluster Network......Page 302
12.5 Cluster Lifetime......Page 304
12.6 Evaluation of Lifetimes and Populations......Page 307
Part IV Summary and Further Reading......Page 311
Appendices......Page 313
A.1 ZigBee Functionality......Page 315
A.2 Device Roles......Page 316
A.3 Network Topologies and Routing......Page 317
A.4 Security......Page 319
Appendix B Probability Generating Functions and Laplace Transforms......Page 325
Bibliography......Page 327
Index......Page 335


πŸ“œ SIMILAR VOLUMES


Wireless Personal Area Networks: Perform
✍ Jelena Misic, Vojislav Misic πŸ“‚ Library πŸ“… 2008 πŸ› Wiley 🌐 English

This is a refreshingly new reference for system engineers and architects who are designing and implementing wireless personal area network (PAN). I enjoyed reading the book. My favorite chapters: Chap. 5: MAC Layer Performance Limitations; Chap. 6: Activity Management through Bernoulli Scheduling;

Wireless Personal Area Networks: Perform
✍ Jelena Misic, Vojislav Misic πŸ“‚ Library πŸ“… 2008 πŸ› Wiley 🌐 English

Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability

Wireless Personal Area Networks: Perform
✍ Jelena Misic, Vojislav Misic πŸ“‚ Library πŸ“… 2008 πŸ› Wiley 🌐 English

Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability of

Wireless Personal Area Networks: Perform
✍ Roger L. Freeman πŸ“‚ Library πŸ“… 2008 πŸ› Wiley 🌐 English

Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability

Wireless Personal Area Networks: Perform
✍ Jelena Misic, Vojislav Misic πŸ“‚ Library πŸ“… 2008 πŸ› Wiley 🌐 English

Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability