Cover image for Wireless personal area networks : performance, interconnections and security with IEEE 802.15.4
Title:
Wireless personal area networks : performance, interconnections and security with IEEE 802.15.4
Personal Author:
Series:
Wiley series on wireless communications and mobile computing
Publication Information:
Chichester, England : Wiley, 2008
ISBN:
9780470518472
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010169215 TK5103.485 M57 2008 Open Access Book Book
Searching...
Searching...
30000010191453 TK5103.485 M57 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.

Wireless Personal Area Networks:

Provides a comprehensive, in-depth look at the issues surrounding WPAN network operation and performance. Investigates multi-cluster networks and compares how they can be implemented. Analyzes the performance of a single cluster under different traffic and power management regimes including uplink vs. downlink traffic, acknowledged vs. unacknowledged traffic, saturation vs. non-saturation, and the like. Discusses security issues in WPANs such as different security threats, their impact on performance, standard security mechanisms, and security policies. Compares the IEEE 802.15.4 standard with the related Bluetooth IEEE 802.15.1 standard in terms of suitability for implementing wireless sensor networks.

This reference is a valuable tool for developers and researchers getting acquainted with various aspects of IEEE 802.15.4 technology. Graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory will also find this book very insightful.


Author Notes

Dr. Jelena V. Misic, University of Manitoba, Canada
An associate Professor in the Department of Computer Science at the University of Manitoba, Canada, Dr. Misic's research interests include wireless sensor networks, WPLANs, WLANs, AD-HOC networks, mesh networks, network security and performance evaluation. Misic has won several awards including Best Paper of the Workshop award at the Proc. HWISE 2005 workshop in the IEEE ICPADS 2005 conference, Fukuoka, Japan. Dr. Misic is also the author of Performance Modeling and Analysis of Bluetooth Networks (crc Press 2005) as well as numerous book chapters and journal papers.

Dr. Vojislav B. Misic , University of Manitoba, Canada
Dr. Misic is an Associate Professor with Tenure in the Department of Computer Science at the University of Manitoba, Canada with research interests including service based computing, performance analysis of wireless ad-hoc and sensor networks, and software engineering. The co-author of several books in Serbian and Performance Modeling and Analysis of Bluetooth Networks (crc Press 2005), Dr Misic has also contributed chapters to other books and published numerous journal and conference papers.


Table of Contents

About the Series Editorsp. xi
List of Figuresp. xiii
List of Tablesp. xvii
Prefacep. xix
Part I WPANS and 802.15.4p. 1
1 Prologue: Wireless Personal Area Networksp. 3
1.1 Wireless Ad Hoc Networksp. 3
1.2 Design Goals for the MAC Protocolp. 4
1.3 Classification of MAC Protocols for Ad Hoc Networksp. 6
1.4 Contention-Based MAC Protocolsp. 9
1.5 New Kinds of Ad Hoc Networksp. 12
1.6 Sensor Networksp. 12
2 Operation of the IEEE 802.15.4 Networkp. 17
2.1 Physical Layer Characteristicsp. 17
2.2 Star Topology and Beacon Enabled Operationp. 20
2.3 Slotted CSMA-CA Medium Accessp. 22
2.4 Acknowledging Successful Transmissionsp. 24
2.5 Downlink Communication in Beacon Enabled Modep. 25
2.6 Guaranteed Time Slotsp. 28
2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operationp. 29
2.8 Device Functionality and Cluster Formationp. 31
2.9 Format of the PHY and MAC framesp. 35
Part II Single-Cluster Networksp. 39
3 Cluster with Uplink Trafficp. 41
3.1 The System Model - Preliminariesp. 41
3.2 Superframe with an Active Period Onlyp. 44
3.3 Superframe with Both Active and Inactive Periodsp. 51
3.4 Probability Distribution of the Packet Service Timep. 57
3.5 Probability Distribution of the Queue Lengthp. 59
3.6 Access Delayp. 61
3.7 Performance Resultsp. 65
4 Cluster with Uplink and Downlink Trafficp. 71
4.1 The System Modelp. 71
4.2 Modeling the Behavior of the Mediump. 84
4.3 Probability Distribution for the Packet Service Timep. 86
4.4 Performance of the Cluster with Bidirectional Trafficp. 91
5 MAC Layer Performance Limitationsp. 95
5.1 Congestion of Packets Deferred to the Next Superframep. 95
5.2 Congestion after the Inactive Periodp. 98
5.3 Congestion of Uplink Data Requestsp. 99
5.4 Blocking of Uplink Data and Data Requestsp. 100
5.5 Possible Remediesp. 102
6 Activity Management through Bernoulli Schedulingp. 111
6.1 The Need for Activity Managementp. 111
6.2 Analysis of Activity Managementp. 112
6.3 Analysis of the Impact of MAC and PHY Layersp. 116
6.4 Controlling the Event Sensing Reliabilityp. 121
6.5 Activity Management Policyp. 123
7 Admission Control Issuesp. 131
7.1 The Need for Admission Controlp. 131
7.2 Performance under Asymmetric Packet Arrival Ratesp. 133
7.3 Calculating the Admission Conditionp. 135
7.4 Performance of Admission Controlp. 139
Part II Summary and Further Readingp. 143
Part III Multi-cluster Networksp. 145
8 Cluster Interconnection with Master-Slave Bridgesp. 147
8.1 Analysis of Bridge Operationp. 149
8.2 Markov Chain Model for a Single Nodep. 158
8.3 Performance of the Networkp. 165
8.4 Network with a Single Source Cluster/Bridgep. 166
8.5 Network with Two Source Clusters/Bridgesp. 173
8.6 Modeling the Transmission Medium and Packet Service Timesp. 179
9 Equalization of Cluster Lifetimesp. 187
9.1 Modeling the Clustersp. 187
9.2 Distributed Activity Managementp. 190
9.3 Energy Consumption in Interconnected Clustersp. 194
9.4 Performance of Activity Managementp. 198
10 Cluster Interconnection with Slave-Slave Bridgesp. 203
10.1 Operation of the SS Bridgep. 205
10.2 Markov Chain Model for the SS Bridgep. 217
10.3 Markov Chain for Non-Bridge Nodesp. 224
10.4 Performance Evaluationp. 230
10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridgep. 231
10.6 Thou Shalt Not Acknowledge: The GTS Bridgep. 234
10.7 Modeling the Transmission Medium and Packet Service Timesp. 240
Part III Summary and Further Readingp. 251
Part IV Securityp. 253
11 Security in 802.15.4 Specificationp. 255
11.1 Security Servicesp. 256
11.2 Auxiliary Security Headerp. 257
11.3 Securing and Unsecuring Framesp. 258
11.4 Attacksp. 260
12 The Cost of Secure and Reliable Sensingp. 265
12.1 Analytical Model of a Generic Key Update Algorithmp. 267
12.2 Analysis of the Node Bufferp. 273
12.3 Success Probabilitiesp. 276
12.4 Key Update in a Multi-Cluster Networkp. 278
12.5 Cluster Lifetimep. 280
12.6 Evaluation of Lifetimes and Populationsp. 283
Part IV Summary and Further Readingp. 287
Appendicesp. 289
Appendix A An Overview of ZigBeep. 291
A.1 ZigBee Functionalityp. 291
A.2 Device Rolesp. 292
A.3 Network Topologies and Routingp. 293
A.4 Securityp. 295
Appendix B Probability Generating Functions and Laplace Transformsp. 301
Bibliographyp. 302
Indexp. 311