Provides a comprehensive, in-depth look at the issues surrounding IEEE 802.15.4 network operation and performance. This book provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It also assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.…mehr
Provides a comprehensive, in-depth look at the issues surrounding IEEE 802.15.4 network operation and performance. This book provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It also assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions. Includes a mathematical analysis of the results of published research from the last three years using the framework of Markov chain modeling for students studying courses in performance evaluation and wireless communication networks Compares several ways in which interconnecting single cluster networks to form multi-cluster networks can be implemented and multi-cluster lifetime extended. Discusses security issues in WPANs with in-depth analysis of different security threats, their impact on performance, standard security mechanisms, and security policies Compares the IEEE 802.15.4 standard with the related Bluetooth 802.15.1 standard in terms of suitability for implementing wireless sensor networks. A "must read" for developers and researchers getting acquainted with various aspects of 802.15.4 technology and graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dr. Jelena V. Misic, University of Manitoba, Canada An associate Professor in the Department of Computer Science at the University of Manitoba, Canada, Dr. Misic's research interests include wireless sensor networks, WPLANs, WLANs, AD-HOC networks, mesh networks, network security and performance evaluation. Misic has won several awards including Best Paper of the Workshop award at the Proc. HWISE 2005 workshop in the IEEE ICPADS 2005 conference, Fukuoka, Japan. Dr. Misic is also the author of Performance Modeling and Analysis of Bluetooth Networks (crc Press 2005) as well as numerous book chapters and journal papers. Dr. Vojislav B. Misic, University of Manitoba, Canada Dr. Misic is an Associate Professor with Tenure in the Department of Computer Science at the University of Manitoba, Canada with research interests including service based computing, performance analysis of wireless ad-hoc and sensor networks, and software engineering. The co-author of several books in Serbian and Performance Modeling and Analysis of Bluetooth Networks (crc Press 2005), Dr Misic has also contributed chapters to other books and published numerous journal and conference papers.
Inhaltsangabe
About the Series Editors xi List of Figures xiii List of Tables xvii Preface xix Part I WPANS and 802.15.4 1 1 Prologue: Wireless Personal Area Networks 3 1.1 Wireless Ad Hoc Networks 3 1.2 Design Goals for the MAC Protocol 4 1.3 Classification of MAC Protocols for Ad Hoc Networks 6 1.4 Contention-Based MAC Protocols 9 1.5 New Kinds of Ad Hoc Networks 12 1.6 Sensor Networks 12 2 Operation of the IEEE 802.15.4 Network 17 2.1 Physical Layer Characteristics 17 2.2 Star Topology and Beacon Enabled Operation 20 2.3 Slotted CSMA-CA Medium Access 22 2.4 Acknowledging Successful Transmissions 24 2.5 Downlink Communication in Beacon Enabled Mode 25 2.6 Guaranteed Time Slots 28 2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation 29 2.8 Device Functionality and Cluster Formation 31 2.9 Format of the PHY and MAC frames 35 Part II Single-Cluster Networks 39 3 Cluster with Uplink Traffic 41 3.1 The System Model - Preliminaries 41 3.2 Superframe with an Active Period Only 44 3.3 Superframe with Both Active and Inactive Periods 51 3.4 Probability Distribution of the Packet Service Time 57 3.5 Probability Distribution of the Queue Length 59 3.6 Access Delay 61 3.7 Performance Results 65 4 Cluster with Uplink and Downlink Traffic 71 4.1 The System Model 71 4.2 Modeling the Behavior of the Medium 84 4.3 Probability Distribution for the Packet Service Time 86 4.4 Performance of the Cluster with Bidirectional Traffic 91 5 MAC Layer Performance Limitations 95 5.1 Congestion of Packets Deferred to the Next Superframe 95 5.2 Congestion after the Inactive Period 98 5.3 Congestion of Uplink Data Requests 99 5.4 Blocking of Uplink Data and Data Requests 100 5.5 Possible Remedies 102 6 Activity Management through Bernoulli Scheduling 111 6.1 The Need for Activity Management 111 6.2 Analysis of Activity Management 112 6.3 Analysis of the Impact of MAC and PHY Layers 116 6.4 Controlling the Event Sensing Reliability 121 6.5 Activity Management Policy 123 7 Admission Control Issues 131 7.1 The Need for Admission Control 131 7.2 Performance under Asymmetric Packet Arrival Rates 133 7.3 Calculating the Admission Condition 135 7.4 Performance of Admission Control 139 Part II Summary and Further Reading 143 Part IIIMulti-cluster Networks 145 8 Cluster Interconnection with Master-Slave Bridges 147 8.1 Analysis of Bridge Operation 149 8.2 Markov Chain Model for a Single Node 158 8.3 Performance of the Network 165 8.4 Network with a Single Source Cluster/Bridge 166 8.5 Network with Two Source Clusters/Bridges 173 8.6 Modeling the Transmission Medium and Packet Service Times 179 9 Equalization of Cluster Lifetimes 187 9.1 Modeling the Clusters 187 9.2 Distributed Activity Management 190 9.3 Energy Consumption in Interconnected Clusters 194 9.4 Performance of Activity Management 198 10 Cluster Interconnection with Slave-Slave Bridges 203 10.1 Operation of the SS Bridge 205 10.2 Markov Chain Model for the SS Bridge 217 10.3 Markov Chain for Non-Bridge Nodes 224 10.4 Performance Evaluation 230 10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge 231 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 234 10.7 Modeling the Transmission Medium and Packet Service Times 240 Part III Summary and Further Reading 251 Part IV Security 253 11 Security in 802.15.4 Specification 255 11.1 Security Services 256 11.2 Auxiliary Security Header 257 11.3 Securing and Unsecuring Frames 258 11.4 Attacks 260 12 The Cost of Secure and Reliable Sensing 265 12.1 Analytical Model of a Generic Key Update Algorithm 267 12.2 Analysis of the Node Buffer 273 12.3 Success Probabilities 276 12.4 Key Update in a Multi-Cluster Network 278 12.5 Cluster Lifetime 280 12.6 Evaluation of Lifetimes and Populations 283 Part IV Summary and Further Reading 287 Appendices 289 Appendix A An Overview of ZigBee 291 A.1 ZigBee Functionality 291 A.2 Device Roles 292 A.3 Network Topologies and Routing 293 A.4 Security 295 Appendix B Probability Generating Functions and Laplace Transforms 301 Bibliography 302 Index 311
About the Series Editors xi List of Figures xiii List of Tables xvii Preface xix Part I WPANS and 802.15.4 1 1 Prologue: Wireless Personal Area Networks 3 1.1 Wireless Ad Hoc Networks 3 1.2 Design Goals for the MAC Protocol 4 1.3 Classification of MAC Protocols for Ad Hoc Networks 6 1.4 Contention-Based MAC Protocols 9 1.5 New Kinds of Ad Hoc Networks 12 1.6 Sensor Networks 12 2 Operation of the IEEE 802.15.4 Network 17 2.1 Physical Layer Characteristics 17 2.2 Star Topology and Beacon Enabled Operation 20 2.3 Slotted CSMA-CA Medium Access 22 2.4 Acknowledging Successful Transmissions 24 2.5 Downlink Communication in Beacon Enabled Mode 25 2.6 Guaranteed Time Slots 28 2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation 29 2.8 Device Functionality and Cluster Formation 31 2.9 Format of the PHY and MAC frames 35 Part II Single-Cluster Networks 39 3 Cluster with Uplink Traffic 41 3.1 The System Model - Preliminaries 41 3.2 Superframe with an Active Period Only 44 3.3 Superframe with Both Active and Inactive Periods 51 3.4 Probability Distribution of the Packet Service Time 57 3.5 Probability Distribution of the Queue Length 59 3.6 Access Delay 61 3.7 Performance Results 65 4 Cluster with Uplink and Downlink Traffic 71 4.1 The System Model 71 4.2 Modeling the Behavior of the Medium 84 4.3 Probability Distribution for the Packet Service Time 86 4.4 Performance of the Cluster with Bidirectional Traffic 91 5 MAC Layer Performance Limitations 95 5.1 Congestion of Packets Deferred to the Next Superframe 95 5.2 Congestion after the Inactive Period 98 5.3 Congestion of Uplink Data Requests 99 5.4 Blocking of Uplink Data and Data Requests 100 5.5 Possible Remedies 102 6 Activity Management through Bernoulli Scheduling 111 6.1 The Need for Activity Management 111 6.2 Analysis of Activity Management 112 6.3 Analysis of the Impact of MAC and PHY Layers 116 6.4 Controlling the Event Sensing Reliability 121 6.5 Activity Management Policy 123 7 Admission Control Issues 131 7.1 The Need for Admission Control 131 7.2 Performance under Asymmetric Packet Arrival Rates 133 7.3 Calculating the Admission Condition 135 7.4 Performance of Admission Control 139 Part II Summary and Further Reading 143 Part IIIMulti-cluster Networks 145 8 Cluster Interconnection with Master-Slave Bridges 147 8.1 Analysis of Bridge Operation 149 8.2 Markov Chain Model for a Single Node 158 8.3 Performance of the Network 165 8.4 Network with a Single Source Cluster/Bridge 166 8.5 Network with Two Source Clusters/Bridges 173 8.6 Modeling the Transmission Medium and Packet Service Times 179 9 Equalization of Cluster Lifetimes 187 9.1 Modeling the Clusters 187 9.2 Distributed Activity Management 190 9.3 Energy Consumption in Interconnected Clusters 194 9.4 Performance of Activity Management 198 10 Cluster Interconnection with Slave-Slave Bridges 203 10.1 Operation of the SS Bridge 205 10.2 Markov Chain Model for the SS Bridge 217 10.3 Markov Chain for Non-Bridge Nodes 224 10.4 Performance Evaluation 230 10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge 231 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 234 10.7 Modeling the Transmission Medium and Packet Service Times 240 Part III Summary and Further Reading 251 Part IV Security 253 11 Security in 802.15.4 Specification 255 11.1 Security Services 256 11.2 Auxiliary Security Header 257 11.3 Securing and Unsecuring Frames 258 11.4 Attacks 260 12 The Cost of Secure and Reliable Sensing 265 12.1 Analytical Model of a Generic Key Update Algorithm 267 12.2 Analysis of the Node Buffer 273 12.3 Success Probabilities 276 12.4 Key Update in a Multi-Cluster Network 278 12.5 Cluster Lifetime 280 12.6 Evaluation of Lifetimes and Populations 283 Part IV Summary and Further Reading 287 Appendices 289 Appendix A An Overview of ZigBee 291 A.1 ZigBee Functionality 291 A.2 Device Roles 292 A.3 Network Topologies and Routing 293 A.4 Security 295 Appendix B Probability Generating Functions and Laplace Transforms 301 Bibliography 302 Index 311
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu