1 / 98

83180 Wireless LANs - 9.3. 2005 LR-WPAN Low-Rate Wireless Personal Area Networks

Coexistence Among Wireless Standards. Toni HuovinenLauri AnttilaJarno NiemelTero Isotalo9.3.2005. 3. Introduction. Both WLAN and WPAN operate in the same ISM bandmutual interference between the systemssevere performance degradations are possibleMany factors effect the level of interference

odell
Download Presentation

83180 Wireless LANs - 9.3. 2005 LR-WPAN Low-Rate Wireless Personal Area Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. 83180 Wireless LANs - 9.3. 2005 LR-WPAN Low-Rate Wireless Personal Area Networks Toni Huovinen: Coexistence Among Wireless Standards Lauri Anttila: IEEE 802.15.4 Low-Rate WPAN - Overview Jarno Niemelä: IEEE 802.15.4 MAC for LR-WPAN applications Tero Isotalo: Low-Rate WPAN Examples, Trends and Products

    2. Coexistence Among Wireless Standards Toni Huovinen Lauri Anttila Jarno Niemelä Tero Isotalo 9.3.2005

    3. 3 Introduction Both WLAN and WPAN operate in the same ISM band mutual interference between the systems severe performance degradations are possible Many factors effect the level of interference the distance between the WLAN and WPAN devices the amount of data traffic flowing over each of the two networks the power levels of the various devices the data rate of the WLAN types of information being sent over the wireless networks Performance degradations might discourage consumers to use more wireless devices

    4. 4 Introduction (cont’d) If nothing is done devices that transmit with relatively higher power or more interference resistant protocols get their data through where as the other devices suffers Coexistence is defined as ability of one system to operate in shared environment. Good coexistence policy is such that it do not increase an interference to other systems using the same wireless channel.

    5. 5 IEEE 802.15.2 IEEE 802.15 working group released a recommended practice ‘IEEE 802.15.2 – Coexistence of Wireless Personal Area Networks with Other Wireless Devices Operating in Unlicensed Frequency Band’ in 2003. IEEE 802.15.2 defines coexistence methods for an IEEE 802.15 WPAN to operate in the presence of frequency static or slow-hopping WLAN devices Basically the scope of IEEE 802.15.2 is limited to coexistence of Bluetooth/IEEE 802.15.1 devices and IEEE 802.11b devices. It was expected that devices using these standards will have the largest market share among devices using 2.4 GHz ISM band Some of the proposed coexistence methods can be used also with other WPAN and WLAN standards.

    6. 6 IEEE 802.15.2 (cont’d) There are two categories of coexistence methods: Collaborative methods Exchange information between WPAN and WLAN network. A wired communication link between system is needed. Applicable only if WPAN master and WLAN station are located in the same physical equipment (like laptop). Three different methods are defined. Non-collaborative methods Do not exchange information between two wireless networks. WPAN and WLAN devices do not have to be in the same equipment. Five different methods defined. It is possible to use several coexistence methods at the same time These coexistence mechanisms are only applicable after a WLAN or WPAN are established and user data is to be sent. They do not help in the process for establishing a WLAN or WPANThese coexistence mechanisms are only applicable after a WLAN or WPAN are established and user data is to be sent. They do not help in the process for establishing a WLAN or WPAN

    7. 7 Collaborative methods

    8. 8 Alternating wireless medium access (AWMA) AWMA is collaborative time division method. Recall that IEEE 802.11b station sends a beacon roughly periodically. In AWMA, part of each beacon period is allocated for WLAN traffic and rest for WPAN traffic. Lengths of these periods are included in the beacon. Synchronization between WPAN and WLAN devices is needed. One WLAN station and WPAN master need wired connection. WLAN station sends a synchronization signal to WPAN master via this connection.

    9. 9 Alternating wireless medium access (Cont’d) Recall that Bluetooth/IEEE 802.15.1 use either ACL or SCO connection. AWMA is suitable only for ACL connections. AWMA can prevent interference between WPAN devices in one piconet and all WLAN (IEEE 802.11b) devices connected to same access point (AP) than the one which have physically co-located with WPAN master. Interference between WLAN devices that are connected to some other AP is prevented only if the APs are synchronized. AWMA is quite ineffective in the sense that transmissions of one system are not allowed during the “empty” time windows reserved for the other system. In ACL connections a packet flow is fully controlled by master device, and especially a slave is allowed to start sending an ACL packet in some time slot only if it have first received an ACL packet from the master in the previous time slot. Consequently, the master in piconet can ensure that slaves are transmitting only during time periods reserved for WPAN devices. In practice, this means that the master sends ACL packets only, if there is enough time left in the current WPAN time window for slave to reply with a maximum length ACL packet. SCO connections are mainly meant for live audio traffic. In these connections, a WPAN device sends typically a long flow of SCO packets, such that each packet is sent on a regular basis with a fixed period. (A length of one SCO packet and time gap between consecutive packets depends on used SCO packet type.) In practice, the time windows reserved for WLAN traffic are a way longer than duration of SCO packets and time gap between them, and therefore significant part of SCO data flow would fall into WLAN time windows. On the other hand, the transmitting WPAN device can not hold transmission during the (relatively long) WLAN time windows, because of the nature of data being transmitted via SCO connections. For this reason AWMA is not suitable for SCO connections. The reason why AWMA can prevent interference between WPAN devices in one piconet and all WLAN (IEEE 802.11b) devices connected to same access point (AP) than the one which have physically co-located with WPAN master is that all of these WLAN devices are synchronized i.e. they share a beacon, and thus have a same beacon periods. Similarly, if there are WLAN devices connected to different APs present and APs are synchronized, all the devices have same beacon periods. IEEE 802.15.2 co-existence standard do not give any methods for this AP synchronization. The standard do not deal, either, with case of several WPAN piconets being in the same area with one WLAN network. However, AWMA can be naturally used also then if each WPAN masters is co-located with some WLAN station and share a wired communication link with it.In ACL connections a packet flow is fully controlled by master device, and especially a slave is allowed to start sending an ACL packet in some time slot only if it have first received an ACL packet from the master in the previous time slot. Consequently, the master in piconet can ensure that slaves are transmitting only during time periods reserved for WPAN devices. In practice, this means that the master sends ACL packets only, if there is enough time left in the current WPAN time window for slave to reply with a maximum length ACL packet. SCO connections are mainly meant for live audio traffic. In these connections, a WPAN device sends typically a long flow of SCO packets, such that each packet is sent on a regular basis with a fixed period. (A length of one SCO packet and time gap between consecutive packets depends on used SCO packet type.) In practice, the time windows reserved for WLAN traffic are a way longer than duration of SCO packets and time gap between them, and therefore significant part of SCO data flow would fall into WLAN time windows. On the other hand, the transmitting WPAN device can not hold transmission during the (relatively long) WLAN time windows, because of the nature of data being transmitted via SCO connections. For this reason AWMA is not suitable for SCO connections. The reason why AWMA can prevent interference between WPAN devices in one piconet and all WLAN (IEEE 802.11b) devices connected to same access point (AP) than the one which have physically co-located with WPAN master is that all of these WLAN devices are synchronized i.e. they share a beacon, and thus have a same beacon periods. Similarly, if there are WLAN devices connected to different APs present and APs are synchronized, all the devices have same beacon periods. IEEE 802.15.2 co-existence standard do not give any methods for this AP synchronization. The standard do not deal, either, with case of several WPAN piconets being in the same area with one WLAN network. However, AWMA can be naturally used also then if each WPAN masters is co-located with some WLAN station and share a wired communication link with it.

    10. 10 Packet traffic arbitration (PTA) This method can be used in case that coexisting WLAN device and WPAN device are in the same equipment. Both devices are connected to packet traffic arbitrator (PTA-block). Before a device can send a packet it must request a approval for transmission from PTA-block. If the transmission do not results in a collision, PTA-block grants the approval. If both devices send their requests (almost) simultaneously, the one with higher priority is approved to transmit and the other have to wait. Notice, that this method prevents interference only between physically co-located devices, not between all WPAN devices in one piconet and WLAN devices connected to same AP. PTA does not replace CSMA/CA-procedure of IEEE 802.11b WLAN, but takes place after the CSMA/CA. Thus when WLAN device sends a PTA request, it has already made sure that other WLAN devices are not transmitting at same time.Notice, that this method prevents interference only between physically co-located devices, not between all WPAN devices in one piconet and WLAN devices connected to same AP. PTA does not replace CSMA/CA-procedure of IEEE 802.11b WLAN, but takes place after the CSMA/CA. Thus when WLAN device sends a PTA request, it has already made sure that other WLAN devices are not transmitting at same time.

    11. 11 PTA (Cont’d) Priorities can be selected deterministically IEEE 802.11b ACK packet (highest) IEEE 802.15.1 SCO packet IEEE 802.11b data packet IEEE 802.15.1 ACL packet (lowest) or in random manner or using some other fairness criteria. This method can be used also with SCO links. And it is also more efficient than previous method. (No need to wait own time window unless collisions are occurring.) Random priority assignment given in IEEE 802.15.2 is as follows: priority ‘2’ is assigned to IEEE 802.11b packet with probability p and priority ‘0’ with probability 1-p. All IEEE 802.15.1 packets have priority ‘1’.Random priority assignment given in IEEE 802.15.2 is as follows: priority ‘2’ is assigned to IEEE 802.11b packet with probability p and priority ‘0’ with probability 1-p. All IEEE 802.15.1 packets have priority ‘1’.

    12. 12 Deterministic interference suppression Recall, that Frequency hopping bandwidth of Bluetooth/IEEE 802.15.1 is roughly 1 MHz. Thus, it can be considered as a narrowband interference to IEEE 802.11b (or other frequency static or slow-hopping) WLAN devices. WLAN receiver can mitigate this narrowband interferer by programmable notch filter whose stop band of ~1 MHz is hopping according to hopping process of WPAN device. WLAN device must have an integrated WPAN unit which provides frequency hopping information of interfering WPAN transmission. This method works purely on physical layer and mitigates only interference caused by WPAN devices to WLAN devices.

    13. 13 Non-collaborative methods

    14. 14 Adaptive Interference Suppression This co-existence method is similar to Deterministic Interference Suppression However, now WLAN device do not need explicit knowledge of FH pattern nor timing of frequency hopping WPAN interferer WLAN transmitter uses adaptive signal processing methods to estimate the location of narrowband interference caused by WPAN and then filter out those frequencies. Also this method works purely on physical layer and mitigates only interference caused by WPAN devices to WLAN devices.

    15. 15 Adaptive Interference Suppression (Cont’d) Block diagram of adaptive interference suppression structure. The adaptive filter uses the uncorrelated nature of the wideband IEEE 802.11 signal to predict the unwanted narrowband IEEE 802.15.1 signal. Block diagram of adaptive interference suppression structure. The adaptive filter uses the uncorrelated nature of the wideband IEEE 802.11 signal to predict the unwanted narrowband IEEE 802.15.1 signal.

    16. 16 Adaptive packet selection Recall that Bluetooth/IEEE 802.15.1 defines various packet types for both ACL and SCL connections Packet types differ especially in the FEC code used and the amount of channel occupied The basic idea in ‘Adaptive Packet Selection’ is to dynamically select packet types, given either an ACL or SCO link, such that maximal total network capacity is achieved. E.g. if WPAN connection is range limited (rather than interference limited), packet types with stronger FEC coding provide better throughput. SCO packet types are preferred in order HV1, HV2 and HV3 ACL packet types DM1, DM2, DM5 are preferred over DH1, DH2 and DH5 In range limited connection, the background noise is the main limiting factor. Thus in that case FEC coding helps to achieve better throughput, since bit errors have random nature.In range limited connection, the background noise is the main limiting factor. Thus in that case FEC coding helps to achieve better throughput, since bit errors have random nature.

    17. 17 Adaptive packet selection (Cont’d) In turn, if WPAN connection is interference limited, FEC coding does not help that much WPAN throughput, but cause more interference to WLAN. SCO packet types are preferred in order HV3, HV2 and HV1. ACL packet types DH1, DH2, DH5 are preferred over DM1, DM2 and DM5. WPAN device can determine the limiting factor by monitoring RSSI (received signal strength indication) and BER (bit error rate) Low RSSI value (and BER) indicates range (noise) limited channel High RSSI value together with high BER indicates interference limited channel In interference limited cases, bit errors tend to have some non-random structure and, for that reason FEC coding does not help much. However, FEC coding always increase the amount of data needed to be sent and, in that way, also the interference to other system is increased.In interference limited cases, bit errors tend to have some non-random structure and, for that reason FEC coding does not help much. However, FEC coding always increase the amount of data needed to be sent and, in that way, also the interference to other system is increased.

    18. 18 Packet scheduling for ACL links This method consists of two parts: channel classification and master delay policy First, each Bluetooth/IEEE 802.15.1 device (adaptively) classify each of its FH channels to be ‘good’ or ‘bad’ (more on channel classification later on). Master device collects a table of channel conditions of all devices in piconet. Recall, that in ACL links all slave transmissions are always followed right after master transmission. Consequently, the master can check both the slave's receiving channel and its own receiving channel before choosing to transmit a packet in a given frequency hop. If one (or both) of the channels are marked as ‘bad’, master delays its own transmission until both channels are ‘good’. Notice, that in this coexistence method master must know channel condition table of all slaves. Consequently, an explicit message exchange between the master and the slave device may be required. Nevertheless, IEEE 802.15.2 standard do not propose how this message exchange should be organized. It is also possible to use implicit classification methods such as negative ACKs, in which cases the slave does not have to send any information about its channel classification to the master. Again, this method cannot be used with SCO links for the same reason as collaborative method ‘Alternating wireless medium access’ described earlier. Notice, that in this coexistence method master must know channel condition table of all slaves. Consequently, an explicit message exchange between the master and the slave device may be required. Nevertheless, IEEE 802.15.2 standard do not propose how this message exchange should be organized. It is also possible to use implicit classification methods such as negative ACKs, in which cases the slave does not have to send any information about its channel classification to the master. Again, this method cannot be used with SCO links for the same reason as collaborative method ‘Alternating wireless medium access’ described earlier.

    19. 19 Packet scheduling for SCO links A new SCO packet type, EV3, is proposed This packet is based on HV3 packet no FEC coding 240 bits payload one packet for every 6 slots. New features of EV3: Slave transmissions are allowed only right after master transmission. Master can selected which two consecutive time slots of six (three options) are used.

    20. 20 Packet scheduling for SCO links (Cont’d) Selection of time slots are again made according to channel classification tables such that both receiving channels (slaves and masters) are ‘good’ if possible.

    21. 21 Adaptive frequency hopping (AFH) This method is defined in IEEE 802.15.1 This method dynamically changes the FH sequence of the Bluetooth/802.15.1 system in order to avoid the interference. Global channel classification is needed. Original FH pattern is mapped to subset of channels classified to be ‘good’. The mapping is such that also a new FH pattern becomes pseudorandom.

    22. 22 AFH (Cont’d) To work properly, the method requires that there is enough ‘good’ channels. In some countries (like USA), regulatory bodies have set a minimum number of FH channels. Small number of FH channels also affect on system’s robustness. If number of ‘good’ channels is too small, some ‘bad’ channels can be included in hopping pattern. In this case QoS can be guaranteed, if SCO packets are preferred over ACL packets in allocation of ‘good’ channels.

    23. 23 Channel classification Most of non-collaborative coexistence methods needs a channel classification information. In channel classification each Bluetooth/IEEE 802.15.1 device classifies each FH channels to be either ‘good’ or ‘bad’. The major concern of the quality should be interference caused by some other system. IEEE 802.15.2 do not define exactly how this classification should be implemented, but it suggests that classification can be based e.g. on RSSI, PER or carrier sensing. RSSI = Received Signal Strength Indicator PER = Packet Error Rate RSSI = Received Signal Strength Indicator PER = Packet Error Rate

    24. 24 Channel classification (Cont’d) Since master device needs channel condition tables of its slaves, the tables can be exchanged using LMP messages. It is also possible to use implicit classification methods such as negative ACKs, in which cases the slave does not have to send any additional information to the master. Overall classification time can be reduced by grouping channels to blocks, which naturally reduce the accuracy. LMP = Link Manager Protocol ACK = AcknowledgementLMP = Link Manager Protocol ACK = Acknowledgement

    25. 25 Channel classification (Cont’d) In ‘Adaptive Frequency Hopping’ method, global state of each FH channel is needed. The master obtains it by taking a weighted average of its own channel state and all the active slaves’ channel states. Finally, a global channel state for one sub-channel is obtained by threshold comparison of the average, which have value in [0,1]. Before taking an average, channel states, values ‘bad’ or ‘good’, are naturally converted to binary values 0 and 1. If e.g. master device use some more reliable classification method than slaves, it can give more weight to its own channel state value. Before taking an average, channel states, values ‘bad’ or ‘good’, are naturally converted to binary values 0 and 1. If e.g. master device use some more reliable classification method than slaves, it can give more weight to its own channel state value.

    26. 26 Current Status of Coexistence Method Development Citation from IEEE 802.15.2 task group’s web page: “The task group is now in hibernation until further notice. ” Several vendors are developing hardware and software coexistence solutions, which are based on IEEE 802.15.2 standard. New WPAN standards (like 802.15.3 and .4) deal also with coexistence issues particular to those systems

    27. 27 References IEEE 802.15.2-2003, “IEEE Recommended Practice for Telecommunications and Information exchange between systems – Local and metropolitan area networks Specific Requirements - Part 15.2: Coexistence of Wireless Personal Area Networks with Other Wireless Devices Operating in Unlicensed Frequency Band”, IEEE, 2003. T. Cooklev, “Wireless Communication Standards, A Study of 802.11, 802.15, and 802.16”,  IEEE Press, 2004. IEEE 802.15 Working Group for WPAN, http://ieee802.org/15/index.html

    28. IEEE 802.15.4 Low-Rate WPAN - Overview Toni Huovinen Lauri Anttila Jarno Niemelä Tero Isotalo

    29. 29 Outline Introduction Standardization Device Types and Functions Network Topologies Protocol Architecture Physical Layer Power Consumption Issues References

    30. 30 802.15.4 Introduction WPAN – Wireless Personal Area Network Motivation for 802.15.4 : A standard for WPANs with Short-range RF connectivity (typ. < 10 m) Reliable transfer w/ low data rate (20-250 kb/s) Low power consumption (battery life >> 1 month) Very low cost Low complexity Applications: sensors, meter reading, smart tags /badges, light switches, home automation, interactive toys etc. - Many applications require short-range connectivity that is different from Bluetooth. - Two important parameters that Bluetooth cannot address: very low power consumption and very low cost. - Trades off data rate for longer battery life. For the simplest devices, and with careful design, battery life can exceed 10 years. - Basically, the main objective is a simple, but flexible and efficient protocol. - Many LR-WPANs already before this standard, e.g. RF Identification systems.- Many applications require short-range connectivity that is different from Bluetooth. - Two important parameters that Bluetooth cannot address: very low power consumption and very low cost. - Trades off data rate for longer battery life. For the simplest devices, and with careful design, battery life can exceed 10 years. - Basically, the main objective is a simple, but flexible and efficient protocol. - Many LR-WPANs already before this standard, e.g. RF Identification systems.

    31. 31 Introduction (cont’d) More 802.15.4 in a nutshell 802.15.4 defines Physical and MAC layers Uses the ISM bands 2.4 GHz, 915 MHz, and 868 MHz with data rates 250, 40, and 20 kb/s, respectively. Direct Sequence Spread Spectrum (DSSS) Access method is Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) Automatic network establishment by the network coordinator Supports star and peer-to-peer network topologies Network can accommodate up to 2^16 devices (cmpr to Bluetooth) 2 addressing modes: 64-bit IEEE address or 16-bit short address Support for critical latency devices, such as joysticks Aims at a certain level of coexistence w/ other standards

    32. 32 802.15.4 Standardization 802.15.4 is a recent standard, approved 12 May 2003 Original task group TG4 put to “hibernation” Currently two new task groups TG4a is developing an alternative PHY (Q2 2006 ?) High precision ranging/location capability (< 1 meter) Adding scalability to data rates Longer range (indoors 20-40 m, outdoors up to 1 km) Even lower power consumption and cost TG4b is considering specific enhancements and clarifications to the original 802.15.4-2003 standard Protocol layers above MAC are left to the manufacturers (the ZigBee Alliance) TG4a to be published in the second quarter of 2006 Will add scalability to data rates, which are now fixed at 250 / 40 / 20 kb/s Longer range: indoors 20-40 m, outdoors 300-1000 m T4Gb is “chartered to create a project for specific enhancements and clarifications to the IEEE 802.15.4-2003 standard such as resolving ambiguities, reducing unnecessary complexity, increasing flexibility in security key usage, considerations for newly available frequency allocations, and others.” TG4a to be published in the second quarter of 2006 Will add scalability to data rates, which are now fixed at 250 / 40 / 20 kb/s Longer range: indoors 20-40 m, outdoors 300-1000 m T4Gb is “chartered to create a project for specific enhancements and clarifications to the IEEE 802.15.4-2003 standard such as resolving ambiguities, reducing unnecessary complexity, increasing flexibility in security key usage, considerations for newly available frequency allocations, and others.”

    33. 33 Device can act in 3 modes: a network coordinator, a coordinator or a network device A network device can initiate or terminate communications, a coordinator can also route messages Standard defines two device types: Full-function device (FFD) Can be all of the above Reduced-function device (RFD) Can only be a network device No routing ability, and no communication between RFDs Extremely simple applications (light switch, passive sensor) Do not have to send large amounts of data Can be implemented with minimal resources & memory Devices are battery (usually) or mains powered Devices can be fixed, portable and/or moving 802.15.4 Device Types and Functions

    34. 34 802.15.4 Network Topologies - In star topology, network devices only communicate with the PAN coordinator. Communications is one-hop, so no routing actually needed. - In P2P, any device can communicate with any other device as long as they are in range of one another. Multi-hop communications possible. - Connectivity to other networks is possible only through the PAN coordinator - In star topology, network devices only communicate with the PAN coordinator. Communications is one-hop, so no routing actually needed. - In P2P, any device can communicate with any other device as long as they are in range of one another. Multi-hop communications possible. - Connectivity to other networks is possible only through the PAN coordinator

    35. 35 Two basic network topologies: 1) Star topology One-hop communications, only between PAN coordinator and the network devices Typical applications are home automation, toys, games, PC peripherals 2) Peer-to-peer topology Any device can communicate with any other device as long as they are in range of one another Can be ad-hoc, self-organizing, and self-healing Enables more complex network topologies to be implemented, e.g. cluster-tree networks Multi-hop network formation is defined in the network layer, not part of 802.15.4 Industrial control and monitoring, sensor networks, security Network Topologies (cont’d)

    36. 36 802.15.4 Protocol Architecture Standard defines PHY and MAC PHY includes the RF transceiver and its low-level control functions MAC provides access to the physical channel IEEE 802.2 Type 1 logical link control (LLC) can access the MAC sublayer through the service specific convergence sublayer (SSCS) The ZigBee Alliance is working on the upper layers (www.zigbee.org) ZigBee is an alliance of roughly 130 companies (at the moment) that are aiming at developing 802.15.4 compliant products. ZigBee is an alliance of roughly 130 companies (at the moment) that are aiming at developing 802.15.4 compliant products.

    37. 37 PHY responsible for the following tasks: Activation/Deactivation of the radio transceiver Energy Detection (ED) within the current channel Link Quality Indication (LQI) for received packets Clear Channel Assessment (CCA) for CSMA-CA Channel frequency adjustment Data transmission and reception PHY provides 2 services PHY data service PHY management service 802.15.4 Physical Layer (PHY) Operates in the ISM bands 2.4 GHz (worldwide), 16 channels 915 MHz (U.S.), 10 channels 868 MHz (Europe), 1 channel Operates in the ISM bands 2.4 GHz (worldwide), 16 channels 915 MHz (U.S.), 10 channels 868 MHz (Europe), 1 channel

    38. 38 PHY – Frequency Bands and Data Rates

    39. 39 PHY – Frequency Bands and Data Rates

    40. 40 PHY – 2.4 GHz Mode Each symbol (i.e. 4 bits) is represented by one of 16 32-chip sequences First 8 sequences are cyclic shifts of one 32-chip sequence, last 8 are cyclic shifts of another sequence (see next slide)

    41. 41 PHY – 2.4 GHz Mode

    42. 42 PHY – 2.4 GHz Mode Chip modulation is offset-QPSK, in which the Q-branch signal is delayed by one chip period (Tc) with respect to the I-branch signal Pulse shape is half-sine with period 2Tc The result is a constant-envelope signal! (actually, it is equivalent to MSK) Good in terms of Power Amplifier (PA) efficiency, and thus important for low power consumption

    43. 43 PHY – 2.4 GHz Mode

    44. 44 PHY – 868/915 MHz Mode

    45. 45 PHY – Power levels, PSD masks, sensitivity Tramsmit power is greater than -3 dBm Maximum defined by local authorities (Europe 100 mW, U.S. 1 W !) Maximum received power -20 dBm Sensitivity: -85 dBm (2.4 GHz) or -92 dBm (868/915 MHz)

    46. 46 PHY – Packet Structure

    47. 47 802.15.4 standard developed for low power consumption Low complexity protocols and physical implementation Additional power management techniques can be used in the physical implementation Area of manufacturer differentiation Battery-powered devices will use duty-cycling Most of the time in sleep-mode (up to 99 %) However, they must listen to network beacons, and stay synchronized to the network ? balance between power consumption and message latency Power Consumption Issues

    48. 48 References T. Cooklev, Wireless Communications Standards, A Study of 802.11, 802.15, and 802.16, IEEE Press, 2004. http://standards.ieee.org/getieee802 J. Zheng, M.J. Lee, Will IEEE 802.15.4 Make Ubiguitos Networking a Reality?: A Discussion on a Potential Low Power, Low Bit Rate Standard, IEEE Comm. Magazine, June 2004.

    49. IEEE 802.15.4 MAC for LR-WPAN applications Toni Huovinen Lauri Anttila Jarno Niemelä Tero Isotalo

    50. 50 Outline Overview of MAC for IEEE 802.15.4 Functionalities Frame types and structures Data transfer Security

    51. 51 IEEE 802.15.4 MAC objectives Extremely low cost Easy implementation Reliable data transfer Short range operation Very low power consumption Certain level of security

    52. 52 Device classes Full Function Device (FFD) Functions in any topology Able to talk to RFDs or other FFDs Operate in three modes (PAN coordinator, coordinator, and device) Reduced Function Device (RFD) Limited to star topology Can only talk to an FFD (coordinator) Cannot become a coordinator Unnecessary to send large amounts of data Extremely simple Can be implemented using minimal resources and memory capacity In an IEEE 802.15.4 network, at least one FFD is required (working as network coordinator). However, the rest of the devices may be RFDs in order to reduce the system costs and the complexity.In an IEEE 802.15.4 network, at least one FFD is required (working as network coordinator). However, the rest of the devices may be RFDs in order to reduce the system costs and the complexity.

    53. 53 An example network

    54. 54 MAC functionalities MAC provides two services, namely, the MAC data service and the MAC management service. MAC provides two services, namely, the MAC data service and the MAC management service.

    55. 55 Beacon management Beacon enabled mode Slotted CSMA/CA Beacon disabled mode CSMA/CA (similar to one in IEEE 802.11) Generation of beacons if a device is a coordinator Either broadcasting or unicasting of beacons Synchronization performed using beacons An FDD can work either in a beaconless (also beacon disabled) or beacon enabled mode. Moreover, an FDD not operating as PAN coordinator can transmit beacon frames only during an association with a PAN. In a beacon enabled network, a coordinator broadcasts beacons periodically to synchronize the attached devices. On the other hand, in beacon disabled network, the synchronization is performed by polling of coordinator for data.An FDD can work either in a beaconless (also beacon disabled) or beacon enabled mode. Moreover, an FDD not operating as PAN coordinator can transmit beacon frames only during an association with a PAN. In a beacon enabled network, a coordinator broadcasts beacons periodically to synchronize the attached devices. On the other hand, in beacon disabled network, the synchronization is performed by polling of coordinator for data.

    56. 56 Association and disassociation Support for WPAN self-configuration (ubiquotous networks) Enables a star to be setup automatically Allows also the creation of self-configuring, peer-to-peer (p2p) network Orphaning offers a way to detect link and/or node failures A realignment procedure can take place An FFD may indicate its presence on a PAN to other devices by transmitting beacon frames. This allows other devices to perform device discovery. An FFD that is not a PAN coordinator begins transmitting beacon frames only when it has successfully associated with a PAN. Association of a device starts after having completed either an active channel scan or a passive channel scan. The passive scan, like an active scan, allows a device to locate any coordinator transmitting beacon frames within its personal operating space (POS) whereas the beacon request command is not required for passive scan. When a coordinator wants one of its associated devices to leave the PAN, it shall send the disassociation notification command to the device using indirect transmission. If an associated device wants to leave the PAN, it shall send a disassociation notification command to the coordinator. Upon reception, the coordinator sends ack. Even if the ack is not received, the device shall consider itself disassociated. A device is considered orphaned if it missed aMaxLostBeacons (default value 4) beacons from its coordinator in a row. Orphaning mechanism is not used by devices that are in beacon disabled mode or in beacons enabled mode but not using beacons tracking. When orphaning happens, the device will try to relocate its coordinator through realignment procedure.An FFD may indicate its presence on a PAN to other devices by transmitting beacon frames. This allows other devices to perform device discovery. An FFD that is not a PAN coordinator begins transmitting beacon frames only when it has successfully associated with a PAN. Association of a device starts after having completed either an active channel scan or a passive channel scan. The passive scan, like an active scan, allows a device to locate any coordinator transmitting beacon frames within its personal operating space (POS) whereas the beacon request command is not required for passive scan. When a coordinator wants one of its associated devices to leave the PAN, it shall send the disassociation notification command to the device using indirect transmission. If an associated device wants to leave the PAN, it shall send a disassociation notification command to the coordinator. Upon reception, the coordinator sends ack. Even if the ack is not received, the device shall consider itself disassociated. A device is considered orphaned if it missed aMaxLostBeacons (default value 4) beacons from its coordinator in a row. Orphaning mechanism is not used by devices that are in beacon disabled mode or in beacons enabled mode but not using beacons tracking. When orphaning happens, the device will try to relocate its coordinator through realignment procedure.

    57. 57 MAC frame formats

    58. 58 A superframe structure A super frame can have varying length (15 ms – 245 s). However, equal-spaced time slots aer applied. Moreover, a super frame is surrounded by frame beacons. During Contention Access Period (CAP), devices wishing to communicate use slotted CSMA/CA for channel access. On the other hand, an optional Contention Free Period (CFP) contains guaranteed time slots (GTS), which always appear in the end of the active superframe. GTS allow a dedicated bandwidth for low latency applications (or devices). There can be up to seven GTSs in more than one slot period. PAN coordinator is responsible of assigning and maintaining GTSs. A super frame can have varying length (15 ms – 245 s). However, equal-spaced time slots aer applied. Moreover, a super frame is surrounded by frame beacons. During Contention Access Period (CAP), devices wishing to communicate use slotted CSMA/CA for channel access. On the other hand, an optional Contention Free Period (CFP) contains guaranteed time slots (GTS), which always appear in the end of the active superframe. GTS allow a dedicated bandwidth for low latency applications (or devices). There can be up to seven GTSs in more than one slot period. PAN coordinator is responsible of assigning and maintaining GTSs.

    59. 59 A superframe with an inactive part A superframe consists of active and inactive parts (bounded by beacons) The length of the superframe (i.e., beacon interval, BI) and the length of its active part (i.e., superframe duration, SD) are define as shown in figure. aBaseSuperframeDuration = 960 symbols BO = Beacon order SO = Superframe order BO and SO are defined by the coordinator. macBeaconOrder (BO) Interval between beacons Beacon Interval (BI) BI = aBaseSuperframeDuration * 2^BO macSuperframeOrder (SO) Length of active portion of the superframe Superframe duration (SD) SD = aBaseSuperframeDuration * 2^SO aBaseSuperframeDuration = 16 * aBaseSlotDuration 0<=SO<=BO<=14 If BO = SO = 15, no beacon -> unslotted CSMA-CAA superframe consists of active and inactive parts (bounded by beacons) The length of the superframe (i.e., beacon interval, BI) and the length of its active part (i.e., superframe duration, SD) are define as shown in figure. aBaseSuperframeDuration = 960 symbols BO = Beacon order SO = Superframe order BO and SO are defined by the coordinator. macBeaconOrder (BO) Interval between beacons Beacon Interval (BI) BI = aBaseSuperframeDuration * 2^BO macSuperframeOrder (SO) Length of active portion of the superframe Superframe duration (SD) SD = aBaseSuperframeDuration * 2^SO aBaseSuperframeDuration = 16 * aBaseSlotDuration 0<=SO<=BO<=14 If BO = SO = 15, no beacon -> unslotted CSMA-CA

    60. 60 Network forming WPAN has to be initiated by a FFD Active or passive scan Selection of suitable PAN identifier An FDD becomes a coordinator The active channel scan consists of transmitting the beacon request command in every channel. If a PAN coordinator exists, in addition to response to a beacon request command, will start transmitting beacons. A passive scan is performed by merely listening for beacons in every channel.The active channel scan consists of transmitting the beacon request command in every channel. If a PAN coordinator exists, in addition to response to a beacon request command, will start transmitting beacons. A passive scan is performed by merely listening for beacons in every channel.

    61. 61 Data transfer/transactions (1) From a device to a coordinator (2) From a coordinator to a device (3) From one peer to another in a peer-to-peer multihop network OR (1) Direct data transmission (2) Indirect data transmission (3) GTS (guarantee time slot) data transmission Direct data transmission applies to all data transfers, either from a device to a coordinator, from a coordinator to a device, or between two peers. Indirect data transmission applies to transfer from a coordinator to its devices. In this mode, a data frame is kept in a transaction list by the coordinator, waiting for extraction by the corresponding device. A device can find out if it has a packet pending in the transaction list by checking the beacon frames received from its coordinator. GTS data transmission is can be applied between a device and its coordinator, either from the device to the coordinator or from the coordinator to the device. No CSMA/CA is needed in GTS data transmission.Direct data transmission applies to all data transfers, either from a device to a coordinator, from a coordinator to a device, or between two peers. Indirect data transmission applies to transfer from a coordinator to its devices. In this mode, a data frame is kept in a transaction list by the coordinator, waiting for extraction by the corresponding device. A device can find out if it has a packet pending in the transaction list by checking the beacon frames received from its coordinator. GTS data transmission is can be applied between a device and its coordinator, either from the device to the coordinator or from the coordinator to the device. No CSMA/CA is needed in GTS data transmission.

    62. 62 Communication from device to coordinator When a device wishes to transfer data to a coordinator in a beacon-enabled network, it first listens for the network beacon. When the beacon is found, it synchronizes to the superframe structure. At the right time, it transmits its data frame, using slotted CSMA-CA, to the coordinator. There is an optional acknowledgement at the end. When a device wishes to transfer data in a nonbeacon-enabled network, it simply transmits its data frame, using the unslotted CSMA-CA, to the coordinator. There is also an optional acknowledgement at the end. Hence, the applications transfers are completely controlled by the devices on a PAN rather than by the coordinator (energy-conservation feature).When a device wishes to transfer data to a coordinator in a beacon-enabled network, it first listens for the network beacon. When the beacon is found, it synchronizes to the superframe structure. At the right time, it transmits its data frame, using slotted CSMA-CA, to the coordinator. There is an optional acknowledgement at the end. When a device wishes to transfer data in a nonbeacon-enabled network, it simply transmits its data frame, using the unslotted CSMA-CA, to the coordinator. There is also an optional acknowledgement at the end. Hence, the applications transfers are completely controlled by the devices on a PAN rather than by the coordinator (energy-conservation feature).

    63. 63 Communication from coordinator to device When a coordinator wishes to transfer data to a device in a beacon-enabled network, it indicates in the network beacon that the data message is pending. The device periodically listens to the network beacon, and if a message is pending, transmits a MAC command requesting this data, using slotted CSMA/CA. The coordinator optionally acknowledges the successful transmission of this packet. The pending data frame is then sent using slotted CSMA/CA. The device acknowledged the successful reception of the data by transmitting an acknowledgement frame. Upon receiving the acknowledgement, the message is removed from the list of pending messages in the beacon. When a coordinator wishes to transfer data to a device in a nonbeacon-enabled network, it stores the data for the appropriate device to make contact and request data. A device may make contact by transmitting a MAC command requesting the data, using unslotted CSMA-CA, to its coordinator at an application-defined rate. The coordinator acknowledges this packet. If data are pending, the coordinator transmits the data frame using unslotted CSMA-CA. If data are not pending, the coordinator transmits a data frame with a zero-length payload to indicate that no data were pending. In a peer-to-peer network, every device can communicate with any other device in its transmission radius. There are two options for this. In the first case, the node will listen constantly and transmit its data using unslotted CSMA-CA. In the second case, the nodes synchronize with each other so that they can save power.When a coordinator wishes to transfer data to a device in a beacon-enabled network, it indicates in the network beacon that the data message is pending. The device periodically listens to the network beacon, and if a message is pending, transmits a MAC command requesting this data, using slotted CSMA/CA. The coordinator optionally acknowledges the successful transmission of this packet. The pending data frame is then sent using slotted CSMA/CA. The device acknowledged the successful reception of the data by transmitting an acknowledgement frame. Upon receiving the acknowledgement, the message is removed from the list of pending messages in the beacon. When a coordinator wishes to transfer data to a device in a nonbeacon-enabled network, it stores the data for the appropriate device to make contact and request data. A device may make contact by transmitting a MAC command requesting the data, using unslotted CSMA-CA, to its coordinator at an application-defined rate. The coordinator acknowledges this packet. If data are pending, the coordinator transmits the data frame using unslotted CSMA-CA. If data are not pending, the coordinator transmits a data frame with a zero-length payload to indicate that no data were pending. In a peer-to-peer network, every device can communicate with any other device in its transmission radius. There are two options for this. In the first case, the node will listen constantly and transmit its data using unslotted CSMA-CA. In the second case, the nodes synchronize with each other so that they can save power.

    64. 64 Traffic types/examples Periodic data Application defined data rate (e.g., sensors) Intermittent data (generated ) Application / external stimulus defined data rate (e.g., ligth switch) Repetitive low latency data GTS Allocation of time slots (e.g., mouse) Periodic data can be handled using the beaconing system whereby the sensor will wake up for the beacon, check for any messages and then go back to sleep. Intermittent data can be handled either in a beaconless system or in a disconnected fashion. In a disconnected operation, the device will only attach to the network when it needs to communicate saving significant energy. Low latency applications may choose to the guaranteed time slot (GTS) option. GTS is a method of QoS in that it allows each device a specific duration of time each superframe to do whatever it wishes to do without contention or latency.Periodic data can be handled using the beaconing system whereby the sensor will wake up for the beacon, check for any messages and then go back to sleep. Intermittent data can be handled either in a beaconless system or in a disconnected fashion. In a disconnected operation, the device will only attach to the network when it needs to communicate saving significant energy. Low latency applications may choose to the guaranteed time slot (GTS) option. GTS is a method of QoS in that it allows each device a specific duration of time each superframe to do whatever it wishes to do without contention or latency.

    65. 65 MAC QoS QoS can be provided by upper layers Different traffic types Priority in queuing during CAP (high or normal priority) In beacon enabled networks, contention free period provides QoS

    66. 66 802.15.4 security overview Access control Prevents unauthorized access Message integrity Authentication and integrity provided using message integrity code (MIC) Message confidentiality Encryption applied Replay protection Packet numbering IEEE 802.15.4 security is provided by MAC

    67. 67 MAC security modes Unsecured mode Mandatory for all devices However, does not provide any security ACL (access control list) mode Optional No cryptographical methods applied Secured mode Optional Advanced Encryption Standard (AES) If security is not an important factor for the application op the upper layer already provides sufficient security protection, a device can select unsecured mode for data transfer. ACL is composed of devices with which a key is shared. A device can use ACL to prevent unauthorized devices from accessing its data. However, any cryptographical methods are not applied. Secured mode has all four security services: - access control list - data encryption - frame integrity - sequential freshnessIf security is not an important factor for the application op the upper layer already provides sufficient security protection, a device can select unsecured mode for data transfer. ACL is composed of devices with which a key is shared. A device can use ACL to prevent unauthorized devices from accessing its data. However, any cryptographical methods are not applied. Secured mode has all four security services: - access control list - data encryption - frame integrity - sequential freshness

    68. 68 Security suites Set of operations for ensuring security Indicates the symmetric cryptographic algorithm mode integrity code bit length Integrity done using AES The 802.15.4 specification defines eight different security suites (Table). Null – no security AES-CTR – encryption only (in counter mode) AES-CBC-MAC – authentication only (Cipher Block Chaining, CBC) AES-CCM encryption and authentication Message authentication code (MAC) = Message integrity code (MIC)The 802.15.4 specification defines eight different security suites (Table). Null – no security AES-CTR – encryption only (in counter mode) AES-CBC-MAC – authentication only (Cipher Block Chaining, CBC) AES-CCM encryption and authentication Message authentication code (MAC) = Message integrity code (MIC)

    69. 69 Security suites (cont’d) AES-CTR Access control Encryption Sequential freshness AES-CBC-MAC (cipher block chaining, CBC) Access control Authentication AES-CCM Mixture of CTR and CBC-MAC modes (CCM) Provides all four security services

    70. 70 References IEEE 802.15.4 Specifications: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), available online: http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf T. Cooklev, Wireless Communications Standards, A Study of 802.11, 802.15, and 802.16,  IEEE Press, 2004. N. Satyr, D. Wagner, “Security considerations for IEEE 802.15.4 networks,” Wise 2004, USA. S. Ergen, “Zigbee/IEEE 802.15.4 Summary,” available online: http://www.eecs.berkeley.edu/~csinem/academic/publications/zigbee.pdf J. Zheng, M. Lee, “Will IEEE 802.15.4 make ubiquitous networking a reality? –A discussion on a potential low power, low bit rate standard,” IEEE Communications Magazine, vol. 42, no. 6, Jun 2004 pp. 140-146

    71. Low-Rate WPAN Examples, Trends and Products Toni Huovinen Lauri Anttila Jarno Niemelä Tero Isotalo

    72. 72 Contents Overview Zigbee Comparison to other 802.15 standards Other techniques RFID BodyLan FAN (Fabric area networks)

    73. 73 Overview Need for lower power consuming and cheaper equipment standard compared to 802.11 and 802.15 WLAN/BT widely in use, but they are too expensive, consume too much battery and have too complicated protocol stack to be used in sensor-networks and in different wireless controlling Ready products using 802.15.4 not yet in the market However, 802.15.4/Zigbee compatible chipsets and plug-in units are already available Planned areas: wireless automated monitoring and control of facilities, home-appliance networks, home healthcare, etc. Zigbee using 802.11.4, similar systems: Bodylan, Wireless USB, ...

    74. 74 Zigbee Bases on 802.11.4 MAC/PHY, sometimes used also as a nickname for 802.11.4 Ultra-low complexity, ultra-low cost, ultra-low power consumption, and low data rate (20-250 kb/s) wireless connectivity among inexpensive devices 64k (2^16) network nodes

    75. 75 Zigbee Alliance Non-profit industry consortium defining a global specification for reliable, cost-effective, low power wireless applications based on the IEEE 802.15.4 standard. Six promoters (Honeywell, Invensys, Mitsubishi, Motorola, Philips, and Samsung) and more than 100 participants Performs marketing and compliance certification for 15.4 Not officially associated with the IEEE “Wireless Control that Simply Works™” www.zigbee.org

    76. 76 Uses of Zigbee

    77. 77 Zigbee / IEEE 802.15.4 Protocol Stack Divided Responsibility Lower (MAC/PHY) stacks IEEE 802.15.4 Upper stacks Zigbee Alliance IEEE 802 compatible LLC protocol can be used

    78. 78 Zigbee Protocol Stack There are ready programmed protocol stacks available in the market Some chip manufactors have specific stacks for their own chips, and some companies, i.e., Ember, Figure8, Helicomm, provide common stacks

    79. 79 Zigbee Network Model (1) Star, mesh, or combined Star/Mesh –type network

    80. 80 Zigbee Network Model (2) Flexible topology of Zigbee network consists of reduced function nodes, and full function nodes Reduced function nodes can not communicate with each others Communication goes through full function nodes, and requires also network coordinator Full function nodes can work as a coordinator => Star topology

    81. 81 Zigbee Network Model (3) Network can consist also only of full function nodes In such case, all equipment are equal and can communicate with each others => Mesh topology Wider networks form from combined star and mesh topology networks

    82. 82 Zigbee Network Model (4) 16/64 –bit addressing Large amount of network nodes, even up to 64k (16-bit) nodes (cf. 7 nodes in bluetooth) Can be used in wide automation networks that do not require large bandwidth

    83. 83 Zigbee Module

    84. 84 Business Trends Multiple of manufactors are developing Zigbee chips Compelete chips (PHY+MAC): Motorola/Freescale, Chipcon, Atmel, Panasonic,... RF chips (PHY): ZMD, CompXS, ... Chips already available on the market Chip sizes beginning from 20x15x1.8 mm First applications expected soon

    85. 85 Commercial Example: iBean Product Family (1)

    86. 86 Commercial Example: iBean Product Family (2) 802.15.4 and Zigbee compatible Also non-compatible products using other frequency bands More information: www.millennial.net

    87. 87 Competitors for ZigBee In addition to other 802. techniques, there is some technique very similar to Zigbee competing from same applications Typically working at 2.4G ISM frequency i.e. Cypress, and finnish Espotel ERF

    88. 88 Comparison to other standards (1)

    89. 89 Comparison to other standard (2)

    90. 90 Comparison to other standards (2)

    91. 91 Competitors for ZigBee: Cypress Called WirelessUSB (different from Wireless USB) low memory consumption protocol stack (4kB vs 32kB in Zigbee) Star-topology network 50m range, low power consumption automatic interference regognition Used for PC mice/keyboards, but looking for new areas

    92. 92 Competitors for ZigBee: Espotel ERF Designed to replace Bluetooth in industry automation sensors and embedded systems Lighter protocol stack compared to bluetooth Can use Zigbee chips, but does not fit into the standard Energy consumption at the same level with Zigbee Lower total cost due to missing standardization reguirements Missing standard makes it easier to fit customers need, but lack of compatibility may cause problems

    93. 93 On-Body-Networking Provide connectivity between different sensors and other equipments in wearable electronics Sports, Medicine, Police, Fireman, Astronauts ... BodyLan, FAN (Fabric Area Network)

    94. 94 BodyLan Consept

    95. 95 Comparison of Different BodyLan Techniques

    96. 96 Future..? Although present and close future world looks like totally networked, more is coming Independent sensors of size of 1c coin are already reality, but consept called ’smart dust’ is under development. Target is to have sensors size of a dust particle, and they would be everywhere around, and they would work with e.g. solar power Ability to form networs automatically Such projects are going on in many universities, also in TUT/TKT

    97. 97 References [1] Roy L. Ashok Dharma P.Agrawal, ”Next-Generation Wearable Networks”, Computing Practices, IEEE Computer Society, 2003 [2] Philip Kuryloski and Sameer Pai, ”Our Crossbow Sensor Equipment and Zigbee”, wisl.ece.cornell.edu/presentations/MICAz.pdf, [3] Zigbee Alliance, ”Wireless Control That Simply Works” www.zigbee.org [4] Krister Wikström, ”Zigbee tuotteistuu”, Prosessori 1/2005 [5] Shigeru Fukunaga, Tadamichi Tagawa, Kiyoshi Fukui, Koichi Tanimoto, Hideaki Kanno, ” Development of Ubiquitous Sensor Network”, Oki Technical Review, October 2004/Issue 200 Vol.71 No.4

    98. 98 Q: What is the origin of the ZigBee name? The domestic honeybee, a colonial insect, lives in a hive that contains a queen, a few male drones, and thousands of worker bees. The survival, success, and future of the colony is dependent upon continuous communication of vital information between every member of the colony. The technique that honey bees use to communicate new-found food sources to other members of the colony is referred to as the ZigBee Principle. Using this silent, but powerful communication system, whereby the bee dances in a zig-zag pattern, she is able to share information such as the location, distance, and direction of a newly discovered food source to her fellow colony members. Instinctively implementing the ZigBee Principle, bees around the world industriously sustain productive hives and foster future generations of colony members. [3]

More Related