1 / 13

Dr. Kemal Akkaya E-mail: kemal@cs.siu

Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE 802.15.4 Standard. Dr. Kemal Akkaya E-mail: kemal@cs.siu.edu. What is IEEE 802.15.4 ?.

washingtonr
Download Presentation

Dr. Kemal Akkaya E-mail: kemal@cs.siu

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Department of Computer ScienceSouthern Illinois University CarbondaleCS441-Mobile & Wireless ComputingIEEE 802.15.4 Standard Dr. Kemal Akkaya E-mail: kemal@cs.siu.edu Mobile & Wireless Computing 1

  2. What is IEEE 802.15.4? • Wireless Medium Access Control(MAC) and Physical Layer (PHY)Specifications for Low-Rate WirelessPersonal Area Networks (WPANs) but is used for Wireless Sensor Networks as well • Specified by task group 4 of IEEE 802.15 Wireless Personal Area Networks (WPAN) • An LR-WPAN is a simple, low-cost communication network that allows wireless connectivity inapplications with limited power and relaxed throughput requirements. • The main objectives of an LR-WPANare • ease of installation, • reliable data transfer, • short-range operation, • extremely low cost, and a reasonablebattery life, • simple and flexible protocol • IEEE 802.15.4 Features • 2400–2483.5 MHz (worldwide) • Over-the-air data rates of 250 kb/s, 100kb/s, 40 kb/s, and 20 kb/s • Star or peer-to-peer operation • Optional allocation of guaranteed time slots (GTSs) • Carrier sense multiple access with collision avoidance (CSMA-CA) channel access • Slotted or Unslotted • Low power consumption Mobile & Wireless Computing 2

  3. Approaches to Make IEEE 802.15.4 Low Power and Low Cost • In order to achieve the low power and low cost goals established by IEEE 802.15.4 and to inform design trade-off decisions, the following approaches are taken: • Reduce the amount of data transmitted • Reduce the transceiver duty cycle and frequency of data transmissions • Reduce the frame overhead • Reduce complexity • Reduce range • Implement strict power management mechanisms (power-down and sleep modes) • All of these contribute to lower power and cost requirements. Mobile & Wireless Computing 3

  4. Network Topologies inIEEE 802.15.4 • An IEEE 802.15.4 LR-WPAN may operate in either of twotopologies: • the star topology or • the peer-to-peer topology • In the star topologythe communication is established between devices and a single central controller, called the PANcoordinator • Two different device types can participate in an IEEE 802.15.4 network; • a full-function device (FFD) and a • reduced-function device (RFD). • The FFD can operate in three modes serving as • a personal area network(PAN) coordinator, • a coordinator, or • a device. • An FFD can talk to RFDs or other FFDs, while an RFD cantalk only to an FFD. Mobile & Wireless Computing 4

  5. MAC Protocol • Two type of channel access: • With a superframe structure – beacon enabled • Star topologies and peer-to-peer topologies • Synchronization among the nodes • Slotted CSMA/CA • Without a superframe structure – nonbeacon enabled • Peer-to-peer topologies • Unslotted CSMA/CA • Unslotted CSMA-CA channel access mechanism • Nonbeacon-enabled PANs use it. • Data transfer is based on regular random backoff algorithm. • Slotted CSMA-CA channel access mechanism • Beacon-enabled PANs it. • The backoff slots of all devices within one PAN arealigned to the PAN coordinator. • Each time a device wishes to transmit data frames, it locatesthe boundary of the next backoff slot and then waits for a random number of backoff slots. • If the channel is idle, the device begins transmitting on the next availablebackoff slot boundary. Mobile & Wireless Computing 5

  6. Beacon enabled - Superframe Structure • The format of the superframe is defined bythe PAN coordinator. • The superframe is bounded by beacons sent by the coordinator andis divided into 16 equally sized slots. • The beaconframe is transmitted in the first slot of each superframe and is used for: • Synchronizing the attacheddevices • Identifying the PAN • Describing the structure of the superframes. • Optionally, the superframe can have an active and an inactive portion. • During the inactive portion, the coordinator may enter a low-power mode. • Any device wishing tocommunicate during the contention access period (CAP) between two beacons competes with other devicesusing a slotted CSMA-CA mechanism. • All transactions are completed by the time of the next networkbeacon. • If a coordinator does not wish to use a superframestructure, it will turn off the beacon transmissions. Mobile & Wireless Computing 6

  7. Guaranteed Time Slots in the Superframe • For low-latency applications or applications requiring specific data bandwidth, the PAN coordinator maydedicate portions of the active superframe to that application. • These portions are called guaranteed time slots(GTSs). • The GTSs form the contention-free period (CFP), which always appears at the end of the activesuperframe starting at a slot boundary immediately following the CAP, as shown in figure below. • The PANcoordinator may allocate up to seven of these GTSs • All contention-based transactions are completed before the CFPbegins. • Each device transmitting in a GTS ensures that its transaction is complete before the time of thenext GTS or the end of the CFP. Mobile & Wireless Computing 7

  8. Data Transfer Model • Three types of data transfer transactions exist. • Data transfer to a coordinator in which adevice transmits the data. • Data transfer from a coordinator in which the devicereceives the data. • Data transfer between two peer devices. • In star topology, onlytwo of these transactions are used because data may be exchanged only between the coordinator and adevice. • In a peer-to-peer topology, data may be exchanged between any two devices on the network. • The mechanisms for each transfer type depend on whether the network supports the transmission ofbeacons. Mobile & Wireless Computing 8

  9. Data Transfer to a Coordinator – Beacon Enabled • When a device wishes to transfer data to a coordinator in a beacon-enabled PAN • Device first listens for thenetwork beacon. • When the beacon is found, the device synchronizes to the superframe structure. • At theappropriate time, the device transmits its data frame, using slotted CSMA-CA, to the coordinator. • Thecoordinator may acknowledge the successful reception of the data by transmitting an optionalacknowledgment frame. Mobile & Wireless Computing 9

  10. Data Transfer to a Coordinator – Nonbeacon Enabled • When a device wishes to transfer data in a nonbeacon-enabled PAN: • It simply transmits its data frame, usingunslotted CSMA-CA, to the coordinator. • The coordinator acknowledges the successful reception of the databy transmitting an optional acknowledgment frame. The transaction is now complete. Mobile & Wireless Computing 10

  11. Data Transfer from a Coordinator – Beacon Enabled • When the coordinator wishes to transfer data to a device in a beacon-enabled PAN, • It indicates in thenetwork beacon that the data message is pending. • The device periodically listens to the network beacon and,if a message is pending,transmits a MAC command requesting the data, using slotted CSMA-CA. • Thecoordinator acknowledges the successful reception of the data request by transmitting an acknowledgmentframe. • The pending data frame is then sent using slotted CSMA-CA or, if possible, immediately after theacknowledgment. • The device may acknowledge the successful reception of the data bytransmitting an optional acknowledgment frame. • Upon successfulcompletion of the data transaction, the message is removed from the list of pending messages in the beacon. Mobile & Wireless Computing 11

  12. Data Transfer from a Coordinator – Nonbeacon Enabled • When a coordinator wishes to transfer data to a device in a nonbeacon-enabled PAN, • It stores the data for theappropriate device to make contact and request the data. • A device may make contact by transmitting a MACcommand requesting the data, using unslotted CSMA-CA, to its coordinator at an application-defined rate. • The coordinator acknowledges the successful reception of the data request by transmitting anacknowledgment frame. • If a data frame is pending, the coordinator transmits the data frame, using unslottedCSMA-CA. • If a data frame is not pending, the coordinator indicates this fact either in theacknowledgment frame following the data request or in a data frame with a zero-length payload. • If requested, the device acknowledges the successful reception of the data frame by transmitting anacknowledgment frame. Mobile & Wireless Computing 12

  13. Peer to Peer Data Transfer • In a peer-to-peer PAN, every device may communicate with every other device in its radio sphere ofinfluence. • In order to do this effectively, the devices wishing to communicate will need to either receiveconstantly or synchronize with each other. • In the former case, the device can simply transmit its data usingunslotted CSMA-CA. • In the latter case, other measures need to be taken in order to achieve synchronization. Mobile & Wireless Computing 13

More Related