Vojislav Misic, Jelena Misic
Wireless Personal Area Networks
Performance, Interconnection and Security with IEEE 802.15.4
Vojislav Misic, Jelena Misic
Wireless Personal Area Networks
Performance, Interconnection and Security with IEEE 802.15.4
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Provides a comprehensive, in-depth look at the issues surrounding IEEE 802.15.4 network operation and performance. This book provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It also assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.…mehr
Andere Kunden interessierten sich auch für
- Martin JacobssonPersonal Networks123,99 €
- Juha LehikoinenPersonal Content Experience96,99 €
- Savo GlisicAdvanced Wireless Networks178,99 €
- Yang XiaoEmerging Wireless Lans, Wireless Pans, and Wireless Mans168,99 €
- George F. ElmasryTactical Wireless Communications and Networks146,99 €
- G. Keith CambronGlobal Networks121,99 €
- Jouni KorhonenDeploying IPv6 in 3GPP Networks109,99 €
-
-
-
Provides a comprehensive, in-depth look at the issues surrounding IEEE 802.15.4 network operation and performance. This book provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It also assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions. Includes a mathematical analysis of the results of published research from the last three years using the framework of Markov chain modeling for students studying courses in performance evaluation and wireless communication networks Compares several ways in which interconnecting single cluster networks to form multi-cluster networks can be implemented and multi-cluster lifetime extended. Discusses security issues in WPANs with in-depth analysis of different security threats, their impact on performance, standard security mechanisms, and security policies Compares the IEEE 802.15.4 standard with the related Bluetooth 802.15.1 standard in terms of suitability for implementing wireless sensor networks. A "must read" for developers and researchers getting acquainted with various aspects of 802.15.4 technology and graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory.
Produktdetails
- Produktdetails
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 335
- Erscheinungstermin: 1. März 2008
- Englisch
- Abmessung: 246mm x 173mm x 23mm
- Gewicht: 730g
- ISBN-13: 9780470518472
- ISBN-10: 0470518472
- Artikelnr.: 23169586
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 335
- Erscheinungstermin: 1. März 2008
- Englisch
- Abmessung: 246mm x 173mm x 23mm
- Gewicht: 730g
- ISBN-13: 9780470518472
- ISBN-10: 0470518472
- Artikelnr.: 23169586
Xuemin (Sherman)Shen (M'97-SM'02) received his B.Sc degree in electrical engineering from Dalian Maritime University, China, in 1982, and the M.SC. and Ph.D. degrees (both i8n electrical engineering) from Rutgers University, New Jersey, USA, in 1987 and 1990 respectively. He is a Professor and University Research Chair, and the Associate Chair for Graduate Studies, Department of Electrical and Computer Engineering, University of Waterloo, Canada. His research focuses on mobility and resource management in interconnected wireless/wired networks, UWB wireless communications systems, wireless security, and ad hoc and sensor networks. he is a co-author of three books, and has published more than 300 papers and book chapters on wireless communications and networks, control and filtering. Dr. Shen serves as a Founding Area Editor for IEEE Transactions on Wireless Communications; Editor-in-Chief for Peer-to-Peer Networking and Application; Associate Editor for IEEE Transactions on Vehicular Technology; KICS/IEEE Journal of Communications and Networks, Computer Networks; ACM/Wireless Networks; and Wireless Communications and Mobile Computing (Wiley). etc. He has also served as Guest Editor for IEEE JSAC, IEEE Wireless Communications, and IEEE Communications Magazine. Dr. Shen recieved the Excellent Graduate Supervision Award in 2006, and the Outstanding Performance Award in 2004 from the University of Waterloo, the Premier's Research Excellence Award (PREA) in 2003 from the Province of Ontario, Canada, and the Distinguished Performance Award in 2002 from the Faculty of Engineering, University of Waterloo. Dr. Shen is a registered Professional Engineer of Ontario, Canada. Dr. Yi Pan is the Chair and a Professor in the Department of Computer Science at Georgia State University, USA. Dr. Pan received his B.Eng. and M.Eng. degrees in computer engineering from Tsinghua University , China, in 1982 and 1984, respectively, and his Ph.D. degree in computer science from the University of Pittsburgh, USA, in 1991. Dr. Pan's research interests include parallel and distributed computing, optical networks, wireless networks, and bioinformatics. Dr. Pan has published more than 100 journal papers with over 30 papers published in various IEEE journals. In addition, he has published over 130 papers in refereed conferences (including IPDPS, ICPP, ICDCS, INFOCOM, and GLOBECOM). He has also co-edited over 30 books. Dr. Pan has served as an editor-in-chief or an editorial board member for 15 journals including five IEEE Transactions and has organized many international conferences and workshops. Dr. Pan has delivered over 10 keynote speeches at many international conferences. He is an IEEE Distinguished Speaker (2000-2002), a Yamacraw Distinguished Speaker (2002), and a Shell Oil Colloquium Speaker (2002). He is listed in Men of Achievement, Who's Who in America, Who's Who in American Education, Who's Men of Achievement, Who's Who in America, Who's Who in American Education, Who's Who in Computational Science and Engineering,and Who's Who of Asian Americans.
Contents Preface I Prologue: WPANs and 802.15.4 1 1 Wireless Personal Area
Networks 1.1 Wireless Ad Hoc Networks 1.2 Design Goals for the MAC Protocol
1.3 Classification of MAC Protocols For Ad Hoc Networks 1.4
Contention-Based MAC Protocols 1.5 New Kinds of Ad Hoc Networks 1.6 Sensor
Networks 2 Operation of the IEEE 802.15.4 network 2.1 Physical Layer
Characteristics 2.2 Star Topology and Beacon Enabled Operation 2.3 Slotted
CSMA-CA Medium Access 2.4 Acknowledging Successful Transmissions 2.5
Downlink Communication in Beacon Enabled Mode 2.6 Guaranteed Time Slots 2.7
Peer-to-Peer Topology and Non-Beacon Enabled Operation 2.8 Device
Functionality and Cluster Formation 2.9 Format of the PHY and MAC frames II
Single-Cluster Networks 3 Cluster with Uplink Traffic 3.1 The System Model
- Preliminaries 3.2 Superframe With an Active Period Only 3.3 Superframe
With Both Active and Inactive Periods 3.4 Probability Distribution of the
Packet Service Time 3.5 Probability Distribution of the Queue Length 3.6
Access Delay 3.7 Performance Results 4 Cluster With Uplink And Downlink
Traffic 4.1 The System Model 4.2 Modeling the Behavior of the Medium 4.3
Probability Distribution For the Packet Service Time 4.4 Performance of the
Cluster With Bidirectional Traffic 5 MAC Layer Performance Limitations 5.1
Congestion of Packets Deferred to The Next Superframe 5.2 Congestion After
The Inactive Period 5.3 Congestion of Uplink Data Requests 5.4 Blocking of
Uplink Data and Data Requests 5.5 Possible Remedies 6 Activity Management
Through Bernoulli Scheduling 6.1 The Need For Activity Management 6.2
Analysis of Activity Management 6.3 Analysis of the Impact of MAC and PHY
Layers 6.4 Controlling the Event Sensing Reliability 6.5 Activity
Management Policy 7 Admission Control Issues 7.1 The Need for Admission
Control 7.2 Performance Under Asymmetric Packet Arrival Rates 7.3
Calculating the Admission Condition 7.4 Performance of Admission Control
Summary and Further Reading III Multi-Cluster Networks 8 Cluster
InterconnectionWith Master-Slave Bridges 8.1 Analysis of Bridge Operation
8.2 Markov Chain Model for A Single Node 8.3 Performance of the Network 8.4
Network with a Single Source Cluster/Bridge 8.5 Network with Two Source
Clusters/Bridges 8.6 Modeling the Transmission Medium and Packet Service
Times 9 Equalization of Cluster Lifetimes 9.1 Modeling the Clusters 9.2
Distributed Activity Management 9.3 Energy Consumption in Interconnected
Clusters 9.4 Performance of activity management 10 Cluster Interconnection
with Slave-Slave Bridges 10.1 Operation of the SS Bridge 10.2 Markov Chain
Model for the SS Bridge 10.3 Markov Chain for Non-Bridge Nodes 10.4
Performance Evaluation 10.5 To Acknowledge or Not To Acknowledge: The
CSMA-CA Bridge 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 10.7
Modeling the Transmission Medium and Packet Service Times Summary and
Further Reading IV Security 11 Security in 802.15.4 Specification 11.1
Security Services 11.2 Auxiliary Security Header 11.3 Securing and
Unsecuring Frames 11.4 Attacks 12 The Cost of Secure and Reliable Sensing
12.1 Analytical Model of a Generic Key Update Algorithm 12.2 Analysis of
the Node Buffer 12.3 Success Probabilities 12.4 Key Update in a
Multi-Cluster Network 12.5 Cluster Lifetime 12.6 Evaluation of Lifetimes
and Populations Summary and Further Reading V Appendices A An Overview of
ZigBee A.1 ZigBee Functionality A.2 Device Roles A.3 Network Topologies and
Routing A.4 Security B Probability generating functions and Laplace
transforms Bibliography
Networks 1.1 Wireless Ad Hoc Networks 1.2 Design Goals for the MAC Protocol
1.3 Classification of MAC Protocols For Ad Hoc Networks 1.4
Contention-Based MAC Protocols 1.5 New Kinds of Ad Hoc Networks 1.6 Sensor
Networks 2 Operation of the IEEE 802.15.4 network 2.1 Physical Layer
Characteristics 2.2 Star Topology and Beacon Enabled Operation 2.3 Slotted
CSMA-CA Medium Access 2.4 Acknowledging Successful Transmissions 2.5
Downlink Communication in Beacon Enabled Mode 2.6 Guaranteed Time Slots 2.7
Peer-to-Peer Topology and Non-Beacon Enabled Operation 2.8 Device
Functionality and Cluster Formation 2.9 Format of the PHY and MAC frames II
Single-Cluster Networks 3 Cluster with Uplink Traffic 3.1 The System Model
- Preliminaries 3.2 Superframe With an Active Period Only 3.3 Superframe
With Both Active and Inactive Periods 3.4 Probability Distribution of the
Packet Service Time 3.5 Probability Distribution of the Queue Length 3.6
Access Delay 3.7 Performance Results 4 Cluster With Uplink And Downlink
Traffic 4.1 The System Model 4.2 Modeling the Behavior of the Medium 4.3
Probability Distribution For the Packet Service Time 4.4 Performance of the
Cluster With Bidirectional Traffic 5 MAC Layer Performance Limitations 5.1
Congestion of Packets Deferred to The Next Superframe 5.2 Congestion After
The Inactive Period 5.3 Congestion of Uplink Data Requests 5.4 Blocking of
Uplink Data and Data Requests 5.5 Possible Remedies 6 Activity Management
Through Bernoulli Scheduling 6.1 The Need For Activity Management 6.2
Analysis of Activity Management 6.3 Analysis of the Impact of MAC and PHY
Layers 6.4 Controlling the Event Sensing Reliability 6.5 Activity
Management Policy 7 Admission Control Issues 7.1 The Need for Admission
Control 7.2 Performance Under Asymmetric Packet Arrival Rates 7.3
Calculating the Admission Condition 7.4 Performance of Admission Control
Summary and Further Reading III Multi-Cluster Networks 8 Cluster
InterconnectionWith Master-Slave Bridges 8.1 Analysis of Bridge Operation
8.2 Markov Chain Model for A Single Node 8.3 Performance of the Network 8.4
Network with a Single Source Cluster/Bridge 8.5 Network with Two Source
Clusters/Bridges 8.6 Modeling the Transmission Medium and Packet Service
Times 9 Equalization of Cluster Lifetimes 9.1 Modeling the Clusters 9.2
Distributed Activity Management 9.3 Energy Consumption in Interconnected
Clusters 9.4 Performance of activity management 10 Cluster Interconnection
with Slave-Slave Bridges 10.1 Operation of the SS Bridge 10.2 Markov Chain
Model for the SS Bridge 10.3 Markov Chain for Non-Bridge Nodes 10.4
Performance Evaluation 10.5 To Acknowledge or Not To Acknowledge: The
CSMA-CA Bridge 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 10.7
Modeling the Transmission Medium and Packet Service Times Summary and
Further Reading IV Security 11 Security in 802.15.4 Specification 11.1
Security Services 11.2 Auxiliary Security Header 11.3 Securing and
Unsecuring Frames 11.4 Attacks 12 The Cost of Secure and Reliable Sensing
12.1 Analytical Model of a Generic Key Update Algorithm 12.2 Analysis of
the Node Buffer 12.3 Success Probabilities 12.4 Key Update in a
Multi-Cluster Network 12.5 Cluster Lifetime 12.6 Evaluation of Lifetimes
and Populations Summary and Further Reading V Appendices A An Overview of
ZigBee A.1 ZigBee Functionality A.2 Device Roles A.3 Network Topologies and
Routing A.4 Security B Probability generating functions and Laplace
transforms Bibliography
Contents Preface I Prologue: WPANs and 802.15.4 1 1 Wireless Personal Area
Networks 1.1 Wireless Ad Hoc Networks 1.2 Design Goals for the MAC Protocol
1.3 Classification of MAC Protocols For Ad Hoc Networks 1.4
Contention-Based MAC Protocols 1.5 New Kinds of Ad Hoc Networks 1.6 Sensor
Networks 2 Operation of the IEEE 802.15.4 network 2.1 Physical Layer
Characteristics 2.2 Star Topology and Beacon Enabled Operation 2.3 Slotted
CSMA-CA Medium Access 2.4 Acknowledging Successful Transmissions 2.5
Downlink Communication in Beacon Enabled Mode 2.6 Guaranteed Time Slots 2.7
Peer-to-Peer Topology and Non-Beacon Enabled Operation 2.8 Device
Functionality and Cluster Formation 2.9 Format of the PHY and MAC frames II
Single-Cluster Networks 3 Cluster with Uplink Traffic 3.1 The System Model
- Preliminaries 3.2 Superframe With an Active Period Only 3.3 Superframe
With Both Active and Inactive Periods 3.4 Probability Distribution of the
Packet Service Time 3.5 Probability Distribution of the Queue Length 3.6
Access Delay 3.7 Performance Results 4 Cluster With Uplink And Downlink
Traffic 4.1 The System Model 4.2 Modeling the Behavior of the Medium 4.3
Probability Distribution For the Packet Service Time 4.4 Performance of the
Cluster With Bidirectional Traffic 5 MAC Layer Performance Limitations 5.1
Congestion of Packets Deferred to The Next Superframe 5.2 Congestion After
The Inactive Period 5.3 Congestion of Uplink Data Requests 5.4 Blocking of
Uplink Data and Data Requests 5.5 Possible Remedies 6 Activity Management
Through Bernoulli Scheduling 6.1 The Need For Activity Management 6.2
Analysis of Activity Management 6.3 Analysis of the Impact of MAC and PHY
Layers 6.4 Controlling the Event Sensing Reliability 6.5 Activity
Management Policy 7 Admission Control Issues 7.1 The Need for Admission
Control 7.2 Performance Under Asymmetric Packet Arrival Rates 7.3
Calculating the Admission Condition 7.4 Performance of Admission Control
Summary and Further Reading III Multi-Cluster Networks 8 Cluster
InterconnectionWith Master-Slave Bridges 8.1 Analysis of Bridge Operation
8.2 Markov Chain Model for A Single Node 8.3 Performance of the Network 8.4
Network with a Single Source Cluster/Bridge 8.5 Network with Two Source
Clusters/Bridges 8.6 Modeling the Transmission Medium and Packet Service
Times 9 Equalization of Cluster Lifetimes 9.1 Modeling the Clusters 9.2
Distributed Activity Management 9.3 Energy Consumption in Interconnected
Clusters 9.4 Performance of activity management 10 Cluster Interconnection
with Slave-Slave Bridges 10.1 Operation of the SS Bridge 10.2 Markov Chain
Model for the SS Bridge 10.3 Markov Chain for Non-Bridge Nodes 10.4
Performance Evaluation 10.5 To Acknowledge or Not To Acknowledge: The
CSMA-CA Bridge 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 10.7
Modeling the Transmission Medium and Packet Service Times Summary and
Further Reading IV Security 11 Security in 802.15.4 Specification 11.1
Security Services 11.2 Auxiliary Security Header 11.3 Securing and
Unsecuring Frames 11.4 Attacks 12 The Cost of Secure and Reliable Sensing
12.1 Analytical Model of a Generic Key Update Algorithm 12.2 Analysis of
the Node Buffer 12.3 Success Probabilities 12.4 Key Update in a
Multi-Cluster Network 12.5 Cluster Lifetime 12.6 Evaluation of Lifetimes
and Populations Summary and Further Reading V Appendices A An Overview of
ZigBee A.1 ZigBee Functionality A.2 Device Roles A.3 Network Topologies and
Routing A.4 Security B Probability generating functions and Laplace
transforms Bibliography
Networks 1.1 Wireless Ad Hoc Networks 1.2 Design Goals for the MAC Protocol
1.3 Classification of MAC Protocols For Ad Hoc Networks 1.4
Contention-Based MAC Protocols 1.5 New Kinds of Ad Hoc Networks 1.6 Sensor
Networks 2 Operation of the IEEE 802.15.4 network 2.1 Physical Layer
Characteristics 2.2 Star Topology and Beacon Enabled Operation 2.3 Slotted
CSMA-CA Medium Access 2.4 Acknowledging Successful Transmissions 2.5
Downlink Communication in Beacon Enabled Mode 2.6 Guaranteed Time Slots 2.7
Peer-to-Peer Topology and Non-Beacon Enabled Operation 2.8 Device
Functionality and Cluster Formation 2.9 Format of the PHY and MAC frames II
Single-Cluster Networks 3 Cluster with Uplink Traffic 3.1 The System Model
- Preliminaries 3.2 Superframe With an Active Period Only 3.3 Superframe
With Both Active and Inactive Periods 3.4 Probability Distribution of the
Packet Service Time 3.5 Probability Distribution of the Queue Length 3.6
Access Delay 3.7 Performance Results 4 Cluster With Uplink And Downlink
Traffic 4.1 The System Model 4.2 Modeling the Behavior of the Medium 4.3
Probability Distribution For the Packet Service Time 4.4 Performance of the
Cluster With Bidirectional Traffic 5 MAC Layer Performance Limitations 5.1
Congestion of Packets Deferred to The Next Superframe 5.2 Congestion After
The Inactive Period 5.3 Congestion of Uplink Data Requests 5.4 Blocking of
Uplink Data and Data Requests 5.5 Possible Remedies 6 Activity Management
Through Bernoulli Scheduling 6.1 The Need For Activity Management 6.2
Analysis of Activity Management 6.3 Analysis of the Impact of MAC and PHY
Layers 6.4 Controlling the Event Sensing Reliability 6.5 Activity
Management Policy 7 Admission Control Issues 7.1 The Need for Admission
Control 7.2 Performance Under Asymmetric Packet Arrival Rates 7.3
Calculating the Admission Condition 7.4 Performance of Admission Control
Summary and Further Reading III Multi-Cluster Networks 8 Cluster
InterconnectionWith Master-Slave Bridges 8.1 Analysis of Bridge Operation
8.2 Markov Chain Model for A Single Node 8.3 Performance of the Network 8.4
Network with a Single Source Cluster/Bridge 8.5 Network with Two Source
Clusters/Bridges 8.6 Modeling the Transmission Medium and Packet Service
Times 9 Equalization of Cluster Lifetimes 9.1 Modeling the Clusters 9.2
Distributed Activity Management 9.3 Energy Consumption in Interconnected
Clusters 9.4 Performance of activity management 10 Cluster Interconnection
with Slave-Slave Bridges 10.1 Operation of the SS Bridge 10.2 Markov Chain
Model for the SS Bridge 10.3 Markov Chain for Non-Bridge Nodes 10.4
Performance Evaluation 10.5 To Acknowledge or Not To Acknowledge: The
CSMA-CA Bridge 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 10.7
Modeling the Transmission Medium and Packet Service Times Summary and
Further Reading IV Security 11 Security in 802.15.4 Specification 11.1
Security Services 11.2 Auxiliary Security Header 11.3 Securing and
Unsecuring Frames 11.4 Attacks 12 The Cost of Secure and Reliable Sensing
12.1 Analytical Model of a Generic Key Update Algorithm 12.2 Analysis of
the Node Buffer 12.3 Success Probabilities 12.4 Key Update in a
Multi-Cluster Network 12.5 Cluster Lifetime 12.6 Evaluation of Lifetimes
and Populations Summary and Further Reading V Appendices A An Overview of
ZigBee A.1 ZigBee Functionality A.2 Device Roles A.3 Network Topologies and
Routing A.4 Security B Probability generating functions and Laplace
transforms Bibliography