05.01.2015 Views

Wireless Sensor Networks : Technology, Protocols, and Applications

Wireless Sensor Networks : Technology, Protocols, and Applications

Wireless Sensor Networks : Technology, Protocols, and Applications

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IEEE 802.15.4 LR-WPANs STANDARD CASE STUDY 175<br />

TABLE 5.1<br />

IEEE 80215.4 PHY Layer Main Parameters<br />

Parameter 2.4-GHz PHY 868/915-MHz PHY<br />

Sensitivity @ 1% PER 85 dBm 92 dBm<br />

Receiver maximum<br />

20 dBm<br />

input level<br />

Adjacent channel<br />

0 dB<br />

rejection<br />

Alternate channel<br />

30 dB<br />

rejection<br />

Output power, lowest<br />

3 dBm<br />

maximum<br />

Transmission modulation<br />

EMV < 35% for<br />

accuracy<br />

1000 chips<br />

Number of channels 16 1/10<br />

Channel spacing 5 MHz NA a /2 MHz<br />

Transmission rates<br />

Date rate 250 kbps 20/40 kbps<br />

Symbol rate 62.5 kilosymbols/sec 20/40 kilosymbols/sec<br />

Chip rate 2 megachips/sec 300/60 kilochips/sec<br />

Chip modulation O-QPSK with half-sine BPSK with raised<br />

pulse shaping (MKS) cosine pulse shaping<br />

RX-TX <strong>and</strong> TX-RX<br />

12 symbols<br />

turnaround time<br />

a Single channel.<br />

(CCA). The PHY layer is also specified with a wide range of operational low-power<br />

features, including low-duty-cycle operations, strict power management, <strong>and</strong> low<br />

transmission overhead. These parameters are listed in Table 5.1.<br />

The MAC layer h<strong>and</strong>les network association <strong>and</strong> disassociation. It also regulates<br />

access to the medium. This is achieved through two modes of operation: beaconing<br />

<strong>and</strong> nonbeaconing. The beaconing mode is specified for environments where control<br />

<strong>and</strong> data forwarding is achieved by an always-active device. The nonbeaconing<br />

mode specifies the use of unslotted, nonpersistent CSMA-based MAC protocol.<br />

The network layer provides the functionality required to support network configuration<br />

<strong>and</strong> device discovery, association <strong>and</strong> disassociation, topology management,<br />

MAC-layer management, routing, <strong>and</strong> security management. Three network<br />

topologies—star, mesh, <strong>and</strong> cluster tree—are supported.<br />

The security layer leverages the basic security services specified by the IEEE<br />

802.15.4 security model to provide support for infrastructure security <strong>and</strong> application<br />

data security. The first security service of the IEEE 802.15.4 security model<br />

provides support for access control. This basic security service prevents unauthorized<br />

parties from participating in the network. It allows a legitimate device to maintain<br />

a list of trusted devices in the network. A legitimate device uses this list to<br />

detect <strong>and</strong> reject messages from unauthorized devices. The second security service

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!