Wireless Personal Area Networks Introduction
- Wireless Ad Hoc Networks
- Design Goals for the MAC Protocol
- Classification of MAC Protocols for Ad Hoc Networks
- New Kinds of Ad Hoc Networks
- Sensor Networks
Operation of the IEEE 802.15.4 Network
- Physical Layer Characteristics
- Star Topology and Beacon Enabled Operation
- Slotted CSMA-CA Medium Access
- Acknowledging Successful Transmissions
- Downlink Communication in Beacon Enabled Mode
- Guaranteed Time Slots
- Peer-to-Peer Topology and Non-Beacon Enabled Operation
- Device Functionality and Cluster Formation
- Format of the PHY and MAC frames
Cluster with Uplink Traffic
- The System Model – Preliminaries
- Superframe with an Active Period Only
- Superframe with Both Active and Inactive Periods
- Probability Distribution of the Packet Service Time
- Probability Distribution of the Queue Length
- Access Delay
- Performance Results
Cluster with Uplink and Downlink Traffic
- The System Model
- Modeling the Behavior of the Medium
- Probability Distribution for the Packet Service Time
- Performance of the Cluster with Bidirectional Traffic
MAC Layer Performance Limitations
- Congestion of Packets Deferred to the Next Superframe
- Congestion after the Inactive Period
- Congestion of Uplink Data Requests
- Blocking of Uplink Data and Data Requests
- Possible Remedies
Activity Management through Bernoulli Scheduling
- The Need for Activity Management
- Analysis of Activity Management
- Analysis of the Impact of MAC and PHY Layers
- Controlling the Event Sensing Reliability
- Activity Management Policy
- The Need for Admission Control
- Performance under Asymmetric Packet Arrival Rates
- Calculating the Admission Condition
- Performance of Admission Control
Cluster Interconnection with Master-Slave Bridges
- Analysis of Bridge Operation
- Markov Chain Model for a Single Node
- Performance of the Network
- Network with a Single Source Cluster/Bridge
- Network with Two Source Clusters/Bridges
- Modeling the Transmission Medium and Packet Service Times
Equalization of Cluster Lifetimes
- Modeling the Clusters
- Distributed Activity Management
- Energy Consumption in Interconnected Clusters
- Performance of Activity Management
Cluster Interconnection with Slave-Slave Bridges
- Operation of the SS Bridge
- Markov Chain Model for the SS Bridge
- Markov Chain for Non-Bridge Nodes
- Performance Evaluation
- To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge
- Thou Shalt Not Acknowledge: The GTS Bridge
- Modeling the Transmission Medium and Packet Service Times
Security in 802.15.4 Specification
- Security Services
- Auxiliary Security Header
- Securing and Unsecuring Frames
The Cost of Secure and Reliable Sensing
- Analytical Model of a Generic Key Update Algorithm
- Analysis of the Node Buffer
- Success Probabilities
- Key Update in a Multi-Cluster Network
- Cluster Lifetime
- Evaluation of Lifetimes and Populations