Engineering Book from C.H.I.P.S.

Wireless Personal Area Networks
Performance, Interconnections and Security with IEEE 802.15.4
by Jelene Misic

Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard.

Wireless Personal Area Networks the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.

Wireless Personal Area Networks:

  • Provides a comprehensive, in-depth look at the issues surrounding WPAN network operation and performance.
  • Investigates multi-cluster networks and compares how they can be implemented.
  • Analyzes the performance of a single cluster under different traffic and power management regimes including uplink vs. downlink traffic, acknowledged vs. unacknowledged traffic, saturation vs. non-saturation, and the like.
  • Discusses security issues in WPANs such as different security threats, their impact on performance, standard security mechanisms, and security policies.
  • Compares the IEEE 802.15.4 standard with the related Bluetooth IEEE 802.15.1 standard in terms of suitability for implementing wireless sensor networks.


Wireless Personal Area Networks

  1. Wireless Ad Hoc Networks
  2. Design Goals for the MAC Protocol
  3. Classification of MAC Protocols For Ad Hoc Networks
  4. Contention-Based MAC Protocols
  5. New Kinds of Ad Hoc Networks
  6. Sensor Networks

Operation of the IEEE 802.15.4 network

  1. Physical Layer Characteristics
  2. Star Topology and Beacon Enabled Operation
  3. Slotted CSMA-CA Medium Access
  4. Acknowledging Successful Transmissions
  5. Downlink Communication in Beacon Enabled Mode
  6. Guaranteed Time Slots
  7. Peer-to-Peer Topology and Non-Beacon Enabled Operation
  8. Device Functionality and Cluster Formation
  9. Format of the PHY and MAC frames

Cluster with Uplink Traffic

  1. The System Model Preliminaries
  2. Superframe With an Active Period Only
  3. Superframe With Both Active and Inactive Periods
  4. Probability Distribution of the Packet Service Time
  5. Probability Distribution of the Queue Length
  6. Access Delay
  7. Performance Results

Cluster With Uplink And Downlink Traffic

  1. The System Model
  2. Modeling the Behavior of the Medium
  3. Probability Distribution For the Packet Service Time
  4. Performance of the Cluster With Bidirectional Traffic

MAC Layer Performance Limitations

  1. Congestion of Packets Deferred to The Next Superframe
  2. Congestion After The Inactive Period
  3. Congestion of Uplink Data Requests
  4. Blocking of Uplink Data and Data Requests
  5. Possible Remedies
Activity Management Through Bernoulli Scheduling

  1. The Need For Activity Management
  2. Analysis of Activity Management
  3. Analysis of the Impact of MAC and PHY Layers
  4. Controlling the Event Sensing Reliability
  5. Activity Management Policy

Admission Control Issues

  1. The Need for Admission Control
  2. Performance Under Asymmetric Packet Arrival Rates
  3. Calculating the Admission Condition
  4. Performance of Admission Control

Cluster InterconnectionWith Master-Slave Bridges

  1. Analysis of Bridge Operation
  2. Markov Chain Model for A Single Node
  3. Performance of the Network
  4. Network with a Single Source Cluster/Bridge
  5. Network with Two Source Clusters/Bridges
  6. Modeling the Transmission Medium and Packet Service Times

Equalization of Cluster Lifetimes

  1. Modeling the Clusters
  2. Distributed Activity Management
  3. Energy Consumption in Interconnected Clusters
  4. Performance of activity management

Cluster Interconnection with Slave-Slave Bridges

  1. Operation of the SS Bridge
  2. Markov Chain Model for the SS Bridge
  3. Markov Chain for Non-Bridge Nodes
  4. Performance Evaluation
  5. To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge
  6. Thou Shalt Not Acknowledge: The GTS Bridge
  7. Modeling the Transmission Medium and Packet Service Times

Security in 802.15.4 Specification

  1. Security Services
  2. Auxiliary Security Header
  3. Securing and Unsecuring Frames
  4. Attacks

The Cost of Secure and Reliable Sensing

  1. Analytical Model of a Generic Key Update Algorithm
  2. Analysis of the Node Buffer
  3. Success Probabilities
  4. Key Update in a Multi-Cluster Network
  5. Cluster Lifetime
  6. Evaluation of Lifetimes and Populations


click here to see books of related interest


Wireless Personal Area Networks
Performance, Interconnections and Security
with IEEE 802.15.4
by Jelene Misic

2008 313 pages $129.00 + shipping
Texas residents please add 6.75 % sales tax

Go to Top of Page

copyright © 1997-2009 Culinary and Hospitality Industry Publications Services