Open In App

Introduction of IEEE 802.15.4 Technology

Last Updated : 22 Feb, 2023
Improve
Improve
Like Article
Like
Save
Share
Report

IEEE 802.15.4 is a low-cost, low-data-rate wireless access technology for devices that are operated or work on batteries. This describes how low-rate wireless personal area networks (LR-WPANs) function.

IEEE 802.15.4e:

802.15.4e for industrial applications and 802.15.4g for the smart utility networks (SUN)

 The 802.15.4e improves the old standard by introducing mechanisms such as time slotted access, multichannel communication and channel hopping.

  • IEEE 802.15.4e introduces the following general functional enhancements:

 1. Low Energy (LE): This mechanism is intended for applications that can trade latency for energy efficiency. It allows a node to operate with a very low duty cycle.

 2. Information Elements (IE) It is an extensible mechanism to exchange information at the MAC sublayer. 

3. Enhanced Beacons (EB): Enhanced Beacons are an extension of the 802.15.4 beacon frames and provide a greater flexibility. They allow to create application-specific frames.

4. Multipurpose Frame: This mechanism provides a flexible frame format that can address a number of MAC operations. It is based on IEs.

5. MAC Performance Metric: It is a mechanism to provide appropriate feedback on the channel quality to the networking and upper layers, so that appropriate decision can be taken.

6. Fast Association (FastA) The 802.15.4 association procedure introduces a significant delay in order to save energy. For time-critical application latency has priority over energy efficiency.

  • IEEE 802.15.4e defines five new MAC behavior modes.

1. Time Slotted Channel Hopping (TSCH): It targets application domains such as industrial automation and process control, providing support for multi-hop and multichannel communications, through a TDMA approach.

2. Deterministic and Synchronous Multi-channel Extension (DSME): It is aimed to support both industrial and commercial applications.

 3. Low Latency Deterministic Network (LLDN): Designed for single-hop and single channel networks

 4. Radio Frequency Identification Blink (BLINK): It is intended for application domains such as item/people identification, location and tracking.

 5. Asynchronous multi-channel adaptation (AMCA): It is targeted to application domains where large deployments are required, such as smart utility networks, infrastructure monitoring networks, and process control networks.

Properties:

1. Standardization and alliances: It specifies low-data-rate PHY and MAC layer requirements for wireless personal area networks (WPAN).
IEEE 802.15. Protocol Stacks include:

  • ZigBee: ZigBee is a Personal Area Network task group with a low rate task group 4. It is a technology of home networking. ZigBee is a technological standard created for controlling and sensing the network. As we know that ZigBee is the Personal Area network of task group 4 so it is based on IEEE 802.15.4 and is created by Zigbee Alliance. 
  • 6LoWPAN: The 6LoWPAN system is used for a variety of applications including wireless sensor networks. This form of wireless sensor network sends data as packets and uses IPv6 – providing the basis for the name – IPv6 over Low power Wireless Personal Area Networks.
  • ZigBee IP: Zigbee is a standards-based wireless technology that was developed for low-cost and low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  • ISA100.11a: It is a mesh network that provides secure wireless communication to process control.
  • Wireless HART: It is also a wireless sensor network technology, that makes use of time-synchronized and self-organizing architecture.
  • Thread: Thread is an IPv6-based networking protocol for low-power Internet of Things devices in IEEE 802.15. 4-2006 wireless mesh network. Thread is independent.

2. Physical Layer: This standard enables a wide range of PHY options in ISM bands, ranging from 2.4 GHz to sub-GHz frequencies. IEEE 802.15.4 enables data transmission speeds of 20 kilobits per second, 40 kilobits per second, 100 kilobits per second, and 250 kilobits per second. The fundamental structure assumes a 10-meter range and a data rate of 250 kilobits per second. To further reduce power usage, even lower data rates are possible. IEEE 802.15.4 regulates the RF transceiver and channel selection, and even some energy and signal management features, at the physical layer. Based on the frequency range and data performance needed, there are now six PHYs specified. Four of them employ frequency hopping techniques known as Direct Sequence Spread Spectrum (DSSS). Both PHY data service and management service share a single packet structure so that they can maintain a common simple interface with MAC.

3. MAC layer: The MAC layer provides links to the PHY channel by determining that devices in the same region will share the assigned frequencies. The scheduling and routing of data packets are also managed at this layer.  The 802.15.4 MAC layer is responsible for a number of functions like:

  • Beaconing for devices that operate as controllers in a network.
  • used to associate and dissociate PANs with the help of devices.
  • The safety of the device.
  • Consistent communication between two MAC devices that are in a peer-to-peer relationship.

Several established frame types are used by the MAC layer to accomplish these functions. In 802.15.4, there are four different types of MAC frames:

  • frame of data
  • Frame for a beacon
  • Frame of acknowledgement
  • Frame for MAC commands

4. Topology: Networks based on IEEE 802.15.4 can be developed in a star, peer-to-peer, or mesh topology. Mesh networks connect a large number of nodes. This enables nodes that would otherwise be out of range to interact with each other to use intermediate nodes to relay data.

5. Security: For data security, the IEEE 802.15.4 standard employs the Advanced Encryption Standard (AES) with a 128-bit key length as the basic encryption technique. Activating such security measures for 802.15.4 significantly alters the frame format and uses a few of the payloads. The very first phase in activating AES encryption is to use the Security Enabled field in the Frame Control part of the 802.15.4 header. For safety, this field is a single bit which is assigned to 1. When this bit is set, by taking certain bytes from its Payload field, a field known as the Auxiliary Security Header is formed following the Source Address field.

6. Competitive Technologies: The IEEE 802.15.4 PHY and MAC layers serve as a basis for a variety of networking profiles that operate in different IoT access scenarios. DASH7 is a competing radio technology with distinct PHY and MAC layers.

The architecture of LR-WPAN Device: 

IEEE 802.15.4

Advantages of IEEE 802.15.4: 

IEEE 802.15.4 has the following advantages:

  • cheap cost
  • long battery life,
  • Quick installation
  • simple
  • extensible protocol stack

Disadvantages of IEEE 802.15.4:

IEEE 802.15.4’s drawbacks include:

  • IEEE 802.15.4 causes interference and multipath fading.
  • doesn’t employ a frequency-hopping approach.
  • unbounded latency
  • interference susceptibility

Applications of IEEE 802.15.4:

IEEE 802.15.4 Applications:

  • Wireless sensor networks in the industry
  • Building and home automation
  • Remote controllers and interacting toys
  • Automotive networks

Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads