SlideShare uma empresa Scribd logo
1 de 69
IEEE 802.15.4 and
cc2420
By
Salah
Borrow slides!
Constraints in WSN
Limited Power
If it is battery powered
Computation power
Higher the frequency, higher the power consumption
Memory
> 100 KB code size
> 10 KB RAM size
Cost is proportional to the memory size
Time constraints
Many applications has time constraints (Real-time)
You must turn off radio for some time.
Otherwise it wouldn’t last for too long
You cannot do complicated algorithm
on one node
Cost is very important for the success of
wireless sensor network
You must finish something within some
time
OSI Model
In computer networkIn WSN
Due to the constraints,
usually we have only
three layers for data
transmission
Application specific
Use the protocols
that fits your need
Consider routing and
MAC together to achieve
better performance
Physical
MAC
Routing
Physical Layer
How the bits transmit in real physical world
For wireless communication, it defines
Operating frequency
 2.4 GHz, programmable channel for Taroko
Modulation/demodulation method
Physical data rate
 250 kbps
Transmission power
 Programmable
How the radio chip detect a valid data packet
 Synchronization header
PreambleSYNC
Synchronization
header
LengthData
MAC
Medium Access Control
Control the access of a
shared channel
Wireless channel are
shared among different
nodes
One node access the
shared channel at a time
Two nodes send packet
at the same time, both
packet will drop
(usually)
Need a mechanism to
control the usage of the
channel
Contention Based
No specific schedule, a node will try to send packet
when it needs to send
CSMA: Carrier Sense Multiple Access
 C wants to send to D
 But A is sending packets to B
 C listen to the channel
 It can hear A is sending
 So C backoff and wait
 When the channel is clear
 C sends packets to D
B
A
D
C
Turn-off Radio
Power consumption while listening
IEEE 802.15.4: approximate 19 mA
For two AAA batteries with 1600 mAh capacity
Out of power in 84 hours if radio is always on
If these are you requirements
Battery powered
Long time operation without replace/recharge battery
Then, you MUST turn-off radio periodically
S-MAC
S-MAC
listen – sleep – listen – sleep
Use RTS-CTS-DATA-ACK
Trade throughput and latency for energy
B-MAC
Key: Low Power Listening (LPL)
B-MAC
CSMA (no RTS-CTS)
Improves over S-MAC
Higher Throughput
Lower Latency
Less energy consumption
TDMA
Time divided
multiple access
Divided into time
slots
TDMA require Time
synchronization
I
B
A
L
G
K
M
E
J
F
D
H
C
Time
A sends; B, C, F
listen
C sends; A, G, M
listen
E sends; J, B, L, K listen
Nodes that do not listen or send, go to sleep
CC2420 Features
IEEE 802.15.4 compliant
250 kbps effective data rate
Hardware MAC encryption (AES-128)
Programmable output power
2400 – 2483.5 MHz
MAC Hardware Support
802.15.4 MAC hardware support:
Automatic preamble generator
Synchronization word insertion/detection
CRC-16 computation and checking over the MAC
payload
Clear Channel Assessment
Energy detection / digital RSSI
Link Quality Indication
Full automatic MAC security(CTR, CBC-MAC, CCM)
Stand-alone AES encryption
IEEE 802.15.4 and Zigbee
IEEE 802.15.4
Wireless MAC and PHY
specifications for low-rate
wireless personal area
networks (LR-WPANs)
ZigBee…802.15.4
Layer 7: ApplicationLayer 7: Application
Layer 6: PresentationLayer 6: Presentation
Layer 5: SessionLayer 5: Session
Layer 4: TransportLayer 4: Transport
Layer 3: NetworkLayer 3: Network
Layer 2: Data Link
• (MAC)
Layer 2: Data Link
• (MAC)
Layer 1: Physical (PHY)Layer 1: Physical (PHY)
OSI 7-Layer
IEEE 802.15.4 MAC
IEEE 802.15.4
2400 MHz PHY
IEEE 802.15.4
868/915 MHz PHY
868MHz / 915MHz
PHY
2.4 GHz
868.3 MHz
Channel 0 Channels 1-10
Channels 11-26
2.4835 GHz
928 MHz902 MHz
5 MHz
2 MHz
2.4 GHz
PHY
IEEE 802.15.4 PHY
PreambleSYNC
Synchronization
header
LengthData
Typical Data Transmit
Transmitter Receiver
listen
PreambleSYNC
Synchronization
header
LengthData
Somebody wants to
send something
Data Frame startLength of the data
PreambleSYNC
Synchronization
header
LengthData PreambleSYNC
Synchronization
header
LengthData
Receive data
PHY Packet Fields
• Preamble (32 bits)
• Start of Packet Delimiter (8 bits)
• PHY Header (8 bits) – PSDU length
• PSDU (0 to 1016 bits) – Data field
IEEE 802.15.4 Packet
IEEE 802.15.4 MAC
Full function device: can do routing
Reduced function device: end device, cannot do routing
Peer-Peer TopologyStar Topology
PAN Coordinator: (1) every network should have at least one coordinator
(2) Other devices joint the coordinator they found
(3) PAN Coordinator assign a 16 bit network to the device
IEEE 802.15.4 Addressing:
MAC address: 64-bit
Network address: 16-bit
PAN identifier: 16-bit
IEEE 802.15.4 Device Classes
 Full function device (FFD)
 Any topology
 PAN coordinator capable
 Talks to any other device
 Implements complete protocol set
 Reduced function device (RFD)
 Limited to star topology or end-device in a
peer-to-peer network.
 Cannot become a PAN coordinator
 Very simple implementation
 Reduced protocol set
IEEE 802.15.4 Definitions
 Network Device: An RFD or FFD
implementation containing an IEEE
802.15.4 medium access control and
physical interface to the wireless medium.
 Coordinator: An FFD with network device
functionality that provides coordination
and other services to the network.
 PAN Coordinator: A coordinator that is the
principal controller of the PAN. A network
has exactly one PAN coordinator.
Low-Power Operation
 Duty-cycle control using superframe
structure
 Beacon order and superframe order
 Coordinator battery life extension
 Indirect data transmission
 Devices may sleep for extended period
over multiple beacons
 Allows control of receiver state by higher
layers
General MAC Frame Format
Octets:2 1 0/2 0/2/8 0/2 0/2/8 variable 2
Destination
PAN
identifier
Destination
address
Source
PAN
identifier
Source
address
MAC
payload
MAC footer
Frame
check
sequence
MAC header
Addressing fields
Frame
control
Sequence
number
Frame
payload
Bits: 0-2 3 4 5 6 7-9 10-11 12-13 14-15
Frame type
Sequrity
enabled
Frame
pending
Ack. Req. Intra PAN Reserved
Dest.
addressing
mode
Reserved
Source
addressing
mode
Frame control field
Beacon Frame Format
Bits: 0-3 4-7 8-11 12 13 14 15
Beacon
order
Superframe
order
Final CAP
slot
Battery life
extension
Reserved
PAN
coordinator
Association
permit
Octets:2 1 4 or 10 2 variable variable variable 2
MAC
footer
Frame
check
sequence
MAC header
Source address
information
MAC payload
Superframe
specification
GTS
fields
Pending
address
fields
Frame
control
Beacon
sequence
number
Beacon payload
MAC Command Frame
 Command Frame Types
 Association request
 Association response
 Disassociation
notification
 Data request
 PAN ID conflict
– Orphan Notification
– Beacon request
– Coordinator realignment
– GTS request
Octets:2 1 4 to 20 1 variable 2
MAC
footer
Frame
check
sequence
Frame
control
Data
sequence
number
Address
information
MAC header MAC payload
Command
type
Command payload
Data Frame Format
Acknowledgement Frame Format
Octets:2 1 2
MAC
footer
Frame
check
sequence
MAC header
Frame
control
Data
sequence
number
Octets:2 1 4 to 20 variable 2
MAC Payload
MAC
footer
Data payload
Frame
check
sequence
MAC header
Frame
control
Data
sequence
number
Address
information
Inter-frame Spacing
For frames ≤ aMaxSIFSFrameSize use short inter-frame spacing (SIFS)
For frames > aMaxSIFSFrameSize use long inter-frame spacing (LIFS)
Long frame ACK Short frame ACK
tack
LIFS tack
SIFS
Acknowledged transmission
Long frame Short frame
LIFS SIFS
Unacknowledged transmission
aTurnaroundTime ≤ tack ≤ (aTurnaroundTime (12 symbols) + aUnitBackoffPeriod (20 symbols))
LIFS > aMaxLIFSPeriod (40 symbols)
SIFS > aMacSIFSPeriod (12 symbols)
Slotted CSMA Procedure
NB = 0, CW = 0
Battery life
extension?
BE = macMinBE
BE = lesser of
(2, macMinBE)
Locate backoff
period boundary
Delay for
random(2BE
- 1) unit
backoff periods
Perform CCA on
backoff period
boundary
Channel idle?
CW = 2, NB = NB+1,
BE = min(BE+1, aMaxBE)
CW = CW - 1
CW = 0?
NB>
macMaxCSMABackoffs
?
Failure Success
Slotted CSMA
Y
Y Y
Y
N
N
N
N
Used in beacon enabled networks.
Un-slotted CSMA Procedure
NB = 0,
BE = macMinBE
Delay for
random(2BE - 1) unit
backoff periods
Perform CCA
Channel idle?
NB = NB+1,
BE = min(BE+1, aMaxBE)
NB>
macMaxCSMABackoffs
?
Failure Success
Un-slotted CSMA
Y
Y
N
N
Used in non-beacon
networks.
General View
CC2420CC2420 MSP430F1611MSP430F1611
Power and reset
control
SPI interface:
Status indication pins
 Initialization:
 Turn on CC2420, setting the
register and memory
 Now CC2420 is in idle mode
 Transmit
 Do your MAC layer operations
 Write the packet into the transmit
buffer
 Send a transmit command to
CC2420
 Do your MAC layer operations
 Receive
 Turn on receiver to listen
 If a packet arrive, after receive the
last byte of the packet, FIFOP
interrupt will generate
 Go to the FIFOP ISR, fetch the
received packet from receive buffer
 Do your MAC layer operations
CC2420: Registers
Communication: CC2420 MSP430F1611
SPI interface
33 16-bit configuration and status registers
Configuration registers
 Initialization: make the device operate in the way you want
Status registers
 Get the status of the device
15 command strobe registers
Single byte instructions: ask the device to do something
Eg. “send packet”, “start encryption”
Two 8-bit FIFO(buffer) access registers
Access receive and transmit buffer
CC2420: RAM
 Internal 368 bytes RAM
 4 bytes blank (not used)
 16 bytes IEEE802.15.4 addressing
 112 bytes security bank
 128 bytes receive FIFO
 128 bytes transmit FIFO
IEEE802.15.4
addressing
security bank
receive buffer
Transmit buffer
MSP430 SPI
It is similar to UART
Initial SPI module by setting proper registers
Check User guide for further detail
Send a byte to CC2420
Write to U0TXBUF
Receive a byte from CC2420
Write a byte to U0TXBUF
Wait for U0RXBUF ready, read the byte from U0RXBUF
You must send a byte to CC2420 in order to read a byte
 In SPI protocol, master must send something to push slave send data
back
 You don’t need receive interrupt (unlike UART)
When will CC2420 know MSP430 wants to send something to
it?
Pull the CSn pin low
Access Registers
Registers
Read/write registers
RAM (1)/
Reg (0)
Read(1)/
Write(0) Address
BIT 7 BIT 6 BIT 5:0
Register Value
Setting Register
0 0 Address
Register Value
Read Register value
0 1 Address
Status
send
Receive
Register Value
Send Command Strobe
0 0 Address
Status
send
Receive
send
Receive StatusStatus
Access RAM
RAM access:
 Crystal oscillator must be running and stable for RAM access
 DO NOT use RAM access for FIFO
FIFO access: use FIFO access register (Tx: 0x3E, Rx: 0x3F)
Luckily, you don’t need to write these hardware access routines
RAM (1)/
Reg (0) Address
BIT 7 BIT 5BIT 6:0
Bank
Read(1)/
Read+Write (0)
X X X X X
BIT 7:6 BIT 4:0
DATA
Receive FIFO
0 0 111110
FIFO DATA
Transmit FIFO
0 1 111111
Status
send
Receive
send
Receive StatusStatus
Status Byte
Status byte is returned
When MSP430 write something to CC2420
Issue a SNOP command (do nothing, just to get the status
byte
Preamble And SFD
 Preamble
 IEEE802.15.4 standard: 4 bytes (0x00)
 Length of preamble is controlled by register: MDMCTRL0
 Programmable length from 1 to 16 bytes
 For IEEE 802.15.4, it is set to 3 bytes long
 Don’t set it to less than 3 bytes
 Each byte is 2 zero-symbols
 Each symbol is 16μs
 SFD
 IEEE 802.15.4 standard: 1 byte (0xA7)
 Programmable by register: SYNCWORD
 SYNCWORD is two bytes long
 When used in IEEE 802.15.4: one byte for preamble, another for SFD
Frame Length And FCF
Frame length field: 7-bit
Frame Control Field (FCF)
Compliant to IEEE 802.15.4
Reserved Frame length
BIT 7 BIT 6:0
Frame length
Frame Control Field
If set to 1 means: I have
another packet to send
to you after this packet
Frame Check Sequence
CC2420 can do auto CRC check
Always enable this function
Frame Check Sequence: 2 bytes
In transmit mode
 CRC is auto calculated and append to the transmit packet
In receive mode
 CRC is verified by hardware
 Frame check sequence contain
RSSI
BIT 7:0
CRC OK(1)/
CRC not OK (0)
LQI
BIT 7 BIT 6:0
LQI - Link Quality Indication
RSSI - Receive Signal Strength Indicator
Address Recognition And ACK
Hardware address recognition
Enable/disable by ADR_DECODE bit in MDMCTRL0 register
CC2420 will perform a sequence of address checking when it is
enable
If address recognition fail, CC2420 will reject the frame
Check datasheet for further detail
Acknowledge frames
Hardware support auto acknowledge
Enable/disable by AUTOACK bit in MDMCTRL0 register
If
 Auto ack enabled
 Incoming frames pass address recognition and CRC checking
 Acknowledge requested in FCF
CC2420 will automatically send an acknowledge back to the sender
RSSI
Receive Signal Strength Indicator
Indicate how strong the RF signal is
Averaged over 8 symbol periods (128 μs)
RSSI_VALID status bit indicates when the RSSI value is valid
Receiver has been enabled for at least 8 symbol periods
power P at the RF Pins
RSSI_OFFSET is found empirically during system
development
RSSI_OFFSET is approximately –45
CCA
Clear channel assessment
 Check if the channel is clear
 Based on the measured RSSI value and a programmable threshold
Threshold level
 Programmed by registers: RSSI
3 CCA modes
 Programmed by registers: MDMCTRL0
CCA output pin indicates the channel is cleal or not
 High: channel is clear
 Low: channel is not clear
Frequency and Channel Programming
Operating frequency is set by FSCTRL register
Last 10 bit
Operating frequency Fc
IEEE 802.15.4
16 channels within the 2.4 GHz band, in 5 MHz steps
numbered 11 through 26
There for
Output Power Programming
Controlled by the TXCTRL register
Receive Mode
 SFD pin goes high after the start of frame delimiter (SFD) field has been
completely received.
 If address recognition is disabled or is successful,
 the SFD pin goes low again only after the last byte of the MPDU has
been received.
 Error state SFD goes high immediately Fig 12
 FIFO is high as long as is one or more data bytes in the RXFIFO.
 FIFO pin then remains high until the RXFIFO is empty
 We use FIFOP to indicate the receive of valid packet
 Enable FIFOP interrupt
 RXFIFO overflow
 FIFO pin goes low and FIFOP pin goes high indicate a RXFIFO overflow
 You must send a SFLUSHRX command to CC2420 if RXFIFO overflow
occurred
Receive Mode
Transmit Mode
FIFO and FIFOP pins are still only related to the
RXFIFO.
SFD pin goes high when the SFD field has been
completely transmitted
TXFIFO underflow
Not enough bytes write to the TXFIFO
Indicate in TX_UNDERFLOW bit in status byte
Transmit Mode
Timer capture
Timestamp value
Strobe command
Configuration registers write
and read operations via SPI
Packet Type
Acknowledge packet
Data Packet
5 bytes
Preamble SFD
Frame
Length
FCF
Seq.
number
PAN ID
Destination
address
Source
address
Payload FCS
Bytes
:
4~17
4~17
1 1 2 1 2 2 2 20~116
Minimum: 11 bytes
cc2420
Applications
 2.4 GHz IEEE 802.15.4 systems
 ZigBee systems
 Home/building automation
 Industrial Control
 Wireless sensor networks
 PC peripherals
 Consumer Electronics
Description
 CC2420 is a true single-chip 2.4 GHz IEEE 802.15.4 compliant RF
transceiver
 designed for low-power and low-voltage wireless applications
What are the benefits of
cc2420?
 Provides extensive hardware support for
 Packet handling,
 Data buffering,
 Burst transmissions,
 Data encryption, data authentication,
 Clear channel assessment, link quality indication
and packet timing information
 These reduce the load on the host controller and allow CC2420 to
interface low-cost microcontrollers.
 The configuration interface and transmit/receive FIFOs of CC2420 are
accessed via an SPI interface
Features(1):2400 – 2483.5 MHz RF Transceiver
 Direct Sequence Spread Spectrum (DSSS) transceiver
 250 kbps data rate, 2 MChip/s chip rate
 O-QPSK with half sine pulse shaping modulation
 Very low current consumption (RX: 19.7 mA, TX: 17.4 mA)
 High sensitivity (-94 dBm)
 High adjacent channel rejection(39 dB)
 High alternate channel rejection(55 dB)
 On-chip VCO, LNA and PA
 Low supply voltage (2.1 – 3.6 V)with on-chip voltage regulator
 Programmable output power
 I/Q low-IF soft decision receiver
 I/Q direct up-conversion transmitter
Features (2)
 Separate transmit and receive FIFOs
 128 byte transmit data FIFO
 128 byte receive data FIFO
 Very few external components
 Easy configuration interface
 4-wire SPI interface
 Up to 10 MHz serial clock
Features (3)-802.15.4 MAC hardware support:
 Automatic preamble generator
 Synchronisation word insertion/detection
 CRC-16 computation and checking over the MAC payload
 Clear Channel Assessment
 Energy detection / digital RSSI
 Link Quality Indication
 Full automatic MAC security
(CTR, CBC-MAC, CCM)
 Automated Hardware security
Circuit Description
Circuit Description(2)-receiver
 The received signal is
 amplified by Low noise amplifier and
 Down-converted in to the immediate frequency
 At IF(2 MHz), the complex I/Q signal is filtered and amplified,
 And then digitized by the ADCs.
 Automatic gain control, final channel filtering, despreading, symbol
correlation and byte synchronization are performed digitally
 When the SFD pin goes high
 This indicates that a start of frame delimiter has been
detected

Circuit Description(3)-receiver
 CC2420 buffers the received data in a 128 byte receive FIFO.
 The user may read the FIFO through an SPI interface.
CRC is verified in hardware.
 RSSI and correlation values are appended to the frame.
 CCA is available on a pin in receive mode.
Circuit Description(4)-transmitter
 The CC2420 transmitter is based on direct up-conversion.
 The data is buffered in a 128 byte transmit FIFO (separate from the
receive FIFO).
 The preamble and start of frame delimiter are generated by
hardware.
 Each symbol (4 bits) is spread using the IEEE 802.15.4 spreading
sequence to 32 chips and
 output to the digital-to-analog converters (DACs).
 An analog lowpass filter passes the signal
to the quadrature (I and Q) upconversion mixers.
 The RF signal is amplified in the power amplifier (PA) and
 fed to the antenna
IEEE 802.15.4 Modulation Format
 Each byte is divided into two symbols, 4 bits each
 Least significant symbol is transmitted first
 Each symbol is mapped to one out of 16 pseudo-random sequences,
32 chips
each
IEEE 802.15.4 Modulation
Format
6. PHY specification
Responsibility
 Activation and deactivation of the radio transceiver
 ED within the current channel
 LQI for received packet
 CCA for CSMA-CA
 Channel frequency selection
 Data transmission and reception
6.1 General requirements
and definitions
 Compliant device shall operate in one or several
frequency bands using the modulation and spreading
formats summarized

Mais conteúdo relacionado

Mais procurados

UNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptx
UNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptxUNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptx
UNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptxSnehaLatha68
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layerrobbbminson
 
MQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communicationMQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communicationChristian Götz
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
Protocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkProtocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkSaatviga Sudhahar
 
Dynamic spectrum access
Dynamic spectrum accessDynamic spectrum access
Dynamic spectrum accessSanjana Prasad
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 

Mais procurados (20)

UNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptx
UNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptxUNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptx
UNIT 3 Memory Design for SOC.ppUNIT 3 Memory Design for SOC.pptx
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
MQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communicationMQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communication
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
Protocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkProtocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor Network
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
 
Dynamic spectrum access
Dynamic spectrum accessDynamic spectrum access
Dynamic spectrum access
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Uart
UartUart
Uart
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 

Semelhante a WSN protocol 802.15.4 together with cc2420 seminars

Semelhante a WSN protocol 802.15.4 together with cc2420 seminars (20)

Networking basics
Networking basicsNetworking basics
Networking basics
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
80211
8021180211
80211
 
6 Weeks Industrial Training In Telecom In Chandigarh
6 Weeks Industrial Training In Telecom In Chandigarh6 Weeks Industrial Training In Telecom In Chandigarh
6 Weeks Industrial Training In Telecom In Chandigarh
 
12 ethernet-wifi
12 ethernet-wifi12 ethernet-wifi
12 ethernet-wifi
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless access
 
Wi Max
Wi MaxWi Max
Wi Max
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Max
 
Wimax 4
Wimax 4Wimax 4
Wimax 4
 
Wimax 4
Wimax 4Wimax 4
Wimax 4
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
8-ZigBee (2).pdf
8-ZigBee (2).pdf8-ZigBee (2).pdf
8-ZigBee (2).pdf
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Role of CAN BUS in automotives
Role of CAN BUS in automotivesRole of CAN BUS in automotives
Role of CAN BUS in automotives
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011
 

Mais de Salah Amean

ICT role in Yemen
ICT role in Yemen ICT role in Yemen
ICT role in Yemen Salah Amean
 
Contiki os timer tutorial
Contiki os timer tutorialContiki os timer tutorial
Contiki os timer tutorialSalah Amean
 
protothread and its usage in contiki OS
protothread and its usage in contiki OSprotothread and its usage in contiki OS
protothread and its usage in contiki OSSalah Amean
 
ContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling ProtocolContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling ProtocolSalah Amean
 
Location in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSLocation in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSSalah Amean
 
Bonjour protocol
Bonjour protocolBonjour protocol
Bonjour protocolSalah Amean
 
Optimization Analysis
Optimization AnalysisOptimization Analysis
Optimization AnalysisSalah Amean
 
Mobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemMobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemSalah Amean
 
ict culturing conference presentation _presented 2013_12_07
 ict culturing conference presentation _presented 2013_12_07 ict culturing conference presentation _presented 2013_12_07
ict culturing conference presentation _presented 2013_12_07Salah Amean
 
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Salah Amean
 
Data mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, dataData mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, dataSalah Amean
 
Data Mining:Concepts and Techniques, Chapter 8. Classification: Basic Concepts
Data Mining:Concepts and Techniques, Chapter 8. Classification: Basic ConceptsData Mining:Concepts and Techniques, Chapter 8. Classification: Basic Concepts
Data Mining:Concepts and Techniques, Chapter 8. Classification: Basic ConceptsSalah Amean
 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Salah Amean
 
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methodsData Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methodsSalah Amean
 
Data Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trendData Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trendSalah Amean
 
Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...
Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...
Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...Salah Amean
 
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...Salah Amean
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Salah Amean
 
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 5
Data Mining:  Concepts and Techniques (3rd ed.)— Chapter 5 Data Mining:  Concepts and Techniques (3rd ed.)— Chapter 5
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 5 Salah Amean
 
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
Data Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olapData Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olap
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olapSalah Amean
 

Mais de Salah Amean (20)

ICT role in Yemen
ICT role in Yemen ICT role in Yemen
ICT role in Yemen
 
Contiki os timer tutorial
Contiki os timer tutorialContiki os timer tutorial
Contiki os timer tutorial
 
protothread and its usage in contiki OS
protothread and its usage in contiki OSprotothread and its usage in contiki OS
protothread and its usage in contiki OS
 
ContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling ProtocolContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling Protocol
 
Location in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSLocation in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMS
 
Bonjour protocol
Bonjour protocolBonjour protocol
Bonjour protocol
 
Optimization Analysis
Optimization AnalysisOptimization Analysis
Optimization Analysis
 
Mobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemMobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystem
 
ict culturing conference presentation _presented 2013_12_07
 ict culturing conference presentation _presented 2013_12_07 ict culturing conference presentation _presented 2013_12_07
ict culturing conference presentation _presented 2013_12_07
 
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
 
Data mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, dataData mining :Concepts and Techniques Chapter 2, data
Data mining :Concepts and Techniques Chapter 2, data
 
Data Mining:Concepts and Techniques, Chapter 8. Classification: Basic Concepts
Data Mining:Concepts and Techniques, Chapter 8. Classification: Basic ConceptsData Mining:Concepts and Techniques, Chapter 8. Classification: Basic Concepts
Data Mining:Concepts and Techniques, Chapter 8. Classification: Basic Concepts
 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
 
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methodsData Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
 
Data Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trendData Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trend
 
Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...
Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...
Data Mining: Concepts and techniques: Chapter 11,Review: Basic Cluster Analys...
 
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
 
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 5
Data Mining:  Concepts and Techniques (3rd ed.)— Chapter 5 Data Mining:  Concepts and Techniques (3rd ed.)— Chapter 5
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 5
 
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
Data Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olapData Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olap
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
 

Último

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

WSN protocol 802.15.4 together with cc2420 seminars

  • 2. Constraints in WSN Limited Power If it is battery powered Computation power Higher the frequency, higher the power consumption Memory > 100 KB code size > 10 KB RAM size Cost is proportional to the memory size Time constraints Many applications has time constraints (Real-time) You must turn off radio for some time. Otherwise it wouldn’t last for too long You cannot do complicated algorithm on one node Cost is very important for the success of wireless sensor network You must finish something within some time
  • 3. OSI Model In computer networkIn WSN Due to the constraints, usually we have only three layers for data transmission Application specific Use the protocols that fits your need Consider routing and MAC together to achieve better performance Physical MAC Routing
  • 4. Physical Layer How the bits transmit in real physical world For wireless communication, it defines Operating frequency  2.4 GHz, programmable channel for Taroko Modulation/demodulation method Physical data rate  250 kbps Transmission power  Programmable How the radio chip detect a valid data packet  Synchronization header PreambleSYNC Synchronization header LengthData
  • 5. MAC Medium Access Control Control the access of a shared channel Wireless channel are shared among different nodes One node access the shared channel at a time Two nodes send packet at the same time, both packet will drop (usually) Need a mechanism to control the usage of the channel
  • 6. Contention Based No specific schedule, a node will try to send packet when it needs to send CSMA: Carrier Sense Multiple Access  C wants to send to D  But A is sending packets to B  C listen to the channel  It can hear A is sending  So C backoff and wait  When the channel is clear  C sends packets to D B A D C
  • 7. Turn-off Radio Power consumption while listening IEEE 802.15.4: approximate 19 mA For two AAA batteries with 1600 mAh capacity Out of power in 84 hours if radio is always on If these are you requirements Battery powered Long time operation without replace/recharge battery Then, you MUST turn-off radio periodically
  • 8. S-MAC S-MAC listen – sleep – listen – sleep Use RTS-CTS-DATA-ACK Trade throughput and latency for energy
  • 9. B-MAC Key: Low Power Listening (LPL)
  • 10. B-MAC CSMA (no RTS-CTS) Improves over S-MAC Higher Throughput Lower Latency Less energy consumption
  • 11. TDMA Time divided multiple access Divided into time slots TDMA require Time synchronization I B A L G K M E J F D H C Time A sends; B, C, F listen C sends; A, G, M listen E sends; J, B, L, K listen Nodes that do not listen or send, go to sleep
  • 12. CC2420 Features IEEE 802.15.4 compliant 250 kbps effective data rate Hardware MAC encryption (AES-128) Programmable output power 2400 – 2483.5 MHz
  • 13. MAC Hardware Support 802.15.4 MAC hardware support: Automatic preamble generator Synchronization word insertion/detection CRC-16 computation and checking over the MAC payload Clear Channel Assessment Energy detection / digital RSSI Link Quality Indication Full automatic MAC security(CTR, CBC-MAC, CCM) Stand-alone AES encryption
  • 14. IEEE 802.15.4 and Zigbee IEEE 802.15.4 Wireless MAC and PHY specifications for low-rate wireless personal area networks (LR-WPANs) ZigBee…802.15.4 Layer 7: ApplicationLayer 7: Application Layer 6: PresentationLayer 6: Presentation Layer 5: SessionLayer 5: Session Layer 4: TransportLayer 4: Transport Layer 3: NetworkLayer 3: Network Layer 2: Data Link • (MAC) Layer 2: Data Link • (MAC) Layer 1: Physical (PHY)Layer 1: Physical (PHY) OSI 7-Layer IEEE 802.15.4 MAC IEEE 802.15.4 2400 MHz PHY IEEE 802.15.4 868/915 MHz PHY
  • 15. 868MHz / 915MHz PHY 2.4 GHz 868.3 MHz Channel 0 Channels 1-10 Channels 11-26 2.4835 GHz 928 MHz902 MHz 5 MHz 2 MHz 2.4 GHz PHY IEEE 802.15.4 PHY
  • 16. PreambleSYNC Synchronization header LengthData Typical Data Transmit Transmitter Receiver listen PreambleSYNC Synchronization header LengthData Somebody wants to send something Data Frame startLength of the data PreambleSYNC Synchronization header LengthData PreambleSYNC Synchronization header LengthData Receive data
  • 17. PHY Packet Fields • Preamble (32 bits) • Start of Packet Delimiter (8 bits) • PHY Header (8 bits) – PSDU length • PSDU (0 to 1016 bits) – Data field IEEE 802.15.4 Packet
  • 18. IEEE 802.15.4 MAC Full function device: can do routing Reduced function device: end device, cannot do routing Peer-Peer TopologyStar Topology PAN Coordinator: (1) every network should have at least one coordinator (2) Other devices joint the coordinator they found (3) PAN Coordinator assign a 16 bit network to the device IEEE 802.15.4 Addressing: MAC address: 64-bit Network address: 16-bit PAN identifier: 16-bit
  • 19. IEEE 802.15.4 Device Classes  Full function device (FFD)  Any topology  PAN coordinator capable  Talks to any other device  Implements complete protocol set  Reduced function device (RFD)  Limited to star topology or end-device in a peer-to-peer network.  Cannot become a PAN coordinator  Very simple implementation  Reduced protocol set
  • 20. IEEE 802.15.4 Definitions  Network Device: An RFD or FFD implementation containing an IEEE 802.15.4 medium access control and physical interface to the wireless medium.  Coordinator: An FFD with network device functionality that provides coordination and other services to the network.  PAN Coordinator: A coordinator that is the principal controller of the PAN. A network has exactly one PAN coordinator.
  • 21. Low-Power Operation  Duty-cycle control using superframe structure  Beacon order and superframe order  Coordinator battery life extension  Indirect data transmission  Devices may sleep for extended period over multiple beacons  Allows control of receiver state by higher layers
  • 22. General MAC Frame Format Octets:2 1 0/2 0/2/8 0/2 0/2/8 variable 2 Destination PAN identifier Destination address Source PAN identifier Source address MAC payload MAC footer Frame check sequence MAC header Addressing fields Frame control Sequence number Frame payload Bits: 0-2 3 4 5 6 7-9 10-11 12-13 14-15 Frame type Sequrity enabled Frame pending Ack. Req. Intra PAN Reserved Dest. addressing mode Reserved Source addressing mode Frame control field
  • 23. Beacon Frame Format Bits: 0-3 4-7 8-11 12 13 14 15 Beacon order Superframe order Final CAP slot Battery life extension Reserved PAN coordinator Association permit Octets:2 1 4 or 10 2 variable variable variable 2 MAC footer Frame check sequence MAC header Source address information MAC payload Superframe specification GTS fields Pending address fields Frame control Beacon sequence number Beacon payload
  • 24. MAC Command Frame  Command Frame Types  Association request  Association response  Disassociation notification  Data request  PAN ID conflict – Orphan Notification – Beacon request – Coordinator realignment – GTS request Octets:2 1 4 to 20 1 variable 2 MAC footer Frame check sequence Frame control Data sequence number Address information MAC header MAC payload Command type Command payload
  • 25. Data Frame Format Acknowledgement Frame Format Octets:2 1 2 MAC footer Frame check sequence MAC header Frame control Data sequence number Octets:2 1 4 to 20 variable 2 MAC Payload MAC footer Data payload Frame check sequence MAC header Frame control Data sequence number Address information
  • 26. Inter-frame Spacing For frames ≤ aMaxSIFSFrameSize use short inter-frame spacing (SIFS) For frames > aMaxSIFSFrameSize use long inter-frame spacing (LIFS) Long frame ACK Short frame ACK tack LIFS tack SIFS Acknowledged transmission Long frame Short frame LIFS SIFS Unacknowledged transmission aTurnaroundTime ≤ tack ≤ (aTurnaroundTime (12 symbols) + aUnitBackoffPeriod (20 symbols)) LIFS > aMaxLIFSPeriod (40 symbols) SIFS > aMacSIFSPeriod (12 symbols)
  • 27. Slotted CSMA Procedure NB = 0, CW = 0 Battery life extension? BE = macMinBE BE = lesser of (2, macMinBE) Locate backoff period boundary Delay for random(2BE - 1) unit backoff periods Perform CCA on backoff period boundary Channel idle? CW = 2, NB = NB+1, BE = min(BE+1, aMaxBE) CW = CW - 1 CW = 0? NB> macMaxCSMABackoffs ? Failure Success Slotted CSMA Y Y Y Y N N N N Used in beacon enabled networks.
  • 28. Un-slotted CSMA Procedure NB = 0, BE = macMinBE Delay for random(2BE - 1) unit backoff periods Perform CCA Channel idle? NB = NB+1, BE = min(BE+1, aMaxBE) NB> macMaxCSMABackoffs ? Failure Success Un-slotted CSMA Y Y N N Used in non-beacon networks.
  • 29. General View CC2420CC2420 MSP430F1611MSP430F1611 Power and reset control SPI interface: Status indication pins  Initialization:  Turn on CC2420, setting the register and memory  Now CC2420 is in idle mode  Transmit  Do your MAC layer operations  Write the packet into the transmit buffer  Send a transmit command to CC2420  Do your MAC layer operations  Receive  Turn on receiver to listen  If a packet arrive, after receive the last byte of the packet, FIFOP interrupt will generate  Go to the FIFOP ISR, fetch the received packet from receive buffer  Do your MAC layer operations
  • 30. CC2420: Registers Communication: CC2420 MSP430F1611 SPI interface 33 16-bit configuration and status registers Configuration registers  Initialization: make the device operate in the way you want Status registers  Get the status of the device 15 command strobe registers Single byte instructions: ask the device to do something Eg. “send packet”, “start encryption” Two 8-bit FIFO(buffer) access registers Access receive and transmit buffer
  • 31. CC2420: RAM  Internal 368 bytes RAM  4 bytes blank (not used)  16 bytes IEEE802.15.4 addressing  112 bytes security bank  128 bytes receive FIFO  128 bytes transmit FIFO IEEE802.15.4 addressing security bank receive buffer Transmit buffer
  • 32. MSP430 SPI It is similar to UART Initial SPI module by setting proper registers Check User guide for further detail Send a byte to CC2420 Write to U0TXBUF Receive a byte from CC2420 Write a byte to U0TXBUF Wait for U0RXBUF ready, read the byte from U0RXBUF You must send a byte to CC2420 in order to read a byte  In SPI protocol, master must send something to push slave send data back  You don’t need receive interrupt (unlike UART) When will CC2420 know MSP430 wants to send something to it? Pull the CSn pin low
  • 33. Access Registers Registers Read/write registers RAM (1)/ Reg (0) Read(1)/ Write(0) Address BIT 7 BIT 6 BIT 5:0 Register Value Setting Register 0 0 Address Register Value Read Register value 0 1 Address Status send Receive Register Value Send Command Strobe 0 0 Address Status send Receive send Receive StatusStatus
  • 34. Access RAM RAM access:  Crystal oscillator must be running and stable for RAM access  DO NOT use RAM access for FIFO FIFO access: use FIFO access register (Tx: 0x3E, Rx: 0x3F) Luckily, you don’t need to write these hardware access routines RAM (1)/ Reg (0) Address BIT 7 BIT 5BIT 6:0 Bank Read(1)/ Read+Write (0) X X X X X BIT 7:6 BIT 4:0 DATA Receive FIFO 0 0 111110 FIFO DATA Transmit FIFO 0 1 111111 Status send Receive send Receive StatusStatus
  • 35. Status Byte Status byte is returned When MSP430 write something to CC2420 Issue a SNOP command (do nothing, just to get the status byte
  • 36. Preamble And SFD  Preamble  IEEE802.15.4 standard: 4 bytes (0x00)  Length of preamble is controlled by register: MDMCTRL0  Programmable length from 1 to 16 bytes  For IEEE 802.15.4, it is set to 3 bytes long  Don’t set it to less than 3 bytes  Each byte is 2 zero-symbols  Each symbol is 16μs  SFD  IEEE 802.15.4 standard: 1 byte (0xA7)  Programmable by register: SYNCWORD  SYNCWORD is two bytes long  When used in IEEE 802.15.4: one byte for preamble, another for SFD
  • 37. Frame Length And FCF Frame length field: 7-bit Frame Control Field (FCF) Compliant to IEEE 802.15.4 Reserved Frame length BIT 7 BIT 6:0 Frame length
  • 38. Frame Control Field If set to 1 means: I have another packet to send to you after this packet
  • 39. Frame Check Sequence CC2420 can do auto CRC check Always enable this function Frame Check Sequence: 2 bytes In transmit mode  CRC is auto calculated and append to the transmit packet In receive mode  CRC is verified by hardware  Frame check sequence contain RSSI BIT 7:0 CRC OK(1)/ CRC not OK (0) LQI BIT 7 BIT 6:0 LQI - Link Quality Indication RSSI - Receive Signal Strength Indicator
  • 40. Address Recognition And ACK Hardware address recognition Enable/disable by ADR_DECODE bit in MDMCTRL0 register CC2420 will perform a sequence of address checking when it is enable If address recognition fail, CC2420 will reject the frame Check datasheet for further detail Acknowledge frames Hardware support auto acknowledge Enable/disable by AUTOACK bit in MDMCTRL0 register If  Auto ack enabled  Incoming frames pass address recognition and CRC checking  Acknowledge requested in FCF CC2420 will automatically send an acknowledge back to the sender
  • 41. RSSI Receive Signal Strength Indicator Indicate how strong the RF signal is Averaged over 8 symbol periods (128 μs) RSSI_VALID status bit indicates when the RSSI value is valid Receiver has been enabled for at least 8 symbol periods power P at the RF Pins RSSI_OFFSET is found empirically during system development RSSI_OFFSET is approximately –45
  • 42. CCA Clear channel assessment  Check if the channel is clear  Based on the measured RSSI value and a programmable threshold Threshold level  Programmed by registers: RSSI 3 CCA modes  Programmed by registers: MDMCTRL0 CCA output pin indicates the channel is cleal or not  High: channel is clear  Low: channel is not clear
  • 43. Frequency and Channel Programming Operating frequency is set by FSCTRL register Last 10 bit Operating frequency Fc IEEE 802.15.4 16 channels within the 2.4 GHz band, in 5 MHz steps numbered 11 through 26 There for
  • 44. Output Power Programming Controlled by the TXCTRL register
  • 45. Receive Mode  SFD pin goes high after the start of frame delimiter (SFD) field has been completely received.  If address recognition is disabled or is successful,  the SFD pin goes low again only after the last byte of the MPDU has been received.  Error state SFD goes high immediately Fig 12  FIFO is high as long as is one or more data bytes in the RXFIFO.  FIFO pin then remains high until the RXFIFO is empty  We use FIFOP to indicate the receive of valid packet  Enable FIFOP interrupt  RXFIFO overflow  FIFO pin goes low and FIFOP pin goes high indicate a RXFIFO overflow  You must send a SFLUSHRX command to CC2420 if RXFIFO overflow occurred
  • 47. Transmit Mode FIFO and FIFOP pins are still only related to the RXFIFO. SFD pin goes high when the SFD field has been completely transmitted TXFIFO underflow Not enough bytes write to the TXFIFO Indicate in TX_UNDERFLOW bit in status byte
  • 49.
  • 51. Configuration registers write and read operations via SPI
  • 52. Packet Type Acknowledge packet Data Packet 5 bytes Preamble SFD Frame Length FCF Seq. number PAN ID Destination address Source address Payload FCS Bytes : 4~17 4~17 1 1 2 1 2 2 2 20~116 Minimum: 11 bytes
  • 53.
  • 55. Applications  2.4 GHz IEEE 802.15.4 systems  ZigBee systems  Home/building automation  Industrial Control  Wireless sensor networks  PC peripherals  Consumer Electronics
  • 56. Description  CC2420 is a true single-chip 2.4 GHz IEEE 802.15.4 compliant RF transceiver  designed for low-power and low-voltage wireless applications
  • 57. What are the benefits of cc2420?  Provides extensive hardware support for  Packet handling,  Data buffering,  Burst transmissions,  Data encryption, data authentication,  Clear channel assessment, link quality indication and packet timing information  These reduce the load on the host controller and allow CC2420 to interface low-cost microcontrollers.  The configuration interface and transmit/receive FIFOs of CC2420 are accessed via an SPI interface
  • 58. Features(1):2400 – 2483.5 MHz RF Transceiver  Direct Sequence Spread Spectrum (DSSS) transceiver  250 kbps data rate, 2 MChip/s chip rate  O-QPSK with half sine pulse shaping modulation  Very low current consumption (RX: 19.7 mA, TX: 17.4 mA)  High sensitivity (-94 dBm)  High adjacent channel rejection(39 dB)  High alternate channel rejection(55 dB)  On-chip VCO, LNA and PA  Low supply voltage (2.1 – 3.6 V)with on-chip voltage regulator  Programmable output power  I/Q low-IF soft decision receiver  I/Q direct up-conversion transmitter
  • 59. Features (2)  Separate transmit and receive FIFOs  128 byte transmit data FIFO  128 byte receive data FIFO  Very few external components  Easy configuration interface  4-wire SPI interface  Up to 10 MHz serial clock
  • 60. Features (3)-802.15.4 MAC hardware support:  Automatic preamble generator  Synchronisation word insertion/detection  CRC-16 computation and checking over the MAC payload  Clear Channel Assessment  Energy detection / digital RSSI  Link Quality Indication  Full automatic MAC security (CTR, CBC-MAC, CCM)  Automated Hardware security
  • 62. Circuit Description(2)-receiver  The received signal is  amplified by Low noise amplifier and  Down-converted in to the immediate frequency  At IF(2 MHz), the complex I/Q signal is filtered and amplified,  And then digitized by the ADCs.  Automatic gain control, final channel filtering, despreading, symbol correlation and byte synchronization are performed digitally  When the SFD pin goes high  This indicates that a start of frame delimiter has been detected 
  • 63. Circuit Description(3)-receiver  CC2420 buffers the received data in a 128 byte receive FIFO.  The user may read the FIFO through an SPI interface. CRC is verified in hardware.  RSSI and correlation values are appended to the frame.  CCA is available on a pin in receive mode.
  • 64. Circuit Description(4)-transmitter  The CC2420 transmitter is based on direct up-conversion.  The data is buffered in a 128 byte transmit FIFO (separate from the receive FIFO).  The preamble and start of frame delimiter are generated by hardware.  Each symbol (4 bits) is spread using the IEEE 802.15.4 spreading sequence to 32 chips and  output to the digital-to-analog converters (DACs).  An analog lowpass filter passes the signal to the quadrature (I and Q) upconversion mixers.  The RF signal is amplified in the power amplifier (PA) and  fed to the antenna
  • 65. IEEE 802.15.4 Modulation Format  Each byte is divided into two symbols, 4 bits each  Least significant symbol is transmitted first  Each symbol is mapped to one out of 16 pseudo-random sequences, 32 chips each
  • 68. Responsibility  Activation and deactivation of the radio transceiver  ED within the current channel  LQI for received packet  CCA for CSMA-CA  Channel frequency selection  Data transmission and reception
  • 69. 6.1 General requirements and definitions  Compliant device shall operate in one or several frequency bands using the modulation and spreading formats summarized

Notas do Editor

  1. SXOSCON is used to turn on the crystal oscillator The command strobe register is accessed in the same way as for a register write operation, but no data is transferred. That is, only the RAM/Register bit (set to 0),R/W bit (set to 0) and the 6 address bits (in the range 0x00 through 0x0E) arewritten.
  2. VCO: A voltage-controlled oscillator or VCO is an electronic oscillator whose oscillation frequency is controlled by a voltage input. The applied input voltage determines the instantaneous oscillation frequency. LNA:Low-noise amplifier (LNA) is an electronic amplifier used to amplify possibly very weak signals (for example, captured by an antenna). It is usually located very close to the detection device to reduce losses in the feedline. PA: power amplifier
  3. In cryptography, a cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a block ...
  4. I/Q data shows the changes in magnitude (or amplitude) and phase of a sine wave. If amplitude and phase changes occur in an orderly, predetermined fashion, you can use these amplitude and phase changes to encode information upon a sine wave, a process known as modulation.
  5. A simple example: A baud of 1 kBd = 1,000 Bd is synonymous to a symbol rate of 1,000 symbols per second. In case of a modem, this corresponds to 1,000 tones per second, and in case of a line code, this corresponds to 1,000 pulses per second. The symbol duration time is 1/1,000 second = 1 millisecond.