Академический Документы
Профессиональный Документы
Культура Документы
4, DASH7
Helen Fornazier, Aurlien Martin, Scott Messner 16 march 2012
Abstract
This article has for objective to introduce the basic concepts of and to compare dierent wireless technologies applied to embedded systems. It focuses on Wi-Fi, Bluetooth, IEEE 802.15.4 and Dash7. For each technology, this article covers multiplexing, topology, range, energy consumption, data rate, application, security and peculiarities. At the end of the article, the developer should be able to choose the best wireless technology for their own embedded application and have a basic notion as to how to integrate the technology into their system.
Contents
1 2 Introduction Wi-Fi 3 3
Origins . . . . . . . . . . . . . . . . . . . . . . . Frequency Channels . . . . . . . . . . . . . . . Multiplexing . . . . . . . . . . . . . . . . . . . Network Topology . . . . . . . . . . . . . . . . 2.4.1 Infrastructure Topology (Point-to-Point to-Multipoint) . . . . . . . . . . . . . . 2.4.2 Ad-Hoc Topology . . . . . . . . . . . . . Layers Denitions . . . . . . . . . . . . . . . . Range, Power Consumption, Data Rate . . . . Security . . . . . . . . . . . . . . . . . . . . . . Particularities and Embedded Applications . . 2.8.1 Wi-Fi Conguration Interface . . . . . . 2.8.2 Embedded Software integration . . . . . 2.8.3 Other Considerations . . . . . . . . . . 2.8.4 Applications of Ad Hoc: Wi-Fi Direct .
. . . . . . . . or . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . Point. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . .
3 4 4 4
4 5 5 8 8 8 10 10 10 12
12
Bluetooth
3.4 Network Topology . . . . . . . . . . . . . . 3.4.1 Piconet Topology . . . . . . . . . . . 3.4.2 Scatternet Topology . . . . . . . . . 3.5 Layers Denitions . . . . . . . . . . . . . . 3.5.1 The Bluetooth Controller . . . . . . 3.5.2 The Bluetooth Host . . . . . . . . . 3.5.3 Host Controller Interface (HCI) . . . 3.5.4 Generic Access Prole (GAP) . . . . 3.6 Range, Power Consumption, Data Rate . . 3.6.1 Bluetooth versions . . . . . . . . . . 3.7 Security . . . . . . . . . . . . . . . . . . . . 3.8 Particularities and Embedded Applications 3.8.1 Sni, Hold and Park mode . . . . .
4
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13 13 13 13 15 15 15 15 15 16 16 16 17
17
IEEE 805.15.4
Origins . . . . . . . . . . . . . . . . . . . . . Frequency Channels . . . . . . . . . . . . . Multiplexing . . . . . . . . . . . . . . . . . Network Topology . . . . . . . . . . . . . . 4.4.1 Star Topology . . . . . . . . . . . . . 4.4.2 Mesh Topology . . . . . . . . . . . . 4.4.3 Beacon Enabled Mode . . . . . . . . 4.4.4 Non-beacon Enabled Mode . . . . . ZigBee . . . . . . . . . . . . . . . . . . . . . 4.5.1 Origins . . . . . . . . . . . . . . . . 4.5.2 Network Organisation . . . . . . . . Layers Denitions . . . . . . . . . . . . . . 4.6.1 Network Layer . . . . . . . . . . . . 4.6.2 Aplication Layer . . . . . . . . . . . Range, Power Consumption, Data Rate . . Security . . . . . . . . . . . . . . . . . . . . Particularities and Embedded Applications Origins . . . . . . . . . . . . . . . . . . . Frequency Channels . . . . . . . . . . . Multiplexing . . . . . . . . . . . . . . . Network Topology . . . . . . . . . . . . Layers Denitions . . . . . . . . . . . . Range, Power Consumption, Data Rate Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17 17 18 18 18 18 18 19 19 19 19 19 19 20 20 20 20 21 21 21 22 22 22 22
Dash7
20
6 7 8
23 23 23
References
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
23
23 24 25 25
Introduction
It can be
used in a wide range of situations where mobility is essential and wires are not practical. The key complications to choosing a wireless technology revolve around the following requirements [ADA10]:
Range Reliability Compliancy (Standards) Security Cost Power Consumption Transmission rate Network Architecture Envisioned
This article aims at helping in selecting the best available embedded wireless technology for your devices amongst some of the most popular choices used in the market today. The choices evaluated are Wi-Fi (802.11 a/b/g/n), BlueTooth, ZigBee (and 802.15.4), and Dash7.
Wi-Fi
Wi-Fi is the common name used for the dierent versions of the IEEE 802.11 standard (a/b/g/n/i, etc.), which describes the technologies and protocols for achieving a Wireless Local Area Network (WLAN), a wireless bridge, or an adhoc network [WFD12][80207].
2.1 Origins
The standard IEEE 802.11 for WLAN networks was created in 1985. Wi-Fi suggests Wireless Fidelity, the term is used commercially since 1999 with the creation of Wi-Fi Alliance. Wi-Fi Alliance is responsible for the logo Wi-Fi which gives interoperability certications between the devices sporting the logo.
1 2.412
2 2.417
3 2.422
4 2.427
5 2.432
6 2.437
7 2.442
8 2.447
9 2.452
10 2.457
11 2.462
12 2.467
13 2.472
22 MHz
important to avoid interference with other RF devices which commonly operate in the 2.4 GHz ISM band (unlicensed RF band for industrial, scientic, and medical devices). 802.11b/g operate in the 2.4 GHz band, but have faster data transmission rates (11 Mbps and 54 Mbps respectively). 802.11n is the newest and most popular version, and can be congured to operate in either the 2.4 GHz or 5 GHz frequency bands. The 2.4 GHz band used by 802.11b/g is divided into channels separated from 5 MHz each. Of the 13 (14) channels, there is an only set of 3 channels (4 in certain countries) which do not overlap.
2.3 Multiplexing
Wi-Fi uses OFDM (Orthogonal Frequency-Division Multiplexing) to perform a full-duplex communication in a single channel. CSMA/CA (see section 6) is used as a mechanism to avoid collision between the overlapping channels and other technologies that use the same ISM band frequency such as ZigBee and BlueTooth.
Figure 2: The Infrastructure topologies Basic Service Set (BSS) declares one dedicated AP and multiple clients in any particular WLAN. Source : http://en.kioskea.net/contents/wi/wimodes.php3
(see section 6). There are two access methods : DCS (Distributed Coordination Functions), based on best eort, egalitarian (equal access of each actor to the medium) for asynchronous data transport, and PCF (Point Coordination Function), based on polling, used for sensitive data and real time applications.
Figure 3: An Extended Service Set denes the ability of two BSSs to be connected via their APs. Source : http://en.kioskea.net/contents/wi/wimodes.php3
Figure 4: IBSS provides the capability for devices to interconnect by functioning dually as an AP and a client. Source : http://en.kioskea.net/contents/wi/wimodes.php3
Inner range 35 m 35 m 38 m 70 m
2.7 Security
Many commercially available embedded Wi-Fi modules come with the added option for conguration in dierent forms of security at the physical and transport levels. TKIP (or WPA) is considered to be sucient protection for most low-security applications. WPA2 is considered to be the most secure. Other security protocols for encryption of data can be added in the dierent OSI layers, but WPA and WPA2 are available for basic encryption. WPS - Wi-Fi protected setup is a Wi-Fi conguration and authentication technique using push buttons for input entry. This has been proven susceptible to brute-force attacks.
Some other interesting Wi-Fi modules to consider at a reasonable price. The cost can vary dramatically depending on features of reliability, range, power consumption, and Wi-Fi standard used. LM006 NanoAdapter (uses USB) cost 25 euros GS1011M GainSpan 802.11b Low Power Wi-Fi cost 30 euros. Provides implemented TCP/IP Stack and security. Connection via UART/SPI/I2C/JTAG
implementers. It can be found here : http://savannah.nongnu.org/projects/lwip/ There are other open-source and non free versions.
A Wi-
Fi module is said to be `active' when it is actively sending or receiving data. Though it varies depending on Wi-Fi modules and driving software, Wi-Fi can consume anywhere between 30% and 60% of the total power consumed during active state in comparison to standby state.
10
Figure 7: Software architecture of an embedded device with all networking and WLAN functionality resident in the WLAN module. Source : http://www.ept.ca/news/designing-embedded-systems-with-wi-connectivity/1000633756/
11
Many Wi-Fi devices can be congured for variable power-save polling (PSpolling). This concept allows the Access Point to hold onto a queue of packets until the client wakes up and polls for the pending data.
Bluetooth
Bluetooth technology is used in many devices such as mobile phones and personal computers. It is designed to be low cost, low range and low power supply.
3.1 Origins
Bluetooth was created by Ericsson in 1994 as a wireless alternative for RS232 data cables. Nowadays, Bluetooth is managed by Bluetooth Special Interest Group (SIG) and its specication can be found on their site: www.bluetooth.org. To be able to use Bluetooth for commercial use, you need to be a member of SIG. Adopter members don't need to pay. Bluetooth v1.2 was ratied as IEEE 802.15.1.
12
3.3 Multiplexing
Bluetooth uses TDD (Time Division Duplex) to perform full-duplex communication. The master (see section 3.4. Network Topology for master-slave structure) denes slots of time and allocates one slot per slave. The devices don't transmit at the same time, just in their respective allocated slot. Therefore, two parallel Bluetooth networks at the same frequency channel (see 3.3. Frequency Channels) could potentially disturb each other. To avoid this kind of interference, the protocol implements FHSS (frequency-hopping spread spectrum, see 3.3.1. Frequency-Hopping Spread Spectrum for more details). Bluetooth uses CSMA/CA (see section 6 for CSMA/CA) to avoid collision when using a shared channel with another wireless network.
The Bluetooth controller The Bluetooth host The Generic Access Prole (GAP).
13
14
Class 3:
Range: 1 meters (max). Maximum Output Power: 1 mW.
15
4 -DQPSK) and 3 Mbps (referred as 8DPSK) modes and HS (v3.0) can reach 24 Kbps [BSIGS]. LE systems (v4.0) have lower
consumption and lower data rates. Versions 2.1 and 2.0 are backward compatible. The Bluetooth LE has an entirely new protocol stack compared to the standard protocols dened in v1.0 v2.0 and v3.0, previously named WiBree and Bluetooth ULP (Ultra Low Power) [BVW12]. The wake up latency usually is of about 3 seconds [TWB10].
3.7 Security
In Bluetooth v2.0 and earlier, security is based on PIN code authentication : each device must enter the same PIN code. Limited input devices like headsets usually have a default PIN code dened inside (0000 or 1234) [PMW12]. Bluetooth v2.1 is backward compatible and it implements the Secure Simple Pairing (SSP), using public key cryptography. The goal is to simplify the pairing procedure for the user and improve security mainly against Eavesdropping and Man-In-The-Middle attacks. SSP has 4 pairing procedures [BSIGB]: Numeric Comparison: The user must conrm that the number displayed on one device is the same as on the other device Just Works: The user must conrm the connection. Used in scenarios where one of the devices is really limited like headsets with no display or keyboard. This pairing method oers no protection against Man-In-The-Middle attack. Out of Band: Higher security method, dierent types of implementations exist. NFC system is an example. Passkey Entry: The user must enter the PIN number displayed on one device into the other.
16
One can nd Bluetooth transceivers in the market starting at $7, the connection is usually made by UART interface.
Sni mode: the slave must listen during every master-to-slave time slot, it can be inactive in the others slots. Hold mode: In this mode, slave and master should agree on the duration the slave remains in hold mode. When in hold mode, the slave is free to do other things like attending another its own piconet or entering power save mode.
Park state: The slave gives up his logical transport address and receives a new address to be used in park state. The slave wakes up from time to time to synchronize with the master who sends a dened message (called beacon train) with a constant time period. The slave can be swapped to an active state by the master's beacon train.
IEEE 805.15.4
While Wi-Fi and Bluetooth are very power-greedy, and with the rise of embedded systems, the need has been heavily felt for more and more autonomous ones, and thus for a more convenient communication protocol. This protocol has been described by the IEEE 802.15.4 group. It is intended for wireless networks with small dimensions, small consumption and small cost (WPANs for Wireless Personnal Area Networks). It's thus perfectly adapted to the embedded world. Only a physical (PHY) and a medium access control (MAC) layer are dened, upper layers being left to the discretion of implementations.
4.1 Origins
IEEE 802.15.4 was released 12 May 2003, and has then been revised 7 June 2006, 28 August 2007 and twice in 2009. [WIK02]
17
The rst one has to be shared with both Wi-Fi and Bluetooth, which causes collisions between networks making use of those protocols. ronements where they cohabit. [I3E03] [I3E06] common in envi-
4.3 Multiplexing
Multiplexing in IEEE 802.15.4 is managed using CSMA/CA, which is detailed in section 6 of the present document. Coordination can be provided through the use of beacon frames, see 4.4.3. [I3E03]
where each node can only converse with its parent and children.
18
4.5 ZigBee
Since IEEE 803.15.4 does only dene PHY and MAC layers, implementations must dene the higher ones That's what does ZigBee, a standard for WPAN specifying a Network and an Application Layer to complete the IEEE.
4.5.1 Origins
In 2002, seeing that neither Wi-Fi nor Bluetooth could t some of their needs for embedded systems (namely, autonomy), a number of industrial companies formed the consortium called ZigBee Alliance, aimed at providing standards for low cost / low consumption wireless communications. Then, with the birth of IEEE 802.15.4 group, both teams have worked closely to specify the entire protocol stack, so that, with the IEEE being released in May 2003, a rst ZigBee specication could be ratied 14 December 2004 and go out 13 June 2005. A rst revision saw the light in 2006, then ZigBee PRO, an enhanced stack oering advanced features such as multicasting and many-to-one routing but more RAM-greedy than its humbler counterpart, in 2007. [WIK03]
19
W.
As ZigBee is based on
IEEE 802.15.4, there is no wake-up signal, but slots for sleep or activity, or in asynchronous mode, devices sleeping anytime they have nothing to say, with an ever-vigilant coordinator. [WIK03]
4.8 Security
Based on facilities provided by IEEE 802.15.4, ZigBee oers means of securing communications, such as use of cryptographic cyphering frames with symmetric keys, frame integrity control, sequential freshness control and ACLs (Access Control Lists). Unsecured mode allows none, ACL mode allows ACLs only and Secured mode allows all. [MAS07]
Dash7
Dash7 is a wireless technology created to have low power consumption and low latency response. It is known as a Wireless Sensor Network (WSN) Dash7 applies BLAST concept [JPN09] :
20
B: Bursty, abrupt data transfer, no support for stream data (i.e. video or audio). L: Light-data, limited packet size, small amount of exchanged data. AS: ASynchronous, no hand-shaking between devices. Command-response oriented. T: Transitive, network can be changing, not a xed structure.
5.1 Origins
The standard ISO 18000-7 (Dash7) was ratied in 2004 as a Wireless Sensor Network (WSN) and modied in 2008. In 2009 the U.S. Department of Defense signed a $429 million contract for DASH7 devices. And in March of the same year the Dash7 Alliance was created [D7W12][DAW12]. Dash7 Alliance is an association which gives interoperability certications for devices. Dash7 Alliance is similar to Wi-Fi Alliance. Dash7 has a mode 1 (ratied as ISO 18000-7) and mode 2 [D7212] which is compatible with mode 1. Mode 2 is not an ocial ISO standard yet. Dash7 mode 1 ISO 18000-7:2004. This document will focus on
5.3 Multiplexing
Multiplexing is performed by collision arbitration [ISO4T] in a broadcast message, point-to-point messages are synchronous (collision may happen with another network only) and collisions are seen as a damaged package. The interrogator (or master) asks the tags (slaves) to collect their Tag's IDs by broadcast and it sets a window size (WS, in number of slots). Each slot of the window lasts a predetermined period of time and tags must transmit just during these slots, the slot during which to transmit is chosen randomly by the tag. In case of collision between tags, they choose another random slot to transmit (Slotted Aloha method). After WS slots the interrogator sends a sleep signal to the tags who answered the rst collection round, and then it starts again another collection round until there is no more answer.
21
5.7 Security
The interrogator can encrypt the connection between the tag by setting a password [ISO4S]. To allow a new password, the tag must be unlocked rst with the old password. Tags are unlocked by default. Locked tags answer a point-to-point communication only if the message is encrypted with this password, but broadcast messages are not aected by locked or unlocked status. Dash7 mode 2 can use 128-bit AES, public key.
22
Wi-Fi Operating frequency Channels Data rate Power supply Range Multiplexing Network topology Security Signal susceptibility Specication 2.4, 5 GHz ISM Band 14 11, 54, 540 Mbps ~4,7mW /324,71mW ~75m / 125m OFDM - CSMA Star, ad-hoc WPA, WEP, TKIP Reference IEEE 802.11
BlueTooth 2.4 (worldwide), 902(USA), 868 (Europe) GHz ISM Band 79 3 Mbps ~2,5mW ~10m TDD - CSMA Piconet, sScatternet PIN Code, Public key More sensitive IEEE 802.15.1 (v1.2)
CSMA/CA
CSMA (Carrier Sense Multiple Access) is a multiplexing method based, as its name implies, on listening to signals by sensing carriers. In CSMA, the device regularly samples the medium, and waits for it to be clear before beginning to emit. That's just the algorithm you're implementing whenever you are in a regular conversation. CSMA/CA (with Collision Avoidance) introduces a random Delay between each test, as a way to decrease medium utilization and over all to narrow chances of collision when several devices are waiting simultaneously.
7 8
We expect this article has been sucient to give you the keys to choose wisely between those wireless communication protocols for use in your own embedded applications. In a nutshell : Wi-Fi for heavy communications, BlueTooth for short distances, point-to-point such communications consuming less power, ZigBee for light and power-savvy applications, Dash7 for even lighter and even thriftier ones.
References
9.1 Wi-Fi
[ADA10] Adams, Lew. Technology. Easy Provisioning with GainSpan Embedded Wi-Fi 21 Oct 2010. accessed 15 Mar 2012. GainSpan Corporation. http://www.slideshare.net/gainspan/easy-provisioning-with-gainspan-embeddedWi-Fi-technology
23
[ERG12] Ergen, Mustafa. IEEE 802.11 Overview. UC Berkeley. http://wow.eecs.berkeley.edu/ergen/docs/I 802.11overview.ppt accessed 16 Mar 2012. [LWO12] http://www.lesswatts.org/tips/wireless.php. cessed 15 Mar 2012. [WFD12] Wi-Fi Direct. Wikipedia. http://en.wikipedia.org/wiki/Wi-Fi_Direct. accessed 14 Mar 2012. [WAK12] Wake On LAN. Wikipedia. on-LAN. accessed 15 Mar 2012. [80207] IEEE 802.11. Wikipedia. http://en.wikipedia.org/wiki/IEEE_802.11. accessed 15 Mar 2012. [MAG09] Magee, Owen. Digi International. EE Times. 28 Mars 2009. http://www.eetimes.com/design/embedded/4026972/Sorting-through-the-embeddedWi-Fi-confusion-item-1?pageNumber=1. accessed 15 Mar 2012. [I3E07] IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specic requirements; Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specications. IEEE Computer Society. 3 Park Avenue, New York, NY. 12 June 2007. accessed 15 Mar 2012. [COM] Les modes de fonctionnement du Wi-Fi (802.11 ou Wi-Fi). commentcamarch.net. http://www.commentcamarche.net/contents/wi/wimodes.php3#gonext. accessed 15 Mar 2012. http://en.wikipedia.org/wiki/WakeLessWatts.org. ac-
9.2 Bluetooth
Channel division information: [BSIGF] Bluetooth Special Interest Group, Core Version 4.0, Vol 2, Part A - FREQUENCY BANDS AND CHANNEL ARRANGEMENT. Range and power supply information: [BSIGT] Bluetooth Special Interest Group, Core Version 4.0, Vol 2, Part A - TRANSMITTER CHARACTERISTICS. Data rate information: [BSIGG] Bluetooth Special Interest Group, Core Version 4.0, Vol 1, Part A - GENERAL DESCRIPTION. Data rate information for Enhanced Data Rate mode: [BSIGS] Bluetooth Special Interest Group, Core Version 4.0, Vol 2, Part A - SCOPE. accessed 13 Mar 2012. Bluetooth wake-up delay: Bluetooth Security: [BSIGB] Bluetooth Special Interest Group, Core Version 4.0, Vol 1, Part A - BR/EDR SECURE SIMPLE PAIRING. [PMW12] Paring Mechanisms. [TWB10] The comparison of Wi-Fi, Bluetooth and ZigBee. Sena Blog. http://www.sena.com/blog/?p=359 25 Feb 2010.
24
Wikipedia.
http://en.wikipedia.org/wiki/Bluetooth#Pairing_mechanisms ac-
cessed 13 Mar 2012. Bluetooth Sni, Hold and Park mode: [BSIGM] Bluetooth Special Interest Group, Core Version 4.0, Vol 2, Part B - SNIFF MODE, HOLD MODE, PARK STATE.
9.4 Dash7
BLAST Reference : [JPN09] JP Norair, Introduction to DASH7 Technologies, 1st Edition. Mar 2009. Dash7 Origins: [D7W12] Dash7. Wikipedia. http://en.wikipedia.org/wiki/DASH7 accessed 15 march 2012. [DAW12] Dash7 Alliance. Wikipedia. http://en.wikipedia.org/wiki/DASH7_Alliance accessed 15 march 2012. accessed 15 Mar 2012. Frequency channel information and wake up information: [ISO4P] ISO/IEC, Internation Standard ISO/IEC 18000-7:2004 - Physical Layer. Signal penetration in walls, water and concrete: [WDB12] Dash7 Alliance. accessed 15 Mar 2012. Frequency channel information in Dash7 mode 2 [D7AM2] Dash7 Alliance, DASH7 Mode 2 Webinar presentation. 16
25
Collision information [ISO4T] ISO/IEC, Internation Standard ISO/IEC 18000-7:2004 - Tag Collection and Collision Arbitration. Data link layer information: [ISO4D] ISO/IEC, Internation Standard ISO/IEC 18000-7:2004 - Data Link Layer. Range, power supply and security information: [WDT12] Dash7 Alliance. accessed 15 Mar 2012. Security Information: [ISO4S] ISO/IEC, Internation Standard ISO/IEC 18000-7:2004 - Security Set Password. CC430 Dash7 module: [D7M12] SAN RAMON, Calif. DASH7 Alliance and Texas Instruments Join Forces to Bring Wireless Networking to the Mass Market. http://dash7.org/index.php?option=com_content&view=article&id=126%3Adash7alliance-and-texas-instruments-join-forces-to-bring-wireless-networking-to-the-massmarket&catid=14%3Apress-releases&Itemid=190 accessed 15 Mar 2012. [CC412] Texas Instruments. CC430F5133 Description. http://www.ti.com/product/cc430f5133 accessed 15 Mar 2012. accessed 15 Mar 2012. [OWS12] OpenTag Web Site. http://sourceforge.net/projects/opentag/ accessed 15 Mar 2012.
26