Академический Документы
Профессиональный Документы
Культура Документы
Yu Chen
Outline
Introduction
Physical Layer
Network Layer
Application Layer
Security
Physical Layer
Network Layer
Application Layer
Security
Field device
Handheld device
Controls all communication over the network, from the scheduling table to
the choice of communication channels
Physical Layer
Network Layer
Application Layer
Security
Reduced memory
Physical Layer
Network Layer
Application Layer
Security
Service provided
Generating beacons (only GWs and router devices)
Synchronization
Joining
Devices
Reduced-function devices (RFDs): field devices and handheld devices
Time source
Inter-cluster communication: GWs as time source
Major functionalities
Avoiding collisions
Improving throughput
Frequency hopping
Security
Timeslots
Configured by NM after a device joins the network
Shared link
Allows more than two devices to use the channel
Mobility devices are authorized to communicate with the cluster head (router)
All devices use the same communication channel, which may switch depending
on external interference
Four priorities
Highest priority (commands)
Diagnostics, configuration, control information, and emergency alarms
Long cycle data: when a device has an update greater than the
update rate of its cluster head (router device)
One router (update rate = 4s) and one field device (update rate = 8s)
Transmit
Dont transmit
Management Service
Provided by data-link-sub-layer (DLSL), including
Network discovery
Physical Layer
Network Layer
Application Layer
Security
Physical Layer
Network Layer
Application Layer
Security
Several UAOs may coexist in the same UAP, each processing data
of different types of sensors, e.g. temperature, pressure
Application Sublayer (ASL)
Provide a transparent interface to communicate with distributed
applications (UAO)
Physical Layer
Network Layer
Application Layer
Security
Key encryption key (KEK): special key to encrypt the transmission of other keys
Physical Layer
Network Layer
Application Layer
Security