Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7
Total Page:16
File Type:pdf, Size:1020Kb
Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7 Helen Fornazier, Aurélien Martin, Scott Messner 16 march 2012 Abstract This article has for objective to introduce the basic concepts of and to compare dierent wireless technologies applied to embedded systems. It focuses on Wi-Fi, Bluetooth, IEEE 802.15.4 and Dash7. For each technology, this article covers multiplexing, topology, range, energy consumption, data rate, application, security and peculiarities. At the end of the article, the developer should be able to choose the best wireless technology for their own embedded application and have a basic notion as to how to integrate the technology into their system. Contents 1 Introduction 3 2 Wi-Fi 3 2.1 Origins . 3 2.2 Frequency Channels . 4 2.3 Multiplexing . 4 2.4 Network Topology . 4 2.4.1 Infrastructure Topology (Point-to-Point or Point- to-Multipoint) . 4 2.4.2 Ad-Hoc Topology . 5 2.5 Layers Denitions . 5 2.6 Range, Power Consumption, Data Rate . 8 2.7 Security . 8 2.8 Particularities and Embedded Applications . 8 2.8.1 Wi-Fi Conguration Interface . 10 2.8.2 Embedded Software integration . 10 2.8.3 Other Considerations . 10 2.8.4 Applications of Ad Hoc: Wi-Fi Direct . 12 3 Bluetooth 12 3.1 Origins . 12 3.2 Frequency Channels . 12 3.3 Multiplexing . 13 1 3.4 Network Topology . 13 3.4.1 Piconet Topology . 13 3.4.2 Scatternet Topology . 13 3.5 Layers Denitions . 13 3.5.1 The Bluetooth Controller . 15 3.5.2 The Bluetooth Host . 15 3.5.3 Host Controller Interface (HCI) . 15 3.5.4 Generic Access Prole (GAP) . 15 3.6 Range, Power Consumption, Data Rate . 15 3.6.1 Bluetooth versions . 16 3.7 Security . 16 3.8 Particularities and Embedded Applications . 16 3.8.1 Sni, Hold and Park mode . 17 4 IEEE 805.15.4 17 4.1 Origins . 17 4.2 Frequency Channels . 17 4.3 Multiplexing . 18 4.4 Network Topology . 18 4.4.1 Star Topology . 18 4.4.2 Mesh Topology . 18 4.4.3 Beacon Enabled Mode . 18 4.4.4 Non-beacon Enabled Mode . 19 4.5 ZigBee . 19 4.5.1 Origins . 19 4.5.2 Network Organisation . 19 4.6 Layers Denitions . 19 4.6.1 Network Layer . 19 4.6.2 Aplication Layer . 20 4.7 Range, Power Consumption, Data Rate . 20 4.8 Security . 20 4.9 Particularities and Embedded Applications . 20 5 Dash7 20 5.1 Origins . 21 5.2 Frequency Channels . 21 5.3 Multiplexing . 21 5.4 Network Topology . 22 5.5 Layers Denitions . 22 5.6 Range, Power Consumption, Data Rate . 22 5.7 Security . 22 6 CSMA/CA 23 7 Comparison table 23 8 Conclusion 23 2 9 References 23 9.1 Wi-Fi . 23 9.2 Bluetooth . 24 9.3 IEEE 802.15.4 . 25 9.4 Dash7 . 25 1 Introduction Wireless communication in embedded systems is a growing eld. It can be used in a wide range of situations where mobility is essential and wires are not practical. The key complications to choosing a wireless technology revolve around the following requirements [ADA10]: Range Reliability Compliancy (Standards) Security Cost Power Consumption Transmission rate Network Architecture Envisioned This article aims at helping in selecting the best available embedded wireless technology for your devices amongst some of the most popular choices used in the market today. The choices evaluated are Wi-Fi (802.11 a/b/g/n), Blue- Tooth, ZigBee (and 802.15.4), and Dash7. 2 Wi-Fi Wi-Fi is the common name used for the dierent versions of the IEEE 802.11 standard (a/b/g/n/i, etc.), which describes the technologies and protocols for achieving a Wireless Local Area Network (WLAN), a wireless bridge, or an adhoc network [WFD12][80207]. 2.1 Origins The standard IEEE 802.11 for WLAN networks was created in 1985. Wi-Fi suggests Wireless Fidelity, the term is used commercially since 1999 with the creation of Wi-Fi Alliance. Wi-Fi Alliance is responsible for the logo Wi-Fi which gives interoperability certications between the devices sporting the logo. 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Channel 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 2.484 Center Frequency (GHz) 22 MHz Figure 1: Wi-Fi channels in the 2.4 GHz band. Source : http://en.wikipedia.org/wiki/IEEE_802.11 2.2 Frequency Channels In embedded systems, there are four main versions of the 802.11 standard that are often used [GAI12]. 802.11a is one that operates in the 5GHz frequency ISM band. In terms of Compliancy and Reliability, this is useful when it is important to avoid interference with other RF devices which commonly operate in the 2.4 GHz ISM band (unlicensed RF band for industrial, scientic, and medical devices). 802.11b/g operate in the 2.4 GHz band, but have faster data transmission rates (11 Mbps and 54 Mbps respectively). 802.11n is the newest and most popular version, and can be congured to operate in either the 2.4 GHz or 5 GHz frequency bands. The 2.4 GHz band used by 802.11b/g is divided into channels separated from 5 MHz each. Of the 13 (14) channels, there is an only set of 3 channels (4 in certain countries) which do not overlap. 2.3 Multiplexing Wi-Fi uses OFDM (Orthogonal Frequency-Division Multiplexing) to perform a full-duplex communication in a single channel. CSMA/CA (see section 6) is used as a mechanism to avoid collision between the overlapping channels and other technologies that use the same ISM band frequency such as ZigBee and BlueTooth. 2.4 Network Topology Depending on the desired application, Wi-Fi is commonly used in two dierent network architecture congurations (Note: dierent network topologies can be implemented at the application layer level) [80207]. 2.4.1 Infrastructure Topology (Point-to-Point or Point-to-Multipoint) A standard network architecture in Wi-Fi uses an access point (AP) and multiple clients which communicate on network through the latter. 4 Figure 2: The Infrastructure topologies Basic Service Set (BSS) declares one dedicated AP and multiple clients in any particular WLAN. Source : http://en.kioskea.net/contents/wi/wimodes.php3 2.4.2 Ad-Hoc Topology The 802.11 standard allows also ad-hoc mode with Indepedant Basic Service Sets (IBSS). This conguration permits a node to operate as both an AP and a client. Ad-hoc infrastructures are widely used in embedded wireless implementa- tions because they permit communication between two devices without a ded- icated access point. Implementing ad-hoc requires careful considerations de- pending on the power consumption requirements of the system. 2.5 Layers Denitions IEEE 802.11 denes Physical (PHY) and Data Link (LLC + MAC) layers for generic wireless connexions using electromagnetic waves. There are 3 distinct physical layers, respectively based on DSSS, FHSS and infrared light. The LLC is based on IEE 802.2, which allows a Wi-Fi network to join any network implementing an IEEE standard. The MAC layer, though specic, is deliberately close to 802.3's one (terrestrial Ethernet). It uses CSMA/CA (see section 6). There are two access methods : DCS (Distributed Coordina- tion Functions), based on best eort, egalitarian (equal access of each actor to the medium) for asynchronous data transport, and PCF (Point Coordination Function), based on polling, used for sensitive data and real time applications. 5 Figure 3: An Extended Service Set denes the ability of two BSSs to be con- nected via their APs. Source : http://en.kioskea.net/contents/wi/wimodes.php3 6 Figure 4: IBSS provides the capability for devices to interconnect by functioning dually as an AP and a client. Source : http://en.kioskea.net/contents/wi/wimodes.php3 7 Protocol Release Frequency Modulation Max data rate Inner range 802.11a 1999 5 GHz OFDM 54 Mbps 35 m 802.11b 1999 2.4 GHz DSSS 11 Mbps 35 m 802.11g 2003 2.4 GHz OFDM/DSSS 54 Mbps 38 m 802.11n 2009 2.4/5 GHz OFDM 150 Mbps 70 m Table 1: Wi-Fi protocols overview. Source : http://en.wikipedia.org/wiki/IEEE_802.11 Wi-Fi is widely used under IP protocol. 2.6 Range, Power Consumption, Data Rate Some important considerations - If data-transfer reliability and speed are impor- tant, 802.11n supports Spaced-time block coding (STBC) and Maximal Ratio Combining (MRC). STBC provides redundancy by using multiple receivers to receive messages on multiple channels. This reduces error-rate but consumes more power. MRC similarly transmits messages on multiple channels. source: http://en.wikipedia.org/wiki/IEEE_802.11 2.7 Security Many commercially available embedded Wi-Fi modules come with the added option for conguration in dierent forms of security at the physical and trans- port levels. TKIP (or WPA) is considered to be sucient protection for most low-security applications. WPA2 is considered to be the most secure. Other se- curity protocols for encryption of data can be added in the dierent OSI layers, but WPA and WPA2 are available for basic encryption. WPS - Wi-Fi protected setup is a Wi-Fi conguration and authentication technique using push buttons for input entry. This has been proven susceptible to brute-force attacks. 2.8 Particularities and Embedded Applications Because embedded systems often have very specic constraints to meet, there are some particularities which are generally followed.