Module 2
Module 2
• The Preamble field is a 32-bit 4-byte pattern that identifies the start
of the frame and is used to synchronize the data transmission.
• The Start of Frame Delimiter field informs the receiver that frame
contents start immediately after this byte.
• The PHY Header portion of the PHY frame is simply a frame length
value.
MAC Layer
The 802.15.4 MAC layer performs the following
tasks:
• Network beaconing for devices acting as coordinators (New devices
use beacons to join an 802.15.4 network)
• PAN association and disassociation by a device
• Device security
• Reliable link communications between two peer MAC entities
The MAC layer achieves these tasks by using various predefined
frame types.
• IEEE 1901.2 has a Segment Control field, This field handles the
segmentation or fragmentation of upper-layer packets with sizes
larger than what can be carried in the MAC protocol data unit
(MPDU).
1901.2a Topology
• Deployment topologies for IEEE 1901.2a are tied to the physical
power lines.
• NB-PLC deployments use mesh topology. Mesh networks offer the
advantage of devices relaying the traffic of other devices.
1901.2a Security
Security capabilities of IEEE 1901.2a:
• Security Enabled bit in the Frame Control field should be set in all
MAC frames carrying segments of an encrypted frame.
• If data encryption is required, it should be done before packet
segmentation.
• On the receiver side, the data decryption is done after packet
reassembly.
• When security is enabled, the MAC payload is composed of the
ciphered payload and the message integrity code (MIC)
IEEE 802.11ah
• IEEE 802.11 is a key IoT wireless access technology, either for
connecting endpoints such as fog computing nodes, highdata- rate
sensors, and audio or video analytics devices or for deploying Wi-Fi
backhaul infrastructures.
• This Wi-Fi lacks sub-GHz support for better signal penetration, low
power for battery-powered nodes.
• For these reasons the IEEE 802.11ah has been launched.
Three main use cases are identified for IEEE 802.11ah:
• Sensors and meters covering a smart grid: Meter to pole,
environmental/agricultural monitoring, industrial process sensors,
indoor healthcare system and fitness sensors, home and building
automation sensors.
• Backhaul aggregation of industrial sensors and meter data:
Potentially connecting IEEE 802.15.4g sub networks.
• Extended range Wi-Fi: For outdoor extended-range hotspot or
cellular traffic offloading.
IEEE 802.11ah Physical Layer
• Various countries and regions use the following bands for IEEE
802.11ah: 868–868.6 MHz for EMEAR, 902–928 MHz and associated
subsets for North America and Asia-Pacific regions, and 314–316
MHz, 430–434 MHz, 470–510 MHz, and 779–787 MHz for China.
• IEEE 802.11ah uses channels of 2, 4, 8, or 16 MHz.
• IEEE 802.11ah uses one-tenth of the IEEE 802.11ac channel speed.
IEEE 802.11ah MAC Layer
• Enhancements and features specified by IEEE 802.11ah for the MAC
layer include the following:
• Number of devices: Has been scaled up to 8192 per access point.
• MAC header: Has been shortened to allow more efficient
communication.
• Null data packet (NDP) support: Is extended to cover several
control and management frames.
• Restricted access window (RAW): Is a control algorithm that avoids
simultaneous transmissions.
• Target wake time (TWT): Reduces energy consumption by
permitting an access point to define times when a device can
access the network.
• Speed frame exchange: Enables an AP and endpoint to exchange
frames during a reserved transmit opportunity (TXOP).
IEEE 802.11ah Topology
• IEEE 802.11ah is deployed as a star topology, it includes a simple
hops relay operation to extend its range.
• This relay operation can be combined with a higher transmission
rate or modulation and coding scheme (MCS).
• This means that a higher transmit rate is used by relay devices
talking directly to the access point.
• Sectorization is a technique that involves partitioning the coverage
area into several sectors.
LoRa WAN (Long Range WAN) Physical Layer
• LoRa modulation is based on chirp spread spectrum modulation,
which trades a lower data rate for receiver sensitivity to significantly
increase the communication distance.
• LoRa WAN use of the main unlicensed sub-GHz frequency bands of
433 MHz, 779–787 MHz, 863–870 MHz, and 902– 928 MHz.
• The data rate in LoRaWAN varies depending on the frequency bands
and adaptive data rate (ADR).
• ADR is an algorithm that manages the data rate and radio signal for
each endpoint.
• The ADR algorithm ensures that packets are delivered at the best
data rate possible.
• Endpoints close to the gateways with good signal values transmit
with the highest data rate, which enables a shorter transmission
time over the wireless network, and the lowest transmit power.
LoRa WAN MAC Layer
• The LoRaWAN specification documents three classes of LoRaWAN
devices:
• Class A: This class is the default implementation. Optimized for
battery powered nodes, it allows bidirectional communications.
• Class B :A Class B node or endpoint should get additional receive
windows compared to Class A, but gateways must be synchronized
through a beaconing process.
• Class C: This class is particularly adapted for powered nodes. This
classification enables a node to be continuously listening by keeping
its receive window open when not transmitting.
• LoRaWAN endpoints are uniquely addressable through a variety of
methods, including the following:
• An endpoint can have a global end device ID represented as an IEEE
EUI-64 address.
• An endpoint can have a global application ID represented as an IEEE
EUI-64 address that uniquely identifies the application provider.
• In a LoRaWAN network, endpoints are also known by their end
device address, known as a DevAddr, a 32-bit address.
LoRa WAN Topology
LoRa WAN Security
• Implemented two layers of security, protecting communications
and data privacy across the network.
• The first layer, called “network security” applied at the MAC layer,
guarantees the authentication of the endpoints.
• The second layer is an application session key (AppSKey), which
performs encryption and decryption functions between the
endpoint and its application server.
NB-IoT and Other LTE Variations
• NB-IoT specifically addresses the requirements of a massive number
of low-throughput devices, low device power consumption,
improved indoor coverage, and optimized network architecture.
LTE Cat 0
• Characteristics
• Power saving mode (PSM): This new device status minimizes energy
consumption.
• PSM is defined as being similar to “powered off” mode, but the
device stays registered with the network.
• Half-duplex mode: This mode reduces the cost and complexity of a
device’s implementation.
LTE-M
• Lower receiver bandwidth: Bandwidth has been lowered to 1.4
MHz versus the usual 20 MHz. This further simplifies the LTE
endpoint.
• Lower data rate: Data is around 200 kbps for LTE-M, compared to 1
Mbps for Cat 0.
• Half-duplex mode: Just as with Cat 0, LTE-M offers a half-duplex
mode that decreases node complexity and cost.
• Enhanced discontinuous reception (eDRX): This capability increases
from seconds to minutes the amount of time an endpoint can
“sleep” between paging cycles.
NB-IoT
• Three modes of operation are applicable to NB-IoT:
• Standalone: A GSM carrier is used as an NB-IoT carrier, enabling
reuse of 900 MHz or 1800 MHz.
• In-band: Part of an LTE carrier frequency band is allocated for use
as an NB-IoT frequency. The service provider typically makes this
allocation, and IoT devices are configured accordingly.
• Guard band: An NB-IoT carrier is between the LTE or WCDMA
bands.