Developing Security Tools of WSN and WBAN Networks Applications by Mohsen A. M. El-Bendary
Author:Mohsen A. M. El-Bendary
Language: eng
Format: epub, pdf
Publisher: Springer Japan, Tokyo
902–928
BPSK
10
40
2,450
2,400–2,483.5
O-QPSK
16
250
Low power consumption in ZigBee networks can be achieved by allowing a device to sleep, which means waking into active mode for brief periods. Enabling such low duty cycle operation is at the heart of the ZigBee standard [13]. ZigBee is built on top of the IEEE 802.15.4 standard. It offers the additional functionality to implement mesh networking rather than point-to-point networking found in most Bluetooth and Wi-Fi applications. The ZigBee specification document is short, allowing a small and simple stack, in contrast to the other wireless standards such as Bluetooth [14].
The IEEE 802.15.4 standard is intended to conform to established regulations in Europe, Japan, Canada, and the United States. It defines two physical (PHY) layers; the 2.4 GHz and 868/915 MHz band PHY layers. Although the PHY layer chosen depends on local regulations and user preference, only the higher data rate, worldwide, unlicensed 2.4 GHz Industrial, Scientific and Medical frequency band is considered [15]. A total of 16 channels are available in the 2.4 GHz band, numbered from 11 to 26, each with a bandwidth of 2 MHz, and a channel separation of 5 MHz. The channel mapping frequencies are given in Table 5.1. The LR-WPAN output powers are around 0 dBm. This wireless network typically operates within a 50-m range. The transmit scheme used is the Direct Sequence Spread Spectrum (DSSS) [16].
The ZigBee network involves little or no infrastructure. It also has a primitive error control mechanism, which is the Automatic Repeat reQuest (ARQ). As a result, this mechanism is unable to reduce the channel effects. So, there is a need for either a coding or interleaving mechanism to combat the bad channel effects [17]. The main advantages of the ZigBee technology are summarized as follows [7]:1.Low power consumption.
Download
Developing Security Tools of WSN and WBAN Networks Applications by Mohsen A. M. El-Bendary.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25282)
Hello! Python by Anthony Briggs(24335)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23424)
Kotlin in Action by Dmitry Jemerov(22504)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21967)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19520)
Grails in Action by Glen Smith Peter Ledbrook(18597)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13688)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8563)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8359)