Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802. 15. 4 / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $92.59
Usually ships in 1-2 business days
(Save 38%)
Other sellers (Hardcover)
  • All (4) from $92.59   
  • New (3) from $92.59   
  • Used (1) from $122.19   


Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions. 

Wireless Personal Area Networks:

  • Provides a comprehensive, in-depth look at the issues surrounding WPAN network operation and performance.
  • Investigates multi-cluster networks and compares how they can be implemented.
  • Analyzes the performance of a single cluster under different traffic and power management regimes including uplink vs. downlink traffic, acknowledged vs. unacknowledged traffic, saturation vs. non-saturation, and the like.
  • Discusses security issues in WPANs such as different security threats, their impact on performance, standard security mechanisms, and security policies.
  • Compares the IEEE 802.15.4 standard with the related Bluetooth IEEE 802.15.1 standard in terms of suitability for implementing wireless sensor networks.

This reference is a valuable tool for developers and researchers getting acquainted with various aspects of IEEE 802.15.4 technology. Graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory will also find this book very insightful.

Read More Show Less

Product Details

Meet the Author

Dr. Jelena V. Misic, University of Manitoba, Canada
An associate Professor in the Department of Computer Science at the University of Manitoba, Canada, Dr. Misic’s research interests include wireless sensor networks, WPLANs, WLANs, AD-HOC networks, mesh networks, network security and performance evaluation. Misic has won several awards including Best Paper of the Workshop award at the Proc. HWISE 2005 workshop in the IEEE ICPADS 2005 conference, Fukuoka, Japan. Dr. Misic is also the author of Performance Modeling and Analysis of Bluetooth Networks (crc Press 2005) as well as numerous book chapters and journal papers.

Dr. Vojislav B. Misic, University of Manitoba, Canada
Dr. Misic is an Associate Professor with Tenure in the Department of Computer Science at the University of Manitoba, Canada with research interests including service based computing, performance analysis of wireless ad-hoc and sensor networks, and software engineering. The co-author of several books in Serbian and Performance Modeling and Analysis of Bluetooth Networks (crc Press 2005), Dr Misic has also contributed chapters to other books and published numerous journal and conference papers.

Read More Show Less

Table of Contents

About the Series Editors.

List of Figures.

List of Tables.


I: WPANs and 802.15.4 1.

1. Prologue: Wireless Personal Area Networks.

1.1 Wireless Ad Hoc Networks.

1.2 Design Goals for the MAC Protocol.

1.3 Classification of MAC Protocols For Ad Hoc Networks.

1.4 Contention-Based MAC Protocols.

1.5 New Kinds of Ad Hoc Networks.

1.6 Sensor Networks.

2. Operation of the IEEE 802.15.4 network.

2.1 Physical Layer Characteristics.

2.2 Star Topology and Beacon Enabled Operation.

2.3 Slotted CSMA-CA Medium Access. 

2.4 Acknowledging Successful Transmissions.

2.5 Downlink Communication in Beacon Enabled Mode.

2.6 Guaranteed Time Slots.

2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation.

2.8 Device Functionality and Cluster Formation.

2.9 Format of the PHY and MAC frames.

Part II. Single-Cluster Networks.

3. Cluster with Uplink Traffic.

3.1 The System Model – Preliminaries.

3.2 Superframe With an Active Period Only.

3.3 Superframe With Both Active and Inactive Periods.

3.4 Probability Distribution of the Packet Service Time.

3.5 Probability Distribution of the Queue Length. 

3.6 Access Delay.

3.7 Performance Results.

4. Cluster With Uplink And Downlink Traffic.

4.1 The System Model.

4.2 Modeling the Behavior of the Medium.

4.3 Probability Distribution For the Packet Service Time.

4.4 Performance of the Cluster With Bidirectional Traffic. 

5. MAC Layer Performance Limitations. 

5.1 Congestion of Packets Deferred to The Next Superframe.

5.2 Congestion After The Inactive Period.

5.3 Congestion of Uplink Data Requests.

5.4 Blocking of Uplink Data and Data Requests.

5.5 Possible Remedies.

6. Activity Management Through Bernoulli Scheduling.

6.1 The Need For Activity Management.

6.2 Analysis of Activity Management.

6.3 Analysis of the Impact of MAC and PHY Layers.

6.4 Controlling the Event Sensing Reliability.

6.5 Activity Management Policy.

7. Admission Control Issues.

7.1 The Need for Admission Control.

7.2 Performance Under Asymmetric Packet Arrival Rates.

7.3 Calculating the Admission Condition.

7.4 Performance of Admission Control.

Part II. Summary and Further Reading.

Part III. Multi-Cluster Networks.

8. Cluster InterconnectionWith Master-Slave Bridges.

8.1 Analysis of Bridge Operation.

8.2 Markov Chain Model for A Single Node.

8.3 Performance of the Network.

8.4 Network with a Single Source Cluster/Bridge.

8.5 Network with Two Source Clusters/Bridges.

8.6 Modeling the Transmission Medium and Packet Service Times.

9. Equalization of Cluster Lifetimes.

9.1 Modeling the Clusters.

9.2 Distributed Activity Management.

9.3 Energy Consumption in Interconnected Clusters.

9.4 Performance of activity management.

10. Cluster Interconnection with Slave-Slave Bridges. 

10.1 Operation of the SS Bridge.

10.2 Markov Chain Model for the SS Bridge.

10.3 Markov Chain for Non-Bridge Nodes.

10.4 Performance Evaluation.

10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge.

10.6 Thou Shalt Not Acknowledge: The GTS Bridge.

10.7 Modeling the Transmission Medium and Packet Service Times.

Part III. Summary and Further Reading.

Part IV. Security.

11. Security in 802.15.4 Specification.

11.1 Security Services.

11.2 Auxiliary Security Header.

11.3 Securing and Unsecuring Frames.

11.4 Attacks.

12. The Cost of Secure and Reliable Sensing.

12.1 Analytical Model of a Generic Key Update Algorithm.

12.2 Analysis of the Node Buffer.

12.3 Success Probabilities.

12.4 Key Update in a Multi-Cluster Network.

12.5 Cluster Lifetime.

12.6 Evaluation of Lifetimes and Populations.

Part IV. Summary and Further Reading. 


Appendix A. An Overview of ZigBee.

A.1 ZigBee Functionality.

A.2 Device Roles.

A.3 Network Topologies and Routing.

A.4 Security.

Appendix B. Probability generating functions and Laplace transforms.



Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)