Chapter
1.3 Making Wireless Technology New
1.3.1 The Nineteenth-century Wireless Secret
1.3.2 Sourcing New Applications
1.3.3 Reinventing the Wheel
1.3.4 Selling the Sizzle, not the Sausage
2 What is a Personal Area Network?
2.1 The Origin of the Area Network
2.2 The Personal Area Network
2.2.2 The Wireless Personal Area Network
2.3 Ever-decreasing Circles
3 Disruptive Topologies through Technology Convergence
3.1 Disruptive Topologies
3.1.1 Understanding Networking Topologies
3.1.2 Dissolving the Boundaries
3.2 Technology Convergence
3.2.2 3G, LTE, and LTE Advanced
3.2.3 Satellite Broadband
4 Introducing the Lawnmower Man Effect
4.2 The Social Media Phenomenon
4.2.1 Cross Platform Promotion
4.3 Intelligent Personal Area Networking
4.4 The Extended Personal Area Network
4.4.1 The Home Area Network
4.4.1.1 Domotics and the Smart Home
4.4.2 The Body Area Network
4.4.3 The Vehicle Area Network
4.5.1 A One-Size-Fits-All Technology
Part II The Wireless Sensor Network
5 Introducing Low Power and Wireless Sensor Technologies
5.1 Energy Efficient Labeling
5.1.1 The European Union Energy Label
5.1.1.1 A+ and A++ Energy Classes
5.1.2 The International Energy Star Logo
5.2 Energy Efficient Techniques in Wireless Technology
5.2.1 Deriving Energy from Alternative Resources
5.2.2 What Is Renewable Energy?
5.2.3 No Batteries Required
5.2.3.1 More About EnOcean’s Energy Conversion
5.2.4 Optimizing Data Transmission
5.3 What Do Low Power and Sensor Technology Provide?
5.4 What Should We Expect from Part II?
6 Enabling the Internet of Things
6.1 Shaping an IP-enabled World
6.1.1 What Are Smart Objects?
7.1.1 The History of Bluetooth low energy
7.1.2 Opening up a New Market for Bluetooth Technology
7.1.3 The Bluetooth low energy Timeline
7.1.4 The Bluetooth Special Interest Group
7.2 The Bluetooth low energy Market
7.3 The Bluetooth low energy Application Portfolio
7.3.1 BLE-specific Profiles
7.3.1.1 Alert Notification Profile
7.3.1.2 Blood Pressure Profile
7.3.1.4 Heart-rate Profile
7.3.1.5 Cycling Speed and Cadence Profile
7.3.1.6 Running Speed and Cadence Profile
7.3.1.8 Health Thermometer Profile
7.3.1.9 Proximity Profile
7.4 Bluetooth low energy and its Competitors
7.4.1 The New 3-in-1Specification
7.6 The Bluetooth low energy Architecture
7.6.2.1 Link Layer Filtering and White Lists
7.6.2.2 Device Addressing
7.6.2.3 Physical Channels
7.6.2.4 The Link Layer Packet Format
7.6.2.5 The Link Layer Control Protocol
7.6.3 The Host Controller Interface
7.6.5 The Attribute Protocol
7.6.6 The Security Manager Protocol
7.6.7 The Generic Attribute Profile
7.6.7.1 GATT Fundamentals
7.6.8 Generic Access Profile
7.6.8.1 Broadcaster, Observer, Peripheral, and Central Roles for the LE System
8 Control Your World with ZigBee
8.1.1 The ZigBee Alliance
8.1.1.1 Membership and the ZigBee Alliance
8.3 ZigBee’s Application Standards Portfolio
8.3.2 Building Automation
8.4 ZigBee and its Competitors
8.4.1 Overlapping Technologies
8.6 The Application Layer
8.7 Application Framework
8.7.1 Application Profiles
8.7.3.2 Node Power Descriptors
8.7.3.3 Simple Descriptors
8.7.3.4 Complex Descriptors
8.8 ZigBee Device Objects
8.8.1.1 The Device Profile Topology
8.8.1.3 Service Discovery
8.8.1.4 End Device Binding
8.8.1.6 Binding Table Management
8.8.1.7 Network Management
8.9 Application Support Sub-layer
8.9.1 APS Service Primitives
8.9.2.1 General APDU Format
8.9.2.2 Data, APS Command, and Acknowledgement Frames
8.10.1 NWK Service Primitives
8.10.2.1 General NPDU Format
8.10.2.2 Data and NWK Command Frames
8.13.1 Networking Topology
8.13.2 The ZigBee RF4CE Application Layer
8.13.3 The ZigBee RF4CE Network Layer
8.13.3.1 ZigBee RF4CE NWK Frame Format
8.13.3.2 Data (Standard and Vendor-specific) and ZigBee RF4CE NWK Command Frames
9 Green, Smart, and Wireless
9.1.2 The EnOcean Alliance
9.1.2.1 Membership and the EnOcean Alliance
9.3 EnOcean’s Application Portfolio
9.4 EnOcean and its Competitors
9.6.1 The EnOcean Radio Protocol
9.6.1.2 Sub-telegram Timings
9.6.1.3 Listen Before Talk
9.6.1.4 Repeater Behavior
9.6.1.5 The ISO/IEC 14543-3-10Standard
9.6.2 The EnOcean Serial Protocol
9.7 The Dolphin Architecture
9.7.1.1 Application Types
9.7.2 The EnOcean System Software Layer
9.7.3.3 Normal Operation and Learning Behavior
9.7.4 The Hardware Abstraction Layer
9.8 The EnOcean Equipment Profiles
9.8.1.1 RPS and 1BS Telegram Types
9.8.1.2 4BS Telegram Type
10.1.1.1 Membership and the ANT+ Alliance
10.1.1.2 ANT+ Certification
10.3 ANT’s Application Portfolio
10.3.1 ANT+ Device Profiles
10.3.1.3 Bicycle Speed and Cadence
10.3.1.5 Fitness Equipment
10.3.1.7 Heart-rate Monitor
10.3.1.8 Light Electric Vehicle
10.3.1.9 Multi-sport, Speed, and Distance
10.3.1.10 Stride-based Speed and Distance
10.4 ANT Wireless and its Competitors
10.5.1 Channel-based Communication
10.6 The ANT Architecture
10.6.2.1 Channel Configuration
10.6.3.1 Other Pairing Features
Part III The Classic Personal Area Network
11 Introducing the Classic Personal Area Networking Technologies
11.1 It’s Never as Simple as Just Cutting the Cable!
11.2 What Do Classic PAN Technologies Provide?
11.3 What Should We Expect from Part III?
12.1.1.1 Membership and the NFC Forum
12.1.1.2 NFC Forum Certification
12.1.2 Comparing NFC and RFID
12.3 NFC’s Application Portfolio
12.4 NFC and its Competitors
12.4.1 Complementary rather than Competitive
12.6 The NFC Architecture
12.6.2 Card Emulation Mode
12.6.3 Reader/Writer Mode
12.7 Simple NDEF Exchange Protocol
12.7.1 The SNEP Request Message
12.7.2 The SNEP Response Message
12.7.4 SNEP Fragmentation
12.8 The Logical Link Control Protocol
12.8.1 The LLCP Architecture
12.8.2 The LLC PDU Format
12.9 NFC Data Exchange Format
12.10 Record Type Definition
12.11 Activities, Digital Protocol, and Analog
13 The 802.11Generation and Wi-Fi
13.1.2 The 802.11Standards
13.1.3 The Wi-Fi Alliance
13.1.3.1 Membership and the Wi-Fi Alliance
13.3 Wi-Fi Application Portfolio
13.4 Wi-Fi and its Competitors
13.5 Networking Topologies
13.5.1 Service Set Identifier
13.5.3.1 The Basic Service Set Identifier
13.5.4 Distribution Systems
13.5.4.1 Integrating 802.11with a Wired LAN
13.6 The 802.11Software Architecture
13.6.1.1 The Generic MAC Frame Format
13.6.3 The 2.4 GHz DSSS System
13.6.3.2 Extended Rate PHY
13.6.4 The OFDM PHY System
13.7 Wi-Fi Protected Access
13.7.1 Security Features with WPA2
13.8 Wi-Fi Protected Setup
13.8.1.2 Push Button Configuration Method
13.9.1 Empowering Wi-Fi Networks with QoS
13.9.1.1 WMM Prioritization
13.10.1 Wi-Fi is More Than Internet Connectivity
13.10.2 Wi-Fi Direct in an Enterprise Context
13.10.2.1 Peer-to-Peer Mechanisms
14 Bluetooth Classic and High speed
14.1.1 The Bluetooth Special Interest Group
14.1.1.1 Membership and the Bluetooth SIG
14.1.1.2 Bluetooth Qualification
14.1.2 Bluetooth’s Timeline
14.1.3 Shaping the Personal Area Network
14.3 Bluetooth’s Application Portfolio
14.3.1 Bluetooth Profiles
14.3.1.1 Advanced Audio Distribution Profile
14.3.1.2 Audio/Video Remote Control Profile
14.3.1.3 Basic Imaging Profile
14.3.1.4 Basic Printing Profile
14.3.1.5 File Transfer Profile
14.3.1.6 Global Navigation Satellite System Profile
14.3.1.8 Hands-free Profile
14.3.1.9 Human Interface Device Profile
14.3.1.10 Personal Area Networking Profile
14.3.1.11 Phone Book Access Profile
14.3.1.12 SIM Access Profile
14.3.1.13 Video Distribution Profile
14.4 Bluetooth wireless technology and its Competitors
14.5.1 Piconets and Scatternets
14.6 The Bluetooth Architecture
14.6.1 The Physical Layer
14.6.1.1 The Bluetooth Transceiver
14.6.1.2 Frequency Hopping
14.6.2 The Link Controller
14.6.2.1 The Bluetooth Clock
14.6.2.2 Device Addressing
14.6.2.4 Physical Channels and Links
14.6.2.5 Logical Transports and Links
14.6.3.1 LMP Packet Format
14.6.4 The AMP Architecture
14.6.4.1 The Protocol Adaptation Layer
14.6.5 The Host Controller Interface
14.6.6.1 Channel Identifiers
14.6.6.2 L2CAP Modes of Operation
14.6.6.3 L2CAP Data Packet Formats
14.6.7 Service Discovery Protocol
14.6.7.2 Service Attribute
14.6.8 Generic Access Profile
14.6.8.1 Initiator, Acceptor, and Paging Roles for the BR/EDR System
14.6.8.2 The User Interface Expectations
14.6.8.4 Security and Authentication
15 One Standard, All Devices
15.1.1 The WHDI Consortium
15.1.1.1 Membership and the WHDI Consortium
15.3 WHDI’s Application Portfolio
15.4 WHDI and its Competitors
15.5.1.1 Assigning Active Network Addresses
15.5.2 Network Management
15.6 Comparing WHDI with HDMI Systems
15.7 Comparing WHDI with WLAN Systems
15.9 The WHDI Architecture
15.9.1 The Audio/Video Control Layer
15.9.2 The WHDI MAC Layer
15.9.3 The WHDI PHY Layer
15.10.1 Audio Requirements Snapshot
15.10.1.1 Concurrent Audio and Video Support
15.10.1.2 Audio Latency and Lip-sync Correction
15.10.2 Video Requirements Snapshot
15.11.1 The Content Protection Scheme
15.11.2 The Wireless Security Scheme
Part IV Forthcoming Technologies and Conclusions
16 Future and Emerging Technologies
16.1.1 Super Wi-Fi or 5G?
16.1.2 The Obvious Market Potential
16.2.1 Market Opportunity
16.3 Certified Wireless USB
16.3.1 Choosing Ultra-wideband for Wireless USB
16.3.2 Certified Wireless USB and 802.11ad
16.4.1 WiGig and 802.11ad
17 Summary and Conclusions
17.1 Making Sense of Wireless Technology
References and Bibliography