Misplaced Pages

FiRa Consortium

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

The FiRa Consortium ( FiRa  – "fine ranging") is a non-profit organization that promotes the use of Ultra-wideband technology for use cases such as access control, location-based services, and device-to-device services. UWB offers fine ranging and secure capabilities and operates in the available 6–9 GHz spectrum. Founded on August 1, 2019, by ASSA ABLOY, Bosch, HID Global, NXP Semiconductors, and Samsung, the consortium aims to certify UWB products for conformity to defined standards of interoperability . In June 2020, the FiRa Consortium and the UWB Alliance announced their formal liaison to "accelerate the development and adoption of UWB technology".

#493506

63-863: The FiRa Consortium builds on to the IEEE 802.15.4 /4z and future iterations and enhancements High Rate PHY (HRP) with an interoperable HRP standard that includes performance requirements, test methods and procedures, and a certification program based on the IEEE’s profiled features. An additional application layer is designed to discover UWB devices and services and configure them in an interoperable manner . Furthermore, FiRa plans to develop service-specific protocols for multiple verticals that leverage access control, location-based services, and device-to-device services. FiRa’s key stakeholders include chip manufacturers, device manufacturers, system integrators, service providers, technology provider, test tool developers, and test labs. Following

126-502: A random exponential backoff algorithm; acknowledgments do not adhere to this discipline. Common data transmission utilizes unallocated slots when beaconing is in use; again, confirmations do not follow the same process. Confirmation messages may be optional under certain circumstances, in which case a success assumption is made. Whatever the case, if a device is unable to process a frame at a given time, it simply does not confirm its reception: timeout-based retransmission can be performed

189-408: A router . The telecommunications network at the physical layer also consists of many interconnected wireline network elements (NEs). These NEs can be stand-alone systems or products that are either supplied by a single manufacturer or are assembled by the service provider (user) or system integrator with parts from several different manufacturers. Wireless NEs are the products and devices used by

252-462: A database of information on related personal area networks. Thus, the PHY manages the physical radio transceiver , performs channel selection along with energy and signal management functions. It operates on one of three possible unlicensed frequency bands: The original 2003 version of the standard specifies two physical layers based on direct-sequence spread spectrum (DSSS) techniques: one working in

315-471: A directional antenna is in use, whether nodes employ power control and so on. Cellular wireless networks generally have good capacity, due to their use of directional aerials, and their ability to reuse radio channels in non-adjacent cells. Additionally, cells can be made very small using low power transmitters this is used in cities to give network capacity that scales linearly with population density. Wireless access points are also often close to humans, but

378-837: A large number of portable transceivers (e.g., mobile phones, pagers , etc.) to communicate with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission. Although originally intended for cell phones, with the development of smartphones , cellular telephone networks routinely carry data in addition to telephone conversations: Private LTE/5G networks use licensed, shared or unlicensed wireless spectrum thanks to LTE or 5G cellular network base stations, small cells and other radio access network (RAN) infrastructure to transmit voice and data to edge devices (smartphones, embedded modules, routers and gateways. 3GPP defines 5G private networks as non-public networks that typically employ

441-478: A mesh topology. Each node forwards messages on behalf of the other nodes and each node performs routing. Ad hoc networks can "self-heal", automatically re-routing around a node that has lost power. Various network layer protocols are needed to realize ad hoc mobile networks, such as Distance Sequenced Distance Vector routing, Associativity-Based Routing , Ad hoc on-demand distance-vector routing , and Dynamic Source Routing . Wireless metropolitan area networks are

504-505: A number of times, following after that a decision of whether to abort or keep trying. Because the predicted environment of these devices demands maximization of battery life, the protocols tend to favor the methods which lead to it, implementing periodic checks for pending messages, the frequency of which depends on application needs. Regarding secure communications, the MAC sublayer offers facilities which can be harnessed by upper layers to achieve

567-399: A reasonable tradeoff between simplicity and robustness. Additionally, a superframe structure, defined by the coordinator, may be used, in which case two beacons act as its limits and provide synchronization to other devices as well as configuration information. A superframe consists of sixteen equal-length slots, which can be further divided into an active part and an inactive part, during which

630-576: A relatively small area, that is generally within a person's reach. For example, both Bluetooth radio and invisible infrared light provides a WPAN for interconnecting a headset to a laptop. Zigbee also supports WPAN applications. Wi-Fi PANs are becoming commonplace (2010) as equipment designers start to integrate Wi-Fi into a variety of consumer electronic devices. Intel "My WiFi" and Windows 7 "virtual Wi-Fi" capabilities have made Wi-Fi PANs simpler and easier to set up and configure. A wireless local area network (WLAN) links two or more devices over

693-642: A short distance using a wireless distribution method, usually providing a connection through an access point for internet access. The use of spread-spectrum or OFDM technologies may allow users to move around within a local coverage area, and still remain connected to the network. Products using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi brand name. Fixed wireless technology implements point-to-point links between computers or networks at two distant locations, often using dedicated microwave or modulated laser light beams over line of sight paths. It

SECTION 10

#1732894691494

756-473: A smaller-scale deployment to meet an organization's needs for reliability, accessibility, and maintainability. Open source private networks are based on a collaborative, community-driven software that relies on peer review and production to use, modify and share the source code. A global area network (GAN) is a network used for supporting mobile across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications

819-443: A type of wireless network that connects several wireless LANs. Wireless wide area networks are wireless networks that typically cover large areas, such as between neighboring towns and cities, or city and suburb. These networks can be used to connect branch offices of business or as a public Internet access system. The wireless connections between access points are usually point to point microwave links using parabolic dishes on

882-471: A wireless carrier to provide support for the backhaul network as well as a mobile switching center (MSC). Reliable wireless service depends on the network elements at the physical layer to be protected against all operational environments and applications (see GR-3171, Generic Requirements for Network Elements Used in Wireless Networks – Physical Layer Criteria ). What are especially important are

945-416: Is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver , known as a cell site or base station . In a cellular network, each cell characteristically uses a different set of radio frequencies from all their immediate neighbouring cells to avoid any interference. When joined these cells provide radio coverage over a wide geographic area. This enables

1008-488: Is a technical standard that defines the operation of a low-rate wireless personal area network ( LR-WPAN ). It specifies the physical layer and media access control for LR-WPANs, and is maintained by the IEEE 802.15 working group, which defined the standard in 2003. It is the basis for the Zigbee , ISA100.11a , WirelessHART , MiWi , 6LoWPAN , Thread , Matter and SNAP specifications, each of which further extends

1071-405: Is achieved. Now the wireless network has been running on LTE, which is a 4G mobile communication standard. Users of an LTE network should have data speeds that are 10x faster than a 3G network. Space is another characteristic of wireless networking. Wireless networks offer many advantages when it comes to difficult-to-wire areas trying to communicate such as across a street or river, a warehouse on

1134-505: Is also supported, where the coordinator of the network will necessarily be the central node. Such a network can originate when an FFD decides to create its own PAN and declare itself its coordinator, after choosing a unique PAN identifier. After that, other devices can join the network, which is fully independent from all other star networks. Frames are the basic unit of data transport, of which there are four fundamental types (data, acknowledgment, beacon and MAC command frames), which provide

1197-452: Is an effective option compared to Ethernet for sharing printers, scanners, and high-speed Internet connections. WLANs help save the cost of installation of cable mediums, save time from physical installation, and also creates mobility for devices connected to the network. Wireless networks are simple and require as few as one single wireless access point connected directly to the Internet via

1260-400: Is another, insecure MAC mode, which allows access control lists merely as a means to decide on the acceptance of frames according to their (presumed) source. Wireless network A wireless network is a computer network that uses wireless data connections between network nodes . Wireless networking allows homes, telecommunications networks , and business installations to avoid

1323-616: Is defined by a standard that describes unique functions at both the Physical and the Data Link layers of the OSI model . These standards differ in their specified signaling methods, geographic ranges, and frequency usages, among other things. Such differences can make certain technologies better suited to home networks and others better suited to network larger organizations." Each standard varies in geographical range, thus making one standard more ideal than

SECTION 20

#1732894691494

1386-593: Is handing off user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless LANs . Space networks are networks used for communication between spacecraft, usually in the vicinity of the Earth. The example of this is NASA's Space Network . Some examples of usage include cellular phones which are part of everyday wireless networks, allowing easy personal communications. Another example, Intercontinental network systems, use radio satellites to communicate across

1449-417: Is often used in cities to connect networks in two or more buildings without installing a wired link. To connect to Wi-Fi using a mobile device, one can use a device like a wireless router or the private hotspot capability of another mobile device. A wireless ad hoc network, also known as a wireless mesh network or mobile ad hoc network (MANET), is a wireless network made up of radio nodes organized in

1512-443: Is on very low-cost communication of nearby devices with little to no underlying infrastructure, intending to exploit this to lower power consumption even more. The basic framework conceives a 10-meter communications range with line of sight at a transfer rate of 250 kbit/s. Bandwidth tradeoffs are possible to favor more radically embedded devices with even lower power requirements for increased battery operating time, through

1575-408: Is only limited by the distance between each pair of nodes. They are meant to serve as the basis for ad hoc networks capable of performing self-management and organization. Since the standard does not define a network layer, routing is not directly supported, but such an additional layer can add support for multihop communications. Further topological restrictions may be added; the standard mentions

1638-520: Is optional. Data transfers from the coordinator usually follow device requests: if beacons are in use, these are used to signal requests; the coordinator acknowledges the request and then sends the data in packets which are acknowledged by the device. The same is done when superframes are not in use, only in this case there are no beacons to keep track of pending messages. Point-to-point networks may either use unslotted CSMA/CA or synchronization mechanisms; in this case, communication between any two devices

1701-414: Is possible, whereas in "structured" modes one of the devices must be the network coordinator. In general, all implemented procedures follow a typical request-confirm/indication-response classification. The physical medium is accessed through a CSMA/CA access method. Networks which are not using beaconing mechanisms utilize an unslotted variation which is based on the listening of the medium, leveraged by

1764-599: Is possible. Beyond these three bands, the IEEE 802.15.4c study group considered the newly opened 314–316 MHz, 430–434 MHz, and 779–787 MHz bands in China, while the IEEE 802.15 Task Group 4d defined an amendment to 802.15.4-2006 to support the new 950–956 MHz band in Japan. The first standard amendments by these groups were released in April 2009. In August 2007 , IEEE 802.15.4a

1827-475: Is when a node on one network is unable to send because of co-channel interference from a node that is on a different network. The wireless spectrum is a limited resource and shared by all nodes in the range of its transmitters. Bandwidth allocation becomes complex with multiple participating users. Often users are not aware that advertised numbers (e.g., for IEEE 802.11 equipment or LTE networks) are not their capacity, but shared with all other users and thus

1890-452: The 2.4 GHz and 5.8 GHz band, rather than omnidirectional antennas used with smaller networks. A typical system contains base station gateways, access points and wireless bridging relays. Other configurations are mesh systems where each access point acts as a relay also. When combined with renewable energy systems such as photovoltaic solar panels or wind systems they can be stand-alone systems. A cellular network or mobile network

1953-402: The 868/915 MHz bands with transfer rates of 20 and 40 kbit/s, and one in the 2450 MHz band with a rate of 250 kbit/s. The 2006 revision improves the maximum data rates of the 868/915 MHz bands, bringing them up to support 100 and 250 kbit/s as well. Moreover, it goes on to define four physical layers depending on the modulation method used. Three of them preserve

FiRa Consortium - Misplaced Pages Continue

2016-467: The DSSS approach: in the 868/915 MHz bands, using either binary or, optionally, offset quadrature phase-shift keying (QPSK); in the 2450 MHz band, using QPSK. An optional alternative 868/915 MHz layer is defined using a combination of binary keying and amplitude-shift keying (thus based on parallel, not sequential, spread spectrum; PSSS). Dynamic switching between supported 868/915 MHz PHYs

2079-579: The IEEE 802.15 standard does not use 802.1D or 802.1Q; i.e., it does not exchange standard Ethernet frames . The physical frame-format is specified in IEEE802.15.4-2011 in section 5.2. It is tailored to the fact that most IEEE 802.15.4 PHYs only support frames of up to 127 bytes (adaptation layer protocols such as the IETF's 6LoWPAN provide fragmentation schemes to support larger network layer packets). No higher-level layers or interoperability sublayers are defined in

2142-516: The IEEE 802.15.4-2015 technical specification and 802.15.4z/D8 draft amendment for fine-ranging UWB technology. The UWB MAC Technical Requirements defines elements such as how ranging protocol works, types of ranging that are supported, the parameters and format of the messages that are exchanged, and how ranging messages are encrypted. Similarly, the PHY Technical Requirements Specification document leverages select portions of

2205-582: The IEEE Standards Association Board approved IEEE 802.15.4e which concluded all Task Group 4e efforts. The medium access control (MAC) enables the transmission of MAC frames through the use of the physical channel. Besides the data service, it offers a management interface and itself manages access to the physical channel and network beaconing . It also controls frame validation, guarantees time slots and handles node associations. Finally, it offers hook points for secure services. Note that

2268-673: The IEEE specification to facilitate interoperability between FiRa Consortium Certified UWB-enabled products. In October 2021, the FiRa Consortium launched the initial phase of its certification program which is centered around MAC/PHY conformance testing. The FiRa Certified™ mark helps to identify interoperable UWB devices. It can only be used once a device has successfully completed the FiRa Device Certification Process performed by an independent Authorized Test Laboratory (ATLs). IEEE 802.15.4 IEEE 802.15.4

2331-531: The MAC through a convergence sublayer. Implementations may rely on external devices or be purely embedded, self-functioning devices. The physical layer is the bottom layer in the OSI reference model used worldwide, and protocols layers transmit packets using it The physical layer (PHY) provides the data transmission service. It also, provides an interface to the physical layer management entity , which offers access to every physical layer management function and maintains

2394-488: The NEs that are located on the cell tower to the base station (BS) cabinet. The attachment hardware and the positioning of the antenna and associated closures and cables are required to have adequate strength, robustness, corrosion resistance, and resistance against wind, storms, icing, and other weather conditions. Requirements for individual components, such as hardware, cables, connectors, and closures, shall take into consideration

2457-453: The available PHYs with several additional PHYs: one for 780 MHz band using O-QPSK or MPSK, another for 950 MHz using GFSK or BPSK . IEEE 802.15.4e was chartered to define a MAC amendment to the existing standard 802.15.4-2006 which adopts a channel hopping strategy to improve support for the industrial market. Channel hopping increases robustness against external interference and persistent multi-path fading. On February 6, 2012,

2520-421: The cluster tree as a structure which exploits the fact that an RFD may only be associated with one FFD at a time to form a network where RFDs are exclusively leaves of a tree, and most of the nodes are FFDs. The structure can be extended as a generic mesh network whose nodes are cluster tree networks with a local coordinator for each cluster, in addition to the global coordinator. A more structured star pattern

2583-405: The coordinator may enter power saving mode, not needing to control its network. Within superframes contention occurs between their limits, and is resolved by CSMA/CA . Every transmission must end before the arrival of the second beacon. As mentioned before, applications with well-defined bandwidth needs can use up to seven domains of one or more contentionless guaranteed time slots, trailing at

FiRa Consortium - Misplaced Pages Continue

2646-686: The coordinator of a personal area network just as it may function as a common node. It implements a general model of communication which allows it to talk to any other device: it may also relay messages, in which case it is dubbed a coordinator (PAN coordinator when it is in charge of the whole network). On the other hand, there are reduced-function devices (RFD). These are meant to be extremely simple devices with very modest resource and communication requirements; due to this, they can only communicate with FFDs and can never act as coordinators. Networks can be built as either peer-to-peer or star networks. However, every network needs at least one FFD to work as

2709-450: The coordinator of the network. Networks are thus formed by groups of devices separated by suitable distances. Each device has a unique 64-bit identifier, and if some conditions are met, short 16-bit identifiers can be used within a restricted environment. Namely, within each PAN domain, communications will probably use short identifiers. Peer-to-peer (or point-to-point) networks can form arbitrary patterns of connections, and their extension

2772-565: The costly process of introducing cables into a building, or as a connection between various equipment locations. Admin telecommunications networks are generally implemented and administered using radio communication . This implementation takes place at the physical level (layer) of the OSI model network structure. Examples of wireless networks include cell phone networks , wireless local area networks (WLANs) , wireless sensor networks, satellite communication networks, and terrestrial microwave networks. The first professional wireless network

2835-410: The definition of not one, but several physical layers. Lower transfer rates of 20 and 40 kbit/s were initially defined, with the 100 kbit/s rate being added in the current revision. Even lower rates can be used, which results in lower power consumption. As already mentioned, the main goal of IEEE 802.15.4 regarding WPANs is the emphasis on achieving low manufacturing and operating costs through

2898-502: The desired level of security. Higher-layer processes may specify keys to perform symmetric cryptography to protect the payload and restrict it to a group of devices or just a point-to-point link; these groups of devices can be specified in access control lists . Furthermore, MAC computes freshness checks between successive receptions to ensure that presumably old frames, or data which is no longer considered valid, does not transcend to higher layers. In addition to this secure mode, there

2961-592: The development and proliferation of digital wireless networks by the 1990s, with further advances in MOSFET technology leading to increasing bandwidth in the 2000s ( Edholm's law ). Most of the essential elements of wireless networks are built from MOSFETs, including the mobile transceivers , base station modules, routers , RF power amplifiers , telecommunication circuits , RF circuits , and radio transceivers , in networks such as 2G , 3G , and 4G . Wireless personal area networks (WPANs) connect devices within

3024-509: The drop off in power over distance is fast, following the inverse-square law . The position of the United Kingdom 's Health Protection Agency (HPA) is that “...radio frequency (RF) exposures from WiFi are likely to be lower than those from mobile phones". It also saw “...no reason why schools and others should not use WiFi equipment". In October 2007, the HPA launched a new "systematic" study into

3087-478: The end of the superframe. The first part of the superframe must be sufficient to give service to the network structure and its devices. Superframes are typically utilized within the context of low-latency devices, whose associations must be kept even if inactive for long periods of time. Data transfers to the coordinator require a beacon synchronization phase, if applicable, followed by CSMA/CA transmission (by means of slots if superframes are in use); acknowledgment

3150-548: The individual user rate is far lower. With increasing demand, the capacity crunch is more and more likely to happen. User-in-the-loop (UIL) may be an alternative solution to ever upgrading to newer technologies for over-provisioning . Shannon's theorem can describe the maximum data rate of any single wireless link, which relates to the bandwidth in hertz and to the noise on the channel. One can greatly increase channel capacity by using MIMO techniques, where multiple aerials or multiple frequencies can exploit multiple paths to

3213-579: The initial sponsor members, the ASSA ABLOY Group ( HID Global ), NXP Semiconductors , Samsung Electronics , and Bosch, the FiRa Consortium counts more than 100 members in seven different membership categories. In May 2020, the FiRa Consortium has released their first technical requirement specifications for the UWB PHY and MAC layers. Both specifications are based on the High Rate Pulse (HRP) portion of

SECTION 50

#1732894691494

3276-598: The next depending on what it is one is trying to accomplish with a wireless network. The performance of wireless networks satisfies a variety of applications such as voice and video. The use of this technology also gives room for expansions, such as from 2G to 3G and, 4G and 5G technologies, which stand for the fourth and fifth generation of cell phone mobile communications standards. As wireless networking has become commonplace, sophistication increases through configuration of network hardware and software, and greater capacity to send and receive larger amounts of data, faster,

3339-517: The other side of the premises or buildings that are physically separated but operate as one. Wireless networks allow for users to designate a certain space which the network will be able to communicate with other devices through that network. Space is also created in homes as a result of eliminating clutters of wiring. This technology allows for an alternative to installing physical network mediums such as TPs , coaxes , or fiber-optics , which can also be expensive. For homeowners, wireless technology

3402-567: The receiver to achieve much higher throughput – by a factor of the product of the frequency and aerial diversity at each end. Under Linux, the Central Regulatory Domain Agent (CRDA) controls the setting of channels. The total network bandwidth depends on how dispersive the medium is (more dispersive medium generally has better total bandwidth because it minimises interference), how many frequencies are available, how noisy those frequencies are, how many aerials are used and whether

3465-419: The receiver, in other cases, particularly with metallic or conductive materials reflection occurs. This can cause dead zones where no reception is available. Aluminium foiled thermal isolation in modern homes can easily reduce indoor mobile signals by 10 dB frequently leading to complaints about the bad reception of long-distance rural cell signals. In multipath fading two or more different routes taken by

3528-421: The signal, due to reflections, can cause the signal to cancel out each other at certain locations, and to be stronger in other places ( upfade ). The hidden node problem occurs in some types of network when a node is visible from a wireless access point (AP), but not from other nodes communicating with that AP. This leads to difficulties in medium access control (collisions). The exposed terminal problem

3591-697: The standard by developing the upper layers , which are not defined in IEEE 802.15.4. In particular, 6LoWPAN defines a binding for the IPv6 version of the Internet Protocol (IP) over WPANs, and is itself used by upper layers such as Thread . IEEE standard 802.15.4 is intended to offer the fundamental lower network layers of a type of wireless personal area network (WPAN), which focuses on low-cost, low-speed ubiquitous communication between devices. It can be contrasted with other approaches, such as Wi-Fi , which offers more bandwidth and requires more power. The emphasis

3654-399: The standard. Other specifications, such as Zigbee , SNAP, and 6LoWPAN / Thread , build on this standard. RIOT , OpenWSN , TinyOS , Unison RTOS, DSPnano RTOS, nanoQplus, Contiki and Zephyr operating systems also use some components of IEEE 802.15.4 hardware and software. The standard defines two types of network node. The first one is the full-function device (FFD). It can serve as

3717-463: The structure to which they are attached. Compared to wired systems, wireless networks are frequently subject to electromagnetic interference . This can be caused by other networks or other types of equipment that generate radio waves that are within, or close, to the radio bands used for communication. Interference can degrade the signal or cause the system to fail. Some materials cause absorption of electromagnetic waves, preventing it from reaching

3780-473: The use of relatively simple transceivers, while enabling application flexibility and adaptability. Key 802.15.4 features include: Devices are designed to interact with each other over a conceptually simple wireless network . The definition of the network layers is based on the OSI model ; although only the lower layers are defined in the standard, interaction with upper layers is intended, possibly using an IEEE 802.2 logical link control sublayer accessing

3843-459: The world. Emergency services such as the police utilize wireless networks to communicate effectively as well. Individuals and businesses use wireless networks to send and share data rapidly, whether it be in a small office building or across the world. In a general sense, wireless networks offer a vast variety of uses by both business and home users. "Now, the industry accepts a handful of different wireless technologies. Each wireless technology

SECTION 60

#1732894691494

3906-650: Was developed under the brand ALOHAnet in 1969 at the University of Hawaii and became operational in June 1971. The first commercial wireless network was the WaveLAN product family, developed by NCR in 1986. Advances in MOSFET (MOS transistor) wireless technology enabled the development of digital wireless networks . The wide adoption of RF CMOS ( radio frequency CMOS ), power MOSFET and LDMOS (lateral diffused MOS) devices led to

3969-466: Was released expanding the four PHYs available in the earlier 2006 version to six, including one PHY using direct sequence ultra-wideband (UWB) and another using chirp spread spectrum (CSS). The UWB PHY is allocated frequencies in three ranges: below 1 GHz, between 3 and 5 GHz, and between 6 and 10 GHz. The CSS PHY is allocated spectrum in the 2450 MHz ISM band. In April, 2009 IEEE 802.15.4c and IEEE 802.15.4d were released expanding

#493506