ISA100 and the OSI Model
The OSI Model
ISA100 Technology and Benefits by Layer
Physical (1-PHY)
Defines the electrical and physical specifications for devices, particularly the relationship between a device and a transmission medium.
Technology
IEEE 802.15.4, 2.4 GHz ISM band
Benefits
- Global use without license
- Transceivers available from many sources
- Designed to coexist with other IEEE radios, especially WiFi
Data Link (2-DLL)
Provides the means to transfer data between network entities and to detect and possibly correct any errors that may occur in the Physical Layer.
Technology
- Mesh network modeled at Layer 2
- Second layer of AES128 security
- Mesh/Star/Hybrid network configurations
- Redundant communication links to backbone; duocast
- Channel hopping: multiple hopping patterns
- Multiple media access methods: TDMA, CSMA, and hybrid
- Extensive wireless diagnostics
- Channel blacklisting for coexistence
- Routing/Non-Routing (I/O) devices
Benefits
- Simple integration with IPv6
- High integrity due to AES128
- Self-configuring
- Reliable and fast update
- Flexible and better performance for different types of applications with efficient data transmission
- Deterministic and large data transfer
- Robust to EM interference
- Lick & stick sensors, low cost sensors
Network (3-NL)
Provides transparent transfer of data between end user applications.
Technology
- UDP: Internet standard device
- IPv6 addressing: Globally addressable Internet of Things
- Backbone Routing, IPv6 access points
- Compatible with 6LoWPAN
Benefits
- Future-proof and scalable
- Integration with IP technology
- Scale network through IP backbone
Transport (4-TL)
Provides the means of transferring variable length data sequences from a source to a destination via one or more networks; performs network routing functions.
Technology
- UDP: Internet standard device
- IPv6 addressing: Globally addressable Internet of Things
- Backbone Routing, IPv6 access points
- Compatible with 6LoWPAN
Benefits
- Future-proof and scalable
- Integration with IP technology
- Scale network through IP backbone
Session (5-SL)
Controls the dialogues (connections) between computers.
It establishes, manages, and terminates the connections between the local population and the remote application.
Technology
- State of the art AES128 bit encryption security
- Join key, network ID, end-to-end security
- Over-the-Air provisioning with PKI (asymmetric key)
- Hop-by-hop security and end-to-end security
- Time as security material to guard against replay attacks
Benefits
- Strong security in every message for data protection and confidentiality
- Message integrity and authenticity
- Replay attack protection
Presentation (6-PL)
Establishes a context between Application Layer entities, in which the higher-layer entities may use different syntax and semantics.
Technology
- ISA100 Wireless native protocol, similar to FOUNDATION Fieldbus
- Object mapping, tunneling protocol
- Extensible to support FOUNDATION Fieldbus, Profibus, HART, and legacy protocols
- Contract-based reservation of resources
Benefits
- Easy Integration with existing wired host systems
- Extensible to cover specialty application protocols
- Open to a rapidly growing variety of device types from diverse ecosystems
- Assured QoS from AL
Application (7-AL)
Interface with software applications that implement a communicating component.
Technology
- ISA100 Wireless native protocol, similar to FOUNDATION Fieldbus
- Object mapping, tunneling protocol
- Extensible to support FOUNDATION Fieldbus, Profibus, HART, and legacy protocols
- Contract-based reservation of resources
Benefits
- Easy Integration with existing wired host systems
- Extensible to cover specialty application protocols
- Open to a rapidly growing variety of device types from diverse ecosystems
- Assured QoS from AL
Take the Next Step
ISA100 Wireless technology has been delivering value in operating sites like yours for over 15 years. Learn how ISA100 can help solve your problems today.