OSI Layer |
Function |
Technology |
Benefits |
Application
(7-AL) |
Interface with software applications that implement a communicating component |
-
ISA100 Wireless native procol, similar to FOUNDATION Fieldbus
-
Object mapping, tunneling protocol
-
Extensible to support FOUNDATION Fieldbus, Profibus, HART, and legacy protocols
-
Contract-based reservation of resources
|
-
Easy Integration with existing wired host systems
-
Extensible to cover specialty application protocols
-
Open to a rapidly growing variety of device types from diverse ecosystems
-
Assured QoS from AL
|
Presentation
(6-PL) |
Establishes a context between Application Layer entities, in which the higher-layer entities may use different syntax and semantics |
Session
(5-SL) |
Controls the dialogues (connections) between computers.
It establishes, manages, and terminates the connections between the local population and the remote application. |
-
State of the art AES128 bit encryption security
-
Join key, network ID, end-to-end security
-
Over-the-Air provisioning with PKI (asymmetric key)
-
Hop-by-hop security and end-to-end security
-
Time as security material to guard against replay attacks
|
-
Strong security in every message for data protection and confidentiality
-
Message integrity and authenticity
-
Replay attack protection
|
Transport
(4-TL) |
Provides transparent transfer of data between end user applications |
-
UDP: Internet standard device
-
IPv6 addressing: Globally addressable Internet of Things
-
Backbone Routing, IPv6 access points
-
Compatible with 6LoWPAN
|
-
Future-proof and scalable
-
Integration with IP technology
-
Scale network through IP backbone
|
Network
(3-NL) |
Provides the means of transferring variable length data sequences from a source to a destination via one or more networks; performs network routing functions |
Data Link
(2-DLL) |
Provides the means to transfer data between network entities and to detect and possibly correct any errors that may occur in the Physical Layer |
-
Mesh network modeled at Layer 2
-
Second layer of AES128 security
-
Mesh/Star/Hybrid network configurations
-
Redundant communication links to backbone; duocast
-
Channel hopping: multiple hopping patterns
-
Multiple media access methods: TDMA, CSMA, and hybrid
-
Extensive wireless diagnostics
-
Channel blacklisting for coexistence
-
Routing/Non-Routing (I/O) devices
|
-
Simple integration with IPv6
-
High integrity due to AES128
-
Self-configuring
-
Reliable and fast update
-
Flexible and better performance for different types of applications with efficient data transmission
-
Deterministic and large data transfer
-
Robust to EM interference
-
Lick & stick sensors, low cost sensors
|
Physical
(1-PHY) |
Defines the electrical and physical specifications for devices, particularly the relationship between a device and a tranmission medium |
-
IEEE 802.15.4, 2.4 GHz ISM band
|
-
Global use without license
-
Transceivers available from many sources
-
Designed to coexist with other IEEE radios, especially WiFI
|