SEE THE COMPLETE LIST
Home   |   About ISA100 Wireless   |   ISA100 Wireless Benefits

ISA100 Wireless Benefits


OSI Layer Function Technology Benefits
Application
(7-AL)
Interface with software applications that implement a communicating component
  • ISA100 Wireless native procol, similar to FOUNDATION Fieldbus
  • Object mapping, tunneling protocol
  • Extensible to support FOUNDATION Fieldbus, Profibus, HART, and legacy protocols
  • Contract-based reservation of resources
  • Easy Integration with existing wired host systems
  • Extensible to cover specialty application protocols
  • Open to a rapidly growing variety of device types from diverse ecosystems
  • Assured QoS from AL
Presentation
(6-PL)
Establishes a context between Application Layer entities, in which the higher-layer entities may use different syntax and semantics
Session
(5-SL)
Controls the dialogues (connections) between computers.

It establishes, manages, and terminates the connections between the local population and the remote application.
  • State of the art AES128 bit encryption security
  • Join key, network ID, end-to-end security
  • Over-the-Air provisioning with PKI (asymmetric key)
  • Hop-by-hop security and end-to-end security
  • Time as security material to guard against replay attacks
  • Strong security in every message for data protection and confidentiality
  • Message integrity and authenticity
  • Replay attack protection
Transport
(4-TL)
Provides transparent transfer of data between end user applications
  • UDP: Internet standard device
  • IPv6 addressing: Globally addressable Internet of Things
  • Backbone Routing, IPv6 access points
  • Compatible with 6LoWPAN
  • Future-proof and scalable
  • Integration with IP technology
  • Scale network through IP backbone
Network
(3-NL)
Provides the means of transferring variable length data sequences from a source to a destination via one or more networks; performs network routing functions
Data Link
(2-DLL)
Provides the means to transfer data between network entities and to detect and possibly correct any errors that may occur in the Physical Layer
  • Mesh network modeled at Layer 2
  • Second layer of AES128 security
  • Mesh/Star/Hybrid network configurations
  • Redundant communication links to backbone; duocast
  • Channel hopping: multiple hopping patterns
  • Multiple media access methods: TDMA, CSMA, and hybrid
  • Extensive wireless diagnostics
  • Channel blacklisting for coexistence
  • Routing/Non-Routing (I/O) devices
  • Simple integration with IPv6
  • High integrity due to AES128
  • Self-configuring
  • Reliable and fast update
  • Flexible and better performance for different types of applications with efficient data transmission
  • Deterministic and large data transfer
  • Robust to EM interference
  • Lick & stick sensors, low cost sensors
Physical
(1-PHY)
Defines the electrical and physical specifications for devices, particularly the relationship between a device and a tranmission medium
  • IEEE 802.15.4, 2.4 GHz ISM band
  • Global use without license
  • Transceivers available from many sources
  • Designed to coexist with other IEEE radios, especially WiFI