SlideShare ist ein Scribd-Unternehmen logo
1 von 23
The ZigBee Technology
CHAPTER 1
INTRODUCTION
ZigBee is a low rate wireless communication technology using small, low-cost and low-
power sensors based on IEEE 802.15.4 standard. Many companies want to investigate and
replace long wires which handling data transfer by inexpensive and low power RF devices.
Finally the ZigBee alliance team produces low cost ZigBee IEEE 802.15.4 compatible RF
transceiver. ZigBee is the name of a specification for a suite of high level communication
protocols using small, low-power digital radios based on the IEEE 802.15.4-2006 standard
for wireless personal area networks (WPANs), such as wireless headphones connecting with
cell phones via short-range radio. The technology is intended to be simpler and less
expensive than other WPANs, such as Bluetooth. ZigBee is targeted at radio-frequency (RF)
applications that require a low data rate, long battery life, and secure networking.
Department Of ECE., shashidhar495@gmail.com
Page4
The ZigBee Technology
Need For ZigBee Technology
1.1 Why is ZigBee needed?
– There are a multitude of standards that address mid to high data rates for voice, PC
LANs, video, etc. However, up till now there hasn’t been a wireless network standard that
meets the unique needs of sensors and control devices. Sensors and controls don’t need high
bandwidth but they do need low latency and very low energy consumption for long battery
lives and for large device arrays.
– There are a multitude of proprietary wireless systems manufactured today to solve a
multitude of problems that also don’t require high data rates but do require low cost and very
low current drain.
– These proprietary systems were designed because there were no standards that met
their requirements. These legacy systems are creating significant interoperability problems
with each other and with newer technologies.
The ZigBee Alliance is not pushing a technology; rather it is providing a standardized base
set of solutions for sensor and control systems.
• The physical layer was designed to accommodate the need for a low cost yet allowing
for high levels of integration. The use of direct sequence allows the analog circuitry to
be very simple and very tolerant towards inexpensive implementations.
• The media access control (MAC) layer was designed to allow multiple topologies
without complexity. The power management operation doesn’t require multiple modes
of operation. The MAC allows a reduced functionality device (RFD) that needn’t have
flash nor large amounts of ROM or RAM. The MAC was designed to handle large
numbers of devices without requiring them to be “parked”.
• The network layer has been designed to allow the network to spatially grow without
requiring high power transmitters. The network layer also can handle large amounts of
nodes with relatively low latencies.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
1.2 FEATURES
ZigBee is poised to become the global control/sensor network standard. It has been
designed to provide the following features:
–Low power consumption, simply implemented
– Users expect batteries to last many months to years! Consider that a typical single
family house has about 6 smoke/CO detectors. If the batteries for each one only lasted six
months, the home owner would be replacing batteries every month!
– Bluetooth has many different modes and states depending upon your latency and
power requirements such as sniff, park, hold, active, etc.; ZigBee/IEEE 802.15.4 has
active (transmit/receive) or sleep. Application software needs to focus on the
application, not on which power mode is optimum for each aspect of operation.
– Even mains powered equipment needs to be conscious of energy. Consider a future
home with 100 wireless control/sensor devices,
– Case 1: 802.11 Rx power is 667 mW (always on)@ 100 devices/home & 50,000
homes/city = 3.33 megawatts
– Case 2: 802.15.4 Rx power is 30 mW (always on)@ 100 devices/home & 50,000
homes/city = 150 kilowatts
– Case 3: 802.15.4 power cycled at .1% (typical duty cycle) = 150 watts.
ZigBee devices will be more ecological than its predecessors saving megawatts at it full
deployment.
–Low cost (device, installation, maintenance)
Low cost to the users means low device cost, low installation cost and low
maintenance. ZigBee devices allow batteries to last up to years using primary cells
(low cost) without any chargers (low cost and easy installation). ZigBee’s simplicity
allows for inherent configuration and redundancy of network devices provides low
maintenance.
–High density of nodes per network
ZigBee’s use of the IEEE 802.15.4 PHY and MAC allows networks to handle any
number of devices. This attribute is critical for massive sensor arrays and control
networks.
–Simple protocol, global implementation
ZigBee’s protocol code stack is estimated to be about 1/4th
of Bluetooth’s or
802.11’s. Simplicity is essential to cost, interoperability, and maintenance. The
IEEE 802.15.4 PHY adopted by ZigBee has been designed for the 868 MHz band in
Europe, the 915 MHz band in N America, Australia, etc; and the 2.4 GHz band is
now recognized to be a global band accepted in almost all countries.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
CHAPTER 2
2.1 ZigBee/IEEE 802.15.4 - General Characteristics
• Dual PHY (2.4GHz and 868/915 MHz)
• Data rates of 250 kbps (@2.4 GHz), 40 kbps (@ 915 MHz), and 20 kbps
(@868 MHz)
• Optimized for low duty-cycle applications (<0.1%)
• CSMA-CA channel access
– Yields high throughput and low latency for low duty cycle devices like sensors and
controls
• Low power (battery life multi-month to years)
• Multiple topologies: star, peer-to-peer, mesh
• Addressing space of up to:
– 18,450,000,000,000,000,000 devices (64 bit IEEE address)
– 65,535 networks
• Optional guaranteed time slot for applications requiring low latency
• Fully hand-shaked protocol for transfer reliability
• Range: 50m typical (5-500m based on environment)
2.2 ZigBee/IEEE802.15.4 - Typical Traffic Types Addressed
– Periodic data
– Application defined rate (e.g., sensors)
– Intermittent data
– Application/external stimulus defined rate (e.g., light switch)
– Repetitive low latency data
– Allocation of time slots (e.g., mouse)
Each of these traffic types mandates different attributes from the MAC. The
IEEE802.15.4 MAC is flexible enough to handle each of these types.
• Periodic data can be handled using the beaconing system whereby the sensor will
wake up for the beacon, check for any messages and then go back to sleep.
• Intermittent data can be handled either in a beaconless system or in a disconnected
fashion. In a disconnected operation the device will only attach to the network when
it needs to communicate saving significant energy.
• Low latency applications may choose to the guaranteed time slot (GTS) option. GTS
is a method of QoS in that it allows each device a specific duration of time each
Superframe to do whatever it wishes to do without contention or latency.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
The IEEE 802.15.4 PHY and MAC along with ZigBee’s Network and Application Support
Layer provide:
• Extremely low cost
• Ease of implementation
• Reliable data transfer
• Short range operation
• Very low power consumption
• Appropriate levels of security
2.3 Types Physical Devices In ZigBee:
There are two physical device types for the lowest system cost
To allow vendors to supply the lowest possible cost devices the IEEE standard defines
two types of devices: full function devices and reduced function devices
–Full function device (FFD)
• Can function in any topology
• Capable of being the Network coordinator
• Capable of being a coordinator
• Can talk to any other device
–Reduced function device (RFD)
• Limited to star topology
• Cannot become a network coordinator
• Talks only to a network coordinator
• Very simple implementation
An IEEE 802.15.4/ZigBee network requires at least one full function device as a network
coordinator, but endpoint devices may be reduced functionality devices to reduce system
cost.
–All devices must have 64 bit IEEE addresses
–Short (16 bit) addresses can be allocated to reduce packet size
–Addressing modes:
– Network + device identifier (star)
– Source/destination identifier (peer-peer)
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
CHAPTER 3
Network Topologies
Figure 2.1 shows 3 types of topologies that ZigBee supports: star topology, peer-to-peer
topology and cluster tree.
3.1 Star Topology
In the star topology, the communication is established between devices and a single central
controller, called the PAN coordinator. The PAN coordinator may be mains powered while
the devices will most likely be battery powered. Applications that benefit from this topology
include home automation, personal computer (PC) peripherals, toys and games. After an
FFD is activated for the first time, it may establish its own network and become the PAN
coordinator. Each start network chooses a PAN identifier, which is not currently used by any
other network within the radio sphere of influence. This allows each star network to operate
independently.
3.2 Peer-to-peer Topology
In peer-to-peer topology, there is also one PAN coordinator. In contrast to star topology, any
device can communicate with any other device as long as they are in range of one another. A
peer-to-peer
Figure 2.1: Topology Models.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
Network can be ad hoc, self-organizing and self-healing. Applications such as industrial
control and monitoring, wireless sensor networks, asset and inventory tracking would benefit
from such a topology. It also allows multiple hops to route messages from any device to any
other device in the network. It can provide reliability by multipath routing.
3.3 Cluster-tree Topology
Cluster-tree network is a special case of a peer-to-peer network in which most devices are
FFDs and an RFD may connect to a cluster-tree network as a leave node at the end of a
branch. Any of the FFD can act as a coordinator and provide synchronization services to
other devices and coordinators. Only one of these coordinators however is the PAN
coordinator. The PAN coordinator forms the first cluster by establishing itself as the cluster
head (CLH) with a cluster identifier (CID) of zero, choosing an unused PAN identifier, and
broadcasting beacon frames to neighboring devices. A candidate device receiving a beacon
frame may request to join the network at the CLH. If the PAN coordinator permits the
device to join, it will add this new device as a child device in its neighbor list. The newly
joined device will add the CLH as its parent in its neighbor list and begin transmitting
periodic beacons such that other candidate devices may then join the network at that device.
Once application or network requirements are met, the PAN coordinator may instruct a
device to become the CLH of a new cluster adjacent to the first one. The advantage of this
clustered structure is the increased coverage area at the cost of increased message latency.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
Topologies In More Detailed View:
Department Of ECE., shashidhar495@gmail.com.
Star Topology
PAN
Coordinator
Full function
device
Communications
flow
Peer to Peer
topology
Cluster Tree
Topology
Full Function Device
Reduced Function
Device
Communications
Flow
Page4
The ZigBee Technology
CHAPTER 4
4.1 Frame Structure:
The frame structures have been designed to keep the complexity to a minimum while at the
same time making them sufficiently robust for transmission on a noisy channel. Each
successive protocol layer adds to the structure with layer-specific headers and footers.
The IEEE 802.15.4 MAC defines four frame structures:
• A beacon frame, used by a coordinator to transmit beacons.
• A data frame, used for all transfers of data.
• An acknowledgment frame, used for confirming successful frame reception.
• A MAC command frame, used for handling all MAC peer entity control transfers.
The data frame is illustrated below:
The Physical Protocol Data Unit is the total information sent over the air. As shown in the
illustration above the Physical layer adds the following overhead:
Preamble Sequence 4 Octets
Start of Frame Delimiter 1 Octet
Frame Length 1 Octet
The MAC adds the following overhead:
Frame Control 2 Octets
Data Sequence Number 1 Octet
Address Information 4 – 20 Octets
Frame Check Sequence 2 Octets
In summary the total overhead for a single packet is therefore 15 -31 octets (120 bits);
depending upon the addressing scheme used (short or 64 bit addresses). Please note that
these numbers do not include any security overhead.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
4.2 Super Frame Structure
The LR-WPAN standard allows the optional use of a superframe structure. The format of the
superframe is defined by the coordinator. The superframe is bounded by network beacons, is
sent by the coordinator (See Figure 4) and is divided into 16 equally sized slots. The beacon
frame is transmitted in the first slot of each superframe. If a coordinator does not wish to use
a superframe structure it may turn off the beacon transmissions. The beacons are used to
synchronize the attached devices, to identify the PAN, and to describe the structure of the
superframes. Any device wishing to communicate during the contention access period
(CAP) between two beacons shall compete with other devices using a slotted CSMA-CA
mechanism. All transactions shall be completed by the time of the next network beacon.
For low latency applications or applications requiring specific data bandwidth, the
PAN coordinator may dedicate portions of the active superframe to that application. These
portions are called guaranteed time slots (GTSs). The guaranteed time slots comprise the
contention free period (CFP), which always appears at the end of the active superframe
starting at a slot boundary immediately following the CAP, as shown in Figure 5. The PAN
coordinator may allocate up to seven of these GTSs and a GTS may occupy more than one
slot period. However, a sufficient portion of the CAP shall remain for contention based
access of other networked devices or new devices wishing to join the network. All
contention based transactions shall be complete before the CFP begins. Also each device
transmitting in a GTS shall ensure that its transaction is complete before the time of the next
GTS or the end of the CFP.
Department Of ECE., shashidhar495@gmail.com.
Page4
The ZigBee Technology
4.3 MAC Data Service Diagrams:
4.4 MAC Primitives
MAC Data Service
• MCPS-DATA – exchange data packets between MAC and PHY
• MCPS-PURGE – purge an MSDU from the transaction queue
MAC Management Service
• MLME-ASSOCIATE/DISASSOCIATE – network association
• MLME-SYNC / SYNC-LOSS - device synchronization
• MLME-SCAN - scan radio channels
• MLME- COMM-STATUS – communication status
• MLME-GET / -SET– retrieve/set MAC PIB parameters
• MLME-START / BEACON-NOTIFY – beacon management
• MLME-POLL - beaconless synchronization
• MLME-GTS - GTS management
• MLME-RESET – request for MLME to perform reset
• MLME-ORPHAN - orphan device management
• MLME-RX-ENABLE - enabling/disabling of radio system
Department Of ECE., shashidhar495@gmail.com.
Beacon network communication
Non-beacon network communication
Page23
The ZigBee Technology
CHAPTER 5
5.1 Security:
When security of MAC layer frames is desired, ZigBee uses MAC layer security to secure
MAC command, beacon, and acknowledgement frames. ZigBee may secure messages
transmitted over a single hop using secured MAC data frames, but for multi-hop messaging
ZigBee relies upon upper layers (such as the NWK layer) for security. The MAC layer uses the
Advanced Encryption Standard (AES) [10] as its core cryptographic algorithm and describes a
variety of security suites that use the AES algorithm. These suites can protect the
confidentiality, integrity, and authenticity of MAC frames. The MAC layer does the security
processing, but the upper layers, which set up the keys and determine the security levels to use,
control this processing. When the MAC layer transmits (receives) a frame with security enabled,
it looks at the destination (source) of the frame, retrieves the key associated with that destination
(source), and then uses this key to process the frame according to the security suite designated
for the key being used. Each key is associated with a single security suite and the MAC frame
header has a bit that specifies whether security for a frame is enabled or disabled.
When transmitting a frame, if integrity is required, the MAC header and payload data are used
in calculations to create a Message Integrity Code (MIC) consisting of 4, 8, or 16 octets. The
MIC is right appended to the MAC payload. If confidentiality is required, the MAC frame
payload is also left appended with frame and sequence counts (data used to form a nonce). The
nonce is used when encrypting the payload and also ensures freshness to prevent replay attacks.
Upon receipt of a frame, if a MIC is present, it is verified and if the payload is encrypted, it is
decrypted. Sending devices will increase the frame count with every message sent and receiving
devices will keep track of the last received count from each sending device. If a message with
an old count is detected, it is flagged with a security error. The MAC layer security suites are
based on three modes of operation. Encryption at the MAC layer is done using AES in Counter
(CTR) mode and integrity is done using AES in Cipher Block Chaining (CBC- MAC) mode
[16]. A combination of encryption and integrity is done using a mixture of CTR and CBC-
MAC modes called the CCM mode.
The NWK layer also makes use of the Advanced Encryption Standard (AES). However, unlike
the MAC layer, the security suites are all based on the CCM* mode of operation. The CCM*
mode of operation is a minor modification of the CCM mode used by the MAC layer. It
includes all of the capabilities of CCM and additionally offers encryption-only and integrity-
only capabilities. These extra capabilities simplify the NWK layer security by eliminating the
need for CTR and CBC-MAC modes. Also, the use of CCM* in all security suites allows a
single key to be used for different suites. Since a key is not strictly bound to a single security
suite, an application has the flexibility to specify the actual security suite to apply to each NWK
frame, not just whether security is enabled or disabled
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
When the NWK layer transmits (receives) a frame using a particular security suite it uses the
Security Services Provider (SSP) to process the frame. The SSP looks at the destination (source)
of the frame, retrieves the key associated with that destination (source), and then applies the
security suite to the frame. The SSP provides the NWK layer with a primitive to apply security
to outgoing frames and a primitive to verify and remove security from incoming frames. The
NWK layer is responsible for the security processing, but the upper layers control the
processing by setting up the keys and determining which CCM* security suite to use for each
frame.
Similar to the MAC layer frame format, a frame sequence count and MIC may be added
to secure a NWK frame.
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
5.2 ZigBee Network Model
The ZigBee Network Coordinator
• Sets up a network
• Transmits network beacons
• Manages network nodes
• Stores network node information
• Routes messages between paired
nodes
• Typically operates in the receive
state
The ZigBee Network Node
• Designed for battery powered or high
energy savings
• Searches for available networks
• Transfers data from its application as
necessary
• Determines whether data is pending
• Requests data from the network coordinator
• Can sleep for extended periods
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Mesh
Link
Star
Link
ZigBee End Device
(RFD or FFD)
ZigBee Router (FFD)
ZigBee Coordinator (FFD)
Page23
The ZigBee Technology
CHAPTER 6
6.1 ZigBee Stack
ZigBee Stack System Requirements
– 8-bit µC, e.g., 80c51
– Full protocol stack <32k
– Simple node only stack ~6k
– Coordinators require extra RAM
– node device database
– transaction table
– pairing table
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
6.2 Functions Of Each Layer
Network Layer
The responsibilities of the ZigBee NWK layer include:
• Starting a network: The ability to successfully establish a new network.
• Joining and leaving a network: The ability to gain membership (join) or relinquish
membership (leave) a network.
• Configuring a new device: The ability to sufficiently configure the stack for operation
as required.
• Addressing: The ability of a ZigBee coordinator to assign addresses to devices joining
the network.
• Synchronization within a network: The ability for a device to achieve synchronization
with another device either through tracking beacons or by polling.
• Security: applying security to outgoing frames and removing security to terminating
frames
• Routing: routing frames to their intended destinations.
Network Routing Overview
Perhaps the most straightforward way to think of the ZigBee routing algorithm is as a
hierarchical routing strategy with table-driven optimizations applied where possible.
– NWK uses an algorithm that allows stack implementers and application developers to
balance unit cost, battery drain, and complexity in producing ZigBee solutions to meet the
specific cost-performance profile of their application.
– Started with the well-studied public-domain algorithm AODV and Motorola’s Cluster-
Tree algorithm and folding in ideas from Ember Corporation’s GRAd.
Network Summary
The network layer builds upon the IEEE 802.15.4 MAC’s features to allow extensibility
of coverage. Additional clusters can be added; networks can be consolidated or split up.
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
Application layer
The ZigBee application layer consists of the APS sub-layer, the ZDO and the manufacturer-
defined application objects. The responsibilities of the APS sub-layer include maintaining tables
for binding, which is the ability to match two devices together based on their services and their
needs, and forwarding messages between bound devices. Another responsibility of the APS sub-
layer is discovery, which is the ability to determine which other devices are operating in the
personal operating space of a device. The responsibilities of the ZDO include defining the role
of the device within the network (e.g., ZigBee coordinator or end device), initiating and/or
responding to binding requests and establishing a secure relationship between network devices.
The manufacturer-defined application objects implement the actual applications according to
the ZigBee-defined application descriptions
ZigBee Device Object
• Defines the role of the device within the network (e.g., ZigBee coordinator or
end device)
• Initiates and/or responds to binding requests
• Establishes a secure relationship between network devices selecting one of
ZigBee’s security methods such as public key, symmetric key, etc.
Application Support Layer
This layer provides the following services:
• Discovery: The ability to determine which other devices are operating in the
personal operating space of a device.
• Binding: The ability to match two or more devices together based on their
services and their needs and forwarding messages between bound devices
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
CHAPTER 7
7.1 ZigBee Vs Bluetooth
Bluetooth seems best suited for:
• Synchronization of cell phone to PDA
• Hands-free audio
• PDA to printer
While ZigBee is better suited for:
• Controls
• Sensors
• Lots of devices
• Low duty cycle
• Small data packets
• Long battery life is critical
Air Interface comparison:
ZigBee
DSSS
11 chips/ symbol
62.5 K symbols/s
4 Bits/ symbol
Peak Information Rate
~128 Kbit/second
Bluetooth
FHSS
1600 hops / second
1 M Symbol / second
1 bit/symbol
Peak Information Rate
~108-723 kbit/second
Battery Drain comparison to Bluetooth
Packet length can affect battery drain. Typically the shorter the packet the quicker the
device can go to sleep. Bluetooth is a slotted protocol. Communication can occur in
either: 625 µS, 1875 µS, or 3125 µS slots.
The following graph showing effective data rate was based upon the transmissions speeds
stated in Bluetooth v1.1 and IEEE 802.15.4 draft 18, using the 250 kb/s rate. The
general trend is that at larger packet sizes the effective data rate approaches the raw
data rate.
The peaks for the Bluetooth rate are a result of the three slot sizes, when a packet
becomes too big for one slot it must increment to the next slot even though it doesn’t
fill the whole slot allocation.
IEEE 802.15.4 was designed for small packets so it is no surprise it is more efficient at
those small packets resulting in a higher effective rate despite its lower raw data rate.
From this graph we can see that for packets less than 75 bytes ZigBee has a higher
effective data rate than Bluetooth. Having a lower rate for small packets means that BT
needs longer transmit and receive times and therefore current drain is higher for small
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
data packets. Although these numbers do not represent retransmissions or multiple
devices requesting the bandwidth; the author believes that the same traits will be
exhibited in these other cases.
Effective Data Rate:
(based upon theoretical values with no retransmissions)
Effective Data Rate vs Packetsize
0
100
200
300
400
500
600
700
800
1 12 23 34 45 56 67 78 89 100 111 122 133 144 155 166 177 188 199 210 221 232 243 254 265 276 287 298 309 320 331
Packet Size (bytes)
DataRate(kb/s)
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
7.2 Timing Considerations
ZigBee
•
• New slave enumeration = 30ms typically
• Sleeping slave changing to active = 15ms typically
• Active slave channel access time = 15ms typically
Bluetooth
•
• New slave enumeration = >3s, typically 20s
• Sleeping slave changing to active = 3s typically
• Active slave channel access time = 2ms typically
Conclusion:
ZigBee devices can quickly attach, exchange information, detach, and then go to deep
sleep to achieve a very long battery life. Bluetooth devices require about ~100X the
energy for this operation.
7.3 Power Considerations
ZigBee
– 2+ years from ‘normal’ batteries
– Designed to optimize slave power requirements
Bluetooth
– Power model as a mobile phone (regular daily charging)
– Designed to maximize ad-hoc functionality
Since IEEE 802.15.4 uses a CSMA-CA protocol the end nodes only talk when they have
data to send with the following benefits:
– No waiting for polling (however they must wait for a clear channel which
shouldn’t be a problem in low duty cycle networks such as with sensor and control
devices)
– Current drain is substantially reduced over a polling protocol that must poll to
maintain latencies even though the majority of the time the device needed be polled
– IEEE 802.15.4 protocol was designed to yield 6 months to 2 yrs on alkaline cell
ZigBee Battery Drain
In this section we’ll look at different aspects of a networked device’s battery drain.
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
A typical scenario for sensors and control devices is to remain “connected” to the
network. We use connected to mean that the device periodically listens for incoming
packets. In this manner the device’s behavior may be altered or at least checked to
verify correctness.
Scenario 1: ZigBee Battery Drain, network connection
Let’s review a couple of aspects for ZigBee devices:
Goal: Two year battery life
Assumptions:
– AAA cell = 1.15 Ahr (Duracell alkaline)
– 2 yrs = 17,532 hrs
Partial result: Average current drain < 65 µA (capacity/time)
– Tx/Rx current drain ~ 15 mA and sleep current = 1 µA
Partial result: Maximum duty cycle < .43% (Avg. current drain-sleep current)/current
drain
– Beacon duration of 3 mS (longer beacons containing more information would
drain more current)
– Beacon rate of 1/s (beacon rates can be as slow as .03/s)
Partial result: beacon use in this case requires a .3% duty cycle
Final result: 22.8 hours (0.13%) of transmission time would be allowed for data
transmission or reception
Scenario 2: Battery Drain when the unit is not connected to the network
This mode can be used to maximize battery life. The device will only connect to the
network when it needs to send data. A disadvantage of this technique is that the device
cannot be sent data, so for the most part it is seldom part of the network.
Assumptions:
– Device will connect only when necessary to send data
– Acquisition time
– Bluetooth requires about 20 – 30 seconds (~98% confidence) for an Inquiry (first
time) and about 3 seconds for a Page (subsequent times)
– IEEE 802.15.4 acquisition time is about 30 mS
– Using maximum duty cycle of .43% and 40 byte packet
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
CHAPTER 8
8.1 Result:
– ~ 45,140 data transmissions for Bluetooth
– ~ 4,269,670 data transmissions for ZigBee
Battery drain conclusion: ZigBee has an inherent advantage for these modes of operation
due to its short attach time and/or its ability to remain in the sleep mode for long periods.
8.2 Comparison Summary
• ZigBee and Bluetooth are two solutions for two different application areas.
• The differences are from their approach to their desired application. Bluetooth
has addressed a voice application by embodying a fast frequency hopping
system with a master slave protocol. ZigBee has addressed sensors, controls,
and other short message applications by embodying a direct sequence system
with a star or peer to peer protocols.
• Minor changes to Bluetooth or ZigBee won’t change their inherent behavior or
characteristics. The different behaviors come from architectural differences.
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
Page23
The ZigBee Technology
Bibliography
[1] ZigBee Alliance, http://www.caba.org/standard/zigbee.html.
[2] LAN-MAN Standards Committee of the IEEE Computer Society, Wireless LAN
medium access control(MAC) and physical layer(PHY) specification, IEEE, New York,
NY, USA, IEEE Std 802.11-1997 edition, 1997
[3] LAN-MAN Standards Committee of the IEEE Computer Society, Wireless Medium
Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless
Personal Area Networks (LR-WPANs), IEEE, 2003
[4] C. E. Perkins and E. M. Royer, Ad Hoc On Demand Distance Vector Routing
[5] IEEE P802.15 Working Group for WPANs, Cluster Tree Network, April 2001
Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.

Weitere ähnliche Inhalte

Was ist angesagt?

Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemShashidhar Reddy
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinRobert Russell
 
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139Premier Farnell
 
Internet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsInternet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsFaheem Zafari
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energySaptadeep Pal
 
LoRaWAN Intro (Oct 2019)
LoRaWAN Intro (Oct 2019)LoRaWAN Intro (Oct 2019)
LoRaWAN Intro (Oct 2019)Alper Yegin
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
Module 4 emerging wireless technologies and standards
Module 4  emerging wireless technologies and standardsModule 4  emerging wireless technologies and standards
Module 4 emerging wireless technologies and standardsnikshaikh786
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energyNEEVEE Technologies
 
Voice over zigbee networks with environmental monitoring
Voice over zigbee networks with environmental monitoringVoice over zigbee networks with environmental monitoring
Voice over zigbee networks with environmental monitoringWaqar Memon
 

Was ist angesagt? (20)

Zigbee
ZigbeeZigbee
Zigbee
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Bluetooth Vs Zigbee
Bluetooth Vs ZigbeeBluetooth Vs Zigbee
Bluetooth Vs Zigbee
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting system
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & Standards
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
 
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
 
Internet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsInternet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart Buildings
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
LoRaWAN Intro (Oct 2019)
LoRaWAN Intro (Oct 2019)LoRaWAN Intro (Oct 2019)
LoRaWAN Intro (Oct 2019)
 
Zigbee intro
Zigbee introZigbee intro
Zigbee intro
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Module 4 emerging wireless technologies and standards
Module 4  emerging wireless technologies and standardsModule 4  emerging wireless technologies and standards
Module 4 emerging wireless technologies and standards
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Voice over zigbee networks with environmental monitoring
Voice over zigbee networks with environmental monitoringVoice over zigbee networks with environmental monitoring
Voice over zigbee networks with environmental monitoring
 

Ähnlich wie Main document

ZigBee technology.pptx
ZigBee technology.pptxZigBee technology.pptx
ZigBee technology.pptxAjaySahre
 
smart Home energy Management System
smart Home energy Management Systemsmart Home energy Management System
smart Home energy Management SystemSrinivas Vasamsetti
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols Nagesh Rao
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbeeAmit Dixit
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
Wireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyWireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyM srinivasu
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01M srinivasu
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESVLSICS Design
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesVLSICS Design
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topicDurgaDeviP2
 
Multi-mode Wireless SoCs
Multi-mode Wireless SoCsMulti-mode Wireless SoCs
Multi-mode Wireless SoCsSilicon Labs
 
zigbee_presentation.pptx
zigbee_presentation.pptxzigbee_presentation.pptx
zigbee_presentation.pptxBhumitPatel46
 
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPIoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPAnshu Pandey
 

Ähnlich wie Main document (20)

ZigBee technology.pptx
ZigBee technology.pptxZigBee technology.pptx
ZigBee technology.pptx
 
smart Home energy Management System
smart Home energy Management Systemsmart Home energy Management System
smart Home energy Management System
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Wireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyWireless zigbee communicationtechnology
Wireless zigbee communicationtechnology
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01
 
Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
ZIGBEE.pptx
ZIGBEE.pptxZIGBEE.pptx
ZIGBEE.pptx
 
Lora vs Zigbee
Lora vs ZigbeeLora vs Zigbee
Lora vs Zigbee
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless Devices
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 
Multi-mode Wireless SoCs
Multi-mode Wireless SoCsMulti-mode Wireless SoCs
Multi-mode Wireless SoCs
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
zigbee_presentation.pptx
zigbee_presentation.pptxzigbee_presentation.pptx
zigbee_presentation.pptx
 
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPIoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
 
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocolsCharacteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
 

Mehr von N.CH Karthik

Hawk eye technology
Hawk eye technologyHawk eye technology
Hawk eye technologyN.CH Karthik
 
digital image processing
digital image processingdigital image processing
digital image processingN.CH Karthik
 
ONLINE-CD STORES..........I HOPE HELP FULL TO OTHERS
ONLINE-CD STORES..........I HOPE HELP FULL TO OTHERSONLINE-CD STORES..........I HOPE HELP FULL TO OTHERS
ONLINE-CD STORES..........I HOPE HELP FULL TO OTHERSN.CH Karthik
 
selfrelfecting robotos
selfrelfecting robotosselfrelfecting robotos
selfrelfecting robotosN.CH Karthik
 
Time managementpresentation1 ppt2
Time managementpresentation1 ppt2Time managementpresentation1 ppt2
Time managementpresentation1 ppt2N.CH Karthik
 

Mehr von N.CH Karthik (11)

KARTHIK.MBAPRJ
KARTHIK.MBAPRJKARTHIK.MBAPRJ
KARTHIK.MBAPRJ
 
kats.ppt
kats.pptkats.ppt
kats.ppt
 
karthiknch
karthiknchkarthiknch
karthiknch
 
Karthik.ppt
Karthik.pptKarthik.ppt
Karthik.ppt
 
Hawk eye technology
Hawk eye technologyHawk eye technology
Hawk eye technology
 
Digital.cc
Digital.ccDigital.cc
Digital.cc
 
digital image processing
digital image processingdigital image processing
digital image processing
 
ONLINE-CD STORES..........I HOPE HELP FULL TO OTHERS
ONLINE-CD STORES..........I HOPE HELP FULL TO OTHERSONLINE-CD STORES..........I HOPE HELP FULL TO OTHERS
ONLINE-CD STORES..........I HOPE HELP FULL TO OTHERS
 
selfrelfecting robotos
selfrelfecting robotosselfrelfecting robotos
selfrelfecting robotos
 
Time managementpresentation1 ppt2
Time managementpresentation1 ppt2Time managementpresentation1 ppt2
Time managementpresentation1 ppt2
 
4 g ppt
4 g ppt4 g ppt
4 g ppt
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Main document

  • 1. The ZigBee Technology CHAPTER 1 INTRODUCTION ZigBee is a low rate wireless communication technology using small, low-cost and low- power sensors based on IEEE 802.15.4 standard. Many companies want to investigate and replace long wires which handling data transfer by inexpensive and low power RF devices. Finally the ZigBee alliance team produces low cost ZigBee IEEE 802.15.4 compatible RF transceiver. ZigBee is the name of a specification for a suite of high level communication protocols using small, low-power digital radios based on the IEEE 802.15.4-2006 standard for wireless personal area networks (WPANs), such as wireless headphones connecting with cell phones via short-range radio. The technology is intended to be simpler and less expensive than other WPANs, such as Bluetooth. ZigBee is targeted at radio-frequency (RF) applications that require a low data rate, long battery life, and secure networking. Department Of ECE., shashidhar495@gmail.com
  • 2. Page4 The ZigBee Technology Need For ZigBee Technology 1.1 Why is ZigBee needed? – There are a multitude of standards that address mid to high data rates for voice, PC LANs, video, etc. However, up till now there hasn’t been a wireless network standard that meets the unique needs of sensors and control devices. Sensors and controls don’t need high bandwidth but they do need low latency and very low energy consumption for long battery lives and for large device arrays. – There are a multitude of proprietary wireless systems manufactured today to solve a multitude of problems that also don’t require high data rates but do require low cost and very low current drain. – These proprietary systems were designed because there were no standards that met their requirements. These legacy systems are creating significant interoperability problems with each other and with newer technologies. The ZigBee Alliance is not pushing a technology; rather it is providing a standardized base set of solutions for sensor and control systems. • The physical layer was designed to accommodate the need for a low cost yet allowing for high levels of integration. The use of direct sequence allows the analog circuitry to be very simple and very tolerant towards inexpensive implementations. • The media access control (MAC) layer was designed to allow multiple topologies without complexity. The power management operation doesn’t require multiple modes of operation. The MAC allows a reduced functionality device (RFD) that needn’t have flash nor large amounts of ROM or RAM. The MAC was designed to handle large numbers of devices without requiring them to be “parked”. • The network layer has been designed to allow the network to spatially grow without requiring high power transmitters. The network layer also can handle large amounts of nodes with relatively low latencies. Department Of ECE., shashidhar495@gmail.com.
  • 3. Page4 The ZigBee Technology 1.2 FEATURES ZigBee is poised to become the global control/sensor network standard. It has been designed to provide the following features: –Low power consumption, simply implemented – Users expect batteries to last many months to years! Consider that a typical single family house has about 6 smoke/CO detectors. If the batteries for each one only lasted six months, the home owner would be replacing batteries every month! – Bluetooth has many different modes and states depending upon your latency and power requirements such as sniff, park, hold, active, etc.; ZigBee/IEEE 802.15.4 has active (transmit/receive) or sleep. Application software needs to focus on the application, not on which power mode is optimum for each aspect of operation. – Even mains powered equipment needs to be conscious of energy. Consider a future home with 100 wireless control/sensor devices, – Case 1: 802.11 Rx power is 667 mW (always on)@ 100 devices/home & 50,000 homes/city = 3.33 megawatts – Case 2: 802.15.4 Rx power is 30 mW (always on)@ 100 devices/home & 50,000 homes/city = 150 kilowatts – Case 3: 802.15.4 power cycled at .1% (typical duty cycle) = 150 watts. ZigBee devices will be more ecological than its predecessors saving megawatts at it full deployment. –Low cost (device, installation, maintenance) Low cost to the users means low device cost, low installation cost and low maintenance. ZigBee devices allow batteries to last up to years using primary cells (low cost) without any chargers (low cost and easy installation). ZigBee’s simplicity allows for inherent configuration and redundancy of network devices provides low maintenance. –High density of nodes per network ZigBee’s use of the IEEE 802.15.4 PHY and MAC allows networks to handle any number of devices. This attribute is critical for massive sensor arrays and control networks. –Simple protocol, global implementation ZigBee’s protocol code stack is estimated to be about 1/4th of Bluetooth’s or 802.11’s. Simplicity is essential to cost, interoperability, and maintenance. The IEEE 802.15.4 PHY adopted by ZigBee has been designed for the 868 MHz band in Europe, the 915 MHz band in N America, Australia, etc; and the 2.4 GHz band is now recognized to be a global band accepted in almost all countries. Department Of ECE., shashidhar495@gmail.com.
  • 4. Page4 The ZigBee Technology CHAPTER 2 2.1 ZigBee/IEEE 802.15.4 - General Characteristics • Dual PHY (2.4GHz and 868/915 MHz) • Data rates of 250 kbps (@2.4 GHz), 40 kbps (@ 915 MHz), and 20 kbps (@868 MHz) • Optimized for low duty-cycle applications (<0.1%) • CSMA-CA channel access – Yields high throughput and low latency for low duty cycle devices like sensors and controls • Low power (battery life multi-month to years) • Multiple topologies: star, peer-to-peer, mesh • Addressing space of up to: – 18,450,000,000,000,000,000 devices (64 bit IEEE address) – 65,535 networks • Optional guaranteed time slot for applications requiring low latency • Fully hand-shaked protocol for transfer reliability • Range: 50m typical (5-500m based on environment) 2.2 ZigBee/IEEE802.15.4 - Typical Traffic Types Addressed – Periodic data – Application defined rate (e.g., sensors) – Intermittent data – Application/external stimulus defined rate (e.g., light switch) – Repetitive low latency data – Allocation of time slots (e.g., mouse) Each of these traffic types mandates different attributes from the MAC. The IEEE802.15.4 MAC is flexible enough to handle each of these types. • Periodic data can be handled using the beaconing system whereby the sensor will wake up for the beacon, check for any messages and then go back to sleep. • Intermittent data can be handled either in a beaconless system or in a disconnected fashion. In a disconnected operation the device will only attach to the network when it needs to communicate saving significant energy. • Low latency applications may choose to the guaranteed time slot (GTS) option. GTS is a method of QoS in that it allows each device a specific duration of time each Superframe to do whatever it wishes to do without contention or latency. Department Of ECE., shashidhar495@gmail.com.
  • 5. Page4 The ZigBee Technology The IEEE 802.15.4 PHY and MAC along with ZigBee’s Network and Application Support Layer provide: • Extremely low cost • Ease of implementation • Reliable data transfer • Short range operation • Very low power consumption • Appropriate levels of security 2.3 Types Physical Devices In ZigBee: There are two physical device types for the lowest system cost To allow vendors to supply the lowest possible cost devices the IEEE standard defines two types of devices: full function devices and reduced function devices –Full function device (FFD) • Can function in any topology • Capable of being the Network coordinator • Capable of being a coordinator • Can talk to any other device –Reduced function device (RFD) • Limited to star topology • Cannot become a network coordinator • Talks only to a network coordinator • Very simple implementation An IEEE 802.15.4/ZigBee network requires at least one full function device as a network coordinator, but endpoint devices may be reduced functionality devices to reduce system cost. –All devices must have 64 bit IEEE addresses –Short (16 bit) addresses can be allocated to reduce packet size –Addressing modes: – Network + device identifier (star) – Source/destination identifier (peer-peer) Department Of ECE., shashidhar495@gmail.com.
  • 6. Page4 The ZigBee Technology CHAPTER 3 Network Topologies Figure 2.1 shows 3 types of topologies that ZigBee supports: star topology, peer-to-peer topology and cluster tree. 3.1 Star Topology In the star topology, the communication is established between devices and a single central controller, called the PAN coordinator. The PAN coordinator may be mains powered while the devices will most likely be battery powered. Applications that benefit from this topology include home automation, personal computer (PC) peripherals, toys and games. After an FFD is activated for the first time, it may establish its own network and become the PAN coordinator. Each start network chooses a PAN identifier, which is not currently used by any other network within the radio sphere of influence. This allows each star network to operate independently. 3.2 Peer-to-peer Topology In peer-to-peer topology, there is also one PAN coordinator. In contrast to star topology, any device can communicate with any other device as long as they are in range of one another. A peer-to-peer Figure 2.1: Topology Models. Department Of ECE., shashidhar495@gmail.com.
  • 7. Page4 The ZigBee Technology Network can be ad hoc, self-organizing and self-healing. Applications such as industrial control and monitoring, wireless sensor networks, asset and inventory tracking would benefit from such a topology. It also allows multiple hops to route messages from any device to any other device in the network. It can provide reliability by multipath routing. 3.3 Cluster-tree Topology Cluster-tree network is a special case of a peer-to-peer network in which most devices are FFDs and an RFD may connect to a cluster-tree network as a leave node at the end of a branch. Any of the FFD can act as a coordinator and provide synchronization services to other devices and coordinators. Only one of these coordinators however is the PAN coordinator. The PAN coordinator forms the first cluster by establishing itself as the cluster head (CLH) with a cluster identifier (CID) of zero, choosing an unused PAN identifier, and broadcasting beacon frames to neighboring devices. A candidate device receiving a beacon frame may request to join the network at the CLH. If the PAN coordinator permits the device to join, it will add this new device as a child device in its neighbor list. The newly joined device will add the CLH as its parent in its neighbor list and begin transmitting periodic beacons such that other candidate devices may then join the network at that device. Once application or network requirements are met, the PAN coordinator may instruct a device to become the CLH of a new cluster adjacent to the first one. The advantage of this clustered structure is the increased coverage area at the cost of increased message latency. Department Of ECE., shashidhar495@gmail.com.
  • 8. Page4 The ZigBee Technology Topologies In More Detailed View: Department Of ECE., shashidhar495@gmail.com. Star Topology PAN Coordinator Full function device Communications flow Peer to Peer topology Cluster Tree Topology Full Function Device Reduced Function Device Communications Flow
  • 9. Page4 The ZigBee Technology CHAPTER 4 4.1 Frame Structure: The frame structures have been designed to keep the complexity to a minimum while at the same time making them sufficiently robust for transmission on a noisy channel. Each successive protocol layer adds to the structure with layer-specific headers and footers. The IEEE 802.15.4 MAC defines four frame structures: • A beacon frame, used by a coordinator to transmit beacons. • A data frame, used for all transfers of data. • An acknowledgment frame, used for confirming successful frame reception. • A MAC command frame, used for handling all MAC peer entity control transfers. The data frame is illustrated below: The Physical Protocol Data Unit is the total information sent over the air. As shown in the illustration above the Physical layer adds the following overhead: Preamble Sequence 4 Octets Start of Frame Delimiter 1 Octet Frame Length 1 Octet The MAC adds the following overhead: Frame Control 2 Octets Data Sequence Number 1 Octet Address Information 4 – 20 Octets Frame Check Sequence 2 Octets In summary the total overhead for a single packet is therefore 15 -31 octets (120 bits); depending upon the addressing scheme used (short or 64 bit addresses). Please note that these numbers do not include any security overhead. Department Of ECE., shashidhar495@gmail.com.
  • 10. Page4 The ZigBee Technology 4.2 Super Frame Structure The LR-WPAN standard allows the optional use of a superframe structure. The format of the superframe is defined by the coordinator. The superframe is bounded by network beacons, is sent by the coordinator (See Figure 4) and is divided into 16 equally sized slots. The beacon frame is transmitted in the first slot of each superframe. If a coordinator does not wish to use a superframe structure it may turn off the beacon transmissions. The beacons are used to synchronize the attached devices, to identify the PAN, and to describe the structure of the superframes. Any device wishing to communicate during the contention access period (CAP) between two beacons shall compete with other devices using a slotted CSMA-CA mechanism. All transactions shall be completed by the time of the next network beacon. For low latency applications or applications requiring specific data bandwidth, the PAN coordinator may dedicate portions of the active superframe to that application. These portions are called guaranteed time slots (GTSs). The guaranteed time slots comprise the contention free period (CFP), which always appears at the end of the active superframe starting at a slot boundary immediately following the CAP, as shown in Figure 5. The PAN coordinator may allocate up to seven of these GTSs and a GTS may occupy more than one slot period. However, a sufficient portion of the CAP shall remain for contention based access of other networked devices or new devices wishing to join the network. All contention based transactions shall be complete before the CFP begins. Also each device transmitting in a GTS shall ensure that its transaction is complete before the time of the next GTS or the end of the CFP. Department Of ECE., shashidhar495@gmail.com.
  • 11. Page4 The ZigBee Technology 4.3 MAC Data Service Diagrams: 4.4 MAC Primitives MAC Data Service • MCPS-DATA – exchange data packets between MAC and PHY • MCPS-PURGE – purge an MSDU from the transaction queue MAC Management Service • MLME-ASSOCIATE/DISASSOCIATE – network association • MLME-SYNC / SYNC-LOSS - device synchronization • MLME-SCAN - scan radio channels • MLME- COMM-STATUS – communication status • MLME-GET / -SET– retrieve/set MAC PIB parameters • MLME-START / BEACON-NOTIFY – beacon management • MLME-POLL - beaconless synchronization • MLME-GTS - GTS management • MLME-RESET – request for MLME to perform reset • MLME-ORPHAN - orphan device management • MLME-RX-ENABLE - enabling/disabling of radio system Department Of ECE., shashidhar495@gmail.com. Beacon network communication Non-beacon network communication
  • 12. Page23 The ZigBee Technology CHAPTER 5 5.1 Security: When security of MAC layer frames is desired, ZigBee uses MAC layer security to secure MAC command, beacon, and acknowledgement frames. ZigBee may secure messages transmitted over a single hop using secured MAC data frames, but for multi-hop messaging ZigBee relies upon upper layers (such as the NWK layer) for security. The MAC layer uses the Advanced Encryption Standard (AES) [10] as its core cryptographic algorithm and describes a variety of security suites that use the AES algorithm. These suites can protect the confidentiality, integrity, and authenticity of MAC frames. The MAC layer does the security processing, but the upper layers, which set up the keys and determine the security levels to use, control this processing. When the MAC layer transmits (receives) a frame with security enabled, it looks at the destination (source) of the frame, retrieves the key associated with that destination (source), and then uses this key to process the frame according to the security suite designated for the key being used. Each key is associated with a single security suite and the MAC frame header has a bit that specifies whether security for a frame is enabled or disabled. When transmitting a frame, if integrity is required, the MAC header and payload data are used in calculations to create a Message Integrity Code (MIC) consisting of 4, 8, or 16 octets. The MIC is right appended to the MAC payload. If confidentiality is required, the MAC frame payload is also left appended with frame and sequence counts (data used to form a nonce). The nonce is used when encrypting the payload and also ensures freshness to prevent replay attacks. Upon receipt of a frame, if a MIC is present, it is verified and if the payload is encrypted, it is decrypted. Sending devices will increase the frame count with every message sent and receiving devices will keep track of the last received count from each sending device. If a message with an old count is detected, it is flagged with a security error. The MAC layer security suites are based on three modes of operation. Encryption at the MAC layer is done using AES in Counter (CTR) mode and integrity is done using AES in Cipher Block Chaining (CBC- MAC) mode [16]. A combination of encryption and integrity is done using a mixture of CTR and CBC- MAC modes called the CCM mode. The NWK layer also makes use of the Advanced Encryption Standard (AES). However, unlike the MAC layer, the security suites are all based on the CCM* mode of operation. The CCM* mode of operation is a minor modification of the CCM mode used by the MAC layer. It includes all of the capabilities of CCM and additionally offers encryption-only and integrity- only capabilities. These extra capabilities simplify the NWK layer security by eliminating the need for CTR and CBC-MAC modes. Also, the use of CCM* in all security suites allows a single key to be used for different suites. Since a key is not strictly bound to a single security suite, an application has the flexibility to specify the actual security suite to apply to each NWK frame, not just whether security is enabled or disabled Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 13. Page23 The ZigBee Technology When the NWK layer transmits (receives) a frame using a particular security suite it uses the Security Services Provider (SSP) to process the frame. The SSP looks at the destination (source) of the frame, retrieves the key associated with that destination (source), and then applies the security suite to the frame. The SSP provides the NWK layer with a primitive to apply security to outgoing frames and a primitive to verify and remove security from incoming frames. The NWK layer is responsible for the security processing, but the upper layers control the processing by setting up the keys and determining which CCM* security suite to use for each frame. Similar to the MAC layer frame format, a frame sequence count and MIC may be added to secure a NWK frame. Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 14. Page23 The ZigBee Technology 5.2 ZigBee Network Model The ZigBee Network Coordinator • Sets up a network • Transmits network beacons • Manages network nodes • Stores network node information • Routes messages between paired nodes • Typically operates in the receive state The ZigBee Network Node • Designed for battery powered or high energy savings • Searches for available networks • Transfers data from its application as necessary • Determines whether data is pending • Requests data from the network coordinator • Can sleep for extended periods Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty. Mesh Link Star Link ZigBee End Device (RFD or FFD) ZigBee Router (FFD) ZigBee Coordinator (FFD)
  • 15. Page23 The ZigBee Technology CHAPTER 6 6.1 ZigBee Stack ZigBee Stack System Requirements – 8-bit µC, e.g., 80c51 – Full protocol stack <32k – Simple node only stack ~6k – Coordinators require extra RAM – node device database – transaction table – pairing table Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 16. Page23 The ZigBee Technology 6.2 Functions Of Each Layer Network Layer The responsibilities of the ZigBee NWK layer include: • Starting a network: The ability to successfully establish a new network. • Joining and leaving a network: The ability to gain membership (join) or relinquish membership (leave) a network. • Configuring a new device: The ability to sufficiently configure the stack for operation as required. • Addressing: The ability of a ZigBee coordinator to assign addresses to devices joining the network. • Synchronization within a network: The ability for a device to achieve synchronization with another device either through tracking beacons or by polling. • Security: applying security to outgoing frames and removing security to terminating frames • Routing: routing frames to their intended destinations. Network Routing Overview Perhaps the most straightforward way to think of the ZigBee routing algorithm is as a hierarchical routing strategy with table-driven optimizations applied where possible. – NWK uses an algorithm that allows stack implementers and application developers to balance unit cost, battery drain, and complexity in producing ZigBee solutions to meet the specific cost-performance profile of their application. – Started with the well-studied public-domain algorithm AODV and Motorola’s Cluster- Tree algorithm and folding in ideas from Ember Corporation’s GRAd. Network Summary The network layer builds upon the IEEE 802.15.4 MAC’s features to allow extensibility of coverage. Additional clusters can be added; networks can be consolidated or split up. Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 17. Page23 The ZigBee Technology Application layer The ZigBee application layer consists of the APS sub-layer, the ZDO and the manufacturer- defined application objects. The responsibilities of the APS sub-layer include maintaining tables for binding, which is the ability to match two devices together based on their services and their needs, and forwarding messages between bound devices. Another responsibility of the APS sub- layer is discovery, which is the ability to determine which other devices are operating in the personal operating space of a device. The responsibilities of the ZDO include defining the role of the device within the network (e.g., ZigBee coordinator or end device), initiating and/or responding to binding requests and establishing a secure relationship between network devices. The manufacturer-defined application objects implement the actual applications according to the ZigBee-defined application descriptions ZigBee Device Object • Defines the role of the device within the network (e.g., ZigBee coordinator or end device) • Initiates and/or responds to binding requests • Establishes a secure relationship between network devices selecting one of ZigBee’s security methods such as public key, symmetric key, etc. Application Support Layer This layer provides the following services: • Discovery: The ability to determine which other devices are operating in the personal operating space of a device. • Binding: The ability to match two or more devices together based on their services and their needs and forwarding messages between bound devices Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 18. Page23 The ZigBee Technology CHAPTER 7 7.1 ZigBee Vs Bluetooth Bluetooth seems best suited for: • Synchronization of cell phone to PDA • Hands-free audio • PDA to printer While ZigBee is better suited for: • Controls • Sensors • Lots of devices • Low duty cycle • Small data packets • Long battery life is critical Air Interface comparison: ZigBee DSSS 11 chips/ symbol 62.5 K symbols/s 4 Bits/ symbol Peak Information Rate ~128 Kbit/second Bluetooth FHSS 1600 hops / second 1 M Symbol / second 1 bit/symbol Peak Information Rate ~108-723 kbit/second Battery Drain comparison to Bluetooth Packet length can affect battery drain. Typically the shorter the packet the quicker the device can go to sleep. Bluetooth is a slotted protocol. Communication can occur in either: 625 µS, 1875 µS, or 3125 µS slots. The following graph showing effective data rate was based upon the transmissions speeds stated in Bluetooth v1.1 and IEEE 802.15.4 draft 18, using the 250 kb/s rate. The general trend is that at larger packet sizes the effective data rate approaches the raw data rate. The peaks for the Bluetooth rate are a result of the three slot sizes, when a packet becomes too big for one slot it must increment to the next slot even though it doesn’t fill the whole slot allocation. IEEE 802.15.4 was designed for small packets so it is no surprise it is more efficient at those small packets resulting in a higher effective rate despite its lower raw data rate. From this graph we can see that for packets less than 75 bytes ZigBee has a higher effective data rate than Bluetooth. Having a lower rate for small packets means that BT needs longer transmit and receive times and therefore current drain is higher for small Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 19. Page23 The ZigBee Technology data packets. Although these numbers do not represent retransmissions or multiple devices requesting the bandwidth; the author believes that the same traits will be exhibited in these other cases. Effective Data Rate: (based upon theoretical values with no retransmissions) Effective Data Rate vs Packetsize 0 100 200 300 400 500 600 700 800 1 12 23 34 45 56 67 78 89 100 111 122 133 144 155 166 177 188 199 210 221 232 243 254 265 276 287 298 309 320 331 Packet Size (bytes) DataRate(kb/s) Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 20. Page23 The ZigBee Technology 7.2 Timing Considerations ZigBee • • New slave enumeration = 30ms typically • Sleeping slave changing to active = 15ms typically • Active slave channel access time = 15ms typically Bluetooth • • New slave enumeration = >3s, typically 20s • Sleeping slave changing to active = 3s typically • Active slave channel access time = 2ms typically Conclusion: ZigBee devices can quickly attach, exchange information, detach, and then go to deep sleep to achieve a very long battery life. Bluetooth devices require about ~100X the energy for this operation. 7.3 Power Considerations ZigBee – 2+ years from ‘normal’ batteries – Designed to optimize slave power requirements Bluetooth – Power model as a mobile phone (regular daily charging) – Designed to maximize ad-hoc functionality Since IEEE 802.15.4 uses a CSMA-CA protocol the end nodes only talk when they have data to send with the following benefits: – No waiting for polling (however they must wait for a clear channel which shouldn’t be a problem in low duty cycle networks such as with sensor and control devices) – Current drain is substantially reduced over a polling protocol that must poll to maintain latencies even though the majority of the time the device needed be polled – IEEE 802.15.4 protocol was designed to yield 6 months to 2 yrs on alkaline cell ZigBee Battery Drain In this section we’ll look at different aspects of a networked device’s battery drain. Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 21. Page23 The ZigBee Technology A typical scenario for sensors and control devices is to remain “connected” to the network. We use connected to mean that the device periodically listens for incoming packets. In this manner the device’s behavior may be altered or at least checked to verify correctness. Scenario 1: ZigBee Battery Drain, network connection Let’s review a couple of aspects for ZigBee devices: Goal: Two year battery life Assumptions: – AAA cell = 1.15 Ahr (Duracell alkaline) – 2 yrs = 17,532 hrs Partial result: Average current drain < 65 µA (capacity/time) – Tx/Rx current drain ~ 15 mA and sleep current = 1 µA Partial result: Maximum duty cycle < .43% (Avg. current drain-sleep current)/current drain – Beacon duration of 3 mS (longer beacons containing more information would drain more current) – Beacon rate of 1/s (beacon rates can be as slow as .03/s) Partial result: beacon use in this case requires a .3% duty cycle Final result: 22.8 hours (0.13%) of transmission time would be allowed for data transmission or reception Scenario 2: Battery Drain when the unit is not connected to the network This mode can be used to maximize battery life. The device will only connect to the network when it needs to send data. A disadvantage of this technique is that the device cannot be sent data, so for the most part it is seldom part of the network. Assumptions: – Device will connect only when necessary to send data – Acquisition time – Bluetooth requires about 20 – 30 seconds (~98% confidence) for an Inquiry (first time) and about 3 seconds for a Page (subsequent times) – IEEE 802.15.4 acquisition time is about 30 mS – Using maximum duty cycle of .43% and 40 byte packet Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 22. Page23 The ZigBee Technology CHAPTER 8 8.1 Result: – ~ 45,140 data transmissions for Bluetooth – ~ 4,269,670 data transmissions for ZigBee Battery drain conclusion: ZigBee has an inherent advantage for these modes of operation due to its short attach time and/or its ability to remain in the sleep mode for long periods. 8.2 Comparison Summary • ZigBee and Bluetooth are two solutions for two different application areas. • The differences are from their approach to their desired application. Bluetooth has addressed a voice application by embodying a fast frequency hopping system with a master slave protocol. ZigBee has addressed sensors, controls, and other short message applications by embodying a direct sequence system with a star or peer to peer protocols. • Minor changes to Bluetooth or ZigBee won’t change their inherent behavior or characteristics. The different behaviors come from architectural differences. Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.
  • 23. Page23 The ZigBee Technology Bibliography [1] ZigBee Alliance, http://www.caba.org/standard/zigbee.html. [2] LAN-MAN Standards Committee of the IEEE Computer Society, Wireless LAN medium access control(MAC) and physical layer(PHY) specification, IEEE, New York, NY, USA, IEEE Std 802.11-1997 edition, 1997 [3] LAN-MAN Standards Committee of the IEEE Computer Society, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003 [4] C. E. Perkins and E. M. Royer, Ad Hoc On Demand Distance Vector Routing [5] IEEE P802.15 Working Group for WPANs, Cluster Tree Network, April 2001 Department Of ECE., Sri KrishnaDevaraya Engineering College, Gooty.