SlideShare a Scribd company logo
1 of 57
ZIGBEE
V.SATHISH
VELAMMAL INSTITUTE OF
TECHNOLOGY
OUTLINE


ZIGBEE AND APPLICATIONS






IEEE 802.15.4 PROTOCOL





ZIGBEE PROTOCOL
ZIGBEE ALLIANCE
ZIGBEE APPLICATIONS
PHYSICAL LAYER
MAC LAYER

ZIGBEE SPECIFICATION




NETWORK LAYER
SECURITY IN ZIGBEE
ZDO AND APPLICATION SUB-LAYER
SENSOR/CONTROL NETWORK
REQUIREMENTS


Networks form by themselves, scale to large sizes and
operate for years without manual intervention



Extremely long battery life (years on AA cell),


low infrastructure cost (low device & setup costs)



low complexity and small size



Low device data rate and QoS



Standardized protocols allow multiple vendors to
interoperate
WHAT IS ZIGBEE PROTOCOL?


The IEEE 802.15.4 covers the physical layer and
the MAC layer of low-rate WPAN.



The ZigBee is “an emerging standard that is
based on the IEEE 802.15.4 and adds network
construction (star networks, peer-to-peer/mesh
networks, and cluster-tree networks), application
services, and more”.
ZIGBEE ALLIANCE
•
•

Organized as an independent, neutral, nonprofit
corporation in 2002
Open and global
•
•

•

Anyone can join and participate
Membership is global

Activity includes
•
•
•

Specification creation
Certification and compliance programs
Branding, market development, and user education
ZIGBEE ALLIANCE
•

Is a growing community of companies
•
•

•

Has made its specification publicly available
•
•

•

~200 members vs. 35 Dec. 2002 (5+X Growth)
Includes major names in the Semiconductor, Software
Developer, End Product Manufacturer, and Service Provider
Industries including major Telecom Carriers
ZigBee is open to all-ZigBee 2006 now available
38,000+ downloads to date

Has over 30 compliant platforms
•
•

Many certified vendors make choosing ZigBee a safe choice
No dominating elements or companies.
WHY ZIGBEE?









Standards based
Low cost
Can be used globally
Reliable and self healing
Supports large number of nodes
Easy to deploy
Very long battery life
Secure
The IEEE 802 Wireless Space
WWAN

IEEE 802.22
IEEE 802.20

e g na R

WMAN

WiMax
IEEE 802.16

WLAN
ZigBee
802.15.4
Bluetooth
15.4c
802.15.1

WPAN
0.01

0.1

ZigBee standard uniquely fills a gap
for low data rate applications

WiFi
802.11

1
10
Data Rate (Mbps)

802.15.3
802.15.3c
100

1000
ZIGBEE PROMOTERS
ZIGBEE APPLICATIONS
security
HVAC
AMR
lighting control
access control

patient
monitoring
fitness
monitoring

ZigBee

TV
VCR
DVD/CD
remote

Wireless Control that
Simply Works

PC &
PERIPHERALS

PERSONAL
HEALTH CARE

asset mgt
process
control
environmental
energy mgt

TELECOM
SERVICES

m-commerce
info services
object interaction
(Internet of Things)

security
HVAC
lighting control
access control
irrigation
SOME APPLICATION PROFILES



Home Automation [HA]


Defines set of devices used
in home automation






Light switches
Thermostats
Window shade
Heating unit
etc.
SOME APPLICATION PROFILES



Industrial Plant Monitoring


Consists of device definitions
for sensors used in industrial
control





Temperature
Pressure sensors
Infrared
etc.
MORE APPLICATION PROFILES


Multiple profiles at various stages of completion


Commercial Building Automation





Telecom Services/M-commerce
Automated Meter Reading






Addresses utility meter reading

Wireless Sensor Networks




Building control, management, and monitoring

Very low power unattended networks

Vendors may form new profile groups within ZigBee
and/or propose private profiles for consideration
400+ private profile IDs issued
In-Home Patient Monitoring


Patients receive better care at reduced cost with more
freedom and comfort
 Patients can remain in their own home
 Monitors vital statistics and sends via internet
 Doctors can adjust medication levels
 Allows monitoring of elderly family member
 Sense movement or usage patterns in a home
 Turns lights on when they get out of bed
 Notify via mobile phone when anomalies occur
 Wireless panic buttons for falls or other problems
 Can also be used in hospital care
 Patients are allowed greater movement
 Reduced staff to patient ratio

graphic

graphic
Commercial Lighting Control




Wireless lighting control
 Dimmable intelligent ballasts
 Light switches/sensors anywhere
 Customizable lighting schemes
 Quantifiable energy savings
 Opportunities in residential, light
commercial and commercial
Extendable networks
 Lighting network can be integrated
with and/or be used by other
building control solutions
DEFINITION OF IEEE 802.15.4
STANDARD


IEEE Std 802.15.4 defines the physical layer
(PHY) and medium access control (MAC)
sublayer specifications for low-data-rate wireless
connectivity with fixed, portable, and moving
devices with no battery or very limited battery
consumption requirements typically operating in
the personal operating space (POS) of 10 m. It is
foreseen that, depending on the application, a
longer range at a lower data rate may be an
acceptable tradeoff.
IEEE 802.15.4 DEVICE TYPES




The IEEE 802.15.4 standard (2003) defines the
device types that can be used in a LR-WPAN
which are Full Functional Device (FFD) and
Reduced Functional Device (RFD).
The RFD can be used in simple applications in
which they do not need to transmit large
amounts of data and they have to communicate
only with a specific FFD
IEEE 802.15.4 DEVICE TYPES


The FFD can work as a PAN coordinator, as a
coordinator, or as a simple device. It can
communicate with either another FFD or a
RFD.
LR-WPAN TOPOLOGIES


In keeping with the application requirements, the LRWPAN operates in a star or peer-to-peer topology.



The star topology the RFD communicates with a single
controller, the PAN coordinator.



The PAN coordinator can perform the same function
as the RFD, but it is also responsible for controlling the
PAN; “it initiates, terminates, or routes communication
around the network”
LR-WPAN TOPOLOGIES


Peer-to-peer topology supports ad-hoc mesh multi-hop
networking.



Any device in the peer-to-peer topology can communicate with
any other device within its communication range; however, this
topology also has a PAN coordinator.



All the devices in a LR-WPAN have a unique 64-bit address.
This or a short address, allocated by the PAN coordinator, can
be used inside a PAN.



Each PAN has a unique identifier. The combination of the PAN
identifier and the sort addresses allows communication across
different PANs
LR-WPAN TOPOLOGIES

Star and Peer-to-Peer topologies in LR-WPAN
PHYSICAL LAYER


The 802.15.4 standard specifies two different services
that the Physical Layer(PHY) provides.



The PHY data service controls the radio, and thus, the
transmission and reception of the PPDUs.



The management service performs Energy Detection in
the channel, Clear Channel Assesment before sending
the messages and provides LQI for the received
packets.
IEEE 802.15.4 BANDS
 868/868.6 MHz for Europe
 902/928 MHz for North America
 2400/2483.5 MHz worldwide
PPDU PACKET FORMAT

 The LSB is always transmitted and received first

 The PPDU size can be up to 127 bytes
MAC LAYER


Interface between the SSCS and the PHY layer.



Similar to the PHY layer, the MAC layer supports two
services.



The MAC data service is responsible for the
transmission and reception of the MPDUs through the
PHY data service.
MAC LAYER


The MAC management service, if the device is a
coordinator, manages the network beacons. It is also
responsible for PAN association and disassociation,
frame validation, and acknowledgment providing “a
reliable link between two peer MAC entities.”



Uses the CSMA/CA for channel access and handles
and maintains the GTS mechanism.



Supports device security.
MAC LAYER FRAME FORMATS


The IEEE 802.15.4 standard defines four different
frame types: the beacon, data, acknowledgment, and
MAC command frame.



All frame types are based on the general MAC frame
format.



The frame control field describes and specifies the
above different frame types.
MAC LAYER FRAME FORMATS


Every MAC frame comprises a MHR, which
consists of a frame control, sequence
number, and the information field. It also
contains the MAC payload.



Different frame types have different MAC
payload fields.
GENERAL MAC LAYER FRAME
FORMAT

 Each frame includes a MFR, which contains a FCS.
 The data in the MPDU follows the same order as the PPDU: the
least significant bits are left in the frame and are transited first.
BEACON FRAME FORMAT

 The beacon frame is transmitted periodically by the PAN coordinator.
 It provides information about the network management through the
super frame and GTS fields.
 It also synchronizes the network devices and indicates the proper
communication period for them.
DATA FRAME FORMAT

 Encapsulates data from the higher layers.
ACKNOWLEDGEMENT FRAME
FORMAT

 Does not have a payload.
 When a device receives a packet, it is not obliged to
response with an acknowledgement packet
COMMAND FRAME FORMAT

 Useful for communication between the network devices.
 The command identifier specifies actions like association,
disassociation, and data, GTS or beacon request.
SUPER FRAME


In the LR-WPAN, every PAN has its own coordinator. The
PAN coordinator manages the communication in the local area;
it has two options, to use or not use the super frame structure.



The super frame uses network beacons.



If the coordinator does not want to use a super frame structure,
it suspends the beacon transmission.
SUPER FRAME


The beacon is important for device association
and disassociation.



If the coordinator wishes to maintain close
communication control in the PAN, and to
support low-latency devices it usually uses the
super frame.



A super frame determines a specific time period,
beacons bound it.
SUPER FRAME STRUCTURE
DATA TRANSFER TYPES


Three different types of data transfer exist.



Data transfer from a device to the PAN coordinator.



Data transfer from the PAN.



Peer-to-peer Data Transfer



The types differ if the coordinator uses or does not
beacons
DATA TRANSFER FROM A
DEVICE TO THE PAN
COORDINATOR
DATA TRANSFER FROM THE
PAN COORDINATOR
PEER-TO PEER DATA
TRANSFER


The devices are free to communicate with any other
device within their communication range.



In a peer-to-peer PAN the devices can “either receive
constantly or synchronize with each other.”



If they are receiving constantly, to transmit data they
use un-slotted CSMA-CA. In the second case,
synchronization must be achieved first.
SECURITY IN IEEE 802.15.4


Provides a security baseline, including “the ability to
maintain an ACL and use symmetric cryptography” for
data encryption.



The algorithm that is used for encryption is the AES.



The higher level layers decide when security is need.



The upper layers are in general responsible for device
authentication and key management.
ZIGBEE STANDARD


ZigBee, a new standard which became publicly
available in June 2005, is based on the IEEE
802.15.4 standard.



It expands the IEEE 802.15.4 by adding the
framework for the network construction,
security and application layer services.
ZIGBEE STACK
NETWORK LAYER




The ZigBee standard works on top of the IEEE
802.15.4 addressing schema by using the
standard 64-bit and the short 16-bit addressing.
Network layer responsibilities:
Establishment of a new network.
 New device configuration, addressing assignment,
network synchronization
 Frames security
 Message routing.

DEVICE TYPES


Uses notion of “logical devices.”



“ZigBee Coordinator” is the first type of logical devices.




Under the coordinator in the network hierarchy is the “ZigBee
router,”




It is responsible for initializing, maintaining, and managing the network.

Responsible for controlling the message routing between the nodes.

“ZigBee End Device” acts as the end point of the network
structure.
ZIGBEE NETWORK
TOPOLOGIES
SECURITY IN ZIGBEE


Security services provided by ZigBee: “key establishment, key
transport, frame protection, and device management.”



The security mechanism covers the network and the application
layer.



The notion of end-to-end security is supported; the source and
destination devices have access and use the same share key.



In the MAC layer the 802.15.4 AES mechanism provides the
proper security.
SECURITY IN ZIGBEE


The mechanism protects “the confidentiality, integrity, and
authenticity of the MAC frames”



An auxiliary header field in front of the MAC payload indicates if
the frame is encrypted or not.



The MAC frames’ integrity is supported by calculating and using
a MIC at the end of the MAC payload.



Nonce is used to provide MAC confidentiality and authenticity.
SECURITY IN ZIGBEE


For different security aspects the MAC layer
uses different mode of the AES:


For the encryption it uses the AES in Counter
(CTR) mode.



For the integrity, the CBC-MAC.



Combination (CCM) of the above two modes.
SECURE MAC FRAME
NETWORK LAYER SECURITY




CCM (a modified MAC layer CCM mode) is used for
encryption.
Single key is used for all different security options.



The network layer security message format is similar to
the MAC frame.



Although the network layer is responsible for securing
its layer messages, the above layers specify the keys and
the CCM option for each frame.
SECURE NETWORK FRAME
APPLICATION LAYER
SECURITY


Uses the “link key” or the “network key” to secure the
message.



Encapsulates it inside a set of fields similar to the
network format.



Other security responsibilities that the application layer
has are to provide the ZDO and the applications with
device management services, key establishment, and key
transport
SECURE APPLICATION LAYER
FRAME
ZDO AND APPLICATION SUBLAYER


The ZigBee application layer contains the manufacturer-defined
application objects, the ZDO and the application sub-layer.



In addition to the security responsibilities, the application sublayer:





Binds devices based on their duties and needs.
Maintains the binding tables.
Forwards messages between them.
Discovers the neighbour devices for a given device.
ZDO


The ZDO is responsible for:
Determining the device’s duty in the network.
 Communicating using binding requests.
 Supporting security




Sub-layer that implements the actual application
is the manufacturer-defined application object
CONCLUSION







Zigbee applications are in diverse areas
Zigbee Alliance works as a non-profit
organization which has more than 200
members.
IEEE 802.15.4 covers Physical Layer And Mac
Layer.
Zigbee adds network construction,application
services, and more.

More Related Content

What's hot

Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easyrajrayala
 
The Differences of between ZigBee and Bluetooth technologies
The Differences of between ZigBee and Bluetooth technologiesThe Differences of between ZigBee and Bluetooth technologies
The Differences of between ZigBee and Bluetooth technologiesCan KAYA
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee TechnologyNimi T
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
 
Zigbee - Building Smart Homes
Zigbee - Building Smart HomesZigbee - Building Smart Homes
Zigbee - Building Smart HomesOmer Ali
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbeeAmit Dixit
 
Zigbee network
Zigbee networkZigbee network
Zigbee networkbhavithd
 
Introduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBeeIntroduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBeeChiu-Hao Chen (Ted)
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technologySerma Pavi
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKSnaimish12
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology pptijaranjani
 

What's hot (20)

Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easy
 
Tech sem on zig 1
Tech sem on zig 1Tech sem on zig 1
Tech sem on zig 1
 
The Differences of between ZigBee and Bluetooth technologies
The Differences of between ZigBee and Bluetooth technologiesThe Differences of between ZigBee and Bluetooth technologies
The Differences of between ZigBee and Bluetooth technologies
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBee
 
Zigbee
ZigbeeZigbee
Zigbee
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
Dccn ppt
Dccn pptDccn ppt
Dccn ppt
 
Zigbee - Building Smart Homes
Zigbee - Building Smart HomesZigbee - Building Smart Homes
Zigbee - Building Smart Homes
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
 
Zigbee network
Zigbee networkZigbee network
Zigbee network
 
Bluetooth Vs Zigbee
Bluetooth Vs ZigbeeBluetooth Vs Zigbee
Bluetooth Vs Zigbee
 
Introduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBeeIntroduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBee
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 

Viewers also liked

RF Management Applications Using ZigBee Networks
RF Management Applications Using ZigBee NetworksRF Management Applications Using ZigBee Networks
RF Management Applications Using ZigBee NetworksAlbert Abello Lozano
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
Wearable computing
Wearable computing Wearable computing
Wearable computing kdore
 
Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Daniel Roggen
 
Conditional Access Systems
Conditional Access SystemsConditional Access Systems
Conditional Access SystemsNamith CM
 
What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?ctorgan
 
Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!RNAdvisor
 
PROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAM
PROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAMPROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAM
PROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAMASHOKKUMAR RAMAR
 
holographic memory
holographic memoryholographic memory
holographic memorybhavithd
 
COMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable ComputingCOMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable ComputingMark Billinghurst
 
Wearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsWearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsDaniel Roggen
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 

Viewers also liked (20)

RF Management Applications Using ZigBee Networks
RF Management Applications Using ZigBee NetworksRF Management Applications Using ZigBee Networks
RF Management Applications Using ZigBee Networks
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Wearable computing
Wearable computing Wearable computing
Wearable computing
 
Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?
 
Conditional Access Systems
Conditional Access SystemsConditional Access Systems
Conditional Access Systems
 
What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?
 
Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!
 
PROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAM
PROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAMPROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAM
PROJECTS CENTER IN TAMBARAM MAASTECH-ECE PROJECTS TAMBARAM
 
holographic memory
holographic memoryholographic memory
holographic memory
 
COMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable ComputingCOMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable Computing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
Wearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsWearable Computing - Part II: Sensors
Wearable Computing - Part II: Sensors
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 

Similar to Zigbee technology

Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
Wireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyWireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyM srinivasu
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01M srinivasu
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 HemalathaR31
 
Bbic 08-zig bee
Bbic 08-zig beeBbic 08-zig bee
Bbic 08-zig beejoshivins
 
Minor projct(Broadband )
Minor projct(Broadband )Minor projct(Broadband )
Minor projct(Broadband )Smriti Tikoo
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the HomeCaroleHackenberg
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEEAfaq Siddiqui
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014Pascal Thubert
 

Similar to Zigbee technology (20)

Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Wireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyWireless zigbee communicationtechnology
Wireless zigbee communicationtechnology
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Ppt devicenet
Ppt devicenetPpt devicenet
Ppt devicenet
 
Main document
Main documentMain document
Main document
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Zigbee
ZigbeeZigbee
Zigbee
 
Ch4
Ch4Ch4
Ch4
 
EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 EC8004 wireless networks unit 1
EC8004 wireless networks unit 1
 
Bbic 08-zig bee
Bbic 08-zig beeBbic 08-zig bee
Bbic 08-zig bee
 
Zigbee
ZigbeeZigbee
Zigbee
 
Minor projct(Broadband )
Minor projct(Broadband )Minor projct(Broadband )
Minor projct(Broadband )
 
N010328691
N010328691N010328691
N010328691
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the Home
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 

More from VELAMMAL INSTITUTE OF TECHNOLOGY (7)

cache memory management
cache memory managementcache memory management
cache memory management
 
cache memory
 cache memory cache memory
cache memory
 
cache
cachecache
cache
 
Memory management
Memory managementMemory management
Memory management
 
VIBRATIONAL ENERGY HARVESTING POWER FROM ROAD SPEED BRAKER
VIBRATIONAL ENERGY HARVESTING POWER FROM ROAD SPEED BRAKERVIBRATIONAL ENERGY HARVESTING POWER FROM ROAD SPEED BRAKER
VIBRATIONAL ENERGY HARVESTING POWER FROM ROAD SPEED BRAKER
 
Eigg mod23.1
Eigg mod23.1Eigg mod23.1
Eigg mod23.1
 
wireless traffic density control using sensor
wireless traffic density control using sensorwireless traffic density control using sensor
wireless traffic density control using sensor
 

Recently uploaded

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 

Recently uploaded (20)

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 

Zigbee technology

  • 2. OUTLINE  ZIGBEE AND APPLICATIONS     IEEE 802.15.4 PROTOCOL    ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER ZIGBEE SPECIFICATION    NETWORK LAYER SECURITY IN ZIGBEE ZDO AND APPLICATION SUB-LAYER
  • 3. SENSOR/CONTROL NETWORK REQUIREMENTS  Networks form by themselves, scale to large sizes and operate for years without manual intervention  Extremely long battery life (years on AA cell),  low infrastructure cost (low device & setup costs)  low complexity and small size  Low device data rate and QoS  Standardized protocols allow multiple vendors to interoperate
  • 4. WHAT IS ZIGBEE PROTOCOL?  The IEEE 802.15.4 covers the physical layer and the MAC layer of low-rate WPAN.  The ZigBee is “an emerging standard that is based on the IEEE 802.15.4 and adds network construction (star networks, peer-to-peer/mesh networks, and cluster-tree networks), application services, and more”.
  • 5. ZIGBEE ALLIANCE • • Organized as an independent, neutral, nonprofit corporation in 2002 Open and global • • • Anyone can join and participate Membership is global Activity includes • • • Specification creation Certification and compliance programs Branding, market development, and user education
  • 6. ZIGBEE ALLIANCE • Is a growing community of companies • • • Has made its specification publicly available • • • ~200 members vs. 35 Dec. 2002 (5+X Growth) Includes major names in the Semiconductor, Software Developer, End Product Manufacturer, and Service Provider Industries including major Telecom Carriers ZigBee is open to all-ZigBee 2006 now available 38,000+ downloads to date Has over 30 compliant platforms • • Many certified vendors make choosing ZigBee a safe choice No dominating elements or companies.
  • 7. WHY ZIGBEE?         Standards based Low cost Can be used globally Reliable and self healing Supports large number of nodes Easy to deploy Very long battery life Secure
  • 8. The IEEE 802 Wireless Space WWAN IEEE 802.22 IEEE 802.20 e g na R WMAN WiMax IEEE 802.16 WLAN ZigBee 802.15.4 Bluetooth 15.4c 802.15.1 WPAN 0.01 0.1 ZigBee standard uniquely fills a gap for low data rate applications WiFi 802.11 1 10 Data Rate (Mbps) 802.15.3 802.15.3c 100 1000
  • 10. ZIGBEE APPLICATIONS security HVAC AMR lighting control access control patient monitoring fitness monitoring ZigBee TV VCR DVD/CD remote Wireless Control that Simply Works PC & PERIPHERALS PERSONAL HEALTH CARE asset mgt process control environmental energy mgt TELECOM SERVICES m-commerce info services object interaction (Internet of Things) security HVAC lighting control access control irrigation
  • 11. SOME APPLICATION PROFILES  Home Automation [HA]  Defines set of devices used in home automation      Light switches Thermostats Window shade Heating unit etc.
  • 12. SOME APPLICATION PROFILES  Industrial Plant Monitoring  Consists of device definitions for sensors used in industrial control     Temperature Pressure sensors Infrared etc.
  • 13. MORE APPLICATION PROFILES  Multiple profiles at various stages of completion  Commercial Building Automation    Telecom Services/M-commerce Automated Meter Reading    Addresses utility meter reading Wireless Sensor Networks   Building control, management, and monitoring Very low power unattended networks Vendors may form new profile groups within ZigBee and/or propose private profiles for consideration 400+ private profile IDs issued
  • 14. In-Home Patient Monitoring  Patients receive better care at reduced cost with more freedom and comfort  Patients can remain in their own home  Monitors vital statistics and sends via internet  Doctors can adjust medication levels  Allows monitoring of elderly family member  Sense movement or usage patterns in a home  Turns lights on when they get out of bed  Notify via mobile phone when anomalies occur  Wireless panic buttons for falls or other problems  Can also be used in hospital care  Patients are allowed greater movement  Reduced staff to patient ratio graphic graphic
  • 15. Commercial Lighting Control   Wireless lighting control  Dimmable intelligent ballasts  Light switches/sensors anywhere  Customizable lighting schemes  Quantifiable energy savings  Opportunities in residential, light commercial and commercial Extendable networks  Lighting network can be integrated with and/or be used by other building control solutions
  • 16. DEFINITION OF IEEE 802.15.4 STANDARD  IEEE Std 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sublayer specifications for low-data-rate wireless connectivity with fixed, portable, and moving devices with no battery or very limited battery consumption requirements typically operating in the personal operating space (POS) of 10 m. It is foreseen that, depending on the application, a longer range at a lower data rate may be an acceptable tradeoff.
  • 17. IEEE 802.15.4 DEVICE TYPES   The IEEE 802.15.4 standard (2003) defines the device types that can be used in a LR-WPAN which are Full Functional Device (FFD) and Reduced Functional Device (RFD). The RFD can be used in simple applications in which they do not need to transmit large amounts of data and they have to communicate only with a specific FFD
  • 18. IEEE 802.15.4 DEVICE TYPES  The FFD can work as a PAN coordinator, as a coordinator, or as a simple device. It can communicate with either another FFD or a RFD.
  • 19. LR-WPAN TOPOLOGIES  In keeping with the application requirements, the LRWPAN operates in a star or peer-to-peer topology.  The star topology the RFD communicates with a single controller, the PAN coordinator.  The PAN coordinator can perform the same function as the RFD, but it is also responsible for controlling the PAN; “it initiates, terminates, or routes communication around the network”
  • 20. LR-WPAN TOPOLOGIES  Peer-to-peer topology supports ad-hoc mesh multi-hop networking.  Any device in the peer-to-peer topology can communicate with any other device within its communication range; however, this topology also has a PAN coordinator.  All the devices in a LR-WPAN have a unique 64-bit address. This or a short address, allocated by the PAN coordinator, can be used inside a PAN.  Each PAN has a unique identifier. The combination of the PAN identifier and the sort addresses allows communication across different PANs
  • 21. LR-WPAN TOPOLOGIES Star and Peer-to-Peer topologies in LR-WPAN
  • 22. PHYSICAL LAYER  The 802.15.4 standard specifies two different services that the Physical Layer(PHY) provides.  The PHY data service controls the radio, and thus, the transmission and reception of the PPDUs.  The management service performs Energy Detection in the channel, Clear Channel Assesment before sending the messages and provides LQI for the received packets.
  • 23. IEEE 802.15.4 BANDS  868/868.6 MHz for Europe  902/928 MHz for North America  2400/2483.5 MHz worldwide
  • 24. PPDU PACKET FORMAT  The LSB is always transmitted and received first  The PPDU size can be up to 127 bytes
  • 25. MAC LAYER  Interface between the SSCS and the PHY layer.  Similar to the PHY layer, the MAC layer supports two services.  The MAC data service is responsible for the transmission and reception of the MPDUs through the PHY data service.
  • 26. MAC LAYER  The MAC management service, if the device is a coordinator, manages the network beacons. It is also responsible for PAN association and disassociation, frame validation, and acknowledgment providing “a reliable link between two peer MAC entities.”  Uses the CSMA/CA for channel access and handles and maintains the GTS mechanism.  Supports device security.
  • 27. MAC LAYER FRAME FORMATS  The IEEE 802.15.4 standard defines four different frame types: the beacon, data, acknowledgment, and MAC command frame.  All frame types are based on the general MAC frame format.  The frame control field describes and specifies the above different frame types.
  • 28. MAC LAYER FRAME FORMATS  Every MAC frame comprises a MHR, which consists of a frame control, sequence number, and the information field. It also contains the MAC payload.  Different frame types have different MAC payload fields.
  • 29. GENERAL MAC LAYER FRAME FORMAT  Each frame includes a MFR, which contains a FCS.  The data in the MPDU follows the same order as the PPDU: the least significant bits are left in the frame and are transited first.
  • 30. BEACON FRAME FORMAT  The beacon frame is transmitted periodically by the PAN coordinator.  It provides information about the network management through the super frame and GTS fields.  It also synchronizes the network devices and indicates the proper communication period for them.
  • 31. DATA FRAME FORMAT  Encapsulates data from the higher layers.
  • 32. ACKNOWLEDGEMENT FRAME FORMAT  Does not have a payload.  When a device receives a packet, it is not obliged to response with an acknowledgement packet
  • 33. COMMAND FRAME FORMAT  Useful for communication between the network devices.  The command identifier specifies actions like association, disassociation, and data, GTS or beacon request.
  • 34. SUPER FRAME  In the LR-WPAN, every PAN has its own coordinator. The PAN coordinator manages the communication in the local area; it has two options, to use or not use the super frame structure.  The super frame uses network beacons.  If the coordinator does not want to use a super frame structure, it suspends the beacon transmission.
  • 35. SUPER FRAME  The beacon is important for device association and disassociation.  If the coordinator wishes to maintain close communication control in the PAN, and to support low-latency devices it usually uses the super frame.  A super frame determines a specific time period, beacons bound it.
  • 37. DATA TRANSFER TYPES  Three different types of data transfer exist.  Data transfer from a device to the PAN coordinator.  Data transfer from the PAN.  Peer-to-peer Data Transfer  The types differ if the coordinator uses or does not beacons
  • 38. DATA TRANSFER FROM A DEVICE TO THE PAN COORDINATOR
  • 39. DATA TRANSFER FROM THE PAN COORDINATOR
  • 40. PEER-TO PEER DATA TRANSFER  The devices are free to communicate with any other device within their communication range.  In a peer-to-peer PAN the devices can “either receive constantly or synchronize with each other.”  If they are receiving constantly, to transmit data they use un-slotted CSMA-CA. In the second case, synchronization must be achieved first.
  • 41. SECURITY IN IEEE 802.15.4  Provides a security baseline, including “the ability to maintain an ACL and use symmetric cryptography” for data encryption.  The algorithm that is used for encryption is the AES.  The higher level layers decide when security is need.  The upper layers are in general responsible for device authentication and key management.
  • 42. ZIGBEE STANDARD  ZigBee, a new standard which became publicly available in June 2005, is based on the IEEE 802.15.4 standard.  It expands the IEEE 802.15.4 by adding the framework for the network construction, security and application layer services.
  • 44. NETWORK LAYER   The ZigBee standard works on top of the IEEE 802.15.4 addressing schema by using the standard 64-bit and the short 16-bit addressing. Network layer responsibilities: Establishment of a new network.  New device configuration, addressing assignment, network synchronization  Frames security  Message routing. 
  • 45. DEVICE TYPES  Uses notion of “logical devices.”  “ZigBee Coordinator” is the first type of logical devices.   Under the coordinator in the network hierarchy is the “ZigBee router,”   It is responsible for initializing, maintaining, and managing the network. Responsible for controlling the message routing between the nodes. “ZigBee End Device” acts as the end point of the network structure.
  • 47. SECURITY IN ZIGBEE  Security services provided by ZigBee: “key establishment, key transport, frame protection, and device management.”  The security mechanism covers the network and the application layer.  The notion of end-to-end security is supported; the source and destination devices have access and use the same share key.  In the MAC layer the 802.15.4 AES mechanism provides the proper security.
  • 48. SECURITY IN ZIGBEE  The mechanism protects “the confidentiality, integrity, and authenticity of the MAC frames”  An auxiliary header field in front of the MAC payload indicates if the frame is encrypted or not.  The MAC frames’ integrity is supported by calculating and using a MIC at the end of the MAC payload.  Nonce is used to provide MAC confidentiality and authenticity.
  • 49. SECURITY IN ZIGBEE  For different security aspects the MAC layer uses different mode of the AES:  For the encryption it uses the AES in Counter (CTR) mode.  For the integrity, the CBC-MAC.  Combination (CCM) of the above two modes.
  • 51. NETWORK LAYER SECURITY   CCM (a modified MAC layer CCM mode) is used for encryption. Single key is used for all different security options.  The network layer security message format is similar to the MAC frame.  Although the network layer is responsible for securing its layer messages, the above layers specify the keys and the CCM option for each frame.
  • 53. APPLICATION LAYER SECURITY  Uses the “link key” or the “network key” to secure the message.  Encapsulates it inside a set of fields similar to the network format.  Other security responsibilities that the application layer has are to provide the ZDO and the applications with device management services, key establishment, and key transport
  • 55. ZDO AND APPLICATION SUBLAYER  The ZigBee application layer contains the manufacturer-defined application objects, the ZDO and the application sub-layer.  In addition to the security responsibilities, the application sublayer:     Binds devices based on their duties and needs. Maintains the binding tables. Forwards messages between them. Discovers the neighbour devices for a given device.
  • 56. ZDO  The ZDO is responsible for: Determining the device’s duty in the network.  Communicating using binding requests.  Supporting security   Sub-layer that implements the actual application is the manufacturer-defined application object
  • 57. CONCLUSION     Zigbee applications are in diverse areas Zigbee Alliance works as a non-profit organization which has more than 200 members. IEEE 802.15.4 covers Physical Layer And Mac Layer. Zigbee adds network construction,application services, and more.