You are on page 1of 14

Contents

Abstract

● Introduction

● Origin of the name Zigbee

● Characteristics

● Architecture
Physical layer
Media access control layer
Network layer
Security layer

● Comparison between the wireless standards

● Applications

A new twist on, "I've fallen and I can't get up”


“The bugs this system catches aren't in software”
“Home to homeowner: "The toilet is leaking."

1
● ZIGBEEF

● Conclusion

● References

ABSTRACT

ZigBee is a low-power wireless


technology, rewriting the wireless
sensor equation. It is a secure
network technology that rides on o INTRODUCTION
top of the recently ratified IEEE
802.15.4 radio standard. Zigbee’s key technical features
include three license free frequency
It is designed to interact bands-2.4GHz, 868MHz,
with the remote controlled devices, 915MHz ;multiple channels ;up to
which are put under a single 100mts range; CSMA-CA channel
standardized control interface that access; low power, long battery life;
can interconnect into a network supporting up to 255devices per
.Once associated with a network, a network.
ZigBee node can wake up and
communicate with other ZigBee Zigbee is used in home security

devices and return to sleep. systems where wireless sensors are


easily installed than sensors that
need wiring. The same is true in
industrial environments, where
wiring typically accounts for 80%
of the cost of sensor installations.
And then there are applications for

2
sensors where wiring isn't practical from factory automation systems to
or even possible. ZigBee promises home security systems to consumer
to put wireless sensors in everything electronics.

o ORIGIN OF THE NAME ZIGBEE


The network name comes from the Principle. Using this silent, but
zigzagging path a bee (a data powerful communication system,
packet) takes to get from flower to whereby the bee dances in a zigzag
flower (or node to node). The pattern, they are able to share
technique that honey bees use to information such as the location,
communicate new-found food distance, and direction of a newly
sources to other members of the discovered food source to her
colony is referred to as the ZigBee fellow colony members.

o CHARACTERISTICS • Low cost — Extends wireless to


virtually any sensor

3
• Low power consumption — Ideal • Direct sequence spread spectrum
for battery operation — Fast acquisition time
• Small size, light weight — Easy • Range- 50m typical (5-500m
to integrate based on environment)
• Ease of implementation • Multiple topologies- star, peer-
• Reliable data transfer to-peer, mesh

• Appropriate levels of security • Data rates of 250 kbps (@2.4


GHz), 40 kbps (@ 915 MHz),
and 20 kbps (@868 MHz)

o ARCHITECHTURE
ZigBee stack architecture follows the The layers above them are defined by
standard Open Systems the ZigBee Alliance.
Interconnection (OSI) reference model, The model has five layers namely
ZigBee's protocol stack is structured in 1. Physical (PHY) layer
layers. The first two layers, physical 2. Media access control (MAC) layer
(PHY) and media access (MAC), are 3. Network (NWK) and security
defined by the IEEE 802.15.4 standard. layers 4. Application framework
5. Application profiles

4
ZigBee
Application Framework Device
Object
Applicatio Applicati

ZPUI
n Object on (ZDO)
240
[On Endpoint
Object 1
[On Endpoint 1] [On Endpoint 0]
240]
APSDE-SAP APSDE-SAP APSDE-SAP
Securi

APSME-SAP
APSSE-SAP

ty Application Support (APS) Layer


Servic
e NLDE-SAP

Provid

NLME-SAP
NLSE-SAP

er Network (NWK) Layer


MCPS-SAP MLME-SAP

Medium Access Layer (MAC)


Layer
PD-SAP PLME-SAP

Physical (PHY) Layer

Figure : ZigBee Stack Model

 PHYSICAL LAYER:

ZigBee-compliant products operate 915MHz (10 channels), and 20Kbps


in unlicensed bands worldwide, at 868MHz (1 channel). The
including 2.4GHz (global), 902 to transmission distance is expected to
928MHz (Americas), and 868MHz range from 10 to 75m, depending
(Europe). Raw data throughput rates on power output and environmental
of 250Kbps can be achieved at characteristics. Like Wi-Fi, Zigbee
2.4GHz (16 channels), 40Kbps at uses direct-sequence spread

5
spectrum in the 2.4GHz band, with spacing. The 868 and 900MHz
offset-quardrature phase-shift bands also use direct-sequence
keying modulation. Channel width spread spectrum but with binary-
is 2MHz with 5MHzchannel phase-shift keying modulation

Table: Frequency bands and data rates

Spreading Parameters Data Parameters


Frequency Channel
PHY
Band Numbering
Chip Bit Symbol
Modulation Modulation
Rate Rate Rate

868 to 870 300 k 20 20 k


868 to 0 BPSK BPSK
MHz chip/s kb/s baud
915
MHz 902 to 928 600 k 40 40 k
1 to 10 BPSK BPSK
MHz chip/s kb/s baud

2.4 2.4 to 2.0 M 250 62.5 k 16-ary


11 to 26 O-QPSK
GHz 2.4835 GHz chip/s kb/s baud Orthogonal

 MEDIA ACCESS CONTROL LAYER

The media access control (MAC) layer large amounts of ROM or RAM. The
was designed to allow multiple MAC was designed to handle large
topologies without complexity. The numbers of devices without requiring
power management operation doesn't them to be "parked".
require multiple modes of operation. The
The MAC provides network association
MAC allows a reduced functionality
and disassociation, has an optional
device (RFD) that needn't have flash nor
superframe structure with beacons for

6
time synchronization, and a guaranteed time-slot mechanism for high-priority
communications

Frame structure: Figure illustrates the four basic frame types defined in 802.15.4:
data, ACK, MAC command, and beacon.

Figure:: The four basic frame types defined in 802.15.4: Data, ACK, MAC command,
and beacon

The data frame provides a payload of It provides feedback from the receiver to
up to 104 bytes. The frame is numbered the sender confirming that the packet
to ensure that all packets are tracked. A was received without error. The device
frame-check sequence ensures that takes advantage of specified "quiet time"
packets are received without error. This between frames to send a short packet
frame structure improves reliability in immediately after the data-packet
difficult conditions. transmission.

Another important structure for 802.15.4 A MAC command frame provides the
is the acknowledgment (ACK) frame. mechanism for remote control and

7
configuration of client nodes. A address and go back to sleep if they don't
centralized network manager uses MAC receive it. Beacons are important for
to configure individual clients' command mesh and cluster-tree networks to keep
frames no matter how large the network. all the nodes synchronized without
requiring those nodes to consume
Finally, the beacon frame wakes up
precious battery energy by listening for
client devices, which listen for their
long periods of time.

 NETWORK LAYER

Zigbee’s self-forming and self-healing data reliability. It may also be used to


mesh-network architecture lets data and build large, geographically dispersed
control messages pass from one node to networks with smaller networks linked
another by multiple paths. This feature to form a 'cluster-tree' network.
extends the network range and improves

Mes
h

Star

PAN
coordinator
Full Function
Cluster Tree Device
Reduced Function
Device

The NWK layer supports multiple cluster tree, and mesh, all of which are
network topologies including star, shown in Figure

8
In a star topology, one of the FFD-type may be extended through the use of
devices assumes the role of network ZigBee routers. The routing algorithm
coordinator and is responsible for uses a request-response protocol to
initiating and maintaining the devices on eliminate sub-optimal routing. Ultimate
the network. All other devices, known as network size can reach 264 nodes (more
end devices, directly communicate with than we'll probably need). Using local
the coordinator. In a mesh topology, the addressing, you can configure simple
ZigBee coordinator is responsible for networks of more than 65,000 (216)
starting the network and for choosing nodes, thereby reducing address
key network parameters, but the network overhead

 Security layer

Security and data integrity are key • frame integrity to protect data
benefits of the ZigBee technology. from being modified by parties
ZigBee leverages the security model of without cryptographic keys
the IEEE 802.15.4 MAC sub-layer • sequential freshness to reject data
which specifies four security services: frames that have been replayed—
access control—the device maintains a the network controller compares
list of trusted devices within the network the freshness value with the last
known value from the device and
• data encryption, which uses
rejects it if the freshness value
symmetric key 128-bit advanced
has not been updated to a new
encryption standard
value

9
o COMPARISION BETWEEN THE WIRELESS
STANDARDS

o APPLICATIONS

Potential applications of zigbee include the building automation, industrial, medical


and residential control & monitoring

• A new twist on, "I've fallen and I can't get up”

10
The figure basically shows a home-
monitoring system for senior citizens.
Zigbee-based sensors keep an eye on
elderly residents living alone and warn
medics about changes in habits that are
potentially serious; It includes a light
switch with a tiny digital camera (left); a
pendant (center) worn around the neck;
and movement tags (right), which can let
the system generate an alert based either on
detected movement or the lack of any
movement.

Zigbee doesn't have the bandwidth to handle video. So light switch / camera
combos deliver still images to a controller. An alert from the pendant or from one
of the tags activates the camera.

The pendant includes accelerometers that detect the forces of a person falling. It
also contains a panic button. The device can send a warning either to a monitoring
company or family member if something is up. It can be programmed to generate
an alert, for example, if a bedroom or refrigerator door hasn't opened by noon

11
“The bugs this system catches aren't in software”

One of the more offbeat applications for Zigbee


sensors is in catching termites. Wireless bait stations are
devised which act as Zigbee nodes. In operation, the
bait stations go into the ground at numerous spots
surrounding a house. Each bait station has a special
sensor that triggers when termites eat at the wood it
contains. The station then signals this activity to a
receiver, which sends an e-mail.
This wireless approach beats the technique now used
on several levels. Existing methods force exterminators to
physically check each station for activity. Termites could
cause severe damage long before evidence of them could
turn up during a periodic inspection. In contrast, the
Zigbee bait stations monitor pest activity 24/7. And
exterminators need not make long trips just to examine
bait stations

“Home to homeowner: "The toilet is leaking."

This type of home automation your pocket or onto a key chain.


system called the Home Heartbeat When the Key leaves the range of
system gives homeowners an the base station, it carries with it the
awareness of what's going on inside last status of items such as doors,
their house, even if they happen to windows, and lights, as read by
be thousands of miles away. sensors on the Zigbee network.
Homeowners wondering whether
Two key components of the system
they left the garage door open could
are a base station and a Home Key.
conceivably tell by looking at the
The Key is envisioned to go into
LCD in their Home Key. (However,

12
the system stops short of asking a A variety of sensors have been devised
sympathetic neighbor to come over for the system. In addition to proximity
and rectify the problem.) switches for doors and windows, there
are devices designed to detect leaking
The base station is smart enough to
pipes, ac loads, and even remind
notice if one of the sensors changes
homeowners about periodic maintenance
state when the Home Key is out of
items such as low batteries in smoke
range. In this case it can send the
detectors or the need for seasonal gutter
homeowner's cell phone a text
cleaning. One worthy piece of the
message detailing what's wrong.
system is a water shut-off valve.

8.6 Zigbeef

ZIGBEEF:

Zigbeef is a solution for tracking reading-range over passive wand-


cattle. Zigbee sensors give beef based tag technology. Producers are
producers the ability to no longer limited to infrequent
electronically identify cattle opportunities to scan IDs. Zigbeef
whether their herds are crowded allows identification of each
into chutes, gathered into pens, or animal on the range, pen, or
grazing open pasture. Zigbeef radio- working chute, at virtually any time.
based cattle ear tags offer superior ZigBeef tags use mass-produced,

13
non-proprietary wireless sensor [Refer the greeting preview for the
technologies, offering a proven figure].
solution at an inexpensive price.

o CONCLUSION
Zigbee promises to put wireless
There are many wireless monitoring
sensors in everything from factory
and control applications for
automation systems to home
industrial and home markets which
security systems to consumer
require longer battery life, lower
electronics. Zigbee is a new
data rates and less complexity than
standard that still needs to pass
available from existing wireless
through the circles or rigorous
standards like Bluetooth and Wi-Fi.
technology critics and establish its
So, there was a need for a standard
own place in the industry. The next
based, interoperable wireless
zigbee challenge will be devising
technology that addresses the
the proposed extension to the
unique needs of low data rate
802.15.4 standard,’4a’ which could
wireless control and sensor based
be based on ultra-wideband (UWB).
networks. In this regard, zigbee was
poised to become the global
control/sensor network standard.

o REFERENCES

1. Electronics for you- November 4. www.zigbee.org


2004
5. www.zigbeef.com
2. Computer networks-by
Tanenbaum 6. www.nuri.com

3. www.zigbeealliance.com

14

You might also like