Professional Documents
Culture Documents
Abstract
● Introduction
● Characteristics
● Architecture
Physical layer
Media access control layer
Network layer
Security layer
● Applications
1
● ZIGBEEF
● Conclusion
● References
ABSTRACT
2
sensors where wiring isn't practical from factory automation systems to
or even possible. ZigBee promises home security systems to consumer
to put wireless sensors in everything electronics.
3
• Low power consumption — Ideal • Direct sequence spread spectrum
for battery operation — Fast acquisition time
• Small size, light weight — Easy • Range- 50m typical (5-500m
to integrate based on environment)
• Ease of implementation • Multiple topologies- star, peer-
• Reliable data transfer to-peer, mesh
o ARCHITECHTURE
ZigBee stack architecture follows the The layers above them are defined by
standard Open Systems the ZigBee Alliance.
Interconnection (OSI) reference model, The model has five layers namely
ZigBee's protocol stack is structured in 1. Physical (PHY) layer
layers. The first two layers, physical 2. Media access control (MAC) layer
(PHY) and media access (MAC), are 3. Network (NWK) and security
defined by the IEEE 802.15.4 standard. layers 4. Application framework
5. Application profiles
4
ZigBee
Application Framework Device
Object
Applicatio Applicati
ZPUI
n Object on (ZDO)
240
[On Endpoint
Object 1
[On Endpoint 1] [On Endpoint 0]
240]
APSDE-SAP APSDE-SAP APSDE-SAP
Securi
APSME-SAP
APSSE-SAP
Provid
NLME-SAP
NLSE-SAP
PHYSICAL LAYER:
5
spectrum in the 2.4GHz band, with spacing. The 868 and 900MHz
offset-quardrature phase-shift bands also use direct-sequence
keying modulation. Channel width spread spectrum but with binary-
is 2MHz with 5MHzchannel phase-shift keying modulation
The media access control (MAC) layer large amounts of ROM or RAM. The
was designed to allow multiple MAC was designed to handle large
topologies without complexity. The numbers of devices without requiring
power management operation doesn't them to be "parked".
require multiple modes of operation. The
The MAC provides network association
MAC allows a reduced functionality
and disassociation, has an optional
device (RFD) that needn't have flash nor
superframe structure with beacons for
6
time synchronization, and a guaranteed time-slot mechanism for high-priority
communications
Frame structure: Figure illustrates the four basic frame types defined in 802.15.4:
data, ACK, MAC command, and beacon.
Figure:: The four basic frame types defined in 802.15.4: Data, ACK, MAC command,
and beacon
The data frame provides a payload of It provides feedback from the receiver to
up to 104 bytes. The frame is numbered the sender confirming that the packet
to ensure that all packets are tracked. A was received without error. The device
frame-check sequence ensures that takes advantage of specified "quiet time"
packets are received without error. This between frames to send a short packet
frame structure improves reliability in immediately after the data-packet
difficult conditions. transmission.
Another important structure for 802.15.4 A MAC command frame provides the
is the acknowledgment (ACK) frame. mechanism for remote control and
7
configuration of client nodes. A address and go back to sleep if they don't
centralized network manager uses MAC receive it. Beacons are important for
to configure individual clients' command mesh and cluster-tree networks to keep
frames no matter how large the network. all the nodes synchronized without
requiring those nodes to consume
Finally, the beacon frame wakes up
precious battery energy by listening for
client devices, which listen for their
long periods of time.
NETWORK LAYER
Mes
h
Star
PAN
coordinator
Full Function
Cluster Tree Device
Reduced Function
Device
The NWK layer supports multiple cluster tree, and mesh, all of which are
network topologies including star, shown in Figure
8
In a star topology, one of the FFD-type may be extended through the use of
devices assumes the role of network ZigBee routers. The routing algorithm
coordinator and is responsible for uses a request-response protocol to
initiating and maintaining the devices on eliminate sub-optimal routing. Ultimate
the network. All other devices, known as network size can reach 264 nodes (more
end devices, directly communicate with than we'll probably need). Using local
the coordinator. In a mesh topology, the addressing, you can configure simple
ZigBee coordinator is responsible for networks of more than 65,000 (216)
starting the network and for choosing nodes, thereby reducing address
key network parameters, but the network overhead
Security layer
Security and data integrity are key • frame integrity to protect data
benefits of the ZigBee technology. from being modified by parties
ZigBee leverages the security model of without cryptographic keys
the IEEE 802.15.4 MAC sub-layer • sequential freshness to reject data
which specifies four security services: frames that have been replayed—
access control—the device maintains a the network controller compares
list of trusted devices within the network the freshness value with the last
known value from the device and
• data encryption, which uses
rejects it if the freshness value
symmetric key 128-bit advanced
has not been updated to a new
encryption standard
value
9
o COMPARISION BETWEEN THE WIRELESS
STANDARDS
o APPLICATIONS
10
The figure basically shows a home-
monitoring system for senior citizens.
Zigbee-based sensors keep an eye on
elderly residents living alone and warn
medics about changes in habits that are
potentially serious; It includes a light
switch with a tiny digital camera (left); a
pendant (center) worn around the neck;
and movement tags (right), which can let
the system generate an alert based either on
detected movement or the lack of any
movement.
Zigbee doesn't have the bandwidth to handle video. So light switch / camera
combos deliver still images to a controller. An alert from the pendant or from one
of the tags activates the camera.
The pendant includes accelerometers that detect the forces of a person falling. It
also contains a panic button. The device can send a warning either to a monitoring
company or family member if something is up. It can be programmed to generate
an alert, for example, if a bedroom or refrigerator door hasn't opened by noon
11
“The bugs this system catches aren't in software”
12
the system stops short of asking a A variety of sensors have been devised
sympathetic neighbor to come over for the system. In addition to proximity
and rectify the problem.) switches for doors and windows, there
are devices designed to detect leaking
The base station is smart enough to
pipes, ac loads, and even remind
notice if one of the sensors changes
homeowners about periodic maintenance
state when the Home Key is out of
items such as low batteries in smoke
range. In this case it can send the
detectors or the need for seasonal gutter
homeowner's cell phone a text
cleaning. One worthy piece of the
message detailing what's wrong.
system is a water shut-off valve.
8.6 Zigbeef
ZIGBEEF:
13
non-proprietary wireless sensor [Refer the greeting preview for the
technologies, offering a proven figure].
solution at an inexpensive price.
o CONCLUSION
Zigbee promises to put wireless
There are many wireless monitoring
sensors in everything from factory
and control applications for
automation systems to home
industrial and home markets which
security systems to consumer
require longer battery life, lower
electronics. Zigbee is a new
data rates and less complexity than
standard that still needs to pass
available from existing wireless
through the circles or rigorous
standards like Bluetooth and Wi-Fi.
technology critics and establish its
So, there was a need for a standard
own place in the industry. The next
based, interoperable wireless
zigbee challenge will be devising
technology that addresses the
the proposed extension to the
unique needs of low data rate
802.15.4 standard,’4a’ which could
wireless control and sensor based
be based on ultra-wideband (UWB).
networks. In this regard, zigbee was
poised to become the global
control/sensor network standard.
o REFERENCES
3. www.zigbeealliance.com
14