Vous êtes sur la page 1sur 8

Visit: www.geocities.com/chinna_chetan05/forfriends.

html

everything from factory automation

Zig Bee systems to home security systems to


consumer electronics.
INTRODUCTION
ORIGIN OF THE NAME
ZigBee is a low-power wireless ZIGBEE
technology, rewriting the wireless
The network name comes from the
sensor equation. It is a secure network
zigzagging path a bee (a data packet)
technology that rides on top of the
takes to get from flower to flower (or
recently ratified IEEE 802.15.4 radio
node to node). The technique that
standard. It is designed to interact with
honeybees use to communicate
the remote controlled devices, which are
newfound food sources to other
put under a single standardized control
members of the colony is referred to as
interface that can interconnect into a
the ZigBee Principle. Using this silent,
network. Once associated with a
but powerful communication system,
network, a ZigBee node can wake up
whereby the bee dances in a zigzag
and communicate with other ZigBee
pattern, they are able to share
devices and return to sleep.
information such as the location,
Zigbee’s key technical features include distance, and direction of a newly
three license free frequency bands- discovered food source to her fellow
2.4GHz, 868MHz, 915MHz;multiple colony members.
channels; up to 100mts range; CSMA-
CA channel access; low power, long
battery life; supporting up to 255devices
per network.

Zigbee is used in home security systems


where wireless sensors are easily
installed than sensors that need wiring.
CHARACTERISTICS
The same is true in industrial
environments, where wiring typically • Low cost — Extends wireless to
accounts for 80% of the cost of sensor virtually any sensor
installations. And then there are • Low power consumption — Ideal for
applications for sensors where wiring battery operation
isn't practical or even possible. ZigBee • Small size, light weight — Easy to
promises to put wireless sensors in integrate
1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

• Ease of implementation
• Reliable data transfer
• Appropriate levels of security
• Direct sequence spread spectrum —
Fast acquisition time
• Range- 50m typical (5-500m based on
environment) PHYSICAL LAYER:
• Multiple topologies- star, peer-to-peer,
ZigBee-compliant products operate
mesh
in unlicensed bands worldwide,
• Data rates of 250 kbps (@2.4 GHz), 40 including 2.4GHz (global), 902 to
kbps (@ 915 MHz), and 20 kbps 928MHz (Americas), and 868MHz
(@868 MHz) (Europe). Raw data throughput rates of
250Kbps can be achieved at 2.4GHz (16
ARCHITECHTURE
channels), 40Kbps at 915MHz (10
ZigBee stack architecture follows the channels), and 20Kbps at 868MHz (1
standard Open Systems Interconnection channel). The transmission distance is
(OSI) reference model; ZigBee's protocol expected to range from 10 to 75m,
stack is structured in layers. The first two depending on power output and
layers, physical (PHY) and media access environmental characteristics. Like Wi-
(MAC), are defined by the IEEE 802.15.4 Fi, Zigbee uses direct-sequence spread
standard. The layers above them are spectrum in the 2.4GHz band, with
defined by the ZigBee Alliance. offset-quardrature phase-shift keying
The model has five layers namely modulation. Channel width is 2MHz
1. Physical (PHY) layer with 5MHzchannel spacing. The 868
2. Media access control (MAC) layer and 900MHz bands also use direct-
3. Network (NWK) and security layers sequence spread spectrum but with
4. Application framework binary-phase-shift keying modulation
ApplicationFramework ZP ZigBee Device
5. Application profiles UI
Object (ZDO)
Application
Object 240
Application
Object 1
Table: Frequency bands and data rates
[On Endpoint 240] [On Endpoint 1] [On Endpoint 0]

AP APSDE-SAP APSDE-SAP APSDE-SAP AP


SS S
E- M
SA E-
Security P Application Support (APS) Layer SA Frequency Spreading
Service
P
Data Parameters
Provider
NL
SE
NLDE-SAP NL
M
Band Parameters
- E-
SA
P Network (NWK) Layer SA
P

MCPS-SAP MLME-SAP

MediumAccess Layer (MAC) Layer

2 Email: chinna_chetan05@yahoo.com
PD-SAP PLME-SAP

Physical (PHY) Layer

Figure: ZigBee Stack Model


Visit: www.geocities.com/chinna_chetan05/forfriends.html

Channel Mod Sym Mod types defined in 802.15.4: data, ACK,


Chip Bit
Numberin ulatio bol ulatio MAC command, and beacon.
Rate Rate
g n Rate n

868 to 870 300 k BPS 20 20 k BPS


868 to 0
MHz chip/s K kb/s baud K
915
902 to 928 600 k BPS 40 40 k BPS
MHz 1 to 10
MHz chip/s K kb/s baud K

16-
2.4 to O- 62.5 ary
2.4 2.0 M 250
2.4835 11 to 26 QPS k Orth
GHz chip/s kb/s
GHz K baud ogon
al

MEDIA ACCESS CONTROL


LAYER

The media access control (MAC)


Figure::
Figure:: The four basic frame types
layer was designed to allow multiple
defined in 802.15.4: Data, ACK, MAC
topologies without complexity. The
command, and beacon
power management operation doesn't
require multiple modes of operation. The
MAC allows a reduced functionality
device (RFD) that needn't have flash nor The data frame provides a payload of up
large amounts of ROM or RAM. The to 104 bytes. The frame is numbered to
MAC was designed to handle large ensure that all packets are tracked. A
numbers of devices without requiring them frame-check sequence ensures that packets
to be "parked". are received without error. This frame
structure improves reliability in difficult
The MAC provides network association conditions.
and disassociation, has an optional
superframe structure with beacons for time Another important structure for 802.15.4 is
synchronization, and a guaranteed time- the acknowledgment (ACK) frame.
frame. It
slot mechanism for high-priority provides feedback from the receiver to the
communications sender confirming that the packet was
received without error. The device takes
Frame structure: advantage of specified "quiet time"
Figure illustrates the four basic frame between frames to send a short packet

3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

immediately after the data-packet


transmission.

A MAC command frame provides the


The NWK layer supports multiple network
mechanism for remote control and
topologies including star, cluster tree, and
configuration of client nodes. A
mesh, all of which are shown in Figure
centralized network manager uses MAC to
configure individual clients' command
In a star topology, one of the FFD-type
frames no matter how large the network.
devices assumes the role of network
coordinator and is responsible for
Finally, the beacon frame wakes up client
initiating and maintaining the devices on
devices, which listen for their address and
the network. All other devices, known as
go back to sleep if they don't receive it.
end devices, directly communicate with
Beacons are important for mesh and
the coordinator. In a mesh topology, the
cluster-tree networks to keep all the nodes
ZigBee coordinator is responsible for
synchronized without requiring those
starting the network and for choosing key
nodes to consume precious battery energy
network parameters, but the network may
by listening for long periods of time.
be extended through the use of ZigBee
routers. The routing algorithm uses a
request-response protocol to eliminate sub-
NETWORK LAYER
optimal routing. Ultimate network size can
reach 264 nodes (more than we'll probably
ZigBee's self-forming and self-healing
need). Using local addressing, you can
mesh-network architecture lets data and
configure simple networks of more than
control messages pass from one node to
65,000 (216) nodes, thereby reducing
another by multiple paths. This feature
address overhead
extends the network range and improves
data reliability. It may also be used to
Security layer
build large, geographically dispersed
networks with smaller networks linked to Security and data integrity are key benefits
form a 'cluster-tree' network. of the ZigBee technology. ZigBee
leverages the security model of the IEEE
Mesh
802.15.4 MAC sub-layer which specifies
Star four security services: access control—the

PAN coordinator
4 Email: chinna_chetan05@yahoo.com
Cluster Tree Full Function Device
Reduced Function Device
Visit: www.geocities.com/chinna_chetan05/forfriends.html

device maintains a list of trusted devices Potential applications of zigbee include the
within the network building automation, industrial, medical
and residential control & monitoring
• Data encryption, which uses
symmetric key 128-bit advanced A new twist on, "I've fallen and I
encryption standard can't get up”

The figure basically shows a home-


• Frame integrity to protect data from monitoring system for senior citizens.
being modified by parties without Zigbee-based sensors keep an eye on
cryptographic keys elderly residents living alone and warn
medics about changes in habits that are

• Sequential freshness to reject data potentially serious; It includes a light

frames that have been replayed—the switch with a tiny digital camera (left); a

network controller compares the pendant (center) worn around the neck;

freshness value with the last known and movement tags (right), which can let

value from the device and rejects it if the system generate an alert based either

the freshness value has not been on detected movement or the lack of any

updated to a new value movement.

COMPARISION BETWEEN
THE WIRELESS STANDARDS

Zigbee doesn't have the bandwidth to


handle video. So light switch / camera
combos deliver still images to a controller.
An alert from the pendant or from one of
the tags activates the camera.

The pendant includes accelerometers that


detect the forces of a person falling. It also
APPLICATIONS
contains a panic button. The device can
5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

send a warning either to a monitoring


company or family member if something
is up. It can be programmed to generate an
alert, for example, if a bedroom or
refrigerator door hasn't opened by noon.

The bugs this system catches aren't in


software

One of the more offbeat


applications for Zigbee sensors is in
catching termites. Wireless bait stations
Two key components of the
are devised which act as Zigbee nodes.
system are a base station and a Home
In operation, the bait stations go Key. The Key is envisioned to go into
into the ground at numerous spots your pocket or onto a key chain.
surrounding a house. Each bait station has When the Key leaves the range of the
a special sensor that triggers when termites base station, it carries with it the last
eat at the wood it contains. The station status of items such as doors,
then signals this activity to a receiver, windows, and lights, as read by
which sends an e-mail. sensors on the Zigbee network.
Homeowners wondering whether they
left the garage door open could
This wireless approach beats the
conceivably tell by looking at the
technique now used on several levels.
LCD in their Home Key. (However,
Existing methods force exterminators to
the system stops short of asking a
physically check each station for activity.
sympathetic neighbor to come over
Termites could cause severe damage long
and rectify the problem.)
before evidence of them could turn up
during a periodic inspection. In contrast, The base station is smart enough to
the Zigbee bait stations monitor pest notice if one of the sensors changes
activity 24/7. And exterminators need not state when the Home Key is out of
make long trips just to examine bait range. In this case it can send the
stations homeowner's cell phone a text
message detailing what's wrong.

6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

A variety of sensors have been devised for Zigbeef is a solution for tracking
the system. In addition to proximity cattle. Zigbee sensors give beef producers
switches for doors and windows, there are the ability to electronically identify cattle
devices designed to detect leaking pipes, whether their herds are crowded into
ac loads, and even remind homeowners chutes, gathered into pens, or grazing open
about periodic maintenance items such as pasture. ZigBeef radio-based cattle ear
low batteries in smoke detectors or the tags offer superior reading-range over
need for seasonal gutter cleaning. One passive wand-based tag technology.
worthy piece of the system is a water shut- Producers are no longer limited to
off valve. infrequent opportunities to scan
IDs. ZigBeef allows identification of each
animal on the range, pen, or working
chute, at virtually any time. ZigBeef tags
use mass-produced, non-proprietary
wireless sensor technologies, offering a
proven solution at an inexpensive price.
[refer the greeting preview for the figure].

CONCLUSION

There are many wireless monitoring and


control applications for industrial and
home markets which require longer battery
life, lower data rates and less complexity
than available from existing wireless
standards like Bluetooth and Wi-Fi. So,
there was a need for a standard based,
interoperable wireless technology that
addresses the unique needs of low data
rate wireless control and sensor based
networks. In this regard, zigbee was poised
to become the global control/sensor
network standard.

7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

Zigbee promises to put wireless sensors in


everything from factory automation
systems to home security systems to
consumer electronics. Zigbee is a new
standard that still needs to pass through the
circles or rigorous technology critics and
establish its own place in the industry. The
next zigbee challenge will be devising the
proposed extension to the 802.15.4
standard,’4a’ which could be based on
ultra-wideband (UWB).

REFERENCES

1. Electronics for you- November 2004


2. Computer networks-by Tanenbaum
3. www.zigbeealliance.com
4. www.zigbee.org
5. www.zigbeef.com
6. www.nuri.com

Visit:
www.geocities.com/chinna_chetan05/forfr
iends.html
Email:
chinna_chetan05@yahoo.com

8 Email: chinna_chetan05@yahoo.com

Vous aimerez peut-être aussi