Professional Documents
Culture Documents
Seminar Report
ON
ZIGBEE TECHNOLOGY
(2009-2010)
PREFACE
ZigBee is an open technology developed by the ZigBee Alliance to overcome the
limitations of BLUETOOTH and Wi-Fi. ZigBee is an IEEE 802.15.4 standard for data
communications with business and consumer devices. It is designed around low-power
consumption allowing batteries to essentially last forever. BLUETOOTH as we know was
developed to replace wires and Wi-Fi to achieve higher data transfer rate, as such till now
nothing has been developed for sensor networking and control machines which require
longer battery life and continuous working without human intervention. ZigBee devices
allow batteries to last up to years using primary cells (low cost) without any chargers (low
cost and easy installation).
The ZigBee standard provides network, security, and application support services
operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical
Layer (PHY) wireless standard. It employs a suite of technologies to enable scalable, self-
organizing, self-healing networks that can manage various data traffic patterns. The
network layer supports various topologies such star, clustered tree topology and self
healing mesh topology which is essential in Smartdust Apart from easy installation and
easy implementation.
ZigBee has a wide application area such as home networking, industrial networking,
Smartdust, many more, having different profiles specified for each field. The upcoming
of ZigBee will revolutionize the home networking and rest of the wireless world.
ACKNOWLEDGEMENT
I sincerely thank head of department MR ABHISHEK SHARMA sir , for their friendly
advice and full support in the successful completion of this topic.
Words are inadequate to express my sincere gratitude to the respective professors for
devoting enough time to me so that this topic could be successfully completed.
I am highly indebted to my family members and my dear friends for their inspiration. It is
my pleasure to say thank you for all of your support.
INDEX
1. Introduction
2. Existing Standards
2.1. Wi-Fi (IEEE standard 802.11)
2.1.1. Standards
2.1.2. Network Types
2.2. Bluetooth (IEEE standard 802.15.1)
2.3. ZigBee (IEEE standard 802.15.4)
2.4. IEEE 802.15.4
2.5. Components of IEEE 802.15.4
2.6. Relation between IEEE 802.15.4 & ZigBee
2.7. ZigBee vs. Bluetooth
2.8. Technology Comparison
3. Introduction to ZigBee
3.1. History
3.2. The ZigBee Alliance
3.3. ZigBee Basics
3.4. The Name ZigBee
3.5. What is ZigBee?
3.6. Why ZigBee?
3.7. Protocol
3.8. OSI overview
3.9. Software and Hardware
3.10. What ZigBee’s “Low Power Consumption” Means
3.11. ZigBee Benefits
6. IEEE 802.15.4
6.1. Received Energy Detection
6.2. Centre Quality Indication
6.3. Clear Channel Assessment
6.4. PPDU Format
13. Licensing
16. Conclusion
17. Bibliography
1. Introduction
It was in 1896 that Guglielmo Marconi invented the first wireless telegraph. In 1901 he
sent telegraphic signals across the Atlantic ocean from Cornwall to St. John’s
Newfoundland; a distance of 1800 miles. Over the last century, advances in wireless
technologies have led to the radio, the television, the mobile telephone, and
communication satellites. All type of information can now be send to any corner of the
world. A wireless network is a flexible data communication system, which uses wireless
media such as radio frequency technology to transmit and receive data over the air,
minimizing the need for wired connections. Wireless networks are used to augment rather
than replace wired networks and are most commonly used to provide last few stages of
connectivity between a mobile user and a wired network.
Wireless networks use electromagnetic waves to communicate information from one
point to another without relying on any physical connection. Radio waves are often
referred to as radio carriers because they simply perform the function of delivering energy
to a remote receiver. The data being transmitted is superimposed on the radio carrier so
that it can be accurately extracted at the receiving end. Once data is superimposed
(modulated) onto the radio carrier, the radio signal occupies more than a single frequency,
since the frequency or bit rate of the modulating information adds to the carrier.
Multiple radio carriers can exist in the same space at the same time without interfering
with each other if the radio waves are transmitted on different radio frequencies.
To extract data, a radio receiver tunes in one radio frequency while rejecting all other
frequencies. The modulated signal thus received is then demodulated and the data is
extracted from the signal.
Wireless networks offer the following productivity, convenience, and cost advantages
over traditional wired networks:
Mobility: provide mobile users with access to real-time information so that they
can roam around in the network without getting disconnected from the network.
This mobility supports productivity and service opportunities not possible with
wired networks.
Installation speed and simplicity: installing a wireless system can be fast and
easy and can eliminate the need to pull cable through walls and ceilings.
Reach of network: the network can be extended to places which cannot be wired.
More Flexibility: wireless networks offer more flexibility and adapt easily to
changes in the configuration of the network.
Reduced cost of ownership: while the initial investment required for wireless
network hardware can be higher than the cost of wired network hardware, overall
installation expenses and life-cycle costs can be significantly lower in dynamic
environments.
2. EXISTING STANDARDS
In the world of wireless communication there are many standards existing today, each
with a specific application field and characteristics which best suites the need. However
among so many standard we will only discuss about Wi-Fi, Bluetooth and ZigBee as they
are the most complementary standards among all.
Wi-Fi is the wireless way to handle networking. It is also known as 802.11 networking
and wireless networking. The big advantage of Wi-Fi is its simplicity. Mobile
connectivity for computers is a rapidly growing requirement. Of the schemes that are
available the IEEE 802.11 standard, often termed Wi-Fi has become the de-facto
standard. With peak operating speeds of around 54 Mbps it is able to compete with many
wired systems. As a result of the flexibility and performance of the
system, many Wi-Fi “hotpots” have been set up and more are following. These enable
people to use their laptop computers as they wait in hotels, airport lounges, cafes, and
many other places using a wireless link rather that needing to use a cable.
2.1.1.Standards
There is a plethora of standards under the IEEE 802 LMSC (LAN / MAN Standard
Committee). Of these even 802.11 has variety of standards, each with a letter suffix.
These cover everything from the wireless standards themselves, to standards for security
aspects, quality of service and the like:
802.11a – Wireless network bearer operating in the 5 GHz. ISM band with data rate up to
54 Mbps.
802.11b – Wireless network bearer operating in the 2.4 GHz ISM band with data rates up
to 11 Mbps
802.11e – Quality of service and prioritization
802.11f – Handover
802.11g – Wireless network bearer operating in 24.GHz ISM band with data rates up to
54 Mbps
802.11h – Power control
802.11i – Authentication and encryption
802.11j – Internetworking
802.11k – Measurement reporting
802.11n – stream multiplexing
802.11s – Mesh networking
Of these the standards that are most widely known are the network bearer standards,
802.11a, 802.11b, 802.11g.
2.1.2.Network types
There are two types of network that can be formed: infrastructure networks; and ad-hoc
networks. The infrastructure application is aimed at office areas or to provide a “hotspot”.
It can be installed instead of a wired system, and can provide considerable cost savings,
especially when used in established offices. A backbone wired network is still required
and is connected to a server. Wireless network is then split up into a number of cells, each
serviced by a base station or Access Point (AP) which acts as a controller for the cell.
Each Access Point may have a range of between 30 and 300 metres dependent upon the
environment and the location of the Access Point.
The other type of network that may be used is termed as Ad-Hoc network. These are
formed when a number of computers and peripherals are brought together. They may be
needed when several people come together and need to share data or if they need to
access a printer without the need for having to use wire connections.
In this situation the user4s may only communicate with each other and not a larger wired
network. As a result there is no Access Point and special algorithms within the protocols
are used to enable one of the peripherals to take over the role of master to control the
network with the others acting as slaves.
2.2. Bluetooth
Bluetooth is based on IEEE standards 802.15.1. Bluetooth has now established itself in
the market place enabling a variety of devices to be connected together using wireless
technology. Bluetooth technology has come into its own connecting remote headsets to
mobile phones, but it is also used in a huge number of other applications as well.
Bluetooth technology originated in 1994 when Erricsson came up with a concept to use a
wireless connection to connect items such as an earphone and a cordless headset and the
mobile phone.
The name of the Bluetooth standard originates from the Danish king Harald Blatand who
was king of Denmark between 940 and 981 AD. His name translates as “Bluetooth” and
this was used as his nickname. A brave warrior, his main achievement was that of uniting
Denmark under the banner of Christianity, and then uniting it with Norway that he had
conquered. The Bluetooth standard was named after him because Bluetooth endeavors to
unite personal computing and telecommunications devices.
Bluetooth is a wireless data system and can carry data at speeds up to 721 Kbps in its
basic form and in addition to this it offers up to three voice channels. Bluetooth
technology enables a user to replace cables between devices such as printers, fax
machines, desktop computers and peripherals, and a host of other digital devices.
Furthermore, it can provide a connection between an ad-hoc wireless network and
existing wired data networks.
The technology is intended to be placed in a low cost module that can be easily
incorporated into electronics devices of all sorts.
Bluetooth uses the license free Industrial, Scientific and Medical(ISM) frequency band
for its radio signals and enables communications to be established between devices up to
a maximum distance of 100 metres. Running in the 2.4 GHz ISM band, Bluetooth
employs frequency hopping techniques with the carrier modulated using
Gaussian Frequency Shift Keying (GFSK).
After a network connection is established between two devices they change their
frequency 1600 times per second thus leaving no time for interference, and if by chance
there is interference it will be for few microseconds. No other sub network will be
working at the frequency at which other sub networks work, thus eliminating
interference.
IEEE 802.15 is the working group 15 of the IEEE 802 which specializes in Wireless PAN
standards.
Task group 1 (WPAM/Bluetooth) deals with Bluetooth, having produced the 802.15.1
standard, published on June 14, 2002. It includes a medium access control and physical
layer specification adapted from Bluetooth 1.1.
Task group 2 (coexistence) deals with coexistence of Wireless LAN (802.11) and
Wireless PAN.
Task group 3 is in fact two groups: 3 (WPAN High Rate) and 3a (WPAN Alternate
Higher Rate), both dealing with high-rate WPAN standards (20 Mbit/s or higher).
Task group 4 (WPAN Low Rate) deals with low rate but very long battery life (months or
even years). The first edition of the 802.15.4 standard was released in May 2003. In
March 2004, after forming Task Group 4b, task group 4 put itself in hibernation.
The new Task Group 4b aims at clarifying and enhancing specific parts of the Task
Group 4 standard.
2.5. ZigBee`
ZigBee is a wireless networking standard that is aimed at remote control and sensor
applications which is suitable for operation in harsh radio environments and in isolated
locations, It builds on IEEE standard 802.15.4 which defines the physical and MAC
layers. Above this ZigBee defines the application and security layer specifications
enabling interoperability between products from different manufacturers. In this way
ZigBee is a superset of the 802.15.4 specification.
With the applications for remote wireless sensing and control growing rapidly it is
estimated that the market size could reach hundreds of millions of dollars as early as
2007. This makes ZigBee a very attractive proposition, and one, which warrants the
introduction of a focused standard
ZigBee looks rather like Bluetooth but is simpler, has a lower data rate and spends most
of its time snoozing. This characteristic means that a node on a ZigBee network should be
able to run for six months to two years on just two AA batteries.
The operational range of ZigBee is 10-75m compared to 10m for Bluetooth
(without a power amplifier).
ZigBee sits below Bluetooth in terms of data rate.
The data rate of ZigBee is
250kbps at 2.4GHz, 40kbps at 915MHz and 20kbps at 868MHz whereas that of Bluetooth
is 1Mbps.
ZigBee uses a basic master-slave configuration suited to static star networks of many
infrequently used devices that talk via small data packets. It allows up to 254 nodes.
Bluetooth’s protocol is more complex since it is geared towards handling voice, images
and file transfers in ad hoc networks. Bluetooth devices can support scatter nets of
multiple smaller non-synchronized networks (piconets). It only allows up to 8 slave nodes
in a basic master-slave piconet set-up.
When ZigBee node is powered down, it can wake up and get a packet in around 15msec
whereas a Bluetooth device would take around 3sec to wake up and respond.
ZigBee and Bluetooth are two solutions for two different application areas. Bluetooth has
addressed a voice application by embodying a fast frequency hopping system with a
master slave protocol. ZigBee has addressed sensors, controls, and other short message
applications by embodying a direct sequence system with a star or peer to peer protocols.
2.8. Technology Comparisons
3. ZigBee
The past few years have witnessed a rapid growth of wireless networking. However, up to
now wireless networking has been mainly focused on high – speed communications, and
relatively long range applications such as IEEE 802.11 wireless local area network
standards. The first well known standard focusing on low rate wireless personal area
networks was BLUETOOTH. However it has limited capacity for networking of many
nodes. There are many wireless monitoring and control applications in industrial and
home environments which require longer battery life, lower data rates and less
complexity than those from existing standards. For such wireless applications, a new
standard called IEEE 802.15.4 has been developed by IEEE. The new standard is also
called ZigBee.
3.1. History
The IEEE 802.15.4 standard was completed in May 2003. In the summer of 2003,
Philips Semiconductors, a major mesh network supporter, ceased the investment.
Philips Lighting has, however, continued Philips' participation, and Philips remains a
promoter member on the ZigBee Alliance Board of Directors.
The ZigBee Alliance announced in October 2004 that the membership had more than
doubled in the preceding year and had grown to more than 100 member companies, in
22 countries. By April 2005 membership had grown to more than 150 companies, and
by December 2005 membership had passed 200 companies.
The ZigBee Alliance announces the completion and immediate member availability of
the enhanced version of the ZigBee Standard in September 2006, known as ZigBee
2006 Specification.
During the last quarter of 2007, ZigBee PRO, the enhanced ZigBee specification was
finalized.
3.2. The ZigBee Alliance
The ZigBee standard is organized under the auspices of the ZigBee Alliance. The ZigBee
alliance is an organization of companies working together to define an open global
standard for making low power wireless networks. The intended outcome of ZigBee
alliance is to create a specification defining how to build different network topologies
with data security features and interoperable application profiles. This organization has
over 150 members, of which seven have taken on the status of what they term
“promoter.” These seven companies are Ember, Honeywell, Invensys, Mitsubishi,
Motorola, Philips and Samsung. A big challenge for the alliance is to make the
interoperability to work among different products.
To solve this problem, the ZigBee Alliance has defines profiles, depending on what type
of category the product belongs to. For example there is a profile called home lightning
that exactly defines how different brands of home lightning-products should communicate
with each other. Under the umbrella of the ZigBee Alliance, the new standard will be
pushed forward, taking on board the requirements of the users, manufacturers and the
system developers.
Private Profile: In this profile interoperability is not at all important. However producers
cannot use the official ZigBee stamp, but can claim that ‘based on ZigBee platform’.
Published Profile: A private profile is shared among other users. Still one cannot use
official ZigBee stamp, but can claim ‘based on ZigBee platform’.
The name ZigBee is said to come from the domestic honeybee which uses a zig-zag type
of dance to communicate important information to other hive members. This
communication dance (“The ZigBee Principle”) is what engineers are trying to emulate
with this protocol – a bunch of separate and simple organisms that join together to tackle
complex tasks.
3.5. What is ZigBee?
It may be helpful to think of IEEE 802.15.4 as the physical radio and ZigBee as the
logical network and application software. Following the standard Open Systems
Interconnection (OSI) reference model, ZigBee's protocol stack is structured in layers.
The first two layers, physical (PHY) and media access (MAC), are defined by the IEEE
802.15.4 standard. The layers above them are defined by the ZigBee Alliance.
3.6. Why ZigBee?
There are a multitude of standards like Bluetooth and Wi-Fi that address mid to heigh
data rates for voice, PC LANs, video etc. However, up till now there hasn’t been a
wireless network standard that meets the unique needs of sensors and control devices.
Sensors and controls don’t need high bandwidth but they do need low latency and very
low energy consumption for long battery lives and for large device arrays.
There are a multitude of proprietary wireless systems manufactured today to solve a
multitude of problems that don’t require high data rates but do require low cost and very
low current drain. These proprietary systems were designed because there were no
standards that met their application requirements. These legacy systems are creating
significant interoperability problems with each other and with newer technologies.
The ZigBee Alliance is not pushing a technology; rather it is providing a standardized
base set of solutions for sensor and control systems. Here are the following points that
justify the use of ZigBee over the existing standards.
Low power consumption, simply implemented: Users expect batteries to last many
months to years! Consider that a typical single-family house has about 6 smoke/CO
detectors. If the batteries for each one only lasted six months, the home owner would be
replacing batteries every month!
In contrast Bluetooth, which has many different modes and states depending upon your
latency and power requirements, ZigBee/IEEE 802.15.4 has two major states:
active(transmit/receive) or sleep. The application software needs to focus on the
application, not on which power mode is optimum for each aspect of operation.
Even mains powered equipment needs to be conscious of energy. ZigBee devices will be
more ecological than their predecessors saving megawatts at it full deployment.
Case 1: 802.11 Rx power is 667 mW (always on) @ 100 devices/home & 50,000
homes/city = 150 3.33 megawatts.
Case 3: 802.15.4 power cycled at .1% (typical duty cycle) = 150 watts
Low cost to the users means low device cost, low installation cost and low maintenance.
ZigBee devices allow batteries to last up to years using primary cells (low cost) without
any chargers (low cost and easy installation). ZigBee’s simplicity allows for inherent
configuration and redundancy of network devices provides low maintenance.
High density of nodes per network: ZigBee’s use of the IEEE 802.15.4 PHY and MAC
allows networks to handle any number of devices. This attribute is critical for massive
sensor arrays and control networks.
Simple protocol, global implementation: ZigBee’s protocol code stack is estimated to be
about 1/4th of Bluetooth’s or 802.11’s. Simplicity is essential to cost, interoperability, and
maintenance.
The IEEE 802.15.4 PHY adopted by ZigBee has been designed for the 868 MHz band in
Europe, the 915 MHz band in N America, Australia, etc; and the 2.4 GHz band is now
recognized to be a global band accepted in almost all countries.
3.7. Protocol
In beacon-enabled networks, the special network nodes called ZigBee Routers transmit
periodic beacons to confirm their presence to other network nodes. Nodes may sleep
between beacons, thus lowering their duty cycle and extending their battery life. Beacon
intervals may range from 15.36 milliseconds to 15.36 ms * 214 = 251.65824 seconds at
250 kbit/s, from 24 milliseconds to 24 ms * 214 = 393.216 seconds at 40 kbit/s and from
48 milliseconds to 48 ms * 214 = 786.432 seconds at 20 kbit/s.
However, low duty cycle operation with long beacon intervals requires precise timing,
which can conflict with the need for low product cost.
In general, the ZigBee protocols minimize the time the radio is on so as to reduce power
use. In beaconing networks, nodes only need to be active while a beacon is being
transmitted.
In non-beacon-enabled networks, power consumption is decidedly asymmetrical: some
devices are always active, while others spend most of their time sleeping.
ZigBee devices are required to conform to the IEEE 802.15.4-2003 Low-Rate Wireless
Personal Area Network (WPAN) standard.
The standard specifies the lower protocol layers—the physical layer (PHY), and the
media access control (MAC) portion of the data link layer (DLL). This standard specifies
operation in the unlicensed 2.4 GHz (worldwide), 915 MHz (Americas) and 868 MHz
(Europe) ISM bands. In the 2.4 GHzband there are 16 ZigBee channels, with each
channel requiring 5 MHz of bandwidth. The center frequency for each channel can be
calculated as, FC = (2405 + 5 * (ch - 11)) MHz, where ch = 11, 12, ..., 26.
The basic channel access mode is "carrier sense, multiple access/collision avoidance"
(CSMA/CA). That is, the nodes talk in the same way that people converse; they briefly
check to see that no one is talking before they start. There are three notable exceptions to
the use of CSMA. Beacons are sent on a fixed timing schedule, and do not use CSMA.
Message acknowledgments also do not use CSMA. Finally, devices in Beacon Oriented
networks that have low latency real-time requirements may also use Guaranteed Time
Slots (GTS), which by definition do not use CSMA.
ZigBee RF4CE
On March 3, 2009 the RF4CE (Radio Frequency for Consumer Electronics) Consortium
agreed to work with the ZigBee Alliance to jointly deliver a standardized specification for
radio frequency-based remote controls. ZigBee RF4CE is designed to be deployed in a
wide range of remotely-controlled audio/visual consumer electronics products, such as
TVs and set-top boxes. It promises many advantages over existing remote control
solutions, including richer communication and increased reliability, enhanced features
and flexibility, interoperability, and no line-of-sight barrier.
3.8. OSI Overview
The Open System Interconnection (OSI) reference model, was developed by the
International Organization for Standardization (ISO) as a model for the computer protocol
architecture, and as a framework for developing protocol standards. The entire point of
the model is to separate networking into several distinct functions that operate at di_erent
levels. Each layer is responsible for performing a speci_c task or set of tasks, and dealing
with the layers above and below it. An illustration of the general OSI-model and where
ZigBee is de_ned in the model can be seen in Figure 2.2.
Even though the radios themselves are inexpensive, the ZigBee Qualification Process
involves a full validation of the requirements of the physical layer. This amount of
concern about the Physical Layer has multiple benefits, since all radios derived from that
semiconductor mask set would enjoy the same RF characteristics. On the other hand, an
uncertified physical layer that malfunctions could cripple the battery lifespan of other
devices on a ZigBee network. Where other protocols can mask poor sensitivity or other
esoteric problems in a fade compensation response, ZigBee radios have very tight
engineering constraints: they are both power and bandwidth constrained. Thus, radios are
tested to the ISO 17025 standard with guidance given by Clause 6 of the 802.15.4-2006
Standard. Most vendors plan to integrate the radio and microcontroller onto a single chip.
In all of its uses, ZigBee offers four inherent characteristics that are highly beneficial:
• Low cost
The typical ZigBee radio is extremely cost-effective. Chipset prices can be as low as $12
each in quantities as few as 100 pieces (while the 802.15.4 and ZigBee stacks are
typically included in this cost, crystals and other discrete components are not). Design-in
modules fall in the neighbourhood of $25 in similar quantities. This pricing provides an
economic justification for extending wireless networking to even the simplest of devices.
• Range and obstruction issues avoidance
ZigBee routers double as input devices and repeaters to create a form of mesh network. If
two network points are unable to communicate as intended, transmission is dynamically
routed from the blocked node to a router with a clear path to the data’s destination. This
happens automatically, so that communications continue even when a link fails
unexpectedly. The use of low-cost routers can also extend the network’s effective reach;
when the distance between the base station and a remote node exceeds the devices’ range,
an intermediate node or nodes can relay transmission, eliminating the need for separate
repeaters (Figure 2).
Figure 2: Heavy lines show a signal from a reduced function end device passing through
multiple routers to reach a gateway functioning as a coordinator; lighter lines show
possible alternative signal paths
• Multi-source products
As an open standard, ZigBee provides customers with the ability to choose among
vendors. ZigBee Alliance working groups define interoperability profiles to which
ZigBee-certified devices must adhere, and certified radio will interoperate with any other
ZigBee-certified radio adhering to the same profile, promoting compatibility and the
associated competition that allows the end users to choose the best device for each
particular network node, regardless of manufacturer.
Data rates of 250 kbps (@2.4 GHz), 40 Kbps (@ 915 MHz) and 20 kbps (@868
MHz)
Optimized for low duty-cycle applications (<0.1%).
Low power (battery life multi-month to years).
Multiple topologies: star, peer-to-peer, mesh.
CSMA-CA channel access yields high throughput and low latency for low duty cycle
devices like sensors and controls.
Addressing space of 64 bits – 18,450,000,000,000,000,000 devices (64 bit IEEE
address) – 65,535 networks.
Optional guaranteed time slot for applications requiring low latency.
Fully hand-shaked protocol for transfer reliability.
Range: 50m typical (5-500m based on environment).
Wireless personal area networks (WPANs) are used to convey information over relatively
short distances.
The main features of this standard are network flexibility, low cost, very low power
consumption, and low data rate in an adhoc self-organizing network among inexpensive
fixed, portable and moving devices.
The main features of this standard are network flexibility, low cost, very low power
consumption, and low data rate in an adhoc self-organizing network among inexpensive
fixed, portable and moving devices. It is developed for applications with relaxed
throughput requirements which cannot handle the power consumption of heavy protocol
stacks.
A ZigBee system consists of several components. The most basic is the device. A device
can be a full-function device (FFD) or reduced-function device (RFD). A network shall
include at least one FFD, operating as the PAN coordinator.
The FFD can operate in three modes: a personal area network (PAN) coordinator, a
coordinator or a device. An RFD is intended for applications that are extremely simple
and do not need to send large amounts of data. An FFD can talk to RFDs or FFDs while
an RFD can only talk to an FFD.
3 types of topologies that ZigBee supports: star topology, peer-to-peer topology and
cluster tree.
Cluster Tree
A cluster tree network consists of a number of star networks connected whose central
nodes are also in direct communications with the single PAN Coordinator.
Using a set of routers and a single PAN coordinator, the network is formed into an
interconnected mesh of routers and end nodes which pass information from node to node
using the most cost effective path. Should any individual router become inaccessible,
alternate routes can be discovered and used providing a robust and reliable network
topography.
Cluster-tree network is a special case of a peer-to-peer network in which most devices are
FFDs and an RFD may connect to a cluster-tree network as a leave node at the end of a
branch. Any of the FFD can act as a coordinator and provide synchronization services to
other devices and coordinators.
Only one of these coordinators however is the PAN coordinator. The PAN coordinator
forms the first cluster by establishing itself as the cluster head (CLH) with a cluster
identifier (CID) of zero, choosing an unused PAN identifier, and broadcasting beacon
frames to neighbouring devices. A candidate device receiving a beacon frame may
request to join the network at the CLH. If the PAN coordinator permits the device to join,
it will add this new device as a child device in its neighbour list. The newly joined device
will add the CLH as its parent in its neighbour list and begin transmitting periodic
beacons such that other candidate devices may then join the network at that device. Once
application or network requirements are met, the PAN coordinator may instruct a device
to become the CLH of a new cluster adjacent to the first one. The advantage of this
clustered structure is the increased coverage area at the cost of increased message latency.
Fig 5.7 Cluster tree topology
In a mesh topology, the ZigBee coordinator is responsible for starting the network and for
choosing key network parameters, but the network may be extended through the use of
ZigBee routers.
The routing algorithm uses a request-response protocol to eliminate sub-optimal routing.
Ultimate network size can reach 264 nodes (more than we’ll probably need). Using local
addressing, you can configure simple networks of more than 65,000 (216) nodes, thereby
reducing address overhead.
Star Configuration
In a star topology, one of the FFD-type devices assumes the role of network coordinator
and is responsible for initiating and maintaining the devices on the network.
All other devices, known as end devices, directly communicate with the coordinator.
In the star topology, the communication is established between devices and a single
central controller, called the PAN coordinator. The PAN coordinator may be mains
powered while the devices will most likely be battery powered. Applications that benefit
from this topology include home automation, personal computer (PC) peripherals, toys
and games. After an FFD is activated for the first time, it may establish its own network
and become the PAN coordinator. Each start network chooses a PAN identifier, which is
not currently used by any other network within the radio sphere of influence. This allows
each star network to operate independently.
ZigBee architecture comprises a PHY, which contains the radio frequency (RF)
transceiver along with its low-level control mechanism, and a MAC sublayer that
provides access to the physical channel for all types of transfer. The upper layers
consists of a network layer, which provides network configuration, manipulation, and
message routing, and application layer, which provides the intended function of a
device. An IEEE 802.2 logical link control (LLC) can access the MAC sublayer
through the service specific convergence sublayer (SSCS).
ZigBee
802.15.4 MAC I
Alliance
E
802.15.4 PHY
E
802.15.PHY 2.4 Ghz E
868 /915MHz
6. IEEE 802.15.4
The receiver energy detection (ED) measurement is intended for use by a network layer
as part of channel selection algorithm. It is an estimate of the received signal power
within the bandwidth of an IEEE 802.15.4 channel.
No attempt is made to identify or decode signals on the channel. The ED time should be
equal to 8 symbol periods. The ED result shall be reported as an 8-bit integer ranging
from 0x00 to 0xff. The minimum ED value (0) shall indicate received power less than
10dB above the specified receiver sensitivity. The range of received power spanned by
the ED values shall be at least 40dB. Within this range, the mapping from the received
power in decibels to ED values shall be linear with an accuracy of + or − 6dB.
Upon reception of a packet, the PHY sends the PSDU length, PSDU itself and link
quality (LQ) in the PD-DATA. Indication primitive. The LQI measurement is a
characterization of the strength and/or quality of a received packet. The measurement
may be implemented using receiver ED, a signal-to-noise estimation or a combination of
these methods.
The clear channel assessment (CCA) is performed according to at least one of the
following three methods:
Energy above threshold. CCA shall report a busy medium upondetecting any energy
above the ED threshold.
Carrier sense only. CCA shall report a busy medium only upon the detection of a
signal with the modulation and spreading characteristics of IEEE 802.15.4. This
signal may be above or below the ED threshold.
Carrier sense with energy above threshold. CCA shall report a busy medium only
upon the detection of a signal with the modulation and spreading characteristics of
IEEE 802.15.4 with energy above the ED threshold.
4.4 PPDU Format
The PPDU packet structure is illustrated in Figure 3.4. Each PPDU packet consists of the
following basic components:
SHR, which allows a receiving device to synchronize and lock into the bit stream
A variable length payload, which carries the MAC sub layer frame.
The MAC sub layer provides an interface between the SSCS and the PHY.
The MAC sub layer conceptually includes a management entity called the MLME. This
entity provides the service interfaces through which layer management functions may be
invoked. The MLME is also responsible for maintaining a database of managed objects
pertaining to the MAC sub layer. This database is referred to as the MAC sub layer PIB.
The MAC sub layer provides two services:
The MAC data service and The MAC management service interfacing to the MAC sub
layer management entity (MLME) service access point (SAP) (MLMESAP).
The MAC data service enables the transmission and reception of MAC protocol data units
(MPDU) across the PHY data service. The features of MAC sub layer are beacon
management, channel access, GTS management, frame validation, acknowledged frame
delivery, association and disassociation.
The frame structures have been designed to keep the complexity to minimum while at the
same time making them sufficiently robust for transmission on a noisy channel. Each
successive protocol layer adds to the structure with layer-specific headers and footers.
A beacon frame, used by a coordinator to transmit beacons. The beacon frame wakes up
client devices, which listen for their address and go back to sleep if they don’t receive it.
Beacons are important for mesh and cluster-tree networks to keep all the nodes
synchronized without requiring those nodes to consume precious battery energy by
listening for long periods of time.
A data frame, used for all transfers of data. The data frame provides a payload of up to
104 bytes. The frame is numbered to ensure that all packets are tracked. A frame-check
sequence ensures that packets are received without error. This frame structure improves
reliability in difficult conditions. This frame is shown in fig. 5.3.
An acknowledgment frame, used for confirming successful frame reception It provides
feedback from the receiver to the sender confirming that the packet was received without
error. The device takes advantage of specified “quiet time” between frames to send a
short packet immediately after the data-packet transmission.
A MAC command frame is used for handling all MAC peer entity control transfers. A
Mac command frame provides the mechanism for remote control and configuration of
client nodes. A centralized network manager uses MAC to configure individual clients’
command frames no matter how large the network
The data frame is illustrated below in fig 5.3:
The Physical Protocol Data Unit is the total information sent over the air. As shown in the
illustration above the Physical layer adds the following overhead:
The total overhead for a single packet is therefore 15 – 31 octets (120 bits); depending
upon the addressing scheme used (short or 64 bit addresses). These numbers do not
include any security overhead.
The LR-WPAN standard allows the optional use of a superframe structure. The format of
the super frame is defined by the coordinator. The superframe is bounded by network
beacons, is sent by the coordinator and is divided into 16 equally sized slots. The beacons
are used to synchronize the attached devices, to identify the PAN and to describe the
structure of the super frames. Any device wishing to communicate during the contention
access period (CAP) between two beacons shall compete with other devices using a
slotted CSMA-CA mechanism.
All transactions shall be completed by the time of the next network beacon.
For the low latency applications or applications requiring specific data bandwidth, the
PAN coordinator may dedicate portions of the active superframe to that application.
These portions are called guaranteed time slots (GTSs).
The guaranteed time slots comprise the contention free period (CFP), which always
appears at the end of the active superframe starting at a slot boundary immediately
following the CAP. The PAN coordinator may allocate up to seven of these GTSs and a
GTS may occupy more than one slot period.
However, a sufficient portion of the CAO shall remain for contention-based access of
other networked devices or new devices wishing to join the network. All contention-
based transactions shall be complete before the CFP begins.
Also each device transmitting in a GTS shall ensure that its transaction is complete before
the time of the next GTS or the end of the CFP.
Fig. 5.5 ZigBee’s superframe structure with contention access and free period
If super frame structure is used in the PAN, then slotted CSMA-CA shall be used. If
beacons are not being used in the PAN or a beacon cannot be located in a beacon-enabled
network, unslotted CSMA-CA algorithm is used.
In both cases, the algorithm is implemented using units of time called Back off periods,
which is equal to a Unit Back off Period symbols.
In slotted CSMA-CA channel access mechanism, the back off period boundaries of
every device in the PAN are aligned with the super frame slot boundaries of the PAN
coordinator. In slotted CSMA-CA, each time a device wishes to transmit data frames
during the CAP, it shall locate the Boundary of the next back off period.
In unslotted CSMA-CA, the back off periods of one device do not need to be
synchronized to the back off periods of another device.
In the beacon mode, a device watches out for the coordinator's beacon that gets
transmitted at periodically, locks on and looks for messages addressed to it. If message
transmission is complete, the coordinator dictates a schedule for the next beacon so that
the device ‘goes to sleep'; in fact, the coordinator itself switches to sleep mode.
While using the beacon mode, all the devices in a mesh network know when to
communicate with each other. In this mode, necessarily, the timing circuits have to be
quite accurate, or wake up sooner to be sure not to miss the beacon. This in turn means an
increase in power consumption by the coordinator's receiver, entailing an optimal
increase in costs.
When a device wishes to transfer data to a coordinator in a beacon-enabled network, it
first listens for the network beacon. When the beacon is found, it synchronizes to the
super frame structure. At the right time, it transmits its data frame, using slotted CSMA-
CA, to the coordinator.
There is an optional acknowledgement at the end as shown in Figure 4.4.
The applications transfers are completely controlled by the devices on a PAN rather than
by the coordinator. This provides the energy-conservation feature of the ZigBee network.
When a coordinator wishes to transfer data to a device in a beacon-enabled network, it
indicates in the network beacon that the data message is pending. The device periodically
listens to the network beacon, and if a message is pending, transmits a MAC command
requesting this data, using slotted CSMA-CA. The coordinator optionally acknowledges
the successful transmission of this packet. The pending data frame is then sent using
slotted CSMA-CA. The device acknowledged the successful reception of the data by
transmitting an acknowledgement frame. Upon receiving the acknowledgement, the
message is removed from the list of pending messages in the beacon as shown in Figure
4.5.
In a peer-to-peer network, every device can communicate with any other device in its
transmission radius. There are two options for this. In the first case, the node will listen
constantly and transmit its data using unslotted CSMA-CA. In the second case, the nodes
synchronize with each Other so that they can save power.
ZigBee/IEEE 802.15.4 addresses three typical traffic types. IEEE 802.15.4 MAC can
accommodate all the types.
Data is periodic. The application dictates the rate, and the sensor activates checks for
data and deactivates.
Data is intermittent. The application, or other stimulus, determines the rate, as in the
case of say smoke detectors. The device needs to connect to the network only when
communication is necessitated. This type enables optimum saving on energy.
Data is repetitive, and the rate is fixed a priori. Depending on allotted time slots,
called GTS (guaranteed time slot), devices operate for fixed durations.
ZigBee employs either of two modes, beacon or non-beacon to enable the to-and-fro data
traffic. Beacon mode is used when the coordinator runs on batteries and thus offers
maximum power savings, whereas the non-beacon mode finds favour when the
coordinator is mains-powered.
7.7 MAC Layer Security
When security of MAC layer frames is desired, ZigBee uses MAC layer security to
secure MAC command, beacon, and acknowledgement frames. ZigBee may secure
messages transmitted over a single hop using secured MAC data frames, but for multi-
hop messaging ZigBee relies upon upper layers (such as the NWK layer) for security. The
MAC layer uses the Advanced Encryption Standard (AES) as its core cryptographic
algorithm and describes a variety of security suites that use the AES algorithm. These
suites can protect the confidentiality, integrity, and authenticity of MAC frames. The
MAC layer does the security processing, but the upper layers, which set up the keys and
determine the security levels to use, control this processing. When the MAC
layer transmits (receives) a frame with security enabled, it looks at the destination
(source) of the frame, retrieves the key associated with that destination (source), and then
uses this key to process the frame according to the security suite designated for the key
being used. Each key is associated with a single security suite and the MAC frame header
has a bit that specifies whether security for a frame is enabled or disabled.
When transmitting a frame, if integrity is required, the MAC header and payload data are
used in calculations to create a Message Integrity Code (MIC) consisting of 4, 8, or 16
octets. The MIC is right appended to the MAC payload. If confidentiality is required, the
MAC frame payload is also left appended with frame and sequence counts (data used to
form a nonce). The nonce is used when encrypting the payload and also ensures freshness
to prevent replay attacks. Upon receipt of a frame, if a MIC is present, it is verified and if
the payload is encrypted, it is decrypted. Sending devices will increase the frame count
with every message sent and receiving devices will keep track of the last received count
from each sending device. If a message with an old count is detected, it is flagged with a
security error. The MAC layer security suites are based on three modes of operation.
Encryption at the MAC layer is done using AES in Counter (CTR) mode and integrity is
done using AES in Cipher Block Chaining (CBC- MAC) mode [16]. A combination of
encryption and integrity is done using a mixture of CTR and CBC- MAC modes called
the CCM mode.
8. ZigBee Network Model
The functions of the Coordinator, which usually remains in the receptive mode,
encompass network set-up, beacon transmission, node management, storage of node
information and message routing between nodes.
The network node, however, is meant to save energy (and so ‘sleeps' for long periods)
and its functions include searching for network availability, data transfer, checks for
pending data and queries for data from the coordinator.
For the sake of simplicity without jeopardising robustness, this particular IEEE standard
defines a quartet frame structure and a super-frame structure used optionally only by the
coordinator.
The coordinator lays down the format for the super-frame for sending beacons after every
15.38 ms or/and multiples thereof, up to 252s. This interval is determined a priori and the
coordinator thus enables sixteen time slots of identical width between beacons so that
channel access is contention-less. Within each time slot, access is contention-based.
Nonetheless, the coordinator provides as many as seven GTS (guaranteed time slots) for
every beacon interval to ensure better quality.
9. ZigBee Protocol Stack
The ZigBee protocol stack is 1/4th of that of Wi-Fi and Bluetooth. It may be helpful to
think of IEEE 802.15.4 as the physical radio and ZigBee as the logical network and
application software.
Following the standard Open Systems Interconnection (OSI) reference model, ZigBee’s
protocol stack is structured in layers. The first two layers, physical (PHY) and media
access (MAC) are defined by the IEEE 802.15.4 standard as shown in the figure ‘fig 5.1’.
The layers above them are defined by the ZigBee Alliance. The IEEE working group
passed the first draft of PHY and MAC in 2003.
ZigBee networks can use beacon or non-beacon environments. Beacons are used to
synchronize the network devices, identify the PAN and describe the structure of the
superframe. The beacon intervals are set by the network coordinator and vary from 15ms
to over 4 minutes.
Sixteen equal time slots are allocated between beacons are message delivery. The channel
access in each time slot is contention-based. However, the network coordinator can
dedicate up to seven guaranteed time slots for non contention based or low-latency
delivery.
The non-beacon mode is a simple, traditional multiple-access system used in simple peer
and near-pear networks. It operates like a two-way radio network, where each client is
autonomous and can initiate a conversation at will, but could interfere with others
unintentionally. The recipient may not here the call or the channel might already be in use
Beacon Mode is a mechanism for controlling power consumption in extended networks
such as cluster tree or mesh. It enables all the clients to know when to communicate with
each other. Here, the two-way radio network has a central dispatcher that manages the
channel and arranges the calls.
The primary value of beacon mode is that it reduces the system’s power consumption
Non-beacon mode is typically used for security systems where client units, such as
intrusion sensors, motion detectors, and glass-break detectors, sleep 99.999% of the time.
Remote units wake up on a regular, yet random, basis to announce their continued
presence in the network. When an event occurs, the sensor wakes up instantly and
transmits the alert (“Somebody is on the front porch”). The network coordinator, powered
from the main source, has its receiver on all the time and can therefore wait to hear from
each of these stations.
Since the network coordinator has an “infinite” source of power it can allow clients to
sleep for unlimited periods of time, enabling them to save power.
Beacon mode is more suitable when the network coordinator is battery-operated. Client
units listen for the network coordinator’s beacon (broadcast at intervals between 0.015
and 252 s). A client registers with the coordinator and looks for any messages directed to
it. If no messages are pending, the client returns to sleep, awaking on a schedule specified
by the coordinator. Once the client communications are completed, the coordinator itself
returns to sleep.
This timing requirement may have an impact on the cost of the timing circuit in each end
device. Longer intervals of sleep mean that the timer must be more accurate or turn on
earlier to make sure that the beacon is heard, both of which will increase receiver power
consumption. Longer sleep intervals also mean the timer must improve the quality of the
timing oscillator circuit (which increases cost) or control the maximum period of time
between because to not exceed 252s, keeping oscillator circuit costs low.
The NWK layer associates or dissociates devices using the network coordinator
implements security, and routes frames to their intended destination. In addition, the
NWK layer of the network coordinator is responsible for starting a new network and
assigning an address to newly associated devices.
The NWK layer associates or dissociates devices using the network coordinator,
implements security, and routes frames to their intended destination. In addition, the
NWK layer of the network coordinator is responsible for starting a new network and
assigning an address to newly associated devices.
The NWK layer supports multiple network topologies including star, cluster tree, and
mesh.
In a star topology, one of the FFD-type devices assumes the role of network coordinator
and is responsible for initiating and maintaining the devices on the network. All other
devices, known as end devices, directly communicate with the coordinator.
In a mesh topology, the ZigBee coordinator is responsible for starting the network and for
choosing key network parameters, but the network may be extended through the use of
ZigBee routers. The routing algorithm uses a request-response protocol to eliminate sub-
optimal routing. Ultimate network size can reach 264 nodes (more than we'll probably
need). Using local addressing, you can configure simple networks of more than 65,000
(216) nodes, thereby reducing address overhead.
The ZigBee application layer consists of the APS sub-layer, the ZDO and the
manufacturer-defined application objects.
The responsibilities of the APS sub-layer include maintaining tables for binding, which is
the ability to match two devices together based on their services and their needs, and
forwarding messages between bound devices.
Another responsibility of the APS sub-layer is discovery, which is the ability to determine
which responsibilities of the ZDO include defining the role of the device within the
network (e.g. ZigBee coordinator or end device),
initiating and/or responding to binding requests and
establishing a secure relationship between network devices.
The manufacturer-defined application objects implement the actual applications
according to the ZigBee- defined application descriptions.
Discovery: The ability to determine which other devices are operating in the personal
operating space of a device.
Binding: The ability to match two or more devices together based on their services and
their needs and forwarding messages between bound devices.
The General Operation Framework (GOF) is a glue layer between applications and rest of
the protocol stack. The GOF currently covers various elements that are common for all
devices. It includes subaddressing and addressing modes and device descriptions, such as
type of device, power source, sleep modes, and coordinators. Using an object model, the
GOF specifies methods, events, and data formats that are used by application profiles to
construct set/get commands and their responses.
Actual application profiles are defined in the individual profiles of the IEEE's working
groups. Each ZigBee device can support up to 30 different profiles. Currently, only one
profile, Commercial and Residential Lighting, is defined. It includes switching and
dimming load controllers, corresponding remote-control devices, and occupancy and light
sensors.
The ZigBee stack is small in comparison to other wireless standards. For network-edge
devices with limited capabilities, the stack requires about 4Kb of the memory. Full
implementation of the protocol stack takes less than 32Kb of memory. The network
coordinator may require extra RAM for a node devices database and for transaction and
pairing tables. The 802.15.4 standard defines 26 primitives for the PHY and MAC layers;
probably another dozen will be added after finalizing the NWK layer specification. Those
numbers are still modest compared to 131 primitives defined for Bluetooth. Such a
compact footprint enables you to run Zigbee on a simple 8-bit microcontroller such as an
HC08- or 8051-based processor core.
Figure 4: A typical ZigBee-enabled device will consist of RF IC and 8-bit microprocessor
with peripherals connected to an application sensor or actuators
A typical ZigBee-enabled device includes a radio frequency integrated circuit (RF IC)
with a partially implemented PHY layer connected to a low-power, low-voltage 8-bit
microcontroller with peripherals, connected to an application sensor or actuators. The
protocol stack and application firmware reside in on-chip flash memory. The entire
ZigBee device can be compact and cost efficient. The focus of network applications under
the ZigBee standard include the features of low power consumption, needed for only two
major modes (Tx/Rx or Sleep), high density of nodes per network, low costs and simple
implementation.
ZigBee devices are required to conform to the IEEE 802.15.4-2003 Low- Rate Wireless
Personal Area Network (WPAN) standard. ZigBee wireless devices are expected to
transmit 10-75 meters, depending on the RF environment and the power output
consumption required for a given application, and will operate in the unlicensed RF
worldwide (2.4GHz global, 915MHz Americas or 868 MHz Europe). The data rate is
250 kbps at 2.4 GHz, 40 kbps at 915 MHz and 20 kbps at 868 MHz. There are three
different ZigBee device types that operate on these layers in any self-organizing
application network. These devices have 64-bit IEEE addresses, with option to enable
shorter addresses to reduce packet size, and work in either of two addressing modes – star
and peer-to-peer.
The most capable device, the coordinator forms the root of the network tree and might
bridge to other networks. It is able to store information about the network. There is one,
and only one, ZigBee coordinator in each network to act as the router to other network. It
also acts as the repository for security keys.
Features
–One and only one required for each ZB network.
–Initiates network formation.
–Acts as 802.15.4 2003 PAN coordinator (FFD).
–May act as router once network is formed.
–Not necessarily dedicated device, can perform applications.
This device is just capable of talking in the network; it cannot relay data from other
devices. Requiring even less memory, (no flash, very little ROM and RAM), an RFD will
thus be cheaper than an FFD. This device talks only to a network coordinator and can be
implemented very simply in star topology.
Defines the role of the device within the network (e.g. ZigBee coordinator or end
device)
Initiates and/or responds to binding requests
Establishes a secure relationship between network devices selecting one of ZigBee’s
security methods such as public key, symmetric key etc.
AODV is a pure on-demand route acquisition algorithm: nodes that do not lie on active
paths neither maintain any routing information nor participate in any periodic routing
table exchanges. Further, a node does not have to discover and maintain a route to another
node until the two needs to communicate, unless the former node is offering services as
an intermediate forwarding station to maintain connectivity between two other nodes. The
primary objectives of the algorithm are to broadcast discovery packets only when
necessary, to distinguish between local connectivity management and general topology
maintenance and to disseminate information about changes in local connectivity to those
neighbouring mobile nodes that are likely to need the information.
When a source node needs to communicate with another node for which it has no routing
information in its table, the Path Discovery process is initiated. Every node maintains two
separate counters: sequence number and broadcast id. The source node initiates path
discovery by broadcasting a route request (RREQ) packet to its neighbours, which
includes source addr, source sequence number, broadcast id, dest addr, dest sequence
number, hop cnt. (Source sequence number is for maintaining freshness information
about the reverse route whereas the destination sequence number is for maintaining
freshness of the route to the destination before it can be accepted by the source.)
The pair source addr, broadcast id uniquely identifies a RREQ, where broadcast id is
incremented whenever the source issues a new RREQ.
When an intermediate node receives a RREQ, if it has already received a RREQ with the
same broadcast id and source address, it drops the redundant RREQ and does not
rebroadcast it. Otherwise, it rebroadcasts it to its own neighbours after increasing hop cnt.
Each node keeps the following information: destination IP address, source IP address,
broadcast id, expiration time for reverse path route entry and source node’s sequence
number.
As the RREQ travels from a source to destinations, it automatically sets up the reverse
path from all nodes back to the source. To set up a reverse path, a node records the
address of the neighbour from which it received the first copy of RREQ.
These reverse path route entries are maintained for at least enough time for the RREQ to
traverse the network and produce a reply to the sender.
When the RREQ arrives at a node, possibly the destination itself that possesses a current
route to the destination, the receiving node first checks that the RREQ was received over
a bi-directional link. If this node is not destination but has route to the destination, it
determines whether the route is current by comparing the destination sequence number in
its own route entry to the destination sequence number in the RREQ. If RREQ’s sequence
number for the destination is greater than that recorded by the intermediate node, the
intermediate node must not use this route to respond to the RREQ, instead rebroadcasts
the RREQ.
If the route has a destination sequence number that is greater than that contained in the
RREQ or equal to that contained in the RREQ but a smaller hop count, it can unicasts a
route reply packet (RREP) back to its neighbour from which it received the RREQ. A
RREP contains the following information: source addr, dest addr, dest sequence number,
hopcnt and lifetime. As the RREP travels back to the source, each node along the path
sets up a forward pointer to the node from which the RREP came, updates its timeout
information for route entries to the source and destination, and records the latest
destination sequence number for the requested destination.
Nodes that are along the path determined by the RREP will timeout after route request
expiration timer and will delete the reverse pointers since they are not on the path from
source to destination as shown in Figure 5.1.
The value of this timeout time depends on the size of the ad hoc network.
The cluster-tree protocol is a protocol of the logical link and network layers that uses
link-state packets to form either a single cluster network or a potentially larger cluster tree
network. The network is basically self-organized and supports network redundancy to
attain a degree of fault resistance and self-repair.
Nodes select a cluster head and form a cluster according to the self-organized manner.
Then self-developed clusters connect to each other using the Designated Device (DD).
The cluster formation process begins with cluster head selection. After a cluster head is
selected, the cluster head expands links with other member nodes to form a cluster.
After a node turns on, it scans the channels to search for a HELLO message form other
nodes (HELLO messages correspond to beacons in MAC layer of IEEE
802.15.4). If it can’t get any HELLO messages for a certain time, then it turns to a cluster
head as shown in Figure 10.2 and sends out HELLO messages to its neighbours. The new
cluster head wait for responses from neighbours for a while. If it hasn’t received any
connection requests, it turns back to a regular node and listens again. The cluster head can
also be selected based on stored parameters of each node, like transmission range, power
capacity, computing ability or location information.
After becoming the cluster head (CH), the node broadcasts a periodic HELLO message
that contains a part of the cluster head MAC address and node ID 0 that indicates the
cluster head. The nodes that receive this message send a CONNECTION REQUEST
message to the cluster head. When the CH receives it, it responds to the node with a
CONNECTION RESPONSE message that contains a node ID for the node (node ID
corresponds to the short address at the MAC layer). The node that is assigned a node ID
replies with an ACK message to the cluster head. The message exchange is shown in
Figure 10.3.
If all nodes are located in the range of the cluster head, the topology of connection
becomes a star and every member nodes are connected to the cluster head with one hop.
A cluster can expand into a multi-hop structure when each node supports multiple
connections. The message exchange for the multi hop cluster set up procedure is shown in
Figure 10.4.
If the cluster head has run out of all node IDs or the cluster has reached some other
defined limit, it should reject connection requests from new nodes. The rejection is
through the assignment of a special ID to the node.
The entry of the neighbour list and the routes is updated by the periodic HELLO message.
If a node entry does not update until a certain timeout limit, it should be eliminated.
A node may receive a HELLO message from a node that belongs to different cluster. In
that case, the node adds the cluster ID (CID) of the transmitting node in the neighbour list
and then sends it inside a LINK STATE REPORT to the CH so that CH knows which
clusters its cluster has intersection.
The LINK STATE REPORT message also contain the neighbors node ID list of the node
so that the CH knows the complete topology to make topology optimizations. If the
topology change is required, then the CH sends a TOPOLOGY UPDATE message. If a
member receives a TOPOLOGY UPDATE message that the different parent node is
linked to the node, it changes the parent node as indicated in the message. And it also
records its child nodes and the nodes below it in the tree at this time.
If a member node has trouble and becomes unable to communicate, the tree route of the
cluster would be reconfigured. The CH knows the presence of a trouble by the periodic
LINK STATE REPORT. When the cluster head has trouble, the distribution of HELLO
message is stopped and all member nodes know that they have lost the CH. The cluster
would then be reconfigured in the same way as the cluster formation process.
If a member has received the HELLO message from the DD, it adds CID 0 in its
neighbor list and reports to its CH. The reported CH selects the member node as a
border node to its parent cluster and sends a network connection request message to
the member node to set up a connection with the DD. The border node requests a
connection and joins the cluster 0 as its member node. Then it sends a CID
REQUEST message to the DD. After the CID RESPONSE message arrival, the
border node sends NETWORK CONNECTION RESPONSE message that contains a
new CID to the CH when the CH gets a new CID, it informs to its member nodes by
the HELLO message.
The clusters not bordering cluster 0 use intermediate clusters to get a CID. Again,
either the CH becomes the border node to its parent cluster or the CH names a
member node as the border to its parent cluster.
Each member node of the cluster has to record its parent cluster, child/lower clusters
and the border node IDs associated with both the parent and child clusters. The DD
should store the whole tree structure of the clusters.
Like the nodes in the clusters, the CHs report their link state information to the DD.
The CH periodically sends a NETWORK LINK STATE REPORT message that
contains its neighbor cluster CID list to the DD. Then this information can be used to
calculate the optimized route and periodically update the topology for the network
redundancy. In the same way, the DD can send TOPOLOGY UPDATE message to
inform up-to-date route from the DD to the clusters.
A backup DD (BDD) can be prepared to prevent network down time due to the DD
trouble. Inter-cluster communication, which is shown in Figure 6.9, is realized by
routing. The border nodes act as routers that connect clusters and relay packets
between the clusters. When a border node receives a packet, it examines the
destination address, then forwards to the next border node in the adjacent cluster or to
the destination node within the cluster.
Only the DD can send a message to all the nodes within its network. The message is
forwarded along the tree route of clusters. The border node should forward the
broadcast packet from the parent cluster to the child cluster.
11.How ZigBee Works?
ZigBee basically uses digital radios to allow devices to communicate with one another. A
typical ZigBee network consists of several types of devices. A network coordinator is a
device that sets up the network, is aware of all the nodes within its network, and manages
both the information about each node as well as the information that is being
transmitted/received within the network. Every ZigBee network must contain a network
coordinator. Other Full Function Devices (FFD's) may be found in the network, and
these devices support all of the 802.15.4 functions. They can serve as network
coordinators, network routers, or as devices that interact with the physical world. The
final device found in these networks is the Reduced Function Device (RFD), which
usually only serve as devices that interact with the physical world. An example of a
ZigBee network is shown below in Figure 1.
The figure above introduces the concept of the ZigBee network topology. Several
topologies are supported by ZigBee, including star, mesh, and cluster tree. Star and mesh
networking are both shown in the figure above. As can be seen, star topology is most
useful when several end devices are located close together so that they can communicate
with a single router node.
That node can then be a part of a larger mesh network that ultimately communicates with
the network coordinator. Mesh networking allows for redundancy in node links, so that if
one node goes down, devices can find an alternative path to communicate with one
another.
Figures below provide an example of how mesh networking allows for multiple paths
between devices.
1.
3.
5.
Beacon mode is a fully coordinated mode in which all the devices know when to
coordinate with one another. In this mode, the network coordinator will periodically
"wake-up" and send out a beacon to the devices within its network. This beacon
subsequently wakes up each device, who must determine if it has any message to receive.
If not, the device returns to sleep, as will the network coordinator, once its job is
complete.
Non-beacon mode, on the other hand, is less coordinated, as any device can
communicate with the coordinator at will. However, this operation can cause different
devices within the network to interfere with one another, and the coordinator must always
be awake to listen for signals, thus requiring more power. In any case, ZigBee obtains its
overall low power consumption because the majority of network devices are able to
remain inactive over long periods of time.
12.ZigBee Security
When security of MAC layer frames is desired, ZigBee uses MAC layer security to
secure MAC command, beacon, and acknowledgment frame. ZigBee may secure
messages transmitted overPage single hop using secured MAC data frames, but for multi-
hop messaging ZigBee relies upon upper layers (such as the NWK layer) for security. The
MAC layer uses the Advanced Encryption Standard (AES) as its core cryptographic
algorithm and describes a variety of security suites that use the AES algorithm. These
suites can protect the confidentiality, integrity, and authenticity of MAC frames. The
MAC layer does the security processing, but the upper layers, which set up the keys and
determine the security levels to use, control this processing. When the MAC layer
transmits (receives) a frame with security enabled, it looks at the destination (source) of
the frame, retrieves the key associated with that destination (source), and then uses this
key to process the frame according to the security suite designated for the key being used.
Each key is associated with a single security suite and the MAC frame header has a bit
that specifies whether security for a frame is enabled or disabled.
13.Licensing
For non-commercial purposes, the ZigBee specification is available free to the general
public. An entry level membership in the ZigBee Alliance, called Adopter, provides
access to the as-yet unpublished specifications and permission to create products for
market using the specifications.
The click through license on the ZigBee specification requires a commercial developer to
join the ZigBee Alliance. "No part of this specification may be used in development of a
product for sale without becoming a member of ZigBee Alliance." The annual fee
conflicts with the GNU General Public License. From the GPL v2, "b) You must cause
any work that you distribute or publish, that in whole or in part contains or is derived
from the Program or any part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License." Since the GPL makes no distinction between
commercial and non-commercial use it is impossible to implement a GPL licensed
ZigBee stack or combine a ZigBee implementation with GPL licensed code. The
requirement for the developer to join the ZigBee Alliance similarly conflicts with most
other Free software licenses.
14. ZigBee Applications
The ZigBee Alliance targets applications “Across consumer, commercial, industrial and
government markets worldwide”. Unwired applications are highly sought after in many
networks that are characterized by numerous nodes consuming minimum power and
enjoying long battery lives.
ZigBee technology is designed to best suit these applications, for the reason that it
enables reduced costs of development, very fast market adoption and rapid ROI..
For the last few years, we have witnessed a great expansion of remote control devices in
our day-to-day life. Five years ago, infrared (IR) remotes for the television were the only
such devices in our homes. Now the number of devices is uncountable. This number will
only increase as more devices are controlled or monitored from a distance. To interact
with all these remotely controlled devices, we will need to put them under a single
standardized control interface that can interconnect into anetwork, specifically a HAN or
home-area network.
Bluetooth has already matured and graduated to version 1.2 after its initial hype. Lots of
products compliant to Bluetooth version 1.1 are available on the market. Will ZigBee be
able to compete with Bluetooth in the market? And if yes, will it replace Bluetooth? This
question is asked by the people where since ZigBee came to the market. We have already
seen all the aspects of both ZigBee and Bluetooth. And hence can be concluded that
ZigBee and Bluetooth are two solutions for two different application areas. The
differences are from their approach to their desired application.
Bluetooth has addressed a voice application by embodying a fast frequency hopping
system with a master slave protocol. ZigBee has addressed sensors, controls, and other
short message applications by embodying a direct sequence system with a star or peer-to-
peer protocols. Minor changes to Bluetooth or ZigBee won’t change their inherent
behaviour or characteristics. The different behaviours come from architectural
differences.
17. Bibliography
[1] http://www.standards.ieee.org
[2] http://www.sigbee.org/en/about/initial_m...p_home.asp
[3] http://www.zigbee.org/en/documents/zigbeeoverview4.pdf
[4] http://www.palowireless.com/zigbee/tutorials.asp
[5] http://www.zigbee.org/en/resources/03141...nology.doc
[6] http://en.wikipedia.org/wiki/Zigbee
[7] Behrouz A. Frouzan, “Data Communication”, Third Edition, Tata McGraw-Hill
Publishing company Limitted, 2004
[8]Andrew S. Tenenbaum, “Computer Networks”, Fourth Edition Pearson Publication
Limited, 2003
[9] William Stalling, “Wireless Communication and Networks”, Fourth Edition, Pearson
Publication Limited, 2004
[10]James Kurose & Keith W. Ross, “Computer Networks”, Fourth Edition, Pearson
Publication Limited, 2