You are on page 1of 23

Communications Design Conference 2 October 2003

ZigBee Technology: Wireless Control that Simply


Works
Patrick Kinney Patrick Kinney
Kinney Consulting LLC Kinney Consulting LLC
Chair of IEEE 802!"# $ask %rou& Chair of IEEE 802!"# $ask %rou&
'ecretary of (ig)ee )oD 'ecretary of (ig)ee )oD
Chair of (ig)ee )uil*ing +utomation Profile ,% Chair of (ig)ee )uil*ing +utomation Profile ,%
- ! - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
ZigBee Technology: Wireless Control that Simply
Works
,hy is (ig)ee nee*e*/
$here are a multitu*e of stan*ar*s that a**ress mi* to high *ata rates for
0oice1 PC L+2s1 0i*eo1 etc 3o4e0er1 u& till no4 there hasn5t been a 4ireless
net4ork stan*ar* that meets the uni6ue nee*s of sensors an* control *e0ices
'ensors an* controls *on5t nee* high ban*4i*th but they *o nee* lo4 latency an*
0ery lo4 energy consum&tion for long battery li0es an* for large *e0ice arrays
$here are a multitu*e of &ro&rietary 4ireless systems manufacture* to*ay
to sol0e a multitu*e of &roblems that also *on5t re6uire high *ata rates but *o
re6uire lo4 cost an* 0ery lo4 current *rain
$hese &ro&rietary systems 4ere *esigne* because there 4ere no stan*ar*s
that met their re6uirements $hese legacy systems are creating significant
intero&erability &roblems 4ith each other an* 4ith ne4er technologies

$he (ig)ee +lliance is not &ushing a technology7 rather it is
&ro0i*ing a stan*ar*i8e* base set of solutions for sensor an*
control systems
$he &hysical layer 4as *esigne* to accommo*ate the nee* for a lo4 cost yet
allo4ing for high le0els of integration $he use of *irect se6uence allo4s the
analog circuitry to be 0ery sim&le an* 0ery tolerant to4ar*s ine9&ensi0e
im&lementations
$he me*ia access control :;+C< layer 4as *esigne* to allo4 multi&le
to&ologies 4ithout com&le9ity $he &o4er management o&eration *oesn5t
re6uire multi&le mo*es of o&eration $he ;+C allo4s a re*uce* functionality
*e0ice :=>D< that nee*n5t ha0e flash nor large amounts of =O; or =+; $he
;+C 4as *esigne* to han*le large numbers of *e0ices 4ithout re6uiring them
to be ?&arke*@
$he net4ork layer has been *esigne* to allo4 the net4ork to s&atially gro4
4ithout re6uiring high &o4er transmitters $he net4ork layer also can han*le
large amounts of no*es 4ith relati0ely lo4 latencies
- 2 - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
(ig)ee is &oise* to become the global controlAsensor net4ork
stan*ar* It has been *esigne* to &ro0i*e the follo4ing
featuresB
Lo4 &o4er consum&tion1 sim&ly im&lemente*
Csers e9&ect batteries to last many months to yearsD Consi*er that a ty&ical
single family house has about E smokeACO *etectors If the batteries for each one
only laste* si9 months1 the home o4ner 4oul* be re&lacing batteries e0ery monthD
)luetooth has many *ifferent mo*es an* states *e&en*ing u&on your latency
an* &o4er re6uirements such as sniff1 &ark1 hol*1 acti0e1 etc7 (ig)eeAIEEE
802!"# has acti0e :transmitArecei0e< or slee& +&&lication soft4are nee*s
to focus on the a&&lication1 not on 4hich &o4er mo*e is o&timum for each
as&ect of o&eration
E0en mains &o4ere* e6ui&ment nee*s to be conscious of energy Consi*er a
future home 4ith !00 4ireless controlAsensor *e0ices1
Case !B 802!! =9 &o4er is EEF m, :al4ays on<. !00 *e0icesAhome G
"01000 homesAcity H 333 mega4atts
Case 2B 802!"# =9 &o4er is 30 m, :al4ays on<. !00 *e0icesAhome G
"01000 homesAcity H !"0 kilo4atts
Case 3B 802!"# &o4er cycle* at !I :ty&ical *uty cycle< H !"0 4atts
(ig)ee *e0ices 4ill be more ecological than its &re*ecessors sa0ing
mega4atts at it full *e&loyment
Lo4 cost :*e0ice1 installation1 maintenance<
Lo4 cost to the users means lo4 *e0ice cost1 lo4 installation cost an* lo4
maintenance (ig)ee *e0ices allo4 batteries to last u& to years using
&rimary cells :lo4 cost< 4ithout any chargers :lo4 cost an* easy
installation< (ig)ee5s sim&licity allo4s for inherent configuration an*
re*un*ancy of net4ork *e0ices &ro0i*es lo4 maintenance
3igh *ensity of no*es &er net4ork
(ig)ee5s use of the IEEE 802!"# P3J an* ;+C allo4s net4orks to
han*le any number of *e0ices $his attribute is critical for massi0e sensor
arrays an* control net4orks
'im&le &rotocol1 global im&lementation
(ig)ee5s &rotocol co*e stack is estimate* to be about !A#
th
of )luetooth5s or
802!!5s 'im&licity is essential to cost1 intero&erability1 an* maintenance
$he IEEE 802!"# P3J a*o&te* by (ig)ee has been *esigne* for the 8E8
;38 ban* in Euro&e1 the K!" ;38 ban* in 2 +merica1 +ustralia1 etc7 an*
the 2# %38 ban* is no4 recogni8e* to be a global ban* acce&te* in almost
all countries
- 3 - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
(ig)eeAIEEE 802!"# - %eneral Characteristics
Dual P3J :2#%38 an* 8E8AK!" ;38<
Data rates of 2"0 kb&s :.2# %38<1 #0 kb&s :. K!" ;38<1 an* 20
kb&s :.8E8 ;38<
O&timi8e* for lo4 *uty-cycle a&&lications :L0!I<
C';+-C+ channel access
Jiel*s high through&ut an* lo4 latency for lo4 *uty cycle *e0ices like
sensors an* controls
Lo4 &o4er :battery life multi-month to years<
;ulti&le to&ologiesB star1 &eer-to-&eer1 mesh
+**ressing s&ace of u& toB
!81#"010001000100010001000 *e0ices :E# bit IEEE a**ress<
E"1"3" net4orks
O&tional guarantee* time slot for a&&lications re6uiring lo4 latency
>ully han*-shake* &rotocol for transfer reliability
=angeB "0m ty&ical :"-"00m base* on en0ironment<
(ig)eeAIEEE802!"# - $y&ical $raffic $y&es +**resse*
Perio*ic *ata
+&&lication *efine* rate :eg1 sensors<
Intermittent *ata
+&&licationAe9ternal stimulus *efine* rate :eg1 light s4itch<
=e&etiti0e lo4 latency *ata
+llocation of time slots :eg1 mouse<
Each of these traffic ty&es man*ates *ifferent attributes from the ;+C $he
IEEE802!"# ;+C is fle9ible enough to han*le each of these ty&es
Perio*ic *ata can be han*le* using the beaconing system 4hereby the
sensor 4ill 4ake u& for the beacon1 check for any messages an* then go
back to slee&
Intermittent *ata can be han*le* either in a beaconless system or in a
*isconnecte* fashion In a *isconnecte* o&eration the *e0ice 4ill only
attach to the net4ork 4hen it nee*s to communicate sa0ing significant
energy
Lo4 latency a&&lications may choose to the guarantee* time slot :%$'<
o&tion %$' is a metho* of Mo' in that it allo4s each *e0ice a s&ecific
*uration of time each 'u&erframe to *o 4hate0er it 4ishes to *o 4ithout
contention or latency
- # - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
$he IEEE 802!"# P3J an* ;+C along 4ith (ig)ee5s
2et4ork an* +&&lication 'u&&ort Layer &ro0i*eB
E9tremely lo4 cost
Ease of im&lementation
=eliable *ata transfer
'hort range o&eration
Nery lo4 &o4er consum&tion
+&&ro&riate le0els of security
$here are t4o &hysical *e0ice ty&es for the lo4est system cost
$o allo4 0en*ors to su&&ly the lo4est &ossible cost *e0ices the IEEE stan*ar*
*efines t4o ty&es of *e0icesB full function *e0ices an* re*uce* function
*e0ices
>ull function *e0ice :>>D<
Can function in any to&ology
Ca&able of being the 2et4ork coor*inator
Ca&able of being a coor*inator
Can talk to any other *e0ice
=e*uce* function *e0ice :=>D<
Limite* to star to&ology
Cannot become a net4ork coor*inator
$alks only to a net4ork coor*inator
Nery sim&le im&lementation
+n IEEE 802!"#A(ig)ee net4ork re6uires at least one full function *e0ice as a
net4ork coor*inator1 but en*&oint *e0ices may be re*uce* functionality *e0ices to
re*uce system cost
+ll *e0ices must ha0e E# bit IEEE a**resses
'hort :!E bit< a**resses can be allocate* to re*uce &acket si8e
+**ressing mo*esB
2et4ork O *e0ice i*entifier :star<
'ourceA*estination i*entifier :&eer-&eer<
- " - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
- E - Kinney Consulting LLC
&atkinney.ieeeorg
Star Topology
P+2
Coor*inator
Full function
device
Communications
flow
Peer to Peer
topology
Cluster Tree
Topology
Full Function Device
Reduced Function
Device
Communications
Flow
Communications Design Conference 2 October 2003
>rame 'tructure
$he frame structures ha0e been *esigne* to kee& the com&le9ity to a minimum
4hile at the same time making them sufficiently robust for transmission on a
noisy channel Each successi0e &rotocol layer a**s to the structure 4ith layer-
s&ecific hea*ers an* footers
$he IEEE 802!"# ;+C *efines four frame structuresB
+ beacon frame1 use* by a coor*inator to transmit beacons
+ *ata frame1 use* for all transfers of *ata
+n ackno4le*gment frame1 use* for confirming successful frame rece&tion
+ ;+C comman* frame1 use* for han*ling all ;+C &eer entity control
transfers
$he *ata frame is illustrate* belo4B
$he Physical Protocol Data Cnit is the total information sent o0er the air +s
sho4n in the illustration abo0e the Physical layer a**s the follo4ing o0erhea*B
Preamble 'e6uence # Octets
'tart of >rame Delimiter ! Octet
>rame Length ! Octet
$he ;+C a**s the follo4ing o0erhea*B
>rame Control 2 Octets
Data 'e6uence 2umber ! Octet
+**ress Information # P 20 Octets
>rame Check 'e6uence 2 Octets
In summary the total o0erhea* for a single &acket is therefore !" -3! octets :!20
bits<7 *e&en*ing u&on the a**ressing scheme use* :short or E# bit a**resses<
Please note that these numbers *o not inclu*e any security o0erhea*
- F - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
'u&er >rame 'tructure
$he L=-,P+2 stan*ar* allo4s the o&tional use of a su&erframe structure $he
format of the su&erframe is *efine* by the coor*inator $he su&erframe is boun*e*
by net4ork beacons1 is sent by the coor*inator :'ee >igure #< an* is *i0i*e* into
!E e6ually si8e* slots $he beacon frame is transmitte* in the first slot of each
su&erframe If a coor*inator *oes not 4ish to use a su&erframe structure it may
turn off the beacon transmissions $he beacons are use* to synchroni8e the
attache* *e0ices1 to i*entify the P+21 an* to *escribe the structure of the
su&erframes +ny *e0ice 4ishing to communicate *uring the contention access
&erio* :C+P< bet4een t4o beacons shall com&ete 4ith other *e0ices using a
slotte* C';+-C+ mechanism +ll transactions shall be com&lete* by the time of
the ne9t net4ork beacon
>or lo4 latency a&&lications or a&&lications re6uiring s&ecific *ata ban*4i*th1 the
P+2 coor*inator may *e*icate &ortions of the acti0e su&erframe to that
a&&lication $hese &ortions are calle* guarantee* time slots :%$'s< $he
guarantee* time slots com&rise the contention free &erio* :C>P<1 4hich al4ays
a&&ears at the en* of the acti0e su&erframe starting at a slot boun*ary imme*iately
follo4ing the C+P1 as sho4n in >igure " $he P+2 coor*inator may allocate u& to
se0en of these %$'s an* a %$' may occu&y more than one slot &erio* 3o4e0er1
a sufficient &ortion of the C+P shall remain for contention base* access of other
net4orke* *e0ices or ne4 *e0ices 4ishing to Qoin the net4ork +ll contention
base* transactions shall be com&lete before the C>P begins +lso each *e0ice
transmitting in a %$' shall ensure that its transaction is com&lete before the time
of the ne9t %$' or the en* of the C>P
- 8 - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
;+C Data 'er0ice Diagrams
;+C Primiti0es
;+C Data 'er0ice
;CP'-D+$+ P e9change *ata &ackets bet4een ;+C an* P3J
;CP'-PC=%E P &urge an ;'DC from the transaction 6ueue
;+C ;anagement 'er0ice
;L;E-+''OCI+$EADI'+''OCI+$E P net4ork association
;L;E-'J2C A 'J2C-LO'' - *e0ice synchroni8ation
;L;E-'C+2 - scan ra*io channels
;L;E- CO;;-'$+$C' P communication status
;L;E-%E$ A -'E$P retrie0eAset ;+C PI) &arameters
;L;E-'$+=$ A )E+CO2-2O$I>J P beacon management
;L;E-POLL - beaconless synchroni8ation
;L;E-%$' - %$' management
;L;E-=E'E$ P re6uest for ;L;E to &erform reset
;L;E-O=P3+2 - or&han *e0ice management
;L;E-=R-E2+)LE - enablingA*isabling of ra*io system
- K - Kinney Consulting LLC
&atkinney.ieeeorg
)eacon net4ork communication
2on-beacon net4ork communication
Communications Design Conference 2 October 2003
- !0 - Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
'ecurity
,hen security of ;+C layer frames is *esire*1 (ig)ee uses ;+C layer security
to secure ;+C comman*1 beacon1 an* ackno4le*gement frames (ig)ee may
secure messages transmitte* o0er a single ho& using secure* ;+C *ata frames1
but for multi-ho& messaging (ig)ee relies u&on u&&er layers :such as the 2,K
layer< for security $he ;+C layer uses the +*0ance* Encry&tion 'tan*ar* :+E'<
S!0T as its core cry&togra&hic algorithm an* *escribes a 0ariety of security suites
that use the +E' algorithm $hese suites can &rotect the confi*entiality1 integrity1
an* authenticity of ;+C frames $he ;+C layer *oes the security &rocessing1 but
the u&&er layers1 4hich set u& the keys an* *etermine the security le0els to use1
control this &rocessing ,hen the ;+C layer transmits :recei0es< a frame 4ith
security enable*1 it looks at the *estination :source< of the frame1 retrie0es the key
associate* 4ith that *estination :source<1 an* then uses this key to &rocess the
frame accor*ing to the security suite *esignate* for the key being use* Each key
is associate* 4ith a single security suite an* the ;+C frame hea*er has a bit that
s&ecifies 4hether security for a frame is enable* or *isable*
,hen transmitting a frame1 if integrity is re6uire*1 the ;+C hea*er an* &ayloa*
*ata are use* in calculations to create a ;essage Integrity Co*e :;IC< consisting
of #1 81 or !E octets $he ;IC is right a&&en*e* to the ;+C &ayloa* If
confi*entiality is re6uire*1 the ;+C frame &ayloa* is also left a&&en*e* 4ith
frame an* se6uence counts :*ata use* to form a nonce< $he nonce is use* 4hen
encry&ting the &ayloa* an* also ensures freshness to &re0ent re&lay attacks C&on
recei&t of a frame1 if a ;IC is &resent1 it is 0erifie* an* if the &ayloa* is
encry&te*1 it is *ecry&te* 'en*ing *e0ices 4ill increase the frame count 4ith
e0ery message sent an* recei0ing *e0ices 4ill kee& track of the last recei0e*
count from each sen*ing *e0ice If a message 4ith an ol* count is *etecte*1 it is
flagge* 4ith a security error $he ;+C layer security suites are base* on three
mo*es of o&eration Encry&tion at the ;+C layer is *one using +E' in Counter
:C$=< mo*e an* integrity is *one using +E' in Ci&her )lock Chaining :C)C-
;+C< mo*e S!ET + combination of encry&tion an* integrity is *one using a
mi9ture of C$= an* C)C- ;+C mo*es calle* the CC; mo*e
$he 2,K layer also makes use of the +*0ance* Encry&tion 'tan*ar* :+E'<
3o4e0er1 unlike the ;+C layer1 the security suites are all base* on the CC;U
mo*e of o&eration $he CC;U mo*e of o&eration is a minor mo*ification of the
CC; mo*e use* by the ;+C layer It inclu*es all of the ca&abilities of CC; an*
a**itionally offers encry&tion-only an* integrity-only ca&abilities $hese e9tra
ca&abilities sim&lify the 2,K layer security by eliminating the nee* for C$= an*
- !! Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
C)C-;+C mo*es +lso1 the use of CC;U in all security suites allo4s a single
key to be use* for *ifferent suites 'ince a key is not strictly boun* to a single
security suite1 an a&&lication has the fle9ibility to s&ecify the actual security suite
to a&&ly to each 2,K frame1 not Qust 4hether security is enable* or *isable*
,hen the 2,K layer transmits :recei0es< a frame using a &articular security suite
it uses the 'ecurity 'er0ices Pro0i*er :''P< to &rocess the frame $he ''P looks
at the *estination :source< of the frame1 retrie0es the key associate* 4ith that
*estination :source<1 an* then a&&lies the security suite to the frame $he ''P
&ro0i*es the 2,K layer 4ith a &rimiti0e to a&&ly security to outgoing frames an*
a &rimiti0e to 0erify an* remo0e security from incoming frames $he 2,K layer
is res&onsible for the security &rocessing1 but the u&&er layers control the
&rocessing by setting u& the keys an* *etermining 4hich CC;U security suite to
use for each frame
'imilar to the ;+C layer frame format1 a frame se6uence count an* ;IC may be
a**e* to secure a 2,K frame
- !2 Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
(ig)ee 2et4ork ;o*el
$he (ig)ee 2et4ork
Coor*inator
'ets u& a net4ork
$ransmits net4ork beacons
;anages net4ork no*es
'tores net4ork no*e
information
=outes messages bet4een
&aire* no*es
$y&ically o&erates in the
recei0e state
$he (ig)ee 2et4ork 2o*e
Designe* for battery
&o4ere* or high energy sa0ings
'earches for a0ailable
net4orks
$ransfers *ata from its
a&&lication as necessary
Determines 4hether *ata is
&en*ing
=e6uests *ata from the net4ork
coor*inator
- !3 Kinney Consulting LLC
&atkinney.ieeeorg
;esh
Link
'tar
Link
(ig)ee En* De0ice
:=>D or >>D<
(ig)ee =outer :>>D<
(ig)ee Coor*inator :>>D<
Communications Design Conference 2 October 2003
Can slee& for e9ten*e*
&erio*s
- !# Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
(ig)ee 'tack
(ig)ee 'tack 'ystem =e6uirements
8-bit C1 eg1 80c"!
>ull &rotocol stack L32k
'im&le no*e only stack VEk
Coor*inators re6uire e9tra =+;
no*e *e0ice *atabase
transaction table
&airing table
- !" Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
2et4ork Layer
$he res&onsibilities of the (ig)ee 2,K layer inclu*eB
W Starting a network: $he ability to successfully establish a ne4 net4ork
W Joining and leaving a networkB $he ability to gain membershi& :Qoin< or
relin6uish membershi& :lea0e< a net4ork
W Configuring a new device: $he ability to sufficiently configure the stack
for o&eration as re6uire*
W Addressing: $he ability of a (ig)ee coor*inator to assign a**resses to
*e0ices Qoining the net4ork
W Synchroniation within a network: $he ability for a *e0ice to achie0e
synchroni8ation 4ith another *e0ice either through tracking beacons or by &olling
W Security: a&&lying security to outgoing frames an* remo0ing security to
terminating frames
W !outing: routing frames to their inten*e* *estinations
2et4ork =outing O0er0ie4
Perha&s the most straightfor4ar* 4ay to think of the (ig)ee routing algorithm is
as a hierarchical routing strategy 4ith table-*ri0en o&timi8ations a&&lie* 4here
&ossible
2,K uses an algorithm that allo4s stack im&lementers an* a&&lication
*e0elo&ers to balance unit cost1 battery *rain1 an* com&le9ity in &ro*ucing
(ig)ee solutions to meet the s&ecific cost-&erformance &rofile of their
a&&lication
'tarte* 4ith the 4ell-stu*ie* &ublic-*omain algorithm +ODN an*
;otorola5s Cluster-$ree algorithm an* fol*ing in i*eas from Ember Cor&oration5s
%=+*
2et4ork 'ummary
$he net4ork layer buil*s u&on the IEEE 802!"# ;+C5s features to allo4
e9tensibility of co0erage +**itional clusters can be a**e*7 net4orks can be
consoli*ate* or s&lit u&
- !E Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
+&&lication layer
$he (ig)ee a&&lication layer consists of the +P' sub-layer1 the (DO an* the
manufacturer-*efine* a&&lication obQects $he res&onsibilities of the +P' sub-
layer inclu*e maintaining tables for bin*ing1 4hich is the ability to match t4o
*e0ices together base* on their ser0ices an* their nee*s1 an* for4ar*ing messages
bet4een boun* *e0ices +nother res&onsibility of the +P' sub-layer is *isco0ery1
4hich is the ability to *etermine 4hich other *e0ices are o&erating in the &ersonal
o&erating s&ace of a *e0ice $he res&onsibilities of the (DO inclu*e *efining the
role of the *e0ice 4ithin the net4ork :eg1 (ig)ee coor*inator or en* *e0ice<1
initiating an*Aor res&on*ing to bin*ing re6uests an* establishing a secure
relationshi& bet4een net4ork *e0ices $he manufacturer-*efine* a&&lication
obQects im&lement the actual a&&lications accor*ing to the (ig)ee-*efine*
a&&lication *escri&tions
(ig)ee De0ice ObQect
W Defines the role of the *e0ice 4ithin the net4ork :eg1 (ig)ee
coor*inator or en* *e0ice<
W Initiates an*Aor res&on*s to bin*ing re6uests
W Establishes a secure relationshi& bet4een net4ork *e0ices selecting
one of (ig)ee5s security metho*s such as &ublic key1 symmetric key1 etc
+&&lication 'u&&ort Layer
$his layer &ro0i*es the follo4ing ser0icesB
W "iscovery: $he ability to *etermine 4hich other *e0ices are
o&erating in the &ersonal o&erating s&ace of a *e0ice
W Binding: $he ability to match t4o or more *e0ices together base* on
their ser0ices an* their nee*s an* for4ar*ing messages bet4een boun*
*e0ices
- !F Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
The #nevita$le %uestion is whether ZigBee and
Bluetooth are competitors or complements&
)luetooth seems best suite* forB
'ynchroni8ation of cell &hone to PD+
3an*s-free au*io
PD+ to &rinter
,hile (ig)ee is better suite* forB
Controls
'ensors
Lots of *e0ices
Lo4 *uty cycle
'mall *ata &ackets
Long battery life is critical
+ir Interface com&arisonB
(ig)ee
D'''
!! chi&sA symbol
E2" K symbolsAs
# )itsA symbol
Peak Information =ate
V!28 KbitAsecon*
)luetooth
>3''
!E00 ho&s A secon*
! ; 'ymbol A secon*
! bitAsymbol
Peak Information =ate
V!08-F23 kbitAsecon*
)attery Drain com&arison to )luetooth
Packet length can affect battery *rain $y&ically the shorter the &acket the
6uicker the *e0ice can go to slee& )luetooth is a slotte* &rotocol
Communication can occur in eitherB E2" X'1 !8F" X'1 or 3!2" X' slots
$he follo4ing gra&h sho4ing effecti0e *ata rate 4as base* u&on the
transmissions s&ee*s state* in )luetooth 0!! an* IEEE 802!"# *raft
!81 using the 2"0 kbAs rate $he general tren* is that at larger &acket
si8es the effecti0e *ata rate a&&roaches the ra4 *ata rate
$he &eaks for the )luetooth rate are a result of the three slot si8es1 4hen a
&acket becomes too big for one slot it must increment to the ne9t slot
- !8 Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
e0en though it *oesn5t fill the 4hole slot allocation
IEEE 802!"# 4as *esigne* for small &ackets so it is no sur&rise it is more
efficient at those small &ackets resulting in a higher effecti0e rate *es&ite
its lo4er ra4 *ata rate
>rom this gra&h 4e can see that for &ackets less than F" bytes (ig)ee has a
higher effecti0e *ata rate than )luetooth 3a0ing a lo4er rate for small
&ackets means that )$ nee*s longer transmit an* recei0e times an* therefore
current *rain is higher for small *ata &ackets
+lthough these numbers *o not re&resent retransmissions or multi&le
*e0ices re6uesting the ban*4i*th7 the author belie0es that the same traits
4ill be e9hibite* in these other cases
Effecti0e Data =ate
:base* u&on theoretical 0alues 4ith no retransmissions<
- !K Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
$iming Consi*erations
(ig)ee

2e4 sla0e enumeration H 30ms ty&ically
'lee&ing sla0e changing to acti0e H !"ms ty&ically
+cti0e sla0e channel access time H !"ms ty&ically
)luetooth

2e4 sla0e enumeration H Y3s1 ty&ically 20s
'lee&ing sla0e changing to acti0e H 3s ty&ically
+cti0e sla0e channel access time H 2ms ty&ically
ConclusionB
(ig)ee *e0ices can 6uickly attach1 e9change information1 *etach1 an* then
go to *ee& slee& to achie0e a 0ery long battery life )luetooth *e0ices
re6uire about V!00R the energy for this o&eration
Po4er Consi*erations
(ig)ee
2O years from Znormal5 batteries
Designe* to o&timi8e sla0e &o4er re6uirements
)luetooth
Po4er mo*el as a mobile &hone :regular *aily charging<
Designe* to ma9imi8e a*-hoc functionality
'ince IEEE 802!"# uses a C';+-C+ &rotocol the en*
no*es only talk 4hen they ha0e *ata to sen* 4ith the
follo4ing benefitsB
2o 4aiting for &olling :ho4e0er they must 4ait for a clear channel
4hich shoul*n5t be a &roblem in lo4 *uty cycle net4orks such as 4ith
sensor an* control *e0ices<
Current *rain is substantially re*uce* o0er a &olling &rotocol that
must &oll to maintain latencies e0en though the maQority of the time the
- 20 Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
*e0ice nee*e* be &olle*
IEEE 802!"# &rotocol 4as *esigne* to yiel* E months to 2 yrs on
alkaline cell
(ig)ee )attery Drain
In this section 4e5ll look at *ifferent as&ects of a net4orke* *e0ice5s
battery *rain
+ ty&ical scenario for sensors an* control *e0ices is to remain ?connecte*@
to the net4ork ,e use connecte* to mean that the *e0ice &erio*ically
listens for incoming &ackets In this manner the *e0ice5s beha0ior may
be altere* or at least checke* to 0erify correctness
'cenario !B (ig)ee )attery Drain1 net4ork connection
Let5s re0ie4 a cou&le of as&ects for (ig)ee *e0icesB
%oalB $4o year battery life
+ssum&tionsB
+++ cell H !!" +hr :Duracell alkaline<
2 yrs H !F1"32 hrs
Partial resultB +0erage current *rain L E" X+ :ca&acityAtime<
$9A=9 current *rain V !" m+ an* slee& current H ! X+
Partial resultB ;a9imum *uty cycle L #3I :+0g current *rain-slee&
current<Acurrent *rain
)eacon *uration of 3 m' :longer beacons containing more
information 4oul* *rain more current<
)eacon rate of !As :beacon rates can be as slo4 as 03As<
Partial resultB beacon use in this case re6uires a 3I *uty cycle
>inal resultB 228 hours :0!3I< of transmission time 4oul* be allo4e*
for *ata transmission or rece&tion
'cenario 2B )attery Drain 4hen the unit is not connecte* to
the net4ork
$his mo*e can be use* to ma9imi8e battery life $he *e0ice 4ill only
connect to the net4ork 4hen it nee*s to sen* *ata + *isa*0antage of this
techni6ue is that the *e0ice cannot be sent *ata1 so for the most &art it is
sel*om &art of the net4ork
+ssum&tionsB
De0ice 4ill connect only 4hen necessary to sen* *ata
+c6uisition time
- 2! Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
)luetooth re6uires about 20 P 30 secon*s :VK8I confi*ence< for an
In6uiry :first time< an* about 3 secon*s for a Page :subse6uent times<
IEEE 802!"# ac6uisition time is about 30 m'
Csing ma9imum *uty cycle of #3I an* #0 byte &acket
- 22 Kinney Consulting LLC
&atkinney.ieeeorg
Communications Design Conference 2 October 2003
=esultB
V #"1!#0 *ata transmissions for )luetooth
V #12EK1EF0 *ata transmissions for (ig)ee
)attery *rain conclusionB (ig)ee has an inherent a*0antage for these mo*es
of o&eration *ue to its short attach time an*Aor its ability to remain in the
slee& mo*e for long &erio*s
Com&arison 'ummary
(ig)ee an* )luetooth are t4o solutions for t4o *ifferent
a&&lication areas
$he *ifferences are from their a&&roach to their *esire* a&&lication
)luetooth has a**resse* a 0oice a&&lication by embo*ying a fast
fre6uency ho&&ing system 4ith a master sla0e &rotocol (ig)ee
has a**resse* sensors1 controls1 an* other short message
a&&lications by embo*ying a *irect se6uence system 4ith a star or
&eer to &eer &rotocols
;inor changes to )luetooth or (ig)ee 4on5t change their inherent
beha0ior or characteristics $he *ifferent beha0iors come from
architectural *ifferences
- 23 Kinney Consulting LLC
&atkinney.ieeeorg

You might also like