Works Patrick Kinney Patrick Kinney Kinney Consulting LLC Kinney Consulting LLC Chair of IEEE 802!"# $ask %rou& Chair of IEEE 802!"# $ask %rou& 'ecretary of (ig)ee )oD 'ecretary of (ig)ee )oD Chair of (ig)ee )uil*ing +utomation Profile ,% Chair of (ig)ee )uil*ing +utomation Profile ,% - ! - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 ZigBee Technology: Wireless Control that Simply Works ,hy is (ig)ee nee*e*/ $here are a multitu*e of stan*ar*s that a**ress mi* to high *ata rates for 0oice1 PC L+2s1 0i*eo1 etc 3o4e0er1 u& till no4 there hasn5t been a 4ireless net4ork stan*ar* that meets the uni6ue nee*s of sensors an* control *e0ices 'ensors an* controls *on5t nee* high ban*4i*th but they *o nee* lo4 latency an* 0ery lo4 energy consum&tion for long battery li0es an* for large *e0ice arrays $here are a multitu*e of &ro&rietary 4ireless systems manufacture* to*ay to sol0e a multitu*e of &roblems that also *on5t re6uire high *ata rates but *o re6uire lo4 cost an* 0ery lo4 current *rain $hese &ro&rietary systems 4ere *esigne* because there 4ere no stan*ar*s that met their re6uirements $hese legacy systems are creating significant intero&erability &roblems 4ith each other an* 4ith ne4er technologies
$he (ig)ee +lliance is not &ushing a technology7 rather it is &ro0i*ing a stan*ar*i8e* base set of solutions for sensor an* control systems $he &hysical layer 4as *esigne* to accommo*ate the nee* for a lo4 cost yet allo4ing for high le0els of integration $he use of *irect se6uence allo4s the analog circuitry to be 0ery sim&le an* 0ery tolerant to4ar*s ine9&ensi0e im&lementations $he me*ia access control :;+C< layer 4as *esigne* to allo4 multi&le to&ologies 4ithout com&le9ity $he &o4er management o&eration *oesn5t re6uire multi&le mo*es of o&eration $he ;+C allo4s a re*uce* functionality *e0ice :=>D< that nee*n5t ha0e flash nor large amounts of =O; or =+; $he ;+C 4as *esigne* to han*le large numbers of *e0ices 4ithout re6uiring them to be ?&arke*@ $he net4ork layer has been *esigne* to allo4 the net4ork to s&atially gro4 4ithout re6uiring high &o4er transmitters $he net4ork layer also can han*le large amounts of no*es 4ith relati0ely lo4 latencies - 2 - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 (ig)ee is &oise* to become the global controlAsensor net4ork stan*ar* It has been *esigne* to &ro0i*e the follo4ing featuresB Lo4 &o4er consum&tion1 sim&ly im&lemente* Csers e9&ect batteries to last many months to yearsD Consi*er that a ty&ical single family house has about E smokeACO *etectors If the batteries for each one only laste* si9 months1 the home o4ner 4oul* be re&lacing batteries e0ery monthD )luetooth has many *ifferent mo*es an* states *e&en*ing u&on your latency an* &o4er re6uirements such as sniff1 &ark1 hol*1 acti0e1 etc7 (ig)eeAIEEE 802!"# has acti0e :transmitArecei0e< or slee& +&&lication soft4are nee*s to focus on the a&&lication1 not on 4hich &o4er mo*e is o&timum for each as&ect of o&eration E0en mains &o4ere* e6ui&ment nee*s to be conscious of energy Consi*er a future home 4ith !00 4ireless controlAsensor *e0ices1 Case !B 802!! =9 &o4er is EEF m, :al4ays on<. !00 *e0icesAhome G "01000 homesAcity H 333 mega4atts Case 2B 802!"# =9 &o4er is 30 m, :al4ays on<. !00 *e0icesAhome G "01000 homesAcity H !"0 kilo4atts Case 3B 802!"# &o4er cycle* at !I :ty&ical *uty cycle< H !"0 4atts (ig)ee *e0ices 4ill be more ecological than its &re*ecessors sa0ing mega4atts at it full *e&loyment Lo4 cost :*e0ice1 installation1 maintenance< Lo4 cost to the users means lo4 *e0ice cost1 lo4 installation cost an* lo4 maintenance (ig)ee *e0ices allo4 batteries to last u& to years using &rimary cells :lo4 cost< 4ithout any chargers :lo4 cost an* easy installation< (ig)ee5s sim&licity allo4s for inherent configuration an* re*un*ancy of net4ork *e0ices &ro0i*es lo4 maintenance 3igh *ensity of no*es &er net4ork (ig)ee5s use of the IEEE 802!"# P3J an* ;+C allo4s net4orks to han*le any number of *e0ices $his attribute is critical for massi0e sensor arrays an* control net4orks 'im&le &rotocol1 global im&lementation (ig)ee5s &rotocol co*e stack is estimate* to be about !A# th of )luetooth5s or 802!!5s 'im&licity is essential to cost1 intero&erability1 an* maintenance $he IEEE 802!"# P3J a*o&te* by (ig)ee has been *esigne* for the 8E8 ;38 ban* in Euro&e1 the K!" ;38 ban* in 2 +merica1 +ustralia1 etc7 an* the 2# %38 ban* is no4 recogni8e* to be a global ban* acce&te* in almost all countries - 3 - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 (ig)eeAIEEE 802!"# - %eneral Characteristics Dual P3J :2#%38 an* 8E8AK!" ;38< Data rates of 2"0 kb&s :.2# %38<1 #0 kb&s :. K!" ;38<1 an* 20 kb&s :.8E8 ;38< O&timi8e* for lo4 *uty-cycle a&&lications :L0!I< C';+-C+ channel access Jiel*s high through&ut an* lo4 latency for lo4 *uty cycle *e0ices like sensors an* controls Lo4 &o4er :battery life multi-month to years< ;ulti&le to&ologiesB star1 &eer-to-&eer1 mesh +**ressing s&ace of u& toB !81#"010001000100010001000 *e0ices :E# bit IEEE a**ress< E"1"3" net4orks O&tional guarantee* time slot for a&&lications re6uiring lo4 latency >ully han*-shake* &rotocol for transfer reliability =angeB "0m ty&ical :"-"00m base* on en0ironment< (ig)eeAIEEE802!"# - $y&ical $raffic $y&es +**resse* Perio*ic *ata +&&lication *efine* rate :eg1 sensors< Intermittent *ata +&&licationAe9ternal stimulus *efine* rate :eg1 light s4itch< =e&etiti0e lo4 latency *ata +llocation of time slots :eg1 mouse< Each of these traffic ty&es man*ates *ifferent attributes from the ;+C $he IEEE802!"# ;+C is fle9ible enough to han*le each of these ty&es Perio*ic *ata can be han*le* using the beaconing system 4hereby the sensor 4ill 4ake u& for the beacon1 check for any messages an* then go back to slee& Intermittent *ata can be han*le* either in a beaconless system or in a *isconnecte* fashion In a *isconnecte* o&eration the *e0ice 4ill only attach to the net4ork 4hen it nee*s to communicate sa0ing significant energy Lo4 latency a&&lications may choose to the guarantee* time slot :%$'< o&tion %$' is a metho* of Mo' in that it allo4s each *e0ice a s&ecific *uration of time each 'u&erframe to *o 4hate0er it 4ishes to *o 4ithout contention or latency - # - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 $he IEEE 802!"# P3J an* ;+C along 4ith (ig)ee5s 2et4ork an* +&&lication 'u&&ort Layer &ro0i*eB E9tremely lo4 cost Ease of im&lementation =eliable *ata transfer 'hort range o&eration Nery lo4 &o4er consum&tion +&&ro&riate le0els of security $here are t4o &hysical *e0ice ty&es for the lo4est system cost $o allo4 0en*ors to su&&ly the lo4est &ossible cost *e0ices the IEEE stan*ar* *efines t4o ty&es of *e0icesB full function *e0ices an* re*uce* function *e0ices >ull function *e0ice :>>D< Can function in any to&ology Ca&able of being the 2et4ork coor*inator Ca&able of being a coor*inator Can talk to any other *e0ice =e*uce* function *e0ice :=>D< Limite* to star to&ology Cannot become a net4ork coor*inator $alks only to a net4ork coor*inator Nery sim&le im&lementation +n IEEE 802!"#A(ig)ee net4ork re6uires at least one full function *e0ice as a net4ork coor*inator1 but en*&oint *e0ices may be re*uce* functionality *e0ices to re*uce system cost +ll *e0ices must ha0e E# bit IEEE a**resses 'hort :!E bit< a**resses can be allocate* to re*uce &acket si8e +**ressing mo*esB 2et4ork O *e0ice i*entifier :star< 'ourceA*estination i*entifier :&eer-&eer< - " - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 - E - Kinney Consulting LLC &atkinney.ieeeorg Star Topology P+2 Coor*inator Full function device Communications flow Peer to Peer topology Cluster Tree Topology Full Function Device Reduced Function Device Communications Flow Communications Design Conference 2 October 2003 >rame 'tructure $he frame structures ha0e been *esigne* to kee& the com&le9ity to a minimum 4hile at the same time making them sufficiently robust for transmission on a noisy channel Each successi0e &rotocol layer a**s to the structure 4ith layer- s&ecific hea*ers an* footers $he IEEE 802!"# ;+C *efines four frame structuresB + beacon frame1 use* by a coor*inator to transmit beacons + *ata frame1 use* for all transfers of *ata +n ackno4le*gment frame1 use* for confirming successful frame rece&tion + ;+C comman* frame1 use* for han*ling all ;+C &eer entity control transfers $he *ata frame is illustrate* belo4B $he Physical Protocol Data Cnit is the total information sent o0er the air +s sho4n in the illustration abo0e the Physical layer a**s the follo4ing o0erhea*B Preamble 'e6uence # Octets 'tart of >rame Delimiter ! Octet >rame Length ! Octet $he ;+C a**s the follo4ing o0erhea*B >rame Control 2 Octets Data 'e6uence 2umber ! Octet +**ress Information # P 20 Octets >rame Check 'e6uence 2 Octets In summary the total o0erhea* for a single &acket is therefore !" -3! octets :!20 bits<7 *e&en*ing u&on the a**ressing scheme use* :short or E# bit a**resses< Please note that these numbers *o not inclu*e any security o0erhea* - F - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 'u&er >rame 'tructure $he L=-,P+2 stan*ar* allo4s the o&tional use of a su&erframe structure $he format of the su&erframe is *efine* by the coor*inator $he su&erframe is boun*e* by net4ork beacons1 is sent by the coor*inator :'ee >igure #< an* is *i0i*e* into !E e6ually si8e* slots $he beacon frame is transmitte* in the first slot of each su&erframe If a coor*inator *oes not 4ish to use a su&erframe structure it may turn off the beacon transmissions $he beacons are use* to synchroni8e the attache* *e0ices1 to i*entify the P+21 an* to *escribe the structure of the su&erframes +ny *e0ice 4ishing to communicate *uring the contention access &erio* :C+P< bet4een t4o beacons shall com&ete 4ith other *e0ices using a slotte* C';+-C+ mechanism +ll transactions shall be com&lete* by the time of the ne9t net4ork beacon >or lo4 latency a&&lications or a&&lications re6uiring s&ecific *ata ban*4i*th1 the P+2 coor*inator may *e*icate &ortions of the acti0e su&erframe to that a&&lication $hese &ortions are calle* guarantee* time slots :%$'s< $he guarantee* time slots com&rise the contention free &erio* :C>P<1 4hich al4ays a&&ears at the en* of the acti0e su&erframe starting at a slot boun*ary imme*iately follo4ing the C+P1 as sho4n in >igure " $he P+2 coor*inator may allocate u& to se0en of these %$'s an* a %$' may occu&y more than one slot &erio* 3o4e0er1 a sufficient &ortion of the C+P shall remain for contention base* access of other net4orke* *e0ices or ne4 *e0ices 4ishing to Qoin the net4ork +ll contention base* transactions shall be com&lete before the C>P begins +lso each *e0ice transmitting in a %$' shall ensure that its transaction is com&lete before the time of the ne9t %$' or the en* of the C>P - 8 - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 ;+C Data 'er0ice Diagrams ;+C Primiti0es ;+C Data 'er0ice ;CP'-D+$+ P e9change *ata &ackets bet4een ;+C an* P3J ;CP'-PC=%E P &urge an ;'DC from the transaction 6ueue ;+C ;anagement 'er0ice ;L;E-+''OCI+$EADI'+''OCI+$E P net4ork association ;L;E-'J2C A 'J2C-LO'' - *e0ice synchroni8ation ;L;E-'C+2 - scan ra*io channels ;L;E- CO;;-'$+$C' P communication status ;L;E-%E$ A -'E$P retrie0eAset ;+C PI) &arameters ;L;E-'$+=$ A )E+CO2-2O$I>J P beacon management ;L;E-POLL - beaconless synchroni8ation ;L;E-%$' - %$' management ;L;E-=E'E$ P re6uest for ;L;E to &erform reset ;L;E-O=P3+2 - or&han *e0ice management ;L;E-=R-E2+)LE - enablingA*isabling of ra*io system - K - Kinney Consulting LLC &atkinney.ieeeorg )eacon net4ork communication 2on-beacon net4ork communication Communications Design Conference 2 October 2003 - !0 - Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 'ecurity ,hen security of ;+C layer frames is *esire*1 (ig)ee uses ;+C layer security to secure ;+C comman*1 beacon1 an* ackno4le*gement frames (ig)ee may secure messages transmitte* o0er a single ho& using secure* ;+C *ata frames1 but for multi-ho& messaging (ig)ee relies u&on u&&er layers :such as the 2,K layer< for security $he ;+C layer uses the +*0ance* Encry&tion 'tan*ar* :+E'< S!0T as its core cry&togra&hic algorithm an* *escribes a 0ariety of security suites that use the +E' algorithm $hese suites can &rotect the confi*entiality1 integrity1 an* authenticity of ;+C frames $he ;+C layer *oes the security &rocessing1 but the u&&er layers1 4hich set u& the keys an* *etermine the security le0els to use1 control this &rocessing ,hen the ;+C layer transmits :recei0es< a frame 4ith security enable*1 it looks at the *estination :source< of the frame1 retrie0es the key associate* 4ith that *estination :source<1 an* then uses this key to &rocess the frame accor*ing to the security suite *esignate* for the key being use* Each key is associate* 4ith a single security suite an* the ;+C frame hea*er has a bit that s&ecifies 4hether security for a frame is enable* or *isable* ,hen transmitting a frame1 if integrity is re6uire*1 the ;+C hea*er an* &ayloa* *ata are use* in calculations to create a ;essage Integrity Co*e :;IC< consisting of #1 81 or !E octets $he ;IC is right a&&en*e* to the ;+C &ayloa* If confi*entiality is re6uire*1 the ;+C frame &ayloa* is also left a&&en*e* 4ith frame an* se6uence counts :*ata use* to form a nonce< $he nonce is use* 4hen encry&ting the &ayloa* an* also ensures freshness to &re0ent re&lay attacks C&on recei&t of a frame1 if a ;IC is &resent1 it is 0erifie* an* if the &ayloa* is encry&te*1 it is *ecry&te* 'en*ing *e0ices 4ill increase the frame count 4ith e0ery message sent an* recei0ing *e0ices 4ill kee& track of the last recei0e* count from each sen*ing *e0ice If a message 4ith an ol* count is *etecte*1 it is flagge* 4ith a security error $he ;+C layer security suites are base* on three mo*es of o&eration Encry&tion at the ;+C layer is *one using +E' in Counter :C$=< mo*e an* integrity is *one using +E' in Ci&her )lock Chaining :C)C- ;+C< mo*e S!ET + combination of encry&tion an* integrity is *one using a mi9ture of C$= an* C)C- ;+C mo*es calle* the CC; mo*e $he 2,K layer also makes use of the +*0ance* Encry&tion 'tan*ar* :+E'< 3o4e0er1 unlike the ;+C layer1 the security suites are all base* on the CC;U mo*e of o&eration $he CC;U mo*e of o&eration is a minor mo*ification of the CC; mo*e use* by the ;+C layer It inclu*es all of the ca&abilities of CC; an* a**itionally offers encry&tion-only an* integrity-only ca&abilities $hese e9tra ca&abilities sim&lify the 2,K layer security by eliminating the nee* for C$= an* - !! Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 C)C-;+C mo*es +lso1 the use of CC;U in all security suites allo4s a single key to be use* for *ifferent suites 'ince a key is not strictly boun* to a single security suite1 an a&&lication has the fle9ibility to s&ecify the actual security suite to a&&ly to each 2,K frame1 not Qust 4hether security is enable* or *isable* ,hen the 2,K layer transmits :recei0es< a frame using a &articular security suite it uses the 'ecurity 'er0ices Pro0i*er :''P< to &rocess the frame $he ''P looks at the *estination :source< of the frame1 retrie0es the key associate* 4ith that *estination :source<1 an* then a&&lies the security suite to the frame $he ''P &ro0i*es the 2,K layer 4ith a &rimiti0e to a&&ly security to outgoing frames an* a &rimiti0e to 0erify an* remo0e security from incoming frames $he 2,K layer is res&onsible for the security &rocessing1 but the u&&er layers control the &rocessing by setting u& the keys an* *etermining 4hich CC;U security suite to use for each frame 'imilar to the ;+C layer frame format1 a frame se6uence count an* ;IC may be a**e* to secure a 2,K frame - !2 Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 (ig)ee 2et4ork ;o*el $he (ig)ee 2et4ork Coor*inator 'ets u& a net4ork $ransmits net4ork beacons ;anages net4ork no*es 'tores net4ork no*e information =outes messages bet4een &aire* no*es $y&ically o&erates in the recei0e state $he (ig)ee 2et4ork 2o*e Designe* for battery &o4ere* or high energy sa0ings 'earches for a0ailable net4orks $ransfers *ata from its a&&lication as necessary Determines 4hether *ata is &en*ing =e6uests *ata from the net4ork coor*inator - !3 Kinney Consulting LLC &atkinney.ieeeorg ;esh Link 'tar Link (ig)ee En* De0ice :=>D or >>D< (ig)ee =outer :>>D< (ig)ee Coor*inator :>>D< Communications Design Conference 2 October 2003 Can slee& for e9ten*e* &erio*s - !# Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 (ig)ee 'tack (ig)ee 'tack 'ystem =e6uirements 8-bit C1 eg1 80c"! >ull &rotocol stack L32k 'im&le no*e only stack VEk Coor*inators re6uire e9tra =+; no*e *e0ice *atabase transaction table &airing table - !" Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 2et4ork Layer $he res&onsibilities of the (ig)ee 2,K layer inclu*eB W Starting a network: $he ability to successfully establish a ne4 net4ork W Joining and leaving a networkB $he ability to gain membershi& :Qoin< or relin6uish membershi& :lea0e< a net4ork W Configuring a new device: $he ability to sufficiently configure the stack for o&eration as re6uire* W Addressing: $he ability of a (ig)ee coor*inator to assign a**resses to *e0ices Qoining the net4ork W Synchroniation within a network: $he ability for a *e0ice to achie0e synchroni8ation 4ith another *e0ice either through tracking beacons or by &olling W Security: a&&lying security to outgoing frames an* remo0ing security to terminating frames W !outing: routing frames to their inten*e* *estinations 2et4ork =outing O0er0ie4 Perha&s the most straightfor4ar* 4ay to think of the (ig)ee routing algorithm is as a hierarchical routing strategy 4ith table-*ri0en o&timi8ations a&&lie* 4here &ossible 2,K uses an algorithm that allo4s stack im&lementers an* a&&lication *e0elo&ers to balance unit cost1 battery *rain1 an* com&le9ity in &ro*ucing (ig)ee solutions to meet the s&ecific cost-&erformance &rofile of their a&&lication 'tarte* 4ith the 4ell-stu*ie* &ublic-*omain algorithm +ODN an* ;otorola5s Cluster-$ree algorithm an* fol*ing in i*eas from Ember Cor&oration5s %=+* 2et4ork 'ummary $he net4ork layer buil*s u&on the IEEE 802!"# ;+C5s features to allo4 e9tensibility of co0erage +**itional clusters can be a**e*7 net4orks can be consoli*ate* or s&lit u& - !E Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 +&&lication layer $he (ig)ee a&&lication layer consists of the +P' sub-layer1 the (DO an* the manufacturer-*efine* a&&lication obQects $he res&onsibilities of the +P' sub- layer inclu*e maintaining tables for bin*ing1 4hich is the ability to match t4o *e0ices together base* on their ser0ices an* their nee*s1 an* for4ar*ing messages bet4een boun* *e0ices +nother res&onsibility of the +P' sub-layer is *isco0ery1 4hich is the ability to *etermine 4hich other *e0ices are o&erating in the &ersonal o&erating s&ace of a *e0ice $he res&onsibilities of the (DO inclu*e *efining the role of the *e0ice 4ithin the net4ork :eg1 (ig)ee coor*inator or en* *e0ice<1 initiating an*Aor res&on*ing to bin*ing re6uests an* establishing a secure relationshi& bet4een net4ork *e0ices $he manufacturer-*efine* a&&lication obQects im&lement the actual a&&lications accor*ing to the (ig)ee-*efine* a&&lication *escri&tions (ig)ee De0ice ObQect W Defines the role of the *e0ice 4ithin the net4ork :eg1 (ig)ee coor*inator or en* *e0ice< W Initiates an*Aor res&on*s to bin*ing re6uests W Establishes a secure relationshi& bet4een net4ork *e0ices selecting one of (ig)ee5s security metho*s such as &ublic key1 symmetric key1 etc +&&lication 'u&&ort Layer $his layer &ro0i*es the follo4ing ser0icesB W "iscovery: $he ability to *etermine 4hich other *e0ices are o&erating in the &ersonal o&erating s&ace of a *e0ice W Binding: $he ability to match t4o or more *e0ices together base* on their ser0ices an* their nee*s an* for4ar*ing messages bet4een boun* *e0ices - !F Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 The #nevita$le %uestion is whether ZigBee and Bluetooth are competitors or complements& )luetooth seems best suite* forB 'ynchroni8ation of cell &hone to PD+ 3an*s-free au*io PD+ to &rinter ,hile (ig)ee is better suite* forB Controls 'ensors Lots of *e0ices Lo4 *uty cycle 'mall *ata &ackets Long battery life is critical +ir Interface com&arisonB (ig)ee D''' !! chi&sA symbol E2" K symbolsAs # )itsA symbol Peak Information =ate V!28 KbitAsecon* )luetooth >3'' !E00 ho&s A secon* ! ; 'ymbol A secon* ! bitAsymbol Peak Information =ate V!08-F23 kbitAsecon* )attery Drain com&arison to )luetooth Packet length can affect battery *rain $y&ically the shorter the &acket the 6uicker the *e0ice can go to slee& )luetooth is a slotte* &rotocol Communication can occur in eitherB E2" X'1 !8F" X'1 or 3!2" X' slots $he follo4ing gra&h sho4ing effecti0e *ata rate 4as base* u&on the transmissions s&ee*s state* in )luetooth 0!! an* IEEE 802!"# *raft !81 using the 2"0 kbAs rate $he general tren* is that at larger &acket si8es the effecti0e *ata rate a&&roaches the ra4 *ata rate $he &eaks for the )luetooth rate are a result of the three slot si8es1 4hen a &acket becomes too big for one slot it must increment to the ne9t slot - !8 Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 e0en though it *oesn5t fill the 4hole slot allocation IEEE 802!"# 4as *esigne* for small &ackets so it is no sur&rise it is more efficient at those small &ackets resulting in a higher effecti0e rate *es&ite its lo4er ra4 *ata rate >rom this gra&h 4e can see that for &ackets less than F" bytes (ig)ee has a higher effecti0e *ata rate than )luetooth 3a0ing a lo4er rate for small &ackets means that )$ nee*s longer transmit an* recei0e times an* therefore current *rain is higher for small *ata &ackets +lthough these numbers *o not re&resent retransmissions or multi&le *e0ices re6uesting the ban*4i*th7 the author belie0es that the same traits 4ill be e9hibite* in these other cases Effecti0e Data =ate :base* u&on theoretical 0alues 4ith no retransmissions< - !K Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 $iming Consi*erations (ig)ee
2e4 sla0e enumeration H 30ms ty&ically 'lee&ing sla0e changing to acti0e H !"ms ty&ically +cti0e sla0e channel access time H !"ms ty&ically )luetooth
2e4 sla0e enumeration H Y3s1 ty&ically 20s 'lee&ing sla0e changing to acti0e H 3s ty&ically +cti0e sla0e channel access time H 2ms ty&ically ConclusionB (ig)ee *e0ices can 6uickly attach1 e9change information1 *etach1 an* then go to *ee& slee& to achie0e a 0ery long battery life )luetooth *e0ices re6uire about V!00R the energy for this o&eration Po4er Consi*erations (ig)ee 2O years from Znormal5 batteries Designe* to o&timi8e sla0e &o4er re6uirements )luetooth Po4er mo*el as a mobile &hone :regular *aily charging< Designe* to ma9imi8e a*-hoc functionality 'ince IEEE 802!"# uses a C';+-C+ &rotocol the en* no*es only talk 4hen they ha0e *ata to sen* 4ith the follo4ing benefitsB 2o 4aiting for &olling :ho4e0er they must 4ait for a clear channel 4hich shoul*n5t be a &roblem in lo4 *uty cycle net4orks such as 4ith sensor an* control *e0ices< Current *rain is substantially re*uce* o0er a &olling &rotocol that must &oll to maintain latencies e0en though the maQority of the time the - 20 Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 *e0ice nee*e* be &olle* IEEE 802!"# &rotocol 4as *esigne* to yiel* E months to 2 yrs on alkaline cell (ig)ee )attery Drain In this section 4e5ll look at *ifferent as&ects of a net4orke* *e0ice5s battery *rain + ty&ical scenario for sensors an* control *e0ices is to remain ?connecte*@ to the net4ork ,e use connecte* to mean that the *e0ice &erio*ically listens for incoming &ackets In this manner the *e0ice5s beha0ior may be altere* or at least checke* to 0erify correctness 'cenario !B (ig)ee )attery Drain1 net4ork connection Let5s re0ie4 a cou&le of as&ects for (ig)ee *e0icesB %oalB $4o year battery life +ssum&tionsB +++ cell H !!" +hr :Duracell alkaline< 2 yrs H !F1"32 hrs Partial resultB +0erage current *rain L E" X+ :ca&acityAtime< $9A=9 current *rain V !" m+ an* slee& current H ! X+ Partial resultB ;a9imum *uty cycle L #3I :+0g current *rain-slee& current<Acurrent *rain )eacon *uration of 3 m' :longer beacons containing more information 4oul* *rain more current< )eacon rate of !As :beacon rates can be as slo4 as 03As< Partial resultB beacon use in this case re6uires a 3I *uty cycle >inal resultB 228 hours :0!3I< of transmission time 4oul* be allo4e* for *ata transmission or rece&tion 'cenario 2B )attery Drain 4hen the unit is not connecte* to the net4ork $his mo*e can be use* to ma9imi8e battery life $he *e0ice 4ill only connect to the net4ork 4hen it nee*s to sen* *ata + *isa*0antage of this techni6ue is that the *e0ice cannot be sent *ata1 so for the most &art it is sel*om &art of the net4ork +ssum&tionsB De0ice 4ill connect only 4hen necessary to sen* *ata +c6uisition time - 2! Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 )luetooth re6uires about 20 P 30 secon*s :VK8I confi*ence< for an In6uiry :first time< an* about 3 secon*s for a Page :subse6uent times< IEEE 802!"# ac6uisition time is about 30 m' Csing ma9imum *uty cycle of #3I an* #0 byte &acket - 22 Kinney Consulting LLC &atkinney.ieeeorg Communications Design Conference 2 October 2003 =esultB V #"1!#0 *ata transmissions for )luetooth V #12EK1EF0 *ata transmissions for (ig)ee )attery *rain conclusionB (ig)ee has an inherent a*0antage for these mo*es of o&eration *ue to its short attach time an*Aor its ability to remain in the slee& mo*e for long &erio*s Com&arison 'ummary (ig)ee an* )luetooth are t4o solutions for t4o *ifferent a&&lication areas $he *ifferences are from their a&&roach to their *esire* a&&lication )luetooth has a**resse* a 0oice a&&lication by embo*ying a fast fre6uency ho&&ing system 4ith a master sla0e &rotocol (ig)ee has a**resse* sensors1 controls1 an* other short message a&&lications by embo*ying a *irect se6uence system 4ith a star or &eer to &eer &rotocols ;inor changes to )luetooth or (ig)ee 4on5t change their inherent beha0ior or characteristics $he *ifferent beha0iors come from architectural *ifferences - 23 Kinney Consulting LLC &atkinney.ieeeorg