Professional Documents
Culture Documents
Abstract-
ZigBee is an IEEE 802.15.4 standard for data communications with business and consumer devices. It is designed around low-power consumption allowing batteries to essentially last forever. The ZigBee standard provides network, security, and application support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer (PHY) wireless standard. It employs a suite of technologies to enable scalable, selforganizing, self-healing networks that can manage various data traffic patterns. ZigBee is a low-cost, lowpower, wireless mesh networking standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications, the low power-usage allows longer life with smaller batteries, and the mesh networking provides high reliability and larger range.ZigBee has been developed to meet the growing demand for capable wireless networking between numerous low-power devices. In industry ZigBee is being used for next generation automated manufacturing, with small transmitters in every device on the floor, allowing for communication between devices to a central computer. This new level of communication permits finely-tuned remote monitoring and manipulation.
that allow multiple OEM vendors to create interoperable products. The current list of application profiles either published or in the works are: Home Automation ZigBee Smart Energy Telecommunication Applications Personal Home The relationship between IEEE 802.15.4 and ZigBee is similar to that between IEEE 802.11 and the Wi-Fi Alliance. For non -commercial purposes, the ZigBee specification is available free to the general public. An entry level membership in the ZigBee Alliance, called Adopter, costs US$ 3500 annually and provides access to the as-yet unpublished specifications and permission to create products for market using the specifications. ZigBee is one of the global standards of communication protocol formulated by the relevant task force under the IEEE 802.15 working group. The fourth in the series, WPAN Low Rate/ZigBee is the newest and provides specifications for devices that have low data rates, consume very low power and are thus characterized by long battery life. Other standards like Bluetooth and IrDA address high data rate applications such as voice, video and LAN communications. ZigBee devices are actively limited to a through-rate of 250Kbps, compared to Bluetooth's much larger pipeline of 1Mbps, operating on the 2.4 GHz ISM band, which is available throughout most of the world.In the consumer market ZigBee is being explored for everything from linking
1. INTRODUCTION
ZigBee is an established set of specifications for wireless personal area networking (WPAN), i.e. digital radio connections between computers and related devices. WPAN Low Rate or ZigBee provides specifications for devices that have low data rates, consume very low power and are thus characterized by long battery life. ZigBee makes possible completely networked homes where all devices are able to communicate and be controlled by a single unit. The ZigBee Alliance, the standards body which defines ZigBee, also publishes application profiles
low-power household devices such as smoke alarms to a central housing control unit, to centralized light controls. The specified maximum range of operation for ZigBee devices is 250 feet (76m), substantially further than that used by Bluetooth capable devices, although security concerns raised over "sniping" Bluetooth devices remotely, may prove to hold true for ZigBee devices as well. Due to its low power output, ZigBee devices can sustain themselves on a small battery for many months, or even years, making them ideal for install-and-forget purposes, such as most small household systems. Predictions of ZigBee installation for the future, most based on the explosive use of ZigBee in automated household tasks in China, look to a near future when upwards of sixty ZigBee devices may be found in an average American home, all communicating with one another freely and regulating common tasks seamlessly. The ZigBee Alliance has been set up as an association of companies working together to enable reliable, cost-effective, low-power, wirelessly networked, monitoring and control products based on an open global standard. Once a manufacturer enrolls in this Alliance for a fee, he can have access to the standard and implement it in his products in the form of ZigBee chipsets that would be built into the end devices. Philips, Motorola, Intel, HP are all members of the Alliance . The goal is to provide the consumer with ultimate flexibility, mobility, and ease of use by building wireless intelligence and capabilities into every day devices. ZigBee technology will be embedded in a wide range of products and applications across consumer, commercial, industrial and government markets worldwide. For the first time, companies will have a standardsbased wireless platform optimized for the unique needs of remote monitoring and control applications, including simplicity, reliability, low-cost and low-power. The target networks encompass a wide
range of devices with low data rates in the Industrial, Scientific and Medical (ISM) radio bands, with buildingautomation controls like intruder/fire alarms, thermostats and remote (wireless) switches, video/audio remote controls likely to be the most popular applications. So far sensor and control devices have been marketed as proprietary items for want of a standard. With acceptance and implementation of ZigBee, interoperability will be enabled in multi-purpose, self-organizing mesh networks.
controls a ZigBee network, which also can be a gateway to the external world, a trust center, and an access authenticator, all in one.
Figure 2: ZigBee topologies Each ZigBee network has one coordinator but can have multiple routers and end devices. Like end devices, routers and the coordinator may execute their own sensor/controller applications. ZigBee supports multiple multihop network topologies, as illustrated by Fig. 2.
(CFP), and an inactive period. The CAP and CFP contain a number (16 by default) of equally sized time slots. A beacon frame must be transmitted at the first slot. The slots in CFP are called guaranteed time slots (GTS), which can be allocated by the personal area network (PAN) coordinator to support urgent real-time applications. During CAP, the channel is accessed using slotted CSMA/CA. Typically, the beacon-based access is used only in networks structured as star and cluster tree topologies as shown in Fig. 2, whereas the flat mesh topology networks use non-beacon access. The star and cluster tree topologies are not as flexible and robust for use in a mesh topology. Also, because it is difficult to add network structure and time synchronization, which is required by the beacon-based approach atop of the self-organized and potentially large ZigBee mesh networks, virtually all commercially available ZigBee systems currently sup-port only non-beacon MAC access. Hence, in this article, we focus on studying the feasibility of voice communication over non-beacon ZigBee networks.
coordinator node. For structured topologies, such as a cluster tree, the short addresses are allocated in a mask-able fashion similar to that of the IP addressing. This addressing scheme reflects the hierarchical nature of the topology. Also, in structured ZigBee networks, scheduling of beacon transmissions is used to guarantee that each device is allocated a slice of time for contention-free channel access. As a result, it is obvious that the beacon interval will be much larger than the super frame duration for the network with a large node density. In the beacon-enabled mode, a coordinator broadcasts beacons periodically to synchronize the attached devices. In the non-beacon-enabled mode, a coordinator does not broadcast beacons periodically but may uncast a beacon to a device that is soliciting beacons. With ZigBee routing, an end-to-end path can be established, and data can be transmitted successfully from the source to the destination. There are three routing approaches in ZigBee. The first one is hierarchical routing, which relays data frames through the tree structure that is formulated when devices (re-)join the network through association. This tree topology, for example, the star and the cluster tree in Fig. 2, is routed from the ZigBee coordinator. The hierarchical routing works as follows: Data frames climb up the tree from the source device toward the ZigBee coordinator.
If the destination device is between the
source device and the ZigBee coordinator, data frames will be received by the destination device; otherwise, data frames will go down the tree from the ZigBee coordinator until arrival at the destination device. This kind of routing does not require dedicated routing protocol, but the disadvantage is that it usually takes a long path to climb up and go down through the tree. In addition to the previous hierarchical routing, ZigBee provides a requestresponse-based routing protocol derived
from the Ad hoc On-demand Distance Vector (AODV) [4] routing algorithm. There are two major commands in this routing protocol: route request (RREQ) and route reply (RREP). RREQ is broadcast hop-by-hop beginning at the source device and rebroadcast by intermediate devices until it reaches the destination device, which in turn will generate RREP, which traverses the reverse path of that of the RREQ back to the source device. When RREP reaches the source device, a route is established. The difference between the ZigBee routing protocol and the original AODV protocol is that ZigBee routing attempts to select a route with the least cost other than the least number of hops. In order to do this, ZigBee specifies a field in the RREQ called path cost, defined as the sum of link cost. Each inter-mediate device calculates its link cost and accordingly, updates the path cost field when RREQ is rebroadcast. As a result, the destination device, when it receives RREQ, can know the cost of the route through which the RREQ is coming and is able to choose the route with the least cost and notify the source device by sending back the RREP via the reverse path of the least cost path. Additionally, the path cost field can be utilized by intermediate devices to filter and avoid unnecessary RREQ broadcast. In ZigBee, the cost of a link l, (C (l)) is an integer-valued parameter in the range of [0, 7], defined as follows: C (l) = 7 or min (7, round (power(pl, 4))) (1) where pl is defined as the probability of packet delivery on the link l . The third routing approach is sourcerouted data transmission. The route record command is designed so that the destination device of this command can record a whole route through the network and construct the source route table, which can be utilized later by this device to perform source-routed data transmission.
6. ZIGBEE APPLICATIONS
Most common applications that ZigBee technology advocates are based on medical, residential, and industrial control and monitoring. Examples include: lighting controls, automatic meter reading, wireless smoke and carbon monoxide (CO) detectors, heating, ventilation, and air conditioning (HVAC) and heating control, home security, environmental controls, medical sensing and monitoring, universal remote control to a set-top box, and industrial automation. Generally speaking, ZigBee is designed to transmit low-rate data with low-energy consumption within a short-distance. Originally, it was not intended for voice transmission. However, if ZigBee nodes already are deployed in an area for sensing and control applications, they pro-vide a communication infrastructure that may become valuable to tap into for other applications under special circumstances. To this end, we study the feasibility of carrying non-secure VoIP and PTT communications over standard ZigBee networks.
lower limit of 3.0 is suggested for usable telephony. ITU-T E-model (R-factor) A well known and widely used approach for evaluating voice quality is the E-model defined in International Telecommunication UnionTelecommunication (ITU-T) Rec. G.107.The E-model combines individual impairments (loss, delay, echo, codec type, noise, etc.) due to both the signal properties and the network characteristics into a single, overall measure of conversational voice quality called the rating factor (Rfactor). This quantity is defined as follows: R = 100 Is Id Ief + A, (2) where Is is the signal-to-noise impairment, Id is the impairment associated with the mouth-to-ear delay of the path, Ief is the equipment impairment factor that captures the effect of information loss due to both the encoding scheme and to packet loss, and A is the expectation factor. For a G.729a voice codec scheme with the assumption of random packet loss, the previous equation is simplified as the following expression:
R > 100 corresponds to MOS = 4.5; 0 < R < 100 corresponds to MOS = 1 + 6
0.035R + 7 10 R(R-60)(100-R).
It is obvious that the higher R is, which implies smaller d and smaller e, the higher the MOS is that will be obtained. An Rfactor between 50 and 60, 60 and 70, 70 and 80, 80 and 90, or 90 and 100 indicates poor, low, medium, high, or best voice quality, respectively. VOICE OVER ZIGBEE The performance of ZigBee networks has been extensively investigated. However, those studies are not specific to voice quality. This reported how they extended their Firefly ZigBee work to pro-vide realtime voice communication capability for underground miners separated by long tunnels. However: The Firefly node has an additional AM radio interface for time synchronization, a highly specialized design that is not applicable to general ZigBee devices. Firefly communication is based on a non-standard time division multiple access (TDMA)-based link protocol designed specifically for linear network topology; it is difficult to generalize the approach to a standard ZigBee network of any topology. Our interest in the feasibility of conducting voice communication over commercial offthe-shelf (COTS) ZigBee hardware, where the normal operating mode is non-beaconenabled, unsynchronized, and unslotted CSMA/CA. Several characteristics of ZigBee technology can affect its capability of carrying voice communications. First, ZigBee networks have limited bandwidth only up to 250 Kbps. This limitation confines the maximum number of supportable voice calls or sessions. Second, channel access contentions in ZigBee networks are resolved by the CSMA/CA protocol, which inevitably introduces additional waiting time for transmissions and leads to smaller effective bandwidth and increased delay both could degrade the quality of voice communications. In addition, to maintain the advantage of low
where H(.) is the Heaviside step function, and d is the one-way mouth-to-ear delay that consists of three components: the delay associated with the codec (dcodec), the delay associated with the dejitter buffer introduced to smooth out the delay variation (djitterbuffer), and the one-way transit delay across the IP transport network (dnetwork). Variable (e) represents loss probability including loss in the IP transport network (enetwork) and the loss resulting from the dejitter buffer at the decoder (ejitterbuffer), provides a simplified method to calculate the previous components in d and e, based on the metrics at the transport level. R and MOS are related as follows : R < 0 corresponds to MOS = 1;
cost, a ZigBee node usually has low-gain antenna design, limited computation capability, and limited buffer size, which can affect the voice quality as well.
8. PERFORMANCE OF VOIP
Each full-duplex VoIP connection is simulated by two constant bit-rate (CBR) flows of opposite directions. The parameters of the CBR flows follow those of the G.729a codec: 20 bytes of data every 20 ms interval. Adding RTP, UDP, and IPv4 headers, each VoIP packet becomes 60 bytes long. Using IPv4/UDP/RTP header compression (e.g., IETF RFC 3095 [10]), a 40-byte IPv4/UDP/RTP header can be compressed to only one byte. In our study, we consider both cases: with header compression (W/HC) and without header compression (W/O HC). The distance D is set to eight meters. Buffer size in every node is 50 packets with first input first output (FIFO) queuing and tail-drop discipline. R-factor is used to measure the quality of VoIP. To calculate the R-factor, a dejitter buffer of six packets is applied. Table 1 presents the resultant R-factor (Eq. 3) for different configurations. From these results, it can be concluded that: Between two directly connected nodes, two (or three, if header compression is in use) G.729a VoIP calls of medium voice quality can be supported. For two hops, if a hidden terminal problem can be avoided, that is CSR is at least twice that of TXR, one VoIP call can be support-ed. When the number of hops exceeds three, support of G.729a VoIP on ZigBee net-works becomes unreliable.
9. SECURITY
Security and data integrity are key benefits of the ZigBee technology. ZigBee leverages the security model of the IEEE 802.15.4 MAC sub layer which specifies four security services: access controlthe device maintains a list of trusted devices within the network data encryption, which uses symmetric key 128-bit advanced encryption standard frame integrity to protect data from being modified by parties without cryptographic keys sequential freshness to reject data frames that have been replayed the network controller compares the freshness value with the last known value from the device and rejects it if the freshness value has not been updated to a new value.
ZigBee security is offered at several levels. Link level security, designed by the IEEE 802.15.4, provides security services for access control, message integrity, message confidentiality, and replay protection. In addition, ZigBee provides a message integrity check. When security is enabled, IEEE 802.15.4 data is encrypted using a particular mode of the 128-bit AES, that is, AES-CTR, AESCBC-MAC, or AES-CCM, depending on security requirements. In addition, ZigBee supports network-level security by applying AES encryption using network-wide key. Application-layer security also can be provided with pair-wise key established between the communicating peers. ZigBee security is generally considered adequate for its applications.
REFERENCES
[1] [2]
R. G. Cole and J. H. Rosenbluth, Voice over IP Performance Monitoring, ACM Comp. Commun. Rev., Apr. 2001.
10.CONLUSION
It is likely that ZigBee will increasingly play an important role in the future of computer and communication technology. The IEEE 802.15.4 based ZigBee is designed for remote controls and sensors, which are very many in number, but need only small data packets and, mainly, extremely low power consumption for (long) life. Therefore they are naturally different in their approach to their respective application arenas. It provides an overview of the ZigBee technology and investigates the feasibility of full-duplex VoIP communications support over simple network topologies. The Rfactor, end-to-end delay, jitter variation, and packetloss ratio also were described. Our findings indicate that although two directly connected ZigBee nodes can sup-port up to three VoIP, a VoIP conversation is possible for at most, two hops in a linear configuration for a reasonable R-Factor. ZigBee technology is designed to best suit these applications, for the reason that it enables reduced costs of development and very fast market adoption.
IEEE 802.15.4, IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Net-works Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Net-works (LRWPANs), Oct. 2003. [3] C. Perkins, E. Belding-Royer, and S. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, IETF RFC 3561, July 2003. [4] ITU-T Rec. G.107, The E-Model, A Computational Model for Use in Transmission Planning, Dec. 1998. [5] J. Zheng and M. J. Lee, A Comprehensive Performance Study of IEEE 802.15.4, Sensor Network Operations, IEEE Press, Wiley Interscience, Ch.. 4, 2006, pp. 21837. [6] Behrouz A. Frouzan, Data Communication, Third Edition, Tata McGraw-Hill Publishing company Limited, 2004, Pp 19-110. [7] Andrew S. Tenenbaum, Computer Networks, Fourth Edition Pearson Publication Limited, 2003, Pp 21-89. [8] William Stalling, Wireless Communication and Networks, Fourth Edition, Pearson Publication Limited, 2004, Pp 39-118. [9] http://www.zigbee.org/en/documents/zigbeeoverview4.pdf
[10] http://www.palowireless.com/zigbee/tutorials.asp
[11] http://www.zigbee.org/en/resources