Professional Documents
Culture Documents
06 Mobile Application BLE
06 Mobile Application BLE
Cellular
ZigBee
Hunzala Mumtaz(19-cs-21)
Hassan Rafique (19-cs-36)
M.Sufiyan Tahir (19-cs-37)
What Is Bluetooth Low Energy (BLE) ?
BLE technology is powerful and application-friendly version of Bluetooth that was developed
for Internet of Things. Bluetooth Low Energy apps transmit low energy signals with Bluetooth
4.0 protocol. Proximity based solution using BLE device enables the business to fetch precise
data, delivering jaw-breaking customer experiences, generating more ROI.
With the reliable team of BLE developers, BLE Mobile Apps is keen to deliver solutions for
BLE iOS Apps and BLE Android Apps that meet the client’s requirements and improve
business performance.
Extensive Coverage:
As Cellular IoT solutions use existing cellular networks, IoT devices are assured of extensive
coverage that is already in place. This level of network coverage is essential for IoT
applications that require data access across multiple cities or regions. Other Internet connection
technologies, like Wi-Fi, do not provide the same levels of either coverage or security.
Cost-saving:
The infrastructure required for Cellular IoT enablement is already in place and does not require
any additional investment. Infrastructural requirements for Cellular IoT, like cellular towers
and base stations, are already in place.
Every physical device needs to be regularly checked and maintained and that includes Cellular
IoT devices. Using an online IoT platform, you can centrally manage and troubleshoot your
connected devices remotely, regardless of location. This benefit ensures that service engineers
can be alerted to exceptions rather than having to check every device. Therefore, cellular
connections minimize downtime and help reduce costs associated with field service
Security:
Just like any other connected device, cellular IoT devices also need to be secured from
unauthorized access. Cellular IoT devices are already secure, as part of the GSMA standards.
Additional encryption can be applied to ensure a multi-layered approach to security. Devices
can be monitored to identify abnormal or malicious activity. Moreover, cellular IoT devices can
be configured to use private network technologies like VPN that offer enhanced security.
ZigBee 10
General Characteristics of Zigbee Standard
ZigBee 11
Types of ZigBee Devices
Zigbee Router:
It is used for passing the data between devices.
ZigBee 12
Features of Zigbee
Stochastic addressing:
A device is assigned a random address and announced. Mechanism for address conflict
resolution. Parents node don’t need to maintain assigned address table.
Link Management:
Each node maintains quality of links to neighbors. Link quality is used as link cost in routing.
Frequency Agility:
Nodes experience interference report to channel manager, which then selects another channel
Asymmetric Link:
Each node has different transmit power and sensitivity. Paths may be asymmetric.
Power Management:
Routers and Coordinators use main power. End Devices use batteries
ZigBee 13
Zigbee Network Topologies
Star Topology
(ZigBee Smart Energy): Consists of a coordinator and several end devices, end devices
communicate only with the coordinator.
Mesh Topology
(Self Healing Process): Mesh topology consists of one coordinator, several routers, and end
devices.
Tree Topology:
In this topology, the network consists of a central node which is a coordinator, several routers,
and end devices. the function of the router is to extend the network coverage.
ZigBee 14
Thank You
15