Zigbee Literature Review
Zigbee Literature Review
Zigbee Literature Review
The various examples of the wireless communication are mobile communication. GPS
unit, Satellite television, wireless computer mice, cordless telephones, wireless keyboards,
headsets etc.
ZIGBEE TECHNOLOGY:
zigbee is a latest evolved technology with the commonly effort of Zigbee alliance and
IEEE 802.5.11 based on the demand of low power, low data transfer rate, low cost, low
complexity wireless network technology. Zigbee is ordinarily used in wireless sensor network
and control systems which connect and communicate among thousands of tiny sensors, these
sensors require very small amount of energy to send data from one sensor to another sensor
through radio waves in a relay way, and communication efficiency is very high.
Zigbee is a standard that defines a set of communications protocol for low data rate short
range wireless networking. Zigbee based wireless devices operate in 868 MHz, 915 MHz,
and 2.5 GHz frequency bands. Zigbee is a kind of short distance, low power, low data
transfer rate, low cost, low complexity wireless network technology. Zigbee connect and
communicate among thousands of sensors.
The maximum data rate is 250k bit per second. Zigbee is targeted mainly for battery
powered applications.
The ZigBee specifications is as follows:
It is intended to be simpler protocol.
It is cheaper than other WPANs, such as Bluetooth. It is a radio-frequency (RF)
application with a low data rate which require, secure networking and long battery life
In the market most wireless standards are available with fast data rate. Speed and
power consumption have direct relationship. The zigbee wireless networking
standards fit into the market that is simply not filled by the other wireless
technologies. While other wireless protocols add more and more features, zigbee aims
for a tiny stack that fits on 8-bit micro controller. ZigBee nodes are used for tying an
entire network, control, for security home or factory together, convenience and safety.
For a huge number of controls and sensors nodes can be incorporated and for
automation applications this nodes are built into big infrastructures like home
automation, industrial automation, remote metering, medical equipment, automotives,
security systems, temperature control systems, patient monitoring, lighting and, asset
tracking systems.
Figure 2: The four basic frame types defined in 802.15.4: Data, ACK, MAC
command, and beacon
The data frame provides a payload of up to 104 bytes. The frame is numbered to ensure
that all packets are tracked. A frame-check sequence ensures that packets are received
without error. This frame structure improves reliability in difficult conditions.
Another important structure for 802.15.4 is the acknowledgment (ACK) frame. It
provides feedback from the receiver to the sender confirming that the packet was
received without error. The device takes advantage of specified "quiet time" between
frames to send a short packet immediately after the data-packet transmission.
A MAC command frame provides the mechanism for remote control and configuration of
client nodes. A centralized network manager uses MAC to configure individual clients'
command frames no matter how large the network.
Finally, the beacon frame wakes up client devices, which listen for their address and go
back to sleep if they don't receive it. Beacons are important for mesh and cluster-tree
networks to keep all the nodes synchronized without requiring those nodes to consume
precious battery energy by listening for long periods of time.
Channel access, addressing
Two channel-access mechanisms are implemented in 802.15.4. For a non"beacon
network, a standard ALOHA CSMA-CA (carrier-sense medium-access with collision
avoidance) communicates with positive acknowledgement for successfully received
packets. In a beacon-enabled network, a superframe structure is used to control channel
access. The superframe is set up by the network coordinator to transmit beacons at
predetermined intervals (multiples of 15.38ms, up to 252s) and provides 16 equal-width
time slots between beacons for contention-free channel access in each time slot. The
structure guarantees dedicated bandwidth and low latency. Channel access in each time
slot is contention-based. However, the network coordinator can dedicate up to seven
guaranteed time slots per beacon interval for quality of service.
Device addresses employ 64-bit IEEE and optional 16-bit short addressing. The address
field within the MAC can contain both source and destination address information
(needed for peer-to-peer operation). This dual address information is used in mesh
networks to prevent a single point of failure within the network.
Device types
ZigBee networks use three device types:
The network coordinator maintains overall network knowledge. It's the most
sophisticated of the three types and requires the most memory and computing power.
The full function device (FFD) supports all 802.15.4 functions and features specified by
the standard. It can function as a network coordinator. Additional memory and
computing power make it ideal for network router functions or it could be used in
network-edge devices (where the network touches the real world).
The reduced function device (RFD) carries limited (as specified by the standard)
functionality to lower cost and complexity. It's generally found in network-edge devices.
ZigBee networks can use beacon or non-beacon environments. Beacons are used to
synchronize the network devices, identify the HAN, and describe the structure of the
superframe. The beacon intervals are set by the network coordinator and vary from
15ms to over 4 minutes. Sixteen equal time slots are allocated between beacons for
message delivery. The channel access in each time slot is contention-based. However,
the network coordinator can dedicate up to seven guaranteed time slots for
noncontention based or low-latency delivery.
The non-beacon mode is a simple, traditional multiple-access system used in simple peer
and near-peer networks. It operates like a two-way radio network, where each client is
autonomous and can initiate a conversation at will, but could interfere with others
unintentionally. The recipient may not hear the call or the channel might already be in
use.
Beacon mode is a mechanism for controlling power consumption in extended networks
such as cluster tree or mesh. It enables all the clients to know when to communicate
with each other. Here, the two-way radio network has a central dispatcher that manages
the channel and arranges the calls. The primary value of beacon mode is that it reduces
the system's power consumption.
Non-beacon mode is typically used for security systems where client units, such as
intrusion sensors, motion detectors, and glass-break detectors, sleep 99.999% of the
time. Remote units wake up on a regular, yet random, basis to announce their continued
presence in the network. When an event occurs, the sensor wakes up instantly and
transmits the alert ("Somebody's on the front porch"). The network coordinator,
powered from the main source, has its receiver on all the time and can therefore wait to
hear from each of these stations. Since the network coordinator has an "infinite" source
of power it can allow clients to sleep for unlimited periods of time, enabling them to save
power.
Beacon mode is more suitable when the network coordinator is battery-operated. Client
units listen for the network coordinator's beacon (broadcast at intervals between 0.015
and 252s). A client registers with the coordinator and looks for any messages directed to
it. If no messages are pending, the client returns to sleep, awaking on a schedule
specified by the coordinator. Once the client communications are completed, the
coordinator itself returns to sleep.
This timing requirement may have an impact on the cost of the timing circuit in each end
device. Longer intervals of sleep mean that the timer must be more accurate or turn on
earlier to make sure that the beacon is heard, both of which will increase receiver power
consumption. Longer sleep intervals also mean the timer must improve the quality of the
timing oscillator circuit (which increases cost) or control the maximum period of time
between beacons to not exceed 252s, keeping oscillator circuit costs low.
Security
Security and data integrity are key benefits of the ZigBee technology. ZigBee leverages
the security model of the IEEE 802.15.4 MAC sublayer which specifies four security
services:
access control—the device maintains a list of trusted devices within the network
data encryption, which uses symmetric key 128-bit advanced encryption standard
frame integrity to protect data from being modified by parties without cryptographic
keys
sequential freshness to reject data frames that have been replayed—the network
controller compares the freshness value with the last known value from the device and
rejects it if the freshness value has not been updated to a new value
Network layer
The NWK layer associates or dissociates devices using the network coordinator,
implements security, and routes frames to their intended destination. In addition, the
NWK layer of the network coordinator is responsible for starting a new network and
assigning an address to newly associated devices.
The NWK layer supports multiple network topologies including star, cluster tree, and
mesh, all of which are shown in Figure 3.
The comparison between most common wireless technologies is listed in below table
according to its wireless standard, power consumption, data rate, range of covering and
memory requirement. The In the context of sensor network which require only small data rate
and low power consumption all the wireless protocol seems to be infeasible except Zigbee.
Zigbee is ideal for low power consumption and low data rate required network sensor
networks.
Zigbee network falls under the Wireless personal area networks (WPANs), which is used for
short distance communication and cover the distance up to 10 m in all direction of this
periphery. The focus of WPANs is low-cost, low power, short range and very small size
A wireless sensor network (WSN) is the collection of the autonomous sensors which are
spatially distributed for the purpose of monitoring physical or environmental condition, such
as temperature, sound, vibration, humidity, pressure, motion etc. Initially the wireless sensor
network was developed for the application of military such as battlefield surveillance to
increase the security and make reliable operation. The wired technology is so much
cumbersome in this task and not feasible as well. In present days WSN used in many
industrial and civilian application areas, including industrial process monitoring and control,
machine health monitoring, environment and habitat monitoring, healthcare applications,
home automation, and traffic control.
In the network there is one or more sensors node and in the node it is equipped with a
radio transceiver or other wireless communication device, a small microcontroller, and an
energy source usually a battery voltage since it requires a small amount of energy to operate.
As a radio transceiver for low data rate and low power consumption application zigbee
wireless protocol is used. And most of the sensor network they operate in low data rate and
try to consume minimum power so that a pair of battery operates a single year for reliability
of its application. Sensor nodes are in different size. The sizes vary from that of a shoebox
down to the size of a grain of dust. Size and cost constraints on sensor nodes result in
corresponding constraints on resources such as energy, memory, computational speed and
bandwidth.
A sensor network normally works a s wireless ad-hoc network that means each sensor
follow a multi-hop routing algorithm where node forwards relays data packets to a base
station.
Sensor node
Sensor nodes gather the information about its surrounding according to its particular
application. It processes the raw information and can communicate with other nodes in the
network. The typical block diagram of the sensor node is presented below.
Components
As in the block diagram the main components of the sensor nodes are listed below,
Microcontroller
Transceiver
External memory
Power Source
One or more sensors
Controller
As the name suggest controller is the controls the overall operation of the node. It includes
processing of data, controlling the functionality of other different component that is used in
the sensor node. There are various types of controller for this purpose but the most common
used controller is Microcontroller unit of different series. Other alternative controllers are
desktop microprocessor, digital signal processors ASICs, and FPGAs. A microcontroller
gain popularity in the embedded system sensor node due to its low cost, flexibility to connect
to other devices, ease of programming and low power consumption.
Other general purpose microprocessors are not considered for this purpose due to the
higher power consumption than microcontroller since wireless sensor network totally
based on the power saving mechanism. A general purpose microprocessor generally has
higher power consumption than a microcontroller; therefore it is often not considered a
suitable choice for a sensor node. In the broadband wireless communication system,
digital signal processor may be implemented but in the case of wireless sensor network
the communication process is so much simpler, easy process of modulation and the
signal processing tasks of actual sensing of data is less complicated. Therefore it is not
seen more advantages of DSP to the wireless sensor node. In the other hand FGPAs can
utilized for this processing by reprogramming and reconfiguring it according to our
need, but the time consumption and effort is more than requirement.
Transceiver
Sensor node often operates to the ISM band which is a free radio, spectrum allocation and
global availability However apart from radio frequency for transmission other media includes
optical communication (Laser) and Infrared. Now talking about these options laser is the
line-of-sight communication with the less energy requirement and it is more sensitive towards
the atmospheric environment. Though the infrared communication does not need any antenna
for communication like laser but it has limited broadcasting capacity. So that, the relevant fit
for WSN applications is Radio frequency based communication with more flexibility. WSN
generally tend to operate in license-free communication frequencies: 173, 433, 868, and 915
MHz; and 2.4 MHz. The device which contains both the function of transmitter and receiver
is known as the transceivers. Transceivers often lack unique identifiers. The different
operational stage of the transceivers is transmitting, receive, idle, and sleep.
The most of transceivers operating in idle mode consume same amount of power as in the
receive mode. Thus, for the power consumption process it is better to completely off the
transceiver, not allowing it to idle mode when it is not transmitting or receiving data.
Transceiver consumes more power when changing the state from sleep mode to transmit
mode in order to transmit the packet of data.
External memory
Generally there are two types of memory; User memory and Program memory. User
memory is used to store application related or personal data and program memory contain
space for programming the device and identification data of the device. Microcontroller
contain on chip memory itself. Flash memories are most relevant from the view of energy
perspective as well there cost is relatively low and storage capacity is high. Off-chip RAM is
used according to the application requirement. Memory requirement is totally application
dependent.
Power source
The power is required for sensor node for sensing, communicating and data processing.
Sensor node needs relatively low power so that Power requirement is fulfilled either the use
of batteries or capacitors. Batteries with rechargeable or non-rechargeable option are the main
source of power supply for sensor nodes. They are also classified according to
electrochemical material used for the electrodes such as NiCd (nickel-cadmium), NiZn
(nickel-zinc), NimHh (nickel-metal hydride), and lithium-ion. Current sensors are able to
renew their energy from solar sources, temperature differences, or vibration. Two power
saving policies used are Dynamic power management (DPM) and Dynamic voltage
Scaling.(DVS). DPM conserves power by shutting down parts of the sensor node which are
not currently used or active. A DVS scheme varies the power levels within the sensor node
depending on the non-deterministic workload. By varying the voltage along with the
frequency, it is possible to obtain quadratic reduction in power consumption.
Sensors
A sensor; is a physical which is used for measuring a physical condition which produce a
measurable response according to the change in physical condition like temperature , pressure
or humidity and converts it into a signal which can be read by an observer or by an
instrument. Sensors measure physical data of the parameter to be monitored.
The initially generated signal by the sensor is continual analog in signal the nature which
should be digitized by an Analog to Digital converter (ADC) for further processing by the
controller. For the proper design consideration in terms of size, power consumption and
speed and to increase intelligence in the system a sensor node should be small in size,
consume extremely low energy, operate in high volumetric densities, be autonomous and
operate unattended, and be adaptive to the environment. So that wireless sensor nodes are
typically very small electronic devices, they can only be equipped with a limited power
source of less than 0.5-2 ampere-hour and 1.2-3.7 volts.
The sensors are divided into further three categories they are listed below
Passive sensors
Omni-directional sensors
Passive narrow beam sensors
Passive sensors are self powered sensors which sense the data without actually manipulating
the environment by active probing. External power is needed only for the amplification of the
analog signal.
An active sensor requires continuous energy from the power source to operate and it actively
examines the environment, for example, a sonar or radar sensor.
Narrow-beam sensors have a well-defined notion of direction of measurement, similar to a
camera. Omni-directional sensors have no notion of direction involved in their
measurements.
For the theoretical work on the WSN network, passive and Omni-directional sensors are
used. For each sensors node certain area of coverage will be determined at which it can fully
monitor that area. The power is required during the different work on the sensor node; signal
sampling and conversion of physical signals to electrical ones, signal conditioning, and
analog-to-digital conversion.
It has been suggested that the name evokes the haphazard paths that bees follow as
they harvest pollen, similar to the way packets would move through a mesh network.
Using communication system, whereby the bee dances in a zig-zag pattern, the worker
also able to share information such as the location, distance, And direction of a newly
discovered food source to her fellow colony members. Instinctively implementing the ZigBee
Principle, bees around the world actively sustain productive itchiness and promote future
generations of Colony members. The various sensors fitted to the car engine.
ZIGBEE PRODUCTS
1) Development kits
2) sensors
3) Transceivers
4) modules
Wireless is inherently unreliable. Does this sound strange coming from a proponent of
zigbee? It’s true. There are so many factors that affect wireless; RF noise coming from
machinery, changes in the physical environment, even the vagaries of the atmosphere. In the
2.4 GHz spectrum, which is the ISM band used by Zigbee, there is even more interference.
Water, people, concrete, metal, foliage can all change the wireless characteristics, causing
packet delivery to fail. Now granted, zigbee, with its mesh networking and per hop and end to
end retries and acknowledgments, turns what is an essentially unreliable medium into a very
reliable network, but zigbee is not the only solution to network devices.
A wired network doesn’t have any of the above problems. But wires do have problems of
their own. Wires have connectors, and connectors get broken over time, especially if they are
plugged in frequently. The wires themselves get caught on things and get cut. A wireless
system can test and inspect the washing machines, dryers and refrigerators coming down the
line without any of the drawbacks of wires.
ADVANTAGES OF ZIGBEE .:
ZIGBEE SPECIFICATIONS:
To power consumption minimize and long battery life promote in battery powered
devices, most of their can spend time asleep end devices, only when need to communicate
they waking up and back to sleep then going immediately. ZigBee envisions that routers and
the coordinator will be mains powered and will not go to sleep.
ZIGBEE BENEFITS:
Characteristics that are highly beneficial and they are as follows:
Zigbee is highly reliable:
Wireless communication is inherently unreliable. Prove this to yourself by walking
around with your cell phones, then step into an elevator. Anyone who has used the cell
phonehas experienced dropped calls or poor reception. It’s all because radio waves are just
that: waves. They run into interference pattern, can be blocked by the metal, water or a lot of
concrete and vary depend on many complex factors including anteena design, power
amplification and even weather condition.
• Low Cost
The typical ZigBee radio is extremely cost-effective. This pricing to simplify the
devices for economic explanation and for extending wireless networking.
• Multi-Source Products
ZigBee provides customers in open standard, with the ability to choose among
vendors. In ZigBee Alliance working groups define that the interoperability profiles is to
which ZigBee certified devices must adhere, and with any other ZigBee certified radio
minding to the same profile the assured radio will interperate, promoting compatibility and
the associated competition that acquiesce the end users to selet the best device for each and
every network node, regardless of manufacturer.
Zigbee provides both encryption, which means that packets cannot be understand by
listening nodes that are not aware of the key, and authentication. Which means a malicious
node cannot inject false packets into the network and expect the zigbee nodes to do anything
with them other than throw them away? Zigbee has been very careful to ensure the security
solution.