You are on page 1of 8

Zig Bee

By B. Samirana Acharya & N.Vamshikrishna


Kamala institute of technology & science (Singapuram)
Huzurabad, Karimnagar (Dist), A.P
Mobile No: 9441847039 E-mail: Sameerana@rediffmail.com
INTRODUCTION
ZigBee

is

low-power

wireless

accounts for 80% of the cost of sensor

technology, rewriting the wireless sensor

installations.

equation.

network

applications for sensors where wiring

technology that rides on top of the

isn't practical or even possible. ZigBee

recently ratified IEEE 802.15.4 radio

promises to put wireless sensors in

standard. It is designed to interact with

everything from factory automation

the remote controlled devices, which are

systems to home security systems to

put under a single standardized control

consumer electronics.

It

is

secure

And

then

there

are

interface that can interconnect into a


network.

Once

associated

with

network, a ZigBee node can wake up

ORIGIN OF THE NAME


ZIGBEE

and communicate with other ZigBee

The network name comes from the

devices and return to sleep.

zigzagging path a bee (a data packet)


takes to get from flower to flower (or

Zigbees key technical features include


three license free frequency bands2.4GHz, 868MHz, 915MHz;multiple
channels; up to 100mts range; CSMACA channel access; low power, long
battery life; supporting up to 255devices
per network.

node to node). The technique that

Zigbee is used in home security systems

whereby the bee dances in a zigzag

where

pattern,

wireless

sensors

are

easily

honeybees

use

newfound

food

to

communicate

sources

to

other

members of the colony is referred to as


the ZigBee Principle. Using this silent,
but powerful communication system,
they

are

able

to

share

installed than sensors that need wiring.

information

The

distance, and direction of a newly

same

is

true

in

industrial

environments, where wiring typically

such

as

the

location,

discovered food source to her fellow

layers, physical (PHY) and media access

colony members.

(MAC), are defined by the IEEE 802.15.4


standard. The layers above them are
defined by the ZigBee Alliance.
The model has five layers namely
1. Physical (PHY) layer
2. Media access control (MAC) layer
3. Network (NWK) and security layers

CHARACTERISTICS
Low cost Extends wireless to
virtually any sensor

4. Application framework
5. Application profiles

Low power consumption Ideal for

Application Framework

battery operation

Small size, light weight Easy to


integrate

Ease of implementation

Reliable data transfer

Appropriate levels of security

Direct sequence spread spectrum

Security
Service
Provider

AP
SS
ESA
P

NL
SE
SA
P

Application
Object 1

[On Endpoint 240]

[On Endpoint 1]

[On Endpoint 0]

APSDE-SAP

APSDE-SAP

APSDE-SAP

Application Support (APS) Layer


NLDE-SAP

MLME-SAP

Medium Access Layer (MAC) Layer


PD-SAP

PLME-SAP

Physical (PHY) Layer


Figure: ZigBee Stack Model

Range- 50m typical (5-500m based on


PHYSICAL LAYER:

Multiple topologies- star, peer-to-peer,

ZigBee-compliant products operate

mesh

in

Data rates of 250 kbps (@2.4 GHz), 40

including 2.4GHz (global), 902 to

kbps (@ 915 MHz), and 20 kbps

928MHz

(@868 MHz)

(Europe). Raw data throughput rates of

ARCHITECHTURE

unlicensed

bands

(Americas),

worldwide,

and

868MHz

250Kbps can be achieved at 2.4GHz (16


channels), 40Kbps at 915MHz (10

ZigBee stack architecture follows the

channels), and 20Kbps at 868MHz (1

standard Open Systems Interconnection

channel). The transmission distance is

(OSI) reference model; ZigBee's protocol

expected to range from 10 to 75m,

stack is structured in layers. The first two

depending

on

power

output

AP
S
M
ESA
P
NL
M
ESA
P

Network (NWK) Layer


MCPS-SAP

environment)

ZigBee Device
Object (ZDO)

Application
Object 240

Fast acquisition time

ZP
UI

and

environmental characteristics. Like Wi-

MAC was designed to handle large

Fi, Zigbee uses direct-sequence spread

numbers of devices without requiring them

spectrum in the 2.4GHz band, with

to be "parked".

offset-quardrature

phase-shift

keying
The MAC provides network association

modulation. Channel width is 2MHz

and

with 5MHzchannel spacing. The 868

disassociation,

has

an

optional

superframe structure with beacons for time

and 900MHz bands also use direct-

synchronization, and a guaranteed time-

sequence spread spectrum but with

slot

binary-phase-shift keying modulation

mechanism

for

high-priority

communications
Table: Frequency bands and data rates
Frame structure:
Spreading
PHY

868 to
915
MHz

Frequency
Band

Channel
Numberin
g

868 to 870
MHz
902 to 928
MHz

1 to 10

Data Parameters

Parameters
Chip
Rate

Mod
ulatio
n

Bit
Rate

Sym

Mod

bol

ulatio

Rate

300 k

BPS

20

20 k

BPS

chip/s

kb/s

baud

600 k

BPS

40

40 k

BPS

chip/s

kb/s

baud

Figure illustrates the four basic frame


types defined in 802.15.4: data, ACK,
MAC command, and beacon.

162.4
GHz

2.4 to
2.4835

11 to 26

GHz

2.0 M
chip/s

OQPS
K

250
kb/s

62.5

ary

Orth

baud

ogon
al

MEDIA ACCESS CONTROL


LAYER
The media access control (MAC)

Figure::
Figure:: The four basic frame types

layer was designed to allow multiple

defined in 802.15.4: Data, ACK, MAC

topologies without

command, and beacon

power

management

complexity. The
operation

doesn't

require multiple modes of operation. The


MAC allows a reduced functionality

The data frame provides a payload of up

device (RFD) that needn't have flash nor

to 104 bytes. The frame is numbered to

large amounts of ROM or RAM. The

ensure that all packets are tracked. A

ZigBee's self-forming and self-healing

frame-check sequence ensures that packets

mesh-network architecture lets data and

are received without error. This frame

control messages pass from one node to

structure improves reliability in difficult

another by multiple paths. This feature

conditions.

extends the network range and improves


data reliability. It may also be used to build

Another important structure for 802.15.4 is


the acknowledgment (ACK) frame.
frame. It
provides feedback from the receiver to the

large, geographically dispersed networks


with smaller networks linked to form a
'cluster-tree' network.

sender confirming that the packet was


received without error. The device takes
advantage

of

specified

"quiet

time"

Mesh

Star

between frames to send a short packet


immediately

after

the

data-packet

PAN coordinator
Full Function Device

Cluster Tree

Reduced Function Device

transmission.
A MAC command frame provides the

The NWK layer supports multiple network

mechanism

topologies including star, cluster tree, and

for

remote

control

and

configuration of client nodes. A centralized

mesh, all of which are shown in Figure

network manager uses MAC to configure


individual clients' command frames no

In a star topology, one of the FFD-type

matter how large the network.

devices assumes the role of network


coordinator

and

is

responsible

for

Finally, the beacon frame wakes up client

initiating and maintaining the devices on

devices, which listen for their address and

the network. All other devices, known as

go back to sleep if they don't receive it.

end devices, directly communicate with

Beacons are important for mesh and

the coordinator. In a mesh topology, the

cluster-tree networks to keep all the nodes

ZigBee coordinator is responsible for

synchronized

those

starting the network and for choosing key

nodes to consume precious battery energy

network parameters, but the network may

by listening for long periods of time.

be extended through the use of ZigBee

without

requiring

routers. The routing algorithm uses a


request-response protocol to eliminate subNETWORK LAYER

optimal routing. Ultimate network size can

reach 264 nodes (more than we'll probably


need). Using local addressing, you can
configure simple networks of more than
65,000 (216) nodes, thereby reducing
address overhead
Security layer
Security and data integrity are key benefits
of

the

ZigBee

technology.

ZigBee

leverages the security model of the IEEE


802.15.4 MAC sub-layer which specifies
four security services: access controlthe

APPLICATIONS

device maintains a list of trusted devices

Potential applications of zigbee include the

within the network

building automation, industrial, medical

Data

encryption,

symmetric

key

which

128-bit

uses

advanced

encryption standard

and residential control & monitoring


A new twist on, "I've fallen and I
can't get up

Frame integrity to protect data from


being modified by parties without
cryptographic keys

The figure basically shows a homemonitoring system for senior citizens.


Zigbee-based sensors keep an eye on
elderly residents living alone and warn
medics about changes in habits that are

Sequential freshness to reject data

potentially serious; It

includes a light

frames that have been replayedthe

switch with a tiny digital

camera (left); a

network

pendant (center) worn

controller

compares

the

around the neck;

freshness value with the last known

and movement tags (right), which can let

value from the device and rejects it if

the system generate an alert based either

the freshness value has not been

on detected movement or the lack of any

updated to a new value

movement.

COMPARISION BETWEEN
THE WIRELESS STANDARDS

This wireless approach beats the


technique now used on several levels.
Existing methods force exterminators to
Zigbee doesn't have the bandwidth to
handle video. So light switch / camera
combos deliver still images to a controller.
An alert from the pendant or from one of
the tags activates the camera.

physically check each station for activity.


Termites could cause severe damage long
before evidence of them could turn up
during a periodic inspection. In contrast,
the Zigbee bait stations monitor pest
activity 24/7. And exterminators need not

The pendant includes accelerometers that

make long trips just to examine bait

detect the forces of a person falling. It also

stations

contains a panic button. The device can


send a warning either to a monitoring
company or family member if something
is up. It can be programmed to generate an
alert, for example, if a bedroom or
refrigerator door hasn't opened by noon.
The bugs this system catches aren't in
software
One of the more offbeat
applications for Zigbee sensors is in
catching termites. Wireless bait stations
are devised which act as Zigbee nodes.
Two key components of the
In operation, the bait stations go
into the

ground at numerous

system are a base station and a Home

spots

Key. The Key is envisioned to go into

surrounding a house. Each bait station has

your pocket or onto a key chain.

a special sensor that triggers when termites

When the Key leaves the range of the

eat at the wood it contains. The station

base station, it carries with it the last

then signals this activity to a receiver,

status

which sends an e-mail.

windows, and lights, as read by

of items

such as

doors,

sensors on the Zigbee network.

Homeowners wondering whether they


left the garage door open could
conceivably tell by looking at the
LCD in their Home Key. (However,
the system stops short of asking a
sympathetic neighbor to come over
and rectify the problem.)
The base station is smart enough to

Zigbeef is a solution for tracking

notice if one of the sensors changes

cattle. Zigbee sensors give beef producers

state when the Home Key is out of

the ability to electronically identify cattle

range. In this case it can send the

whether their herds are crowded into

homeowner's

chutes, gathered into pens, or grazing open

cell

phone

text

message detailing what's wrong.

pasture. ZigBeef radio-based cattle ear


tags offer superior reading-range over

A variety of sensors have been devised for

passive

the system. In addition to proximity

Producers

switches for doors and windows, there are

infrequent

devices designed to detect leaking pipes,

IDs. ZigBeef allows identification of each

ac loads, and even remind homeowners

animal on the range, pen, or working

about periodic maintenance items such as

chute, at virtually any time. ZigBeef tags

low batteries in smoke detectors or the

use

need for seasonal gutter cleaning. One

wireless sensor technologies, offering a

worthy piece of the system is a water shut-

proven solution at an inexpensive price.

off valve.

[refer the greeting preview for the figure].

wand-based
are

no

tag

longer limited

opportunities

mass-produced,

CONCLUSION

technology.
to

to
scan

non-proprietary

There are many wireless monitoring and

1. Electronics for you- November 2004

control applications for industrial and

2. Computer networks-by Tanenbaum

home markets which require longer battery

3. www.zigbeealliance.com

life, lower data rates and less complexity

4. www.zigbee.org

than available from existing wireless

5. www.zigbeef.com

standards like Bluetooth and Wi-Fi. So,

6. www.nuri.com

there was a need for a standard based,


interoperable wireless technology that
addresses the unique needs of low data rate
wireless

control

and

sensor

based

networks. In this regard, zigbee was poised


to

become

the

global

control/sensor

network standard.
Zigbee promises to put wireless sensors in
everything

from

factory

automation

systems to home security systems to


consumer electronics. Zigbee is a new
standard that still needs to pass through the
circles or rigorous technology critics and
establish its own place in the industry. The
next zigbee challenge will be devising the
proposed

extension

to

the

802.15.4

standard,4a which could be based on


ultra-wideband (UWB).

REFERENCES

You might also like