Sie sind auf Seite 1von 9

ZigBee

This article is about a wireless protocol. For the fictional creation, the control of its parameters and basic main-
character, see Zigby. tenance. Within star networks, the coordinator must be
the central node. Both trees and meshes allow the use of
ZigBee is an IEEE 802.15.4-based specification for a ZigBee routers to extend communication at the network
level.
suite of high-level communication protocols used to cre-
ate personal area networks with small, low-power digital ZigBee builds on the physical layer and media access
radios. control defined in IEEE standard 802.15.4 for low-rate
The technology defined by the ZigBee specification is WPANs. The specification includes four additional key
intended to be simpler and less expensive than other components: network layer, application layer, ZigBee de-
wireless personal area networks (WPANs), such as vice objects (ZDOs) and manufacturer-defined applica-
Bluetooth or Wi-Fi. Applications include wireless light tion objects which allow for customization and favor total
switches, electrical meters with in-home-displays, traf- integration. ZDOs are responsible for some tasks, includ-
fic management systems, and other consumer and indus- ing keeping track of device roles, managing requests to
trial equipment that requires short-range low-rate wire- join a network, as well as device discovery and security.
less data transfer. ZigBee is one of the global standards of communication
protocol formulated by the significant task force under
Its low power consumption limits transmission distances
to 10–100 meters line-of-sight, depending on power out- the IEEE 802.15 working group. The fourth in the se-
ries, WPAN Low Rate/ZigBee is the newest and provides
put and environmental characteristics.[1] ZigBee devices
can transmit data over long distances by passing data specifications for devices that have low data rates, con-
sume very low power and are thus characterized by long
through a mesh network of intermediate devices to reach
more distant ones. ZigBee is typically used in low data battery life. Other standards like Bluetooth and IrDA ad-
rate applications that require long battery life and se- dress high data rate applications such as voice, video and
cure networking (ZigBee networks are secured by 128 bit LAN communications.
symmetric encryption keys.) ZigBee has a defined rate of
250 kbit/s, best suited for intermittent data transmissions
from a sensor or input device.
ZigBee was conceived in 1998, standardized in 2003, and
revised in 2006. The name refers to the waggle dance of
2 History
honey bees after their return to the beehive.[2]
ZigBee-style self-organizing ad-hoc digital radio net-
works were conceived in the 1990s. The IEEE 802.15.4-
1 Overview 2003 ZigBee specification was ratified on December 14,
2004.[3] The ZigBee Alliance announced availability of
ZigBee is a low-cost, low-power, wireless mesh network Specification 1.0 on June 13, 2005, known as the ZigBee
standard targeted at the wide development of long bat- 2004 Specification.
tery life devices in wireless control and monitoring appli-
cations. Zigbee devices have low latency, which further
reduces average current. ZigBee chips are typically in-
tegrated with radios and with microcontrollers that have
between 60-256 KB of flash memory. ZigBee operates in 2.1 Cluster Library
the industrial, scientific and medical (ISM) radio bands:
2.4 GHz in most jurisdictions worldwide; 784 MHz in In September 2006, the ZigBee 2006 Specification was
China, 868 MHz in Europe and 915 MHz in the USA announced, obsoleting the 2004 stack[4] (2006 mainly re-
and Australia. Data rates vary from 20 kbit/s (868 MHz places the Message/Key Value Pair structure used in 2004
band) to 250 kbit/s (2.4 GHz band). with a “cluster library”).
The ZigBee network layer natively supports both star and The library is a set of standardised commands, organised
tree networks, and generic mesh networking. Every net- under groups known as clusters with names such as Smart
work must have one coordinator device, tasked with its Energy, Home Automation, ZigBee Light Link.[5]

1
2 4 STANDARD AND PROFILES

2.2 ZigBee PRO 4.1 License

ZigBee PRO, also known as Zigbee 2007, the enhanced For non-commercial purposes, the ZigBee specification
ZigBee Pro Specification, was posted on 31 October 2007, is available free to the general public.[12] An entry level
and was finalized that same year. ZigBee PRO is fully membership in the ZigBee Alliance, called Adopter, pro-
backward-compatible with ZigBee 2006 devices. A Zig- vides access to the as-yet unpublished specifications and
Bee 2007 device may join and operate on a ZigBee 2006 permission to create products for market using the spec-
network and vice versa. Due to differences in routing ifications.
options, ZigBee PRO devices must become non-routing The requirements for membership in the ZigBee Alliance
ZigBee End-Devices (ZEDs) on a ZigBee 2006 network, cause problems for Free Software developers because the
and ZigBee 2006 devices must become ZEDs on a Zig- annual fee conflicts with the GNU General Public Li-
Bee PRO network. The applications running on those cence.[13] The requirement for the developer to join the
devices work the same, regardless of the stack profile be- ZigBee Alliance similarly conflicts with most other free
neath them. The first ZigBee Application Profile, Home software licenses.[14]
Automation, was announced November 2, 2007.
The ZigBee Alliance board has been asked to make their
license compatible with GPL, but refused. The refusal
came, even though Bluetooth had already changed their
3 Use cases license to make it consistent with GPL.

ZigBee protocols are intended for embedded applications


requiring low power consumption and tolerating low data
4.2 Application profiles
rates. The resulting network will use very small amounts
The current list of application profiles either published, or
of power — individual devices must have a battery life of
[6] in development are:
at least two years to pass ZigBee certification.
Typical application areas include:[7]
4.2.1 Released specifications

• Home Entertainment and Control — Home automa- • ZigBee Home Automation 1.2
tion such as in QIVICON,[8] smart lighting,[9] ad-
vanced temperature control, safety and security, • Smart Energies 1.1b
movies and music
• Telecommunication Services 1.0
• Wireless sensor networks — Starting with individual • Health Care 1.0
sensors like Telosb/Tmote and Iris from Memsic
• RF4CE – Remote Control 1.0
• Industrial control
• RF4CE – Input Device 1.0
• Embedded sensing • Remote Control 2.0

• Medical data collection • Light Link 1.0

• IP 1.0
• Smoke and intruder warning
• Building Automation 1.0
• Building automation
• Gateway 1.0

• Green Power 1.0 (Optional battery-less remote con-


4 Standard and profiles trol feature of ZigBee 2012)

• Retail Services
The ZigBee Alliance is a group of companies that main-
tain and publish the ZigBee standard.[10] The term Zig-
Bee is a registered trademark of this group, not a single 4.2.2 Specifications under development
technical standard. The Alliance publishes application
profiles that allow multiple OEM vendors to create in- • ZigBee Smart Energy 2.0
teroperable products. The relationship between IEEE • Smart Energy 1.2/1.3
802.15.4 and ZigBee[11] is similar to that between IEEE
802.11 and the Wi-Fi Alliance. • Light Link 1.1
3

• Home Automation 1.3 requirements of the physical layer. All radios derived
from the same validated semiconductor mask set would
The ZigBee Smart Energy V2.0 specifications define enjoy the same RF characteristics. An uncertified physi-
an Internet protocol to monitor, control, inform and au- cal layer that malfunctions could cripple the battery lifes-
tomate the delivery and use of energy and water. It is pan of other devices on a ZigBee network. ZigBee ra-
an enhancement of the ZigBee Smart Energy version 1 dios have very tight constraints on power and bandwidth.
specifications.[15] It adds services for plug-in electric ve- Thus, radios are tested with guidance given by Clause 6 of
hicle charging, installation, configuration and firmware the 802.15.4−2006 Standard. Most vendors plan to inte-
download, prepay services, user information and messag- grate the radio and microcontroller onto a single chip[21]
ing, load control, demand response and common infor- getting smaller devices.[22]
mation and application profile interfaces for wired and This standard specifies operation in the unlicensed 2.4
wireless networks. It is being developed by partners in- GHz (worldwide), 915 MHz (Americas and Australia)
cluding: and 868 MHz (Europe) ISM bands. Sixteen channels are
allocated in the 2.4 GHz band, with each channel spaced
• HomeGrid Forum responsible for marketing and 5 MHz apart, though using only 2 MHz of bandwidth.
certifying ITU-T G.hn technology and products The radios use direct-sequence spread spectrum coding,
which is managed by the digital stream into the modula-
• HomePlug Powerline Alliance tor. Binary phase-shift keying (BPSK) is used in the 868
• International Society of Automotive Engineers SAE and 915 MHz bands, and offset quadrature phase-shift
International keying (OQPSK) that transmits four bits per symbol is
used in the 2.4 GHz band.
• IPSO Alliance
The raw, over-the-air data rate is 250 kbit/s per channel
• SunSpec Alliance in the 2.4 GHz band, 40 kbit/s per channel in the 915
MHz band, and 20 kbit/s in the 868 MHz band. The
• Wi-Fi Alliance. actual data throughput will be less than the maximum
specified bit rate due to the packet overhead and process-
ZigBee Smart Energy relies on ZigBee IP, a network layer ing delays. For indoor applications at 2.4 GHz trans-
that routes standard IPv6 traffic over IEEE 802.15.4 using mission distance may be 10–20 m, depending on the
6LoWPAN header compression.[16][17] construction materials, the number of walls to be pen-
In 2009, the RF4CE (Radio Frequency for Consumer etrated and the output power permitted in that geograph-
[23]
Electronics) Consortium and ZigBee Alliance agreed to ical location. Outdoors with line-of-sight, range may
deliver jointly a standard for radio frequency remote con- be up to 1500 m depending on power output and environ-
[1]
trols. ZigBee RF4CE is designed for a broad range of mental characteristics . The output power of the radios
consumer electronics products, such as TVs and set-top is generally 0-20 dBm (1-100 mW).
boxes. It promised many advantages over existing re-
mote control solutions, including richer communication
and increased reliability, enhanced features and flexibil- 6 Example commercial SOCs
ity, interoperability, and no line-of-sight barrier.[18] The
ZigBee RF4CE specification lifts off some networking
weight and does not support all the mesh features, which 7 Device types and operating
is traded for smaller memory configurations for lower cost modes
devices, such as remote control of consumer electronics.
With the introduction of the second ZigBee RF4CE ZigBee devices are of three kinds:
application profile in 2012 and increased momentum
in MSO market, the ZigBee RF4CE team provides an • ZigBee Coordinator (ZC): The most capable device,
overview on current status of the standard, applications, the Coordinator forms the root of the network tree
and future of the technology.[19][20] and might bridge to other networks. There is pre-
cisely one ZigBee Coordinator in each network since
it is the device that started the network originally
5 Radio hardware (the ZigBee LightLink specification also allows op-
eration without a ZigBee Coordinator, making it
The radio design used by ZigBee has been carefully op- more usable for over-the-shelf home products). It
timized for low cost in large scale production. It has few stores information about the network, including act-
analog stages and uses digital circuits wherever possible. ing as the Trust Center & repository for security
keys.[33][34]
Though the radios themselves are inexpensive, the Zig-
Bee Qualification Process involves a full validation of the • ZigBee Router (ZR): As well as running an applica-
4 8 SOFTWARE

tion function, a Router can act as an intermediate talk in the same way that humans converse; they briefly
router, passing on data from other devices. check to see that no one is talking before he or she start,
with three notable exceptions. Beacons are sent on a
• ZigBee End Device (ZED): Contains just enough fixed timing schedule and do not use CSMA. Message ac-
functionality to talk to the parent node (either the knowledgments also do not use CSMA. Finally, devices
Coordinator or a Router); it cannot relay data from in beacon-enabled networks that have low latency real-
other devices. This relationship allows the node to time requirements may also use Guaranteed Time Slots
be asleep a significant amount of the time thereby (GTS), which by definition do not use CSMA.
giving long battery life. A ZED requires the least
amount of memory, and, therefore, can be less ex-
pensive to manufacture than a ZR or ZC.
8 Software
The current ZigBee protocols support beacon and non-
The software is designed to be easy to develop on small,
beacon enabled networks. In non-beacon-enabled net-
inexpensive microprocessors. For more detail, please use
works, an unspotted CSMA/CA channel access mecha-
one or more of the sources listed in the References section
nism is used. In this type of network, ZigBee Routers
below, or go directly to the ZigBee Alliance web site using
typically have their receivers continuously active, requir-
the External links provided below.
ing a more robust power supply. However, this allows for
heterogeneous networks in which some devices receive
continuously while others only transmit when an external 8.1 Network layer
stimulus is detected. The typical example of a hetero-
geneous network is a wireless light switch: The ZigBee
The main functions of the network layer are to enable the
node at the lamp may constantly receive, since it is con-
correct use of the MAC sublayer and provide a suitable
nected to the mains supply, while a battery-powered light
interface for use by the next upper layer, namely the appli-
switch would remain asleep until the switch is thrown.
cation layer. Its capabilities and structure are those typi-
The switch then wakes up, sends a command to the lamp,
cally associated to such network layers, including routing.
receives an acknowledgment, and returns to sleep. In
such a network the lamp node will be at least a ZigBee On the one hand, the data entity creates and manages net-
Router, if not the ZigBee Coordinator; the switch node is work layer data units from the payload of the application-
typically a ZigBee End Device. layer and performs routing according to the current topol-
ogy. On the other hand, there is the layer control, which is
In beacon-enabled networks, the special network nodes
used to handle configuration of new devices and establish
called ZigBee Routers transmit periodic beacons to con-
new networks: it can determine whether a neighboring
firm their presence to other network nodes. Nodes may
device belongs to the network and discovers new neigh-
sleep between beacons, thus lowering their duty cycle and
bors and routers. The control can also detect the pres-
extending their battery life. Beacon intervals depend on
ence of a receiver, which allows direct communication
data rate; they may range from 15.36 milliseconds to
and MAC synchronization.
251.65824 seconds at 250 kbit/s, from 24 milliseconds
to 393.216 seconds at 40 kbit/s and from 48 milliseconds The routing protocol used by the network layer is AODV.
to 786.432 seconds at 20 kbit/s. However, low duty cy- To find the destination device, it broadcasts out a route
cle operation with long beacon intervals requires precise request to all of its neighbors. The neighbors then broad-
timing, which can conflict with the need for low product cast the request to their neighbors and onward until the
cost. destination is reached. Once the destination is reached,
it sends its route reply via unicast transmission following
In general, the ZigBee protocols minimize the time the
the lowest cost path back to the source. Once the source
radio is on, so as to reduce power use. In beaconing net-
receives the reply, it will update its routing table for the
works, nodes only need to be active while a beacon is be-
destination address of the next hop in the path and the
ing transmitted. In non-beacon-enabled networks, power
path cost.
consumption is decidedly asymmetrical: Some devices
are always active while others spend most of their time
sleeping. 8.2 Application layer
Except for the Smart Energy Profile 2.0, ZigBee devices
are required to conform to the IEEE 802.15.4−2003 The application layer is the highest-level layer defined by
Low-Rate Wireless Personal Area Network (LR-WPAN) the specification and is the effective interface of the Zig-
standard. The standard specifies the lower protocol lay- Bee system to its end users. It comprises the majority
ers—the physical layer (PHY), and the Media Access of components added by the ZigBee specification: both
Control portion of the data link layer (DLL). The ba- ZDO and its management procedures, together with ap-
sic channel access mode is “carrier sense, multiple ac- plication objects defined by the manufacturer, are con-
cess/collision avoidance” (CSMA/CA). That is, the nodes sidered part of this layer.
8.5 Communication and device discovery 5

8.3 Main components

The ZDO (ZigBee Device Object), a protocol in the Zig-


Bee protocol stack, is responsible for overall device man-
agement, security keys, and policies. It is responsible for
defining the role of a device as either coordinator or end
device, as mentioned above, but also for the discovery
of new (one-hop) devices on the network and the iden-
tification of their offered services. It may then go on to
establish secure links with external devices and reply to
binding requests accordingly.
The application support sublayer (APS) is the other main
standard component of the layer, and as such it offers a
well-defined interface and control services. It works as a
bridge between the network layer and the other elements
of the application layer: it keeps up-to-date binding tables
in the form of a database, which can be used to find appro-
priate devices depending on the services that are needed
and those the different devices offer. As the union be-
tween both specified layers, it also routes messages across
the layers of the protocol stack.

8.4 Communication models

An application may consist of communicating objects


which cooperate to carry out the desired tasks. The fo-
cus of ZigBee is to distribute work among many differ-
ent devices which reside within individual ZigBee nodes
which in turn form a network (said work will typically be
largely local to each device, for instance, the control of
each household appliance). ZigBee, high-level communication model
The collection of objects that form the network commu-
nicates using the facilities provided by APS, supervised
Addressing is also part of the application layer. A net-
by ZDO interfaces. The application layer data service fol-
work node consists of an 802.15.4-conformant radio
lows a typical request-confirm/indication-response struc-
transceiver and one or more device descriptions (basically
ture. Within a single device, up to 240 application objects
collections of attributes which can be polled or set, or
can exist, numbered in the range 1-240. 0 is reserved for
which can be monitored through events). The transceiver
the ZDO data interface and 255 for broadcast; the 241-
is the base for addressing, and devices within a node are
254 range is not currently in use but may be in the future.
specified by an endpoint identifier in the range 1-240.
Two services are available for application objects to use
(in ZigBee 1.0):
8.5 Communication and device discovery
• The key-value pair service (KVP) is meant for con-
figuration purposes. It enables description, request For applications to communicate, their comprising de-
and modification of object attribute through a sim- vices must use a common application protocol (types of
ple interface based on getting/set and event primi- messages, formats and so on); these sets of conventions
tives, some allowing a request for a response. Con- are grouped in profiles. Furthermore, binding is decided
figuration uses compressed XML (full XML can be upon by matching input and output cluster identifiers,
used) to provide an adaptable and elegant solution. unique within the context of a given profile and associ-
ated to an incoming or outgoing data flow in a device.
• The message service is designed to offer a general Binding tables contain source and destination pairs.
approach to information treatment, avoiding the ne- Depending on the available information, device discov-
cessity to adapt application protocols and potential ery may follow different methods. When the network
overhead incurred on by KVP. It allows arbitrary address is known, the IEEE address can be requested us-
payloads to be transmitted over APS frames. ing unicast communication. When it is not, petitions are
6 9 SECURITY SERVICES

broadcast (the IEEE address being part of the response such their protection is of paramount importance, and
payload). End devices will simply respond with the re- keys are never supposed to be transported through an in-
quested address while a network coordinator or a router secure channel. A momentary exception to this rule oc-
will also send the addresses of all the devices associated curs during the initial phase of the addition to the net-
with it. work of a previously unconfigured device. The ZigBee
This extended discovery protocol permits external de- network model must take particular care of security con-
vices to find out about devices in a network and the ser- siderations, as ad hoc networks may be physically acces-
vices that they offer, which endpoints can report when sible to external devices. Also the state of the working
environment cannot be predicted.
queried by the discovering device (which has previously
obtained their addresses). Matching services can also be Within the protocol stack, different network layers are
used. not cryptographically separated, so access policies are
The use of cluster identifiers enforces the binding of com- needed, and conventional design assumed. The open trust
plementary entities using the binding tables, which are model within a device allows for key sharing, which no-
maintained by ZigBee coordinators, as the table must al- tably decreases potential cost. Nevertheless, the layer
ways be available within a network and coordinators are which creates a frame is responsible for its security. If
most likely to have a permanent power supply. Backups, malicious devices may exist, every network layer payload
managed by higher-level layers, may be needed by some must be ciphered, so unauthorized traffic can be imme-
applications. Binding requires an established communi- diately cut off. The exception, again, is the transmission
cation link; after it exists, whether to add a new node to of the network key, which confers a unified security layer
the network is decided, according to the application and to the grid, to a new connecting device.
security policies.
Communication can happen right after the association. 9.2 Security architecture
Direct addressing uses both radio address and endpoint
identifier, whereas indirect addressing uses every rele- ZigBee uses 128-bit keys to implementing its security
vant field (address, endpoint, cluster, and attribute) and mechanisms. A key can be associated either to a net-
requires that they are sent to the network coordinator, work, being usable by both ZigBee layers and the MAC
which maintains associations and translates requests for sublayer, or to a link, acquired through pre-installation,
communication. Indirect addressing is particularly use- agreement or transport. Establishment of link keys is
ful to keep some devices very simple and minimize their based on a master key which controls link key correspon-
need for storage. Besides these two methods, broadcast dence. Ultimately, at least, the initial master key must
to all endpoints in a device is available, and group ad- be obtained through a secure medium (transport or pre-
dressing is used to communicate with groups of endpoints installation), as the security of the whole network depends
belonging to a set of devices. on it. Link and master keys are only visible to the ap-
plication layer. Different services use different one-way
variations of the link key to avoid leaks and security risks.
9 Security services Key distribution is one of the most important security
functions of the network. A secure network will designate
one special device which other devices trust for the distri-
As one of its defining features, ZigBee provides facilities
bution of security keys: the trust center. Ideally, devices
for carrying out secure communications, protecting es-
will have the center trust address and initial master key
tablishment and transport of cryptographic keys, cypher-
preloaded; if a momentary vulnerability is allowed, it will
ing frames, and controlling devices. It builds on the basic
be sent as described above. Typical applications without
security framework defined in IEEE 802.15.4. This part
special security needs will use a network key provided by
of the architecture relies on the correct management of
the trust center (through the initially insecure channel) to
symmetric keys and the correct implementation of meth-
communicate.
ods and security policies.
Thus, the trust center maintains both the network key and
provides point-to-point security. Devices will only accept
9.1 Basic security model communications originating from a key supplied by the
trust center, except for the initial master key. The security
The basic mechanism to ensure confidentiality is the ad- architecture is distributed among the network layers as
equate protection of all keying material. Trust must be follows:
assumed in the initial installation of the keys, as well as
in the processing of security information. For an imple- • The MAC sublayer is capable of single-hop reliable
mentation to globally work, its general conformance to communications. As a rule, the security level it is to
specified behaviors is assumed. use is specified by the upper layers.
Keys are the cornerstone of the security architecture; as • The network layer manages routing, processing re-
7

ceived messages and being capable of broadcasting [2] “ZigBee Wireless Networking”, Drew Gislason (via EE-
requests. Outgoing frames will use the adequate link Times)
key according to the routing if it is available; oth-
[3] ZigBee Document 053474r06, Version 1.0, ZigBee Speci-
erwise, the network key will be used to protect the fication. ZigBee Alliance. 2004.
payload from external devices.
[4] “IEEE 802.15.4”. Ieee 802. Retrieved 2012-10-18.
• The application layer offers key establishment and
transport services to both ZDO and applications. [5] User manual (PDF), NXP.

[6] Archived December 13, 2006, at the Wayback Machine.


The security levels infrastructure is based on CCM*,
which adds encryption- and integrity-only features to [7] “What’s so good about ZigBee networks?" (PDF).
Daintree Networks. Retrieved 2007-01-19.
CCM.
According to a German computer magazine website, [8] Kai Kreuzer et al. “Developing Applications for Your
Zigbee Home Automation 1.2 is using fallback keys Smart Home with QIVICON.” osgi.org. Retrieved 2014-
05-08.
for encryption negotiation which are known and can-
not be changed. This makes the encryption highly [9] Bellido-Outeirino, Francisco J. (February 2012).
vulnerable.[35] “Building lighting automation through the integra-
tion of DALI with wireless sensor networks”. IEEE
Transactions on Consumer Electronics 58 (1): 47–52.
doi:10.1109/TCE.2012.6170054.
10 Simulation of ZigBee networks
[10] “The ZigBee Alliance”. Zigbee. Retrieved 2012-10-18.
Network simulators, like NS2, OPNET, and NetSim can [11] “Wireless Sensor Networks Research Group”. Sensor net-
be used to simulate IEEE 802.15.4 ZigBee networks. works. 2008-11-17. Retrieved 2012-10-18.
These simulators come with open source C or C++ li-
[12] “ZigBee Cluster Library Specification Download Re-
braries for users to modify. This way users can deter- quest”. Zigbee. Retrieved 2010-04-10.
mine the validity of new algorithms before hardware im-
plementation. [13] “Innovation”, FAQ for BEN WPAN, Qi hardware, ZigBee
is only royalty-free if not used for commercial purposes...

[14] “Zigbee, Linux, and the GPL”. Freak labs. Retrieved


11 See also 2009-06-14.

[15] “ZigBee Smart Energy Overview”. ZigBee.org. Retrieved


• Bluetooth 2012-10-18.
• HaLow [16] “ZigBee IP and 920IP”. ZigBee Alliance. Retrieved
2016-06-04.
• DASH7
[17] “ZigBee IP: Smart Grid, Meet the Internet of Things”.
• 6LoWPAN GreenTech Advocates. Retrieved 2016-06-04.

• INSTEON – dual-mesh (RF and Powerline) tech- [18] “Introducing ZigBee RF4CE” (PDF). Daintree Networks.
nology from INSTEON Retrieved 2009-05-04.

• Z-Wave – RF mesh technology [19] “ZigBee RF4CE: A Quiet Revolution is Underway (De-
cember, 2012)" (PDF). ZigBee Alliance. Retrieved 2012-
• EnOcean 12-06.

• LoRaWAN [20] “ZigBee RF4CE Webinar: A Quiet Revolution is Un-


derway (December, 2012)". ZigBee Alliance. Retrieved
• Comparison of 802.15.4 radio modules 2012-12-06.

• Comparison of wireless data standards [21] “Zigbit Modules MCU Wireless- Atmel Corporation”.
Atmel.com. Retrieved 2012-10-18.
• Thread (network protocol)
[22] “n-Core Platform & Polaris Real-Time Locating System
– Wireless Sensor Networks – ZigBee”. N-core.info. Re-
trieved 2012-10-18.
12 References [23] David Egan, “ZigBee Propagation for Smart Metering
Networks”, Electric Light & Power vol 17 issue12
[1] “ZigBee Specification FAQ”. Zigbee Alliance. Retrieved
14 June 2013. [24] “Microchip MRF24J40”.
8 13 EXTERNAL LINKS

[25] “TI CC2350”.

[26] “SLAB EM358x” (PDF).

[27] “MRVL 88MZ100” (PDF).

[28] “Freescale MC1323XFS” (PDF).

[29] “NXP JN-516x” (PDF).

[30] “Atmel ATZB-24-B0” (PDF).

[31] “Telink TLSR8636”.

[32] “GreenPeak GP691” (PDF).

[33] “Wireless Sensor Networks Research Group”. Sensor-


networks.org. 2010-04-15. Retrieved 2012-10-18.

[34] “Wireless Sensor Networks Research Group”. Sensor-


networks.org. 2009-02-05. Retrieved 2012-10-18.

[35] http://heise.de/$-$3010287

13 External links
• Official website
• Smart Energy Documents (V2.0)

• Alliance Documents
• “ZigBee RF4CE: A Quiet Revolution is Un-
derway” (PDF). December 2012.
• What does ZigBee Pro mean for your application?
by Jack Shandle, 11/27/2007
• The ZigBee PRO Feature Set: More of a good thing
by Bob Gohn, 12/18/2007
• ZBOSS ZigBee Open Source Stack, (Certified by
Zigbee Alliance)

• ZigBee for M2M Technology Find out how zigbee


can be used for M2M communications

• FreakZ open source Zigbee project, Project home-


page, and Zigbee/802.15.4 chip comparison

• ZigBee wants to be the Bluetooth of the internet of


things. Too bad everyone hates it.
9

14 Text and image sources, contributors, and licenses


14.1 Text
• ZigBee Source: https://en.wikipedia.org/wiki/ZigBee?oldid=726159030 Contributors: Malcolm Farmer, Ray Van De Walker, Maury
Markowitz, Waveguy, David spector, Heron, Edward, CesarB, Glenn, Smack, Crissov, Radiojon, Grendelkhan, Itai, Omegatron, Wern-
her, Chealer, Rfc1394, Cornellier, SchmuckyTheCat, Davodd, Tea2min, Wolfkeeper, Mboverload, Bobblewik, Edcolins, Delta G, Robert
Brockway, Hgfernan, Kevin Rector, Abdull, RevRagnarok, Mormegil, Imroy, CALR, Neckelmann, Rich Farmbrough, Thomas Willerich,
Roybb95~enwiki, Alistair1978, Kaszeta, IFaqeer, Cmdrjameson, Cohesion, Blhole~enwiki, Penwhale, Bempey, Corwin8, Metron4, Wt-
shymanski, Cburnett, Stephan Leeds, Suruena, Sven Wahl, Sleigh, Alras, Dismas, Firsfron, Mindmatrix, Georgia guy, Dandv, Armando,
Pol098, JeremyA, Sega381, Hughcharlesparker, Mandarax, Rjwilmsi, Cirfis, Vegaswikian, Jeffschuler, Lendorien, Krash, Dinosaurdar-
rell, FlaBot, Ausinha, Kolbasz, Rupl, Kail Ceannai, FFF~enwiki, RussBot, Hydrargyrum, Manop, Bovineone, Thinkmike, Phileo, Wangi,
Hobit, Bakkster Man, Jonsmirl, Oddan, Abune, Back ache, JLaTondre, Eptin, SmackBot, Snielsen, Prodego, Rcardenas, Eskimbot, Kel-
leyCook, Commander Keane bot, Yamaguchi , Gilliam, Ohnoitsjamie, Daedalus01, Smt52, Thumperward, Snori, Oli Filth, Dwark,
Russvdw, Slimsejdi, Colonies Chris, Quaque, Chlewbot, AlexHajnal, DGerman, Allan McInnes, Greggwon~enwiki, G-J, Derek R Bullam-
ore, MacPrince, DylanW, Harish 239, Pelagic, Dr. Sunglasses, ManiacK, Palopt, Euchiasmus, Mike1901, Clapre, Sjf, Novangelis, Kvng,
Hu12, Iridescent, JHP, Vocaro, Fresnel zone, Nerfer, Syxx, CmdrObot, N2e, Itechtrix, Badgrs, AndersFeder, Kozuch, Omicronpersei8,
Thijs!bot, Wikid77, MountainLogic, Phooto, Mwastrod, NigelR, Reepy, Siro mateos, Dawnseeker2000, Guy Macon, Dougher, Dimawik,
JAnDbot, Barek, Jheiv, Benstown, Bongwarrior, Smash1gordon, Dilane, BatteryIncluded, David Eppstein, I B Wright, Kasiko~enwiki,
Cleidigh, Robertc808, Jim.henderson, Ffierling, Ore4444, Haffner, Stephenwright44, Adavidb, Peter Chastain, Thdgpfla, BluesFiddler, Ja-
sonqin, Shoessss, KylieTastic, Tiggerjay, Ross Fraser, Doggkruse, Spelemann, KGV, Shibinshaji, TXiKiBoT, Drake Redcrest, NPrice,
Rob Blanco~enwiki, Canaima, Aszymanik, Tomaxer, Simonharrison, Rep07, Fqrley, JRetSapDoog, SieBot, BotMultichill, RFeditor,
Smithderek2000, Fahidka, OsamaBinLogin, JackSchmidt, Wadecarl, Asocall, Akoubaa, ImageRemovalBot, Michael.Sage, Plantus105,
Gailyh, ClueBot, WurmWoode, Ignorance is strength, Kcrao, Niceguyedc, DragonBot, Alexbot, Arsham11, Pot, Arjayay, Stypex, El
bot de la dieta, Dank, Ginbot86, Dooywopwopbanjio345, Addbot, Mortense, Ee digital, Jafeluv, KitchM, Jelsova, Ellyschietse, MrOl-
lie, Download, LaaknorBot, Pmod, RLFeenstra, Tassedethe, Abisys, Carlos.prados, Tide rolls, Lightbot, Gail, Wireless friend, Jarble,
Ramiza Tasneem, Legobot, Yobot, WikiDan61, DutchCanadian, Wonderfl, Gottadota, AnomieBOT, Xiloynaha, Jim1138, Piano non
troppo, Materialscientist, LilHelpa, Xqbot, Bennoritter, Freaklabs, Millahnna, Shulini, Fightin' Phillie, GrouchoBot, Rznr.m, Interoper-
able, Holly505, Damonrand, BigDwiki, Chris Caven, Redbird is, Bluefist, Randelung, Reaper Eternal, MikeMaynardUK, Squeakypaul,
Dwvisser, EmausBot, Prazdan79, Bdijkstra, Dewritech, GoingBatty, RA0808, Dcirovic, Seikku Kaita, Ycastilloux, Tcheneau, ZéroBot,
FlippyFlink, Smoky.kwon, Veinblz, Hazard-SJ, Boya5432112345, Wikfr, Ari81, Donner60, Damirgraffiti, ClueBot NG, Pazoar, Bor-
ingstandards, Shaddim, DieSwartzPunkt, Wikiju, Antiqueight, BG19bot, Refrain74, Jjuni91, Pradeepmathesh, Floating Boat, Probity
incarnate, Sadiaper, Ifgladlee, Cryptos2k, Jimw338, Mrt3366, Cyberbot II, ChrisGualtieri, MadCowpoke, Poolborges, Enterprisey, Mark-
fickett, Codename Lisa, Vamsirules, SFK2, Nicceg, Southamericatechy, TheFrog001, Geza.molnar, Dairhead, Samyulg, Satya-Regalix,
AutolycusQ, Lesser Cartographies, JoomlaMan99, Fixuture, 7Sidz, Nyashinski, Monkbot, Doughyblossom, JakeMitch, Jasonkidd971,
JackFitzgibbons, DiscantX, Hungryce, Dutral, OlyLove360 and Anonymous: 533

14.2 Images
• File:ZigBee_node_structure.png Source: https://upload.wikimedia.org/wikipedia/commons/3/38/ZigBee_node_structure.png License:
CC BY-SA 2.5 es Contributors: Own work Original artist: Rob Blanco

14.3 Content license


• Creative Commons Attribution-Share Alike 3.0

Das könnte Ihnen auch gefallen