Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
It was in 1896 that Guglielmo Marconi invented the first wireless
telegraph. In 1901 he sent telegraphic signals across the Atlantic ocean from
Cornwall to St. Johns Newfoundland; a distance of 1800 miles. Over the last
century, advances in wireless technologies have led to the radio, the
television, the mobile telephone, and communication satellites. All type of
information can now be send to any corner of the world. A wireless network
is a flexible data communication system, which uses wireless media such as
radio frequency technology to transmit and receive data over the air,
minimizing the need for wired connections. Wireless networks are used to
augment rather than replace wired networks and are most commonly used to
provide last few stages of connectivity between a mobile user and a wired
network. Wireless networks use electromagnetic waves to communicate
information from one point to another without relying on any physical
connection. Radio waves are often referred to as radio carriers because they
simply perform the function of delivering energy to a remote receiver. The
data being transmitted is superimposed on the radio carrier so that it can be
accurately extracted at the receiving end. Once data is superimposed
(modulated) onto the radio carrier, the radio signal occupies more than a
single frequency, since the frequency or bit rate of the modulating
information adds to the carrier. Multiple radio carriers can exist in the same
space at the same time without interfering with each other if the radio waves
are transmitted on different radio frequencies. To extract data, a radio
receiver tunes in one radio frequency while rejecting all other frequencies.
The modulated signal thus received is then demodulated and the data is
extracted from the signal. Wireless networks offer the following
productivity, convenience, and cost advantages over traditional wired
networks:
Mobility: provide mobile users with access to real-time information so that
they can roam around in the network without getting disconnected from the
network. This mobility supports productivity and service opportunities not
possible with wired networks.
Reach of network: the network can be extended to places which can not
be wired More Flexibility: wireless networks offer more flexibility and adapt
easily to changes in the configuration of the network. Reduced cost of
ownership: while the initial investment required for wireless network
hardware can be higher than the cost of wired network hardware, overall
installation expenses and life-cycle costs can be significantly lower in
dynamic environments.
2. EXISTING STANDARDS
In the world of wireless communication there are many standards
existing today, each with a specific application field and characteristics
which best suites the need. However among so many standard we will only
discuss about Wi-Fi, Bluetooth and ZigBee as they are the most
complementary standards among all.
2.1.Wi-Fi (IEEE standard 802.11)
Wi-Fi is the wireless way to handle networking. It is also known as 802.11
networking and wireless networking. The big advantage of Wi-Fi is its
simplicity. Mobile connectivity for computers is a rapidly growing
requirement. Of the schemes that are available the IEEE 802.11 standard,
often termed Wi-Fi has become the de facto standard. With peak operating
speeds of around 54 Mbps it is able to compete with many wired systems.
As a result of the flexibility and performance of the system, many Wi-Fi
hotpots have been set up and more are following. These enable people to use
their laptop computers as they wait in hotels, airport lounges, cafes, and
many other places using a wire less link rather that needing to use a cable.
2.1.1. Standards
There are two types of network that can be formed: infrastructure networks;
and ad-hoc networks. The infrastructure application is aimed at office areas
or to provide a hotspot. It can be installed instead of a wired system, and can
provide considerable cost savings, especially when used in established
offices. A backbone wired network is still required and is connected to a
server.
2.2. Bluetooth
Bluetooth is based on IEEE standards 802.15.1. Bluetooth has now
established itself in the marketplace enabling a variety of devices to be
connected together using wireless technology. Bluetooth technology has
come into its own connecting remote headsets to mobile phones, but it is
also used in a huge number of other applications as well. Bluetooth
technology originated in 1994 when Erricsson came up with a concept to use
a wireless connection to connect items such as an earphone and a cordless
headset and the mobile phone. The name of the Bluetooth standard
originates from the Danish king Harald Blat and who was king of Denmark
between 940 and 981 AD. His name translates as Bluetooth and this was
used as his nickname. A brave warrior, his main achievement was that of
uniting Denmark under the banner of Christianity, and then uniting it with
Norway that he had conquered. The Bluetooth standard was named after him
because Bluetooth endeavors to unite personal computing and
telecommunications devices.
2.3. ZigBee
ZigBee is a wireless networking standard that is aimed at remote
control and sensor applications which is suitable for operation in harsh radio
environments and in isolated locations, It builds on IEEE standard 802.15.4
which defines the physical and MAC layers. Above this ZigBee defines the
application and security layer specifications enabling interoperability
between products from different manufacturers. In this way ZigBee is a
superset of the 802.15.4 specification. With the applications for remote
wireless sensing and control growing rapidly it is estimated that the market
size could reach hundreds of millions of dollars as early as 2007. This makes
ZigBee a very attractive proposition, and one, which warrants the
introduction of a focused standard.
3. INTRODUCTION TO ZIGBEE
The past few years have witnessed a rapid growth of wireless
networking. However, up to now wireless networking has been mainly
focused on high speed communications, and relatively long-range
applications such as IEEE 802.11 wireless local area network standards. The
first well known standard focusing on low rate wireless personal area
networks was BLUETOOTH. However it has limited capacity for
networking of many nodes. There are many wireless monitoring and control
applications in industrial and home environments which require longer
battery life, lower data rates and less complexity than those from existing
standards. For such wireless applications, a new standard called IEEE
802.15.4 has been developed by IEEE. The new standard is also called
ZigBee.
Published Profile: A private profile is shared among other users. Still one
cannot use official ZigBee stamp, but can claim based on ZigBee platform
Public profile: It is the official ZigBee profile
3.2. The Name ZigBee
The name ZigBee is said to come from the domestic honeybee which
uses a zig-zag type of dance to communicate important information to other
hive members. This communication dance (TheZigBee Principle) is what
engineers are trying to emulate with this protocol a bunch of separate and
simple organisms that join together to tackle complex tasks.
Case 1: 802.11 Rx power is 667 mW (always on) [at] 100 devices/home &
50,000 homes/city = 150 3.33 megawatts.
Case 3: 802.15.4 power cycled at .1% (typical duty cycle) = 150 watts Low
cost to the users means low device cost, low installation cost and low
maintenance. ZigBee devices allow batteries to last up to years using
primary cells (low cost) without any chargers (low cost and easy
installation). ZigBee simplicity allows for inherent configuration and
redundancy of network devices provides low maintenance.
High density of nodes per network: ZigBee use of the IEEE 802.15.4 PHY
and MAC allows networks to handle any number of devices. This attribute is
critical for massive sensor arrays and control networks.
IEEE 802.15 is the working group 15 of the IEEE 802 which specializes in
Wireless PAN standards. It includes four task groups (numbered from 1
to 4): Task group 1 (WPAM/Bluetooth) deals with Bluetooth, having
produced the 802.15.1 standard, published on June 14, 2002. It includes a
medium access control and physical layer specification adapted from
Bluetooth 1.1. Task group 2 (coexistence) deals with coexistence of
Wireless LAN (802.11) and wireless PAN. Task group 3 is in fact two
groups: 3 (WPAN High Rate) and 3a (WPAN Alternate Higher ate), both
dealing with high-rate WPAN standards (20 Mbit/s or higher). ask group 4
(WPAN Low Rate) deals with low rate but very long battery life (months or
even years). The first edition of the 802.15.4 standard was released in May
2003. In March 2004, after forming Task Group 4b, task group 4 put itself in
hibernation. The new Task Group 4b aims at clarifying and enhancing
specific parts of the Task Group 4 standard.
• Data rates of 250 kbps (@2.4 GHz), 40 Kbps ([at] 915 MHz) and 20
kbps (@868 MHz)
• CSMA-CA channel access yields high throughput and low latency for
low duty cycle devices like sensors and controls.
• Non-Beacon mode
• Beacon mode
The recipient may no there the call or the channel might already be in
use. Beacon Mode is a mechanism for controlling power consumption in
extended networks such as cluster tree or mesh. It enables all the clients to
know when to communicate with each other. Here, the two-way radio
network has a central dispatcher that manages the channel and arranges the
calls. The primary value of beacon mode is that it reduces the system power
consumption Non-beacon mode is typically used for security systems where
client units, such as intrusion sensors, motion detectors, and glass-break
detectors, sleep 99.999% of the time. Remote units wake up on a regular, yet
random, basis to announce their continued presence in the network. When an
event occurs, the sensor wakes up instantly and transmits the alert
(Somebody is on the front porch). The network coordinator, powered from
the main source, has its receiver on all the time and can therefore wait to
hear from each of these stations. Since the network coordinator has an
infinite source of power it can allow clients to sleep for unlimited periods of
time, enabling them to save power.
Figure 5.3 The four basic frame types defined in 802.15.4: Data, ACK,
MAC command, and beacon
A MAC command frame: used for handling all MAC peer entity control
transfers. A Mac command frame provides the mechanism for remote
control and configuration of client nodes. A centralized network manager
uses MAC to configure individual clients command frames no matter how
large the network. The data frame is illustrated below in fig 5.3:
Fig 5.3 ZigBee Data Frame.
The Physical Protocol Data Unit is the total information sent over the
air. As shown in the illustration above the Physical layer adds the following
overhead: Preamble sequence: 4 Octets Start of Frame Delimiter:1 Octet
Frame Length :1 Octet The MAC adds the following. Overhead:
The total overhead for a single packet is therefore 15 31 octets (120 bits);
depending upon the addressing scheme used (short or 64 bit addresses).
These numbers do not include any security overhead.
The ZigBee application layer consists of the APS sub-layer, the ZDO
and the manufacturer-defined application objects. The responsibilities of the
APS sub-layer include maintaining tables forbidding, which is the ability to
match two devices together based on their services and their needs, and
forwarding messages between bound devices. Another responsibility of the
APS sub-layer is discovery, which is the ability to determine which
responsibilities of the ZDO include defining the role of the device within the
network (e.g. ZigBee coordinator or end device), initiating and/or
responding to binding requests and establishing a secure relationship
between network devices. The manufacturer-defined application objects
implement the actual applications according to the ZigBee- defined
application descriptions.
Defines the role of the device within the network (e.g. ZigBee
coordinator or end device) Initiates and/or responds to binding requests
Establishes a secure relationship between network devices selecting one of
ZigBee’s security methods such as public key, symmetric key etc.
5.4.2 Application Support Layer
Discovery: The ability to determine which other devices are operating in the
personal operating space of a device.
Binding: The ability to match two or more devices together based on their
services and their needs and forwarding messages between bound devices.
The General Operation Framework (GOF) is a glue layer between
applications and rest of the protocol stack. The GOF currently covers
various elements that are common for all devices. It includes sub-addressing
and addressing modes and device descriptions, such as type of device, power
source, sleep modes, and coordinators using an object model, the GOF
specifies methods, events, and data formats that are used by application
profiles to construct set/get commands and their responses. Actual
application profiles are defined in the individual profiles of the IEEE
working groups. Each ZigBee device can support up to 30 different profiles.
Currently, only one profile, Commercial and Residential Lighting, is
defined. It includes switching and dimming load controllers, corresponding
remote-control devices, and occupancy and light sensors.
6. ZIGBEE SECURITY
When security of MAC layer frames is desired, ZigBee uses MAC
layer security to secure MAC command, beacon, and acknowledgment
frame. ZigBee may secure messages transmitted over single hop using
secured MAC data frames, but for multi-hop messaging ZigBee relies upon
upper layers (such as the NWK layer) for security. The MAC layer uses the
Advanced Encryption Standard (AES) as its core cryptographic algorithm
and describes a variety of security suites that use the AES algorithm. These
suites can protect the confidentiality, integrity, and authenticity of MAC
frames. The MAC layer does the security processing, but the upper layers,
which set up the keys and determine the security levels to use, control this
processing. When the MAC layer transmits (receives) a frame with security
enabled, it looks at the destination (source) of the frame, retrieves the key
associated with that destination (source), and then uses this key to process
the frame according to the security suite designated for the key being used.
Each key is associated with a single security suite and the MAC frame
header has a bit that specifies whether security for a frame is enabled or
disabled.
7. ZIGBEE APPLICATIONS
The ZigBee Alliance targets applications Across consumer,
commercial, industrial and government markets worldwide. Unwired
applications are highly sought after in many networks that are characterized
by numerous nodes consuming minimum power and enjoying long battery
lives. ZigBee technology is designed to best suit these applications, for the
reason that it enables reduced costs of development, very fast market
adoption and rapid ROI..
For the last few years, we have witnessed a great expansion of remote
control devices in our day-to-day life. Five years ago, infrared (IR) remotes
for the television were the only such devices in our homes. Now the number
of devices is uncountable. This number will only increase as more devices
are controlled or monitored from a distance. To interact with all these
remotely controlled devices, we will need to put them under a single
standardized control interface that can interconnect into a network,
specifically a HAN or home-area network.
• Home networking
• Smart dust
“The Home” is receiving a lot of attention lately as the place that could do
with a lot of new technology. Some of it seems like wishful thinking. Ideas
that we want to connect all our electronic devices at home from PCs, stereos,
TV and DVD players to the security system, all utility meters, microwave
oven, fridge and even toaster to a single home network that is then
connected to the internet does not stand up to much scrutiny at this time.
Why would we all want to do that? In fact, the home networking market
appears to be fragmented into four different application areas: PC
networking, connecting two or more PCs to a single broadband connection
to the Internet as well as printers and other resources that can be shared.
Home entertainment distribution, sharing content among televisions, stereos,
and game consoles around the home. Home control, where one group of
applications offers electronic control of heating, lighting and security
systems. Home appliances, where your fridge can access recipes on the
Internet or shop on your behalf and your washing machine can call a service
engineer. Then there is Microsoft work on SPOT (Smart Personal Object
Technology) that seems to be away for Microsoft to try to Improve everyday
household objects like alarm clocks, key chains ad pens. Of these, PC
networking is clearly in the ascendancy at present, as a direct result of the
rollout of broadband connections to the home. The second typically involves
connecting the TC to the Stereo system, for example, and looks a little less
certain as a mass market. It may well pick up steam though also as a result of
broadband connections transferring those music and video files from the PC
to the home entertainment system perhaps. Industrial automation includes
extending existing manufacturing and process control systems reliably and
improve asset management by continuously monitoring critical equipment.
Using ZigBee we can reduce energy costs through optimized manufacturing
process and to identify inefficient operation or poorly performing
equipment. Smart dust an emerging technology can be used for various
purposes such as surveillance, military purposes, weather monitoring and
many other things which are still beyond reach. The goal of the Smart Dust
project is to build a self-contained, millimeter-scale sensing and
communication platform for a massively distributed sensor network. This
device will be around the size of a grain of sand and will contain sensors,
computational ability, bi-directional wireless communications, and a power
supply, while being inexpensive enough to deploy by the hundreds. Smart
Dust may not be the subject matter of science fiction any longer the advent
of ZigBee and other wireless protocols suitable for sensor networks is
pushing the technology to the next level.
8. CONCLUSION
Bluetooth has already matured and graduated to version 1.2 after its
initial hype. Lots of products compliant to Bluetooth version 1.1 are
available on the market. Will ZigBee be able to compete with Bluetooth in
the market? And if yes, will it replace Bluetooth? This question is asked by
the people where since ZigBee came to the market. We have already seen all
the aspects of both ZigBee and Bluetooth. And hence can be concluded that
ZigBee and Bluetooth are two solutions for two different application areas.
The differences are from their approach to their desired application.
Bluetooth has addressed a voice application by embodying a fast frequency
hopping system with a master slave protocol. ZigBee has addressed sensors,
controls, and other short message applications by embodying a direct
sequence system with a star or peer-to-peer protocols. Minor changes to
Bluetooth or ZigBee won’t change their inherent behavior or characteristics.
The different behaviours come from architectural differences.
9. REFERENCECS
http://www.standards.ieee.org
http://www.sigbee.org/en/about/initial_mp_home.asp
http://www.zigbee.org/en/documents/zigbeeoverview4.pdf
http://www.palowireless.com/zigbee/tutorials.asp
http://www.zigbee.org/en/resources/03141...nology.doc
http://en.wikipedia.org/wiki/Zigbee
1. INTRODUCTION ..............................................................................1
8. CONCLUSION .................................................................................25
9. REFERENCECS ..............................................................................26
ACKNOWLEDGEMENT
I take pleasure in acknowledging the contribution of many individuals
for the preparation of my seminar. I would like to thank God almighty for
present my seminar.
presenting my Seminar.
WYNIMOL JOSE