Dccn ppt


Published on

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • References:
    1. Freescale Semiconductor, ZigBee Implementer’s Guide; Document Number: F8W 2004-0007, May 23, 2005.
    2. Weiser, M. (1991). The Computer for the 21st Century. Scientific America, September 1991, 94-104. Journal of Theoretical and Applied Information Technology © 2005-2009 JATIT.
    3. Pister K. S. J., Kahn J. M., and Boser B. E. (1999). Smart dust: Wireless networks of millimeter scale sensor nodes.1999 UCB Electronics Research Laboratory Research Summary.
    4. IEEE 802 Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks, IEEE Computer Society, 2003.
    5. ZigBee Specification v1.0, ZigBee Alliance, December 14th, 2004. Tanenbaum, A. S., Gamage, C., & Crispo, B. (2006). Taking sensor networks from the lab to the jungle.Computer, 39(8), 98-100.
    6. Kohvakka, M., Kuorilehto, M., Hännikäinen, M., & Hännikäinen, T. D. (2006). Performance analysis of IEEE 802.15.4 and ZigBee for large scale wireless sensor network applications.
  • Dccn ppt

    1. 1. Presentation on ZigBee by BEE-4B Ch Ahsan Ali Fasih ur Rehman Tashfain Yousuf
    2. 2. WAGGLE DANCE ZigBee
    3. 3. INTRODUCTION  Zigbee is an emerging worldwide standard for Wireless Personal Area Networks (WPAN).  Defined rate of 250 kbit/s on 2.4 Ghz frequency, best suited for a single signal transmission from a sensor or input device.  Network based on IEEE 802.15.4 standard.  low cost, low power, wireless mesh network standard.  Applications include wireless light switches, electrical meters with in-home-displays, traffic management systems, and other consumer and industrial equipment.
    4. 4. WHY WE NEED ZIGBEE! There are many standards that address mid to high data rates for voice, PC LANs, video, etc. However, up till now there hasn’t been a wireless network standard that meets the unique needs of sensors and control devices.
    5. 5. USES  Home automation  Wireless sensor networks  Industrial control  Embedded sensing  Medical data collection  Smoke and intruder warning  Building automation
    6. 6. ZIGBEE DIVICES Zigbee devices are of three types: 1) ZigBee coordinator (ZC) The main device, the coordinator forms the network tree and is a bridge to other networks. There is exactly one ZigBee coordinator in each network it stores information about the network, including acting as the Trust Center & repository for security keys. 2) ZigBee Router (ZR) As well as running an application function, a router can act as an intermediate router, passing on data from other devices. 3)ZigBee End Device (ZED) Contains just enough functionality to talk to the parent node (either the coordinatoror a router); it cannot relay data from other devices.
    7. 7. HOW ZIGBEE WORKS  It works in the unlicensed 2.4 GHz (worldwide), 915 MHz (Americas and Australia) and 868 MHz (Europe) ISM bands.  Sixteen channels are allocated in the 2.4 GHz band, with each channel requiring 5 MHz of bandwidth.  It is built on a single chip which reduces its cost and power consumption.  It has few analog stages and uses digital circuits wherever possible.  The radios use direct-sequence spread spectrum coding, which is managed by the digital stream into the modulator. Binary phase-shift keying (BPSK) is used in the 868 and 915 MHz bands, and offset quadrature phase-shift keying (OQPSK) that transmits two bits per symbol is used in the 2.4 GHz band.  The current ZigBee protocols support beacon and non-beacon enabled networks.
    8. 8. DATA RATE Frequency Data Rate Indoor Outdoor 2.4Ghz 250kb/s 10 to 20m 1500m 915Mhz 40kb/s - 1000m 868Mhz 20kb/s - 800m
    10. 10. ZIGBEE NETWORK &SECURITY ARCHITECTURE Network Setup  Searches for a Radio Channel.  Automatically assigns PAN(Personal Area Networks) ID.
    11. 11. ZIGBEE NETWORK &SECURITY ARCHITECTURE  ZigBee uses 128-bit keys to implement its security mechanisms.  Initial master key must be obtained through a secure medium (transport or pre-installation), as the security of the whole network depends on it.  A secure network will designate one special device which other devices trust for the distribution of security keys: the trust center.  The MAC sublayer is capable of single-hop reliable communications.  The network layer manages routing, processing received messages and being capable of broadcasting requests.  The application layer offers key establishment and transport services to both ZDO and applications.
    12. 12. ADVANTAGES OF ZIGBEE  Low power consumption.  They are more ecological saving megawatts at its full deployment.  Low cost (device, installation, maintenance).  High density of nodes per network(using IEEE 802.15.4 PHY and MAC).
    13. 13. SIMULATION OF ZIGBEE NETWORKS NS2, OPNET, and NetSim can be used using C++. Simulation on Opnet