SlideShare a Scribd company logo
What is the Best?
BlueTooth
ZigBee
WiFi
ZigBee
By: Mostafa Ali
Bluetooth[1]
• Bluetooth briefly is a short range and mobility product
• It’s a short-range wireless technology that lets you connect
computers, mobile phones, and handheld devices to each other
it can used in high-quality voice transmission in wireless
headsets
• Creating personal area networks(PANs) with high levels of
security with a medium data rate of 1 to 3Mbps
Bluetooth[2]
• Its indoor range is typically 2–10 meters
• Communicating on a frequency between 2.402 and 2.480
• 100+KB memory
• Created by telecom vender Ericsson in 1994
• Transmitting data via low-power radio waves
• Using a radio technology called frequency-hopping
spread spectrum
Bluetooth[3]
• Using Point-to-multipoint(Star topology)
• The big draw of Bluetooth are that it is wireless,
inexpensive and automatic
• Connection happen when device come within range of
one another the electronic conversation happens
automatically
• Bluetooth systems create a Personal Area Network(PAN)
after conversation occurred and this called Piconet
Bluetooth[4]
• A master Bluetooth device can communicate with up to
seven devices in a Piconet
• Devices can switch roles, by agreement, the slave can
become the master at any time
Bluetooth[5]
• It use in a lot of devices like mouse, keyboards, printers
and to communicate between mobile phones and a hands-
free headsets
• Use of Bluetooth is to transfer files, contact details,
reminders, appointment dates between devices
• Removal of traditional wires in test equipment, bar code
scanners and medical equipment
ZigBee[1]
• ZigBee is a standard that defines a set of communication
protocols for low-data-rate short-range wireless networking
• ZigBee-based wireless devices operate in 868 MHz, 915 MHz,
and 2.4 GHz frequency bands
• The 868 MHz band is used in Europe, the 915 MHz frequency
band is used mainly in North America, whereas the 2.4 GHz
band is used worldwide.
• The maximum data rate is 250 K bits per second
• ZigBee is targeted mainly for battery-powered applications
where low data rate, low cost, and long battery life are main
requirements
ZigBee[2]
• In many ZigBee applications, the total time the wireless
device is engaged in any type of activity is very limited;
the device spends most of its time in a power-saving
mode, also known as sleep mode .
• As a result, ZigBee enabled devices are capable of being
operational for several years before their batteries need to
be replaced.
• Design for wireless controls and sensors networking
• ZigBee provides the most power and the most cost-
efficient solution compared to Bluetooth and IEEE
802.11b
ZigBee[3]
Network layers and it’s relationship with IEEE
802.15.4 Standards
• One of the common ways to establish a communication
network (wired or wireless) is to use the concept of
networking layers.
• Each layer is responsible for certain functions in the
network.
• The layers normally pass data and commands only to the
layers directly above and below them.
• These network layers shown in (Figure 1).
ZigBee[4]
ZigBee[5]
• As shown in Figure, the bottom two networking layers
are defined by the IEEE 802.15.4 standard. This standard
is developed by the IEEE 802 standards committee and
was initially released in 2003.
• IEEE 802.15.4 defines the specifications for PHY and
MAC layers of wireless networking, but it does not
specify any requirements for higher networking layers.
• The ZigBee standard defines only the networking,
application, and security layers of the protocol and adopts
IEEE 802.15.4 PHY and MAC layers as part of the
ZigBee networking protocol
ZigBee[6]
Device types and device roles
• There are two types of devices in an IEEE 802.15.4
wireless network: full-function devices (FFDs) and
reduced-function devices (RFDs).
• In an IEEE 802.15.4 network, an FFD device can take
three different roles: coordinator, PAN coordinator, and
device. A coordinator is an FFD device that is capable of
relaying messages. If the coordinator is also the principal
controller of a personal area network (PAN), it is called a
PAN coordinator . If a device is not acting as a
coordinator, it is simply called a device .
ZigBee[7]
Networking Topologies
• In the star topology(point to multi points), every device in
the network can communicate only with the PAN coordinator.
• In a peer-to-peer topology(mesh topology) (see Figure 2),
each device can communicate directly with any other device if
the devices are placed close enough together to establish a
successful communication link. Any FFD in a peer-to-peer
network can play the role of the PAN coordinator
• One way to decide which device will be the PAN coordinator
is to pick the first FFD device that starts communicating as the
PAN coordinator
ZigBee[8]
• In a peer-to-peer network, all the devices that participate
in relaying the messages are FFDs because RFDs are not
capable of relaying the messages. However, an RFD can
be part of the network and communicate only with one
particular device (a coordinator or a router) in the
network.
WiFi[1]
• Short for wireless fidelity.
• It is a wireless technology that uses radio frequency to
transmit data through the air.
• Wi-Fi is based on the 802.11 standard:
• 802.11a
• 802.11b
• 802.11g
• 802.11n
WiFi[2]
• 802.11 is primarily concerned with the lower layers of the OSI
model.
• Physical Layer
Physical Layer Convergence Procedure (PLCP).
• to map the MAC frames onto the medium
Physical Medium Dependent (PMD).
• to transmit those frames.
• Data Link Layer
Logical Link Control (LLC).
Medium Access Control (MAC).
WiFi[4]
802.11b Standard
• Well-supported, stable, and cost effective, but runs in the
2.4 GHz range that makes it prone to interference from
other devices (microwave ovens, cordless phones, etc)
and also has security disadvantages.
• Limits the number of access points in range of each other
to three.
• Has 11 channels, with 3 non-overlapping, and supports
rates from 1 to 11 Mbps, but realistically about 4-5 Mbps
max.
• Uses direct-sequence spread-spectrum technology.
WiFi[5]
802.11a Standard
• Completely different from 11b and 11g.
• Flexible because multiple channels can be combined for
faster throughput and more access points can be co-
located.
• Shorter range than 11b and 11g.
• Runs in the 5 GHz range, so less interference from other
devices.
• Has 12 channels, 8 non-overlapping, and supports rates
from 6 to 54 Mbps, but realistically about 27 Mbps max
• Uses frequency division multiplexing
WiFi[6]
802.11g Standard
• Extension of 802.11b, with the same disadvantages
(security and interference).
• Has a shorter range than 802.11b.
• Is backwards compatible with 802.11b so it allows or a
smooth transition from 11b to 11g.
• Flexible because multiple channels can be combined for
faster throughput, but limited to one access point.
• Runs at 54 Mbps, but realistically about 20-25 Mbps and
about 14 Mbps when b associated
• Uses frequency division multiplexing
WiFi[7]
802.11n Standard
• The newest IEEE standard in the Wi-Fi category is 802.11n. It
was designed to improve on 802.11g in the amount of
bandwidth.
• 802.11n adds technology called multiple-input multiple-output
(MIMO), a signal processing and smart antenna technique for
transmitting multiple data streams through multiple antennas.
The result? Up to five times the performance and up to twice
the range compared to the earlier 802.11g standard.
• 802.11n connections support data rates of over 300 Mbps.
• Runs in the 2.4 and 5 GHz range.
WiFi[8]
Which one to choose?
• (A) 802.11a
Frequency- 5 GHz
Typical Data Rate - 23
Mbit/s
Max Data rate – 54 Mbit/s
Range –30 m(100ft) outdoors
Cost: highest cost.
• (B) 802.11b
Frequency - 2.4 GHz
Typical Data Rate - 4.5
Mbit/s
Max Data rate – 11 Mbit/s
Range - 95 m(300 ft) outdoors
Cost: lowest cost.
• (G) 802.11g
Frequency - 2.4 GHz
Typical Data Rate – 19
Mbit/s
Max Data rate - 54 Mbit/s
Range – 95 m(300 ft) outdoors
Cost: costs more than 11b.
• (N) 802.11n
Frequency - 5GHz and/or
2.4GHz
Typical Data Rate - 74 Mbit/s
Max Data rate - 300 Mbit/s
(2 streams)
Range–190 m(600 ft) outdoors
Cost: costs more than 11g.
WiFi[9]
Basic Security Strategies
• Block your Service Set Identifier (SSID) from being broadcast.
• SSID that allows to identify the service network; it is a 32
bytes character string of a variable size.
• SSID is used in order to guarantee the authentication and the
identification between an AP and a client.
• Wireless beacon so PCs can easily find the access point.
• Change the default network name in the access point.
• Change the default access point password.
• Center the access point in the middle of the building, house or
any other place.
WiFi[10]
Media Access Control (MAC) Filtering
• Every network device has a unique MAC address
• Allocated by the manufacturer.
• MAC Filtering only allows certain addresses access.
• Mostly for home use.
• Tedious to implement on a large scale.
WiFi[11]
Wired Equivalency Protocol (WEP)
• Basic encryption technology.
• Uses an RC4 stream cipher.
• Pseudo-random bytes.
• Two versions: 64-bit and 128-bit versions.
• Built into Wi-Fi certified equipment.
• Implemented at the MAC level.
• Protects radio signal between device and access point.
• Does not protect data beyond the access point.
• Uses static encryption keys.
• Easy to crack.
• Still better than nothing.
WiFi[12]
Wi-Fi Protected Access (WPA)
• Designed to replace WEP.
• Firmware update.
• 128-bit Temporal Key Integrity Protocol (TKIP) encryption.
• Uses a master key that is regularly changed.
• User authentication.
• Data Integrity.
• Protects radio signal between device and access point.
• Built into Wi-Fi certified equipment.
• Implemented at the MAC level.
• Available in two versions:
• WPA2 Personal.
• WPA2 Enterprise.
WiFi[13]
&Wi-Fi Protected Access 2 (WPA2)
Extended EAP
• Designed to replace WEP.
• 128-bit Advanced Encryption Standard (AES).
• Based on the IEEE 802.11i standard.
• Provides government level security.
• Also available in two versions:
• WPA2 Personal.
• WPA2 Enterprise.
• EAP - Extensible Authentication Protocol.
• Addition to the Wi-Fi Protected Access.
• Used in internal network.
• Extra security for enterprise and government Wi-Fi LANs.
• Several versions available
WiFi[14]
Virtual Private Network (VPN)
• Creates a secure virtual “tunnel” from remote device to VPN
server.
• Creates an encryption scheme.
• Requires authentication.
• Works across the internet.
• Many types and levels of VPN technology.
• May include hardware and software components.
• Some very expensive.
• Windows provides a basic implementation in its server
software.
WiFi[15]
Firewall
• Can make the network or computer invisible to the internet.
• Block unauthorized users.
• Monitor and control flow of data to/from a network or computer.
• Many types and levels of firewall technology.
Hardware and software combinations
Software only versions.
• ZoneAlarm
• enables a personal firewall that can be configured with various levels of
security
• Many devices provide basic firewall capability.
Gateways and access points.
Network address translation.
Windows XP operating system.
WiFi[16]
Kerberos
• Network authentication based on key distribution.
• Nodes provide their own authentication.
• Checks for data stream integrity.
• Checks for modification.
• Uses Data Encryption Standard (DES).
• Any combination of these security techniques can be
used.
• The more security the more of a hassle.
• Important when supporting users.
Distribution of the costs of a WLAN solution (souceWLANA). This
figure illustrates clearly that a great part of the costs relates to the
used physical material (1: downtime, 2: expenses, 3: management, 4:
development of applications, 5: outsourcing, 6: material)
WiFi[17]
References
• WI-Fi, Bluetooth, Zigbee and Wimax by Houda Labiod,
Hossam Afifi, Costantino De Santis.
• ZigBee Wireless Networks and Transceivers by Shahin
Farahani
• 802.11® Wireless Networks: The Definitive Guide by
Matthew Gast.
• IEEE Standard for Information technology—
Telecommunications and information exchange between
systems—Local and metropolitan area networks—Specific
requirements Part 11: Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) Specifications.
• Wi-Fi Security by Stewart S. Miller.

More Related Content

What's hot

Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
Naveen Kumar
 
WiMAX
WiMAXWiMAX
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
Venkata Naga Ravi
 
Wireless Networks Introduction
Wireless Networks IntroductionWireless Networks Introduction
Wireless Networks Introduction
ramalakshmi54
 
The comparison of pdh and sdh
 The comparison of pdh and sdh The comparison of pdh and sdh
The comparison of pdh and sdh
Vanessa Shen
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
FTTH
FTTHFTTH
IOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptxIOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptx
ArchanaPandiyan
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
udhayakumarc1
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
Vuz Dở Hơi
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
Lilesh Pathe
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 

What's hot (20)

Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
WiMAX
WiMAXWiMAX
WiMAX
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Wireless Networks Introduction
Wireless Networks IntroductionWireless Networks Introduction
Wireless Networks Introduction
 
The comparison of pdh and sdh
 The comparison of pdh and sdh The comparison of pdh and sdh
The comparison of pdh and sdh
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
FTTH
FTTHFTTH
FTTH
 
IOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptxIOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptx
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 

Similar to The Differences Between Bluetooth, ZigBee and WiFi

IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
Nagesh Rao
 
Wireless networks
Wireless networksWireless networks
Wireless networks
SYEDJAMAESHA
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
xdarlord
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
AbyThomas54
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Joland Reambillo
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Derick Ochia
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
Inocentshuja Ahmad
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
Inocentshuja Ahmad
 
Wireless connectivity for iot
Wireless connectivity for iotWireless connectivity for iot
Wireless connectivity for iot
Subramanyam Arige
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinRobert Russell
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
DurgaDeviP2
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehraMohit Mehra
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
Sanjay Hp
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
Pratik Gohel
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoT
Jordan Eller
 

Similar to The Differences Between Bluetooth, ZigBee and WiFi (20)

IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless connectivity for iot
Wireless connectivity for iotWireless connectivity for iot
Wireless connectivity for iot
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
 
Main document
Main documentMain document
Main document
 
cn 1.pptx
cn 1.pptxcn 1.pptx
cn 1.pptx
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoT
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

The Differences Between Bluetooth, ZigBee and WiFi

  • 1. What is the Best? BlueTooth ZigBee WiFi ZigBee By: Mostafa Ali
  • 2. Bluetooth[1] • Bluetooth briefly is a short range and mobility product • It’s a short-range wireless technology that lets you connect computers, mobile phones, and handheld devices to each other it can used in high-quality voice transmission in wireless headsets • Creating personal area networks(PANs) with high levels of security with a medium data rate of 1 to 3Mbps
  • 3. Bluetooth[2] • Its indoor range is typically 2–10 meters • Communicating on a frequency between 2.402 and 2.480 • 100+KB memory • Created by telecom vender Ericsson in 1994 • Transmitting data via low-power radio waves • Using a radio technology called frequency-hopping spread spectrum
  • 4. Bluetooth[3] • Using Point-to-multipoint(Star topology) • The big draw of Bluetooth are that it is wireless, inexpensive and automatic • Connection happen when device come within range of one another the electronic conversation happens automatically • Bluetooth systems create a Personal Area Network(PAN) after conversation occurred and this called Piconet
  • 5. Bluetooth[4] • A master Bluetooth device can communicate with up to seven devices in a Piconet • Devices can switch roles, by agreement, the slave can become the master at any time
  • 6. Bluetooth[5] • It use in a lot of devices like mouse, keyboards, printers and to communicate between mobile phones and a hands- free headsets • Use of Bluetooth is to transfer files, contact details, reminders, appointment dates between devices • Removal of traditional wires in test equipment, bar code scanners and medical equipment
  • 7. ZigBee[1] • ZigBee is a standard that defines a set of communication protocols for low-data-rate short-range wireless networking • ZigBee-based wireless devices operate in 868 MHz, 915 MHz, and 2.4 GHz frequency bands • The 868 MHz band is used in Europe, the 915 MHz frequency band is used mainly in North America, whereas the 2.4 GHz band is used worldwide. • The maximum data rate is 250 K bits per second • ZigBee is targeted mainly for battery-powered applications where low data rate, low cost, and long battery life are main requirements
  • 8. ZigBee[2] • In many ZigBee applications, the total time the wireless device is engaged in any type of activity is very limited; the device spends most of its time in a power-saving mode, also known as sleep mode . • As a result, ZigBee enabled devices are capable of being operational for several years before their batteries need to be replaced. • Design for wireless controls and sensors networking • ZigBee provides the most power and the most cost- efficient solution compared to Bluetooth and IEEE 802.11b
  • 9. ZigBee[3] Network layers and it’s relationship with IEEE 802.15.4 Standards • One of the common ways to establish a communication network (wired or wireless) is to use the concept of networking layers. • Each layer is responsible for certain functions in the network. • The layers normally pass data and commands only to the layers directly above and below them. • These network layers shown in (Figure 1).
  • 11. ZigBee[5] • As shown in Figure, the bottom two networking layers are defined by the IEEE 802.15.4 standard. This standard is developed by the IEEE 802 standards committee and was initially released in 2003. • IEEE 802.15.4 defines the specifications for PHY and MAC layers of wireless networking, but it does not specify any requirements for higher networking layers. • The ZigBee standard defines only the networking, application, and security layers of the protocol and adopts IEEE 802.15.4 PHY and MAC layers as part of the ZigBee networking protocol
  • 12. ZigBee[6] Device types and device roles • There are two types of devices in an IEEE 802.15.4 wireless network: full-function devices (FFDs) and reduced-function devices (RFDs). • In an IEEE 802.15.4 network, an FFD device can take three different roles: coordinator, PAN coordinator, and device. A coordinator is an FFD device that is capable of relaying messages. If the coordinator is also the principal controller of a personal area network (PAN), it is called a PAN coordinator . If a device is not acting as a coordinator, it is simply called a device .
  • 13. ZigBee[7] Networking Topologies • In the star topology(point to multi points), every device in the network can communicate only with the PAN coordinator. • In a peer-to-peer topology(mesh topology) (see Figure 2), each device can communicate directly with any other device if the devices are placed close enough together to establish a successful communication link. Any FFD in a peer-to-peer network can play the role of the PAN coordinator • One way to decide which device will be the PAN coordinator is to pick the first FFD device that starts communicating as the PAN coordinator
  • 14. ZigBee[8] • In a peer-to-peer network, all the devices that participate in relaying the messages are FFDs because RFDs are not capable of relaying the messages. However, an RFD can be part of the network and communicate only with one particular device (a coordinator or a router) in the network.
  • 15. WiFi[1] • Short for wireless fidelity. • It is a wireless technology that uses radio frequency to transmit data through the air. • Wi-Fi is based on the 802.11 standard: • 802.11a • 802.11b • 802.11g • 802.11n
  • 16. WiFi[2] • 802.11 is primarily concerned with the lower layers of the OSI model. • Physical Layer Physical Layer Convergence Procedure (PLCP). • to map the MAC frames onto the medium Physical Medium Dependent (PMD). • to transmit those frames. • Data Link Layer Logical Link Control (LLC). Medium Access Control (MAC).
  • 17.
  • 18. WiFi[4] 802.11b Standard • Well-supported, stable, and cost effective, but runs in the 2.4 GHz range that makes it prone to interference from other devices (microwave ovens, cordless phones, etc) and also has security disadvantages. • Limits the number of access points in range of each other to three. • Has 11 channels, with 3 non-overlapping, and supports rates from 1 to 11 Mbps, but realistically about 4-5 Mbps max. • Uses direct-sequence spread-spectrum technology.
  • 19. WiFi[5] 802.11a Standard • Completely different from 11b and 11g. • Flexible because multiple channels can be combined for faster throughput and more access points can be co- located. • Shorter range than 11b and 11g. • Runs in the 5 GHz range, so less interference from other devices. • Has 12 channels, 8 non-overlapping, and supports rates from 6 to 54 Mbps, but realistically about 27 Mbps max • Uses frequency division multiplexing
  • 20. WiFi[6] 802.11g Standard • Extension of 802.11b, with the same disadvantages (security and interference). • Has a shorter range than 802.11b. • Is backwards compatible with 802.11b so it allows or a smooth transition from 11b to 11g. • Flexible because multiple channels can be combined for faster throughput, but limited to one access point. • Runs at 54 Mbps, but realistically about 20-25 Mbps and about 14 Mbps when b associated • Uses frequency division multiplexing
  • 21. WiFi[7] 802.11n Standard • The newest IEEE standard in the Wi-Fi category is 802.11n. It was designed to improve on 802.11g in the amount of bandwidth. • 802.11n adds technology called multiple-input multiple-output (MIMO), a signal processing and smart antenna technique for transmitting multiple data streams through multiple antennas. The result? Up to five times the performance and up to twice the range compared to the earlier 802.11g standard. • 802.11n connections support data rates of over 300 Mbps. • Runs in the 2.4 and 5 GHz range.
  • 22. WiFi[8] Which one to choose? • (A) 802.11a Frequency- 5 GHz Typical Data Rate - 23 Mbit/s Max Data rate – 54 Mbit/s Range –30 m(100ft) outdoors Cost: highest cost. • (B) 802.11b Frequency - 2.4 GHz Typical Data Rate - 4.5 Mbit/s Max Data rate – 11 Mbit/s Range - 95 m(300 ft) outdoors Cost: lowest cost. • (G) 802.11g Frequency - 2.4 GHz Typical Data Rate – 19 Mbit/s Max Data rate - 54 Mbit/s Range – 95 m(300 ft) outdoors Cost: costs more than 11b. • (N) 802.11n Frequency - 5GHz and/or 2.4GHz Typical Data Rate - 74 Mbit/s Max Data rate - 300 Mbit/s (2 streams) Range–190 m(600 ft) outdoors Cost: costs more than 11g.
  • 23. WiFi[9] Basic Security Strategies • Block your Service Set Identifier (SSID) from being broadcast. • SSID that allows to identify the service network; it is a 32 bytes character string of a variable size. • SSID is used in order to guarantee the authentication and the identification between an AP and a client. • Wireless beacon so PCs can easily find the access point. • Change the default network name in the access point. • Change the default access point password. • Center the access point in the middle of the building, house or any other place.
  • 24. WiFi[10] Media Access Control (MAC) Filtering • Every network device has a unique MAC address • Allocated by the manufacturer. • MAC Filtering only allows certain addresses access. • Mostly for home use. • Tedious to implement on a large scale.
  • 25. WiFi[11] Wired Equivalency Protocol (WEP) • Basic encryption technology. • Uses an RC4 stream cipher. • Pseudo-random bytes. • Two versions: 64-bit and 128-bit versions. • Built into Wi-Fi certified equipment. • Implemented at the MAC level. • Protects radio signal between device and access point. • Does not protect data beyond the access point. • Uses static encryption keys. • Easy to crack. • Still better than nothing.
  • 26. WiFi[12] Wi-Fi Protected Access (WPA) • Designed to replace WEP. • Firmware update. • 128-bit Temporal Key Integrity Protocol (TKIP) encryption. • Uses a master key that is regularly changed. • User authentication. • Data Integrity. • Protects radio signal between device and access point. • Built into Wi-Fi certified equipment. • Implemented at the MAC level. • Available in two versions: • WPA2 Personal. • WPA2 Enterprise.
  • 27. WiFi[13] &Wi-Fi Protected Access 2 (WPA2) Extended EAP • Designed to replace WEP. • 128-bit Advanced Encryption Standard (AES). • Based on the IEEE 802.11i standard. • Provides government level security. • Also available in two versions: • WPA2 Personal. • WPA2 Enterprise. • EAP - Extensible Authentication Protocol. • Addition to the Wi-Fi Protected Access. • Used in internal network. • Extra security for enterprise and government Wi-Fi LANs. • Several versions available
  • 28. WiFi[14] Virtual Private Network (VPN) • Creates a secure virtual “tunnel” from remote device to VPN server. • Creates an encryption scheme. • Requires authentication. • Works across the internet. • Many types and levels of VPN technology. • May include hardware and software components. • Some very expensive. • Windows provides a basic implementation in its server software.
  • 29. WiFi[15] Firewall • Can make the network or computer invisible to the internet. • Block unauthorized users. • Monitor and control flow of data to/from a network or computer. • Many types and levels of firewall technology. Hardware and software combinations Software only versions. • ZoneAlarm • enables a personal firewall that can be configured with various levels of security • Many devices provide basic firewall capability. Gateways and access points. Network address translation. Windows XP operating system.
  • 30. WiFi[16] Kerberos • Network authentication based on key distribution. • Nodes provide their own authentication. • Checks for data stream integrity. • Checks for modification. • Uses Data Encryption Standard (DES). • Any combination of these security techniques can be used. • The more security the more of a hassle. • Important when supporting users.
  • 31. Distribution of the costs of a WLAN solution (souceWLANA). This figure illustrates clearly that a great part of the costs relates to the used physical material (1: downtime, 2: expenses, 3: management, 4: development of applications, 5: outsourcing, 6: material) WiFi[17]
  • 32.
  • 33. References • WI-Fi, Bluetooth, Zigbee and Wimax by Houda Labiod, Hossam Afifi, Costantino De Santis. • ZigBee Wireless Networks and Transceivers by Shahin Farahani • 802.11® Wireless Networks: The Definitive Guide by Matthew Gast. • IEEE Standard for Information technology— Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. • Wi-Fi Security by Stewart S. Miller.