ZigBee defines the application and security layer specifications enabling interoperability between products from different manufacturers.ZigBee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless M2M networks.It is very useful in this communication world
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
High Speed data transmission in medical body sensor network by reducing the d...ijsrd.com
The technology of sensor, medical body sensor and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports are changing the way humans use computers. In this research, proposed an energy-efficient Medium Access Control (MAC) protocol based on IEEE802.16 is specifically designed for Wireless Body Area Network (WBAN) to cognitively work in high interference environment. Proposed system uses the cross-layer optimization algorithm called such as Joint Cross-Layer Width Arbitrary Filter Length Algorithm (JCL) it significantly reduces the hand-off delay, energy-level. Simulation results show that, depending on the interference level, it is able to outperform the efficient medium access control protocol and existing IPv6 over Low power Wireless personal area network (6LoWPAN) in terms of energy utilization, packet delay, and network throughput.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
This presentation provides a comprehensive state-of-the-art study of wireless sensor networks(WSN) - based IoT MAC protocols, design guidelines that inspired these protocols,
as well as their drawbacks and shortcomings.
Evaluation of 5G Data Duplication for URLLC - Nomor Reseach GmbHEiko Seidel
As you might know Data Duplication can be used in combination of Carrier Aggregation or Dual Connectivity to increase reliability for services such as URLLC. Enclosed a paper of my colleague Dr. Volker Pauli with 5G system/protocol level simulation results for different scenarios for a CU/DU split architecture. Packet loss rates of 10-5 are feasible for URLLC within restricted service areas.
The wireless technology which has wide range of applications in automation and control. Low power consumption and reliable data transfer is main advantage of this technology
High Speed data transmission in medical body sensor network by reducing the d...ijsrd.com
The technology of sensor, medical body sensor and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports are changing the way humans use computers. In this research, proposed an energy-efficient Medium Access Control (MAC) protocol based on IEEE802.16 is specifically designed for Wireless Body Area Network (WBAN) to cognitively work in high interference environment. Proposed system uses the cross-layer optimization algorithm called such as Joint Cross-Layer Width Arbitrary Filter Length Algorithm (JCL) it significantly reduces the hand-off delay, energy-level. Simulation results show that, depending on the interference level, it is able to outperform the efficient medium access control protocol and existing IPv6 over Low power Wireless personal area network (6LoWPAN) in terms of energy utilization, packet delay, and network throughput.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
This presentation provides a comprehensive state-of-the-art study of wireless sensor networks(WSN) - based IoT MAC protocols, design guidelines that inspired these protocols,
as well as their drawbacks and shortcomings.
Evaluation of 5G Data Duplication for URLLC - Nomor Reseach GmbHEiko Seidel
As you might know Data Duplication can be used in combination of Carrier Aggregation or Dual Connectivity to increase reliability for services such as URLLC. Enclosed a paper of my colleague Dr. Volker Pauli with 5G system/protocol level simulation results for different scenarios for a CU/DU split architecture. Packet loss rates of 10-5 are feasible for URLLC within restricted service areas.
The wireless technology which has wide range of applications in automation and control. Low power consumption and reliable data transfer is main advantage of this technology
Zigbee is a technological standard designed for control and sensor networks based on IEEE 802.15.4. The standard is developed and promoted by the Zigbee Alliance.
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
A network which connects a bunch of distributed low-power sensor nodes together, with each node dedicated to a predefined operation can be visualized as a Wireless Sensor Network (WSN).
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
What is Zigbee?
this presentation is based on Zigbee
this presentation contains what is zigbee how it works what are their types for what is used how it works introducton contains all the things along with the diagram of zigbee this presentation is very easily understandable..
zigbee architectture is involved
the application of zigbee
the advantages of zigbee
the conclusion of zigbee
it is very helpful for the projects based on home automation security purposes industrial automation... so go through it contains all details about zigbee
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESVLSICS Design
The rapid development in wireless networking has been witnessed in past several years, which aimed on high speed and long range applications. There are different protocol standards used for the short range wireless communication namely the Bluetooth, ZigBee, Wimax and Wi-Fi. Among these standards ZigBee is based on IEEE 802.15.4 protocol can meet a wider variety of real industrial needs due to its long-term battery operation and reliability of the mesh networking architecture. The increasing demand for low data rate and low power networking led to the development of ZigBee technology. This technology was developed for Wireless Personal Area Networks (WPAN), directed at control and military applications, where low cost, low data rate, and more battery life were main requirements. This paper presents VerilogHDL simulation of the Top level module (Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-Chip block, OQPSK block and Pulse shaping) of the ZigBee transmitter for IoT applications.
Zigbee Transmitter for IoT Wireless DevicesVLSICS Design
The rapid development in wireless networking has been witnessed in past several years, which aimed on high speed and long range applications. There are different protocol standards used for the short range wireless communication namely the Bluetooth, ZigBee, Wimax and Wi-Fi. Among these standards ZigBee is based on IEEE 802.15.4 protocol can meet a wider variety of real industrial needs due to its long-term battery operation and reliability of the mesh networking architecture. The increasing demand for low data rate and low power networking led to the development of ZigBee technology. This technology was developed for Wireless Personal Area Networks (WPAN), directed at control and military applications, where low cost, low data rate, and more battery life were main requirements. This paper presents VerilogHDL simulation of the Top level module (Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-Chip block, OQPSK block and Pulse shaping) of the ZigBee transmitter for IoT applications.
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
ZigBee is one of the most widely used wireless comm
unication technologies. ZigBee is being widely used
for sensor communications and many other research f
ields. Why consider ZigBee? Because it is cheap and
has better compatibility when compared to other com
munication technologies. We have given a detailed
description on comparison between all the available
technologies. In this paper, we have discussed so
me
basic concepts about ZigBee and its security aspect
s in networking. We have also listed out the major
manufacturers who are into the production of the tr
ansceivers for ZigBee
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
2. Contents
What is Zigbee Technology 3
Features of Zigbee Technology 4
Zigbee Architecture 5
Zigbee Operating Modes 10
Zigbee Topologies 10
Applications of Zigbee Technology 12
2
3. In this present communication world, there are numerous high-data rate communication
standards that are available, but none of these meet the sensors’ and control devices’
communication standards. These high-data rate communication standards require low-
latency and low-energy consumption even at low bandwidths. The available proprietary
wireless systems’ Zigbee technology' s low-cost and low-power consumption and its
excellent and superb characteristics make this communication best suited for several
embedded applications, industrial control systems, and home-automation systems, and
so on.
Zigbee communication is specially built for control and sensor networks with IEEE
802.15.4 standard for wireless personal area networks (WPANs), and it is the product of
the Zigbee Alliance. This communication standard defines physical and Media Access
Control (MAC) layers to handle many devices at low-data rates. These Zigbee’s WPANs
operate at 868 MHz, 902-928MHz and 2.4 GHz frequencies. The data rate of 250 kbps is
best suited for periodic as well as intermediate two-way transmission of data between
sensors and controllers.
Zigbee is low-cost and low-powered mesh network widely deployed for controlling and
monitoring applications wherein it covers 10-100 meters within the range. This
communication system is less expensive and simpler than the other proprietary short-
range wireless sensor networks such as Bluetooth and WI-Fi.
What is Zigbee Technology?
3
4. Zigbee supports different network configurations for master to master or master to slave
communications. And also, it can be operated in different modes, as a result, the battery
power can be conserved. Zigbee networks are extendable with the use of routers and
allow many nodes to interconnect with each other for building a wide area network.
Zigbee addresses the periodic and intermittent data at application defined rates and low-
latency repetitive data by allocating time slots. The beacon system handles Periodic data
(sensor data). The intermittent data (light switch) is handled either by beaconless system
or in disconnected fashion, and the guaranteed time slots are for low-latency data
applications.
Ÿ Simple protocol and global implementation
Ÿ High density of nodes per network 18,450,000,000,000,000,000 devices (64 bit IEEE
address) and 65,535 networks
Ÿ Data rates of 250 kbps at 2.4 GHz, 40 kbps at 915 MHz and 20 kbps at 868 MHz
Ÿ Low power consumption and long battery life
Ÿ Multiple topologies: star, mesh, peer-to-peer
Ÿ Optional guaranteed time slot for low latency applications
Ÿ Range: Typically 50m (Based on the environment, it is 5-500m)
Features of Zigbee Technology
4
5. Zigbee Architecture
The Zigbee system structure consists of three different types of devices: Zigbee
coordinator, Router and End device.
Ÿ Every Zigbee network must consists of at least one coordinator, which acts as a root
and the bridge of the network. The coordinator is responsible for handling and storing
the information while performing receiving and transmitting data operations.
Ÿ Zigbee routers act as intermediary devices that permit data to pass to and fro through
them to other devices.
Ÿ End devices have limited functionality to communicate with the parent nodes such
that the battery power is saved, as shown in the figure. The number of routers,
coordinators and end devices depends on the type of network such as star, tree and
mesh networks.
Ÿ Full function device (FFD) can function in any topology like star, peer to peer, etc and it's
also capable of being either coordinator or network coordinator. This is capable of
communicating with any other device with network. Full MAC is implemented to this
device and it can be a PAN coordinator, coordinator or a device.
Ÿ Reduced Function Device (RFD) is limited only to star topology; and, it is a device which
cannot become a network coordinator. Partial MAC is implemented to these devices.
Zigbee System Structure
5
6. Zigbee protocol architecture consists of a stack of various layers wherein IEEE 802.15.4 is
defined by physical and MAC layers while this protocol is completed by accumulating a
Zigbee’s own network and application layers.
Ÿ Physical Layer: This layer does modulation and demodulation operations up on
transmitting and receiving signals respectively. This layer’s frequency, date rate and
the number of channels are given below.
Ÿ MAC Layer: This layer is responsible for reliable transmission of data by accessing
different networks with the carrier sense multiple access collision avoidance (CSMA).
This also transmits the beacon frames for synchronizing communication.
6
7. MAC layer of IEEE 802.15.4 defines four frame structures, namely beacon frame which is
used by the coordinator for transmitting beacons, data frame for transferring of data,
acknowledgement frame for confirmation of successful reception of a frame, and a MAC
command frame for handling all entity control transfers of MAC peers, which are given
below. The overheads of physical and MAC layers are given in the below figure, wherein
the data frame uses 15 to 31 Octets of overhead for single packet, which is approximately
120 bits.
When the beacon-enabled mode is selected by the coordinator, then it uses superframe
structure to manage communication between the network devices. This superframe
format is defined by the coordinator and is bounded by network beacons. It is divided into
16 slots with equal length - and, in each superframe, the beacon frame is transmitted in
the first slot, as shown in the figure. The coordinator automatically turns off the beacon
transmission if it does not wish to use a superframe structure.
The beacons synchronize the attached devices, identifie the PAN, and describe the
structure of the superframes. A slotted CSMA-CA mechanism comes into action
whenever any device wishing to communicate between the two beacons shall compete
with other devices during the contention access period (CAP). For applications that
require specific data bandwidth or low latency applications, the PAN coordinator may
dedicate portions of the active superframe to that application; these are called
guaranteed time slots (GTSs).
7
8. Beacon Frame Format of MAC Layer
Command Frame Format of MAC layer
Data /Acknowledgement frame formats
8
9. Ÿ Network Layer: This layer takes care of all network related operations such as
network setup, end device connection and disconnection to network, synchronizing
the devices with other devices, configuring a new device, addressing, routing, security
to the network, etc.
A coordinator does an energy scan for finding the best RF channel for its new network
when the coordinator attempts to establish a Zigbee network. The coordinator assigns a
PAN ID or logical network identifier to the channel chosen by it, and then applies the
network identifier to all the devices that want to join the network. It is possible for a node
to join directly or through association to the network. To join directly, the node’s
extended address has to be added into the neighbor table of a device by the system's
designer, whereas to join through the association, the node sends a beacon request to a
channel and repeats it to all channels until it finds a network which is acceptable to join.
Ÿ Application Layer This layer consists of the application sub-layer, Zigbee device
object (ZDO) and the manufacture-defined application objects.
Application Support Sub-Layer enables the services necessary for Zigbee device object
and application objects to interface with the network layers for data managing services.
This layer is responsible for matching two devices, according to their services and needs.
Application Framework provides two types of data services as a key value pair and
generic message services. A generic message is a developer defined structure, whereas
the key value pair is used for getting attributes within the application objects.
Zigbee Device Object (ZDO) provides an interface between the application objects and
APS layer in Zigbee devices. It is responsible for detecting, initiating and binding other
devices to the network. It is responsible for establishing a security based relationship
between the devices of the network using a public key and symmetric key: security
methods of Zigbee.
Based on the ZigBee-defined application descriptions, the manufacture-defined
application objects implement the actual applications.
9
10. Zigbee Operating Modes and Its Topologies
Zigbee Topologies
Zigbee two way data is transferred in two modes: Non-beacon mode and Beacon mode.
Ÿ In a beacon mode, the coordinators and routers continuously monitor the active state
of the incoming data, hence more power is consumed. In this mode, the routers and
coordinators do not sleep because at any time any node can wake up and
communicate. However, it requires more power supply and its overall power
consumption is low because most of the devices are in an inactive state for over long
periods in the network.
Ÿ In a beacon mode, when there is no data communication from end devices, then the
routers and coordinators enter into a sleep state. Periodically this coordinator wakes
up and transmits the beacons to the routers in the network. These beacon networks
work for time slots, which means, they operate when the communication needed
results in lower duty cycles and longer battery usage. These beacon and non-beacon
modes of Zigbee can manage periodic (sensor data), intermittent (Light switches) and
repetitive data types.
Ÿ Zigbee supports several network topologies; however, the most commonly used
configurations are star, mesh and cluster tree topologies. Any topology consists of one
or more coordinator. In a star topology, the network consists of one coordinator, which
is responsible for initiating and managing the devices over the network. All other
devices are called end devices that directly communicate with the coordinator. This is
used in industries where all the endpoint devices are needed to communicate with the
central controller, and this topology is simple and easy to deploy.
10
11. Ÿ In mesh and tree topologies, the Zigbee network is extended with several routers
wherein coordinator is responsible for storing them. These structures allow any device
to communicate with any other adjacent node for providing redundancy to the data. If
any node fails, the information is routed automatically to another device by these
topologies. As the redundancy is the main factor in industries, hence mesh topology is
mostly used.
Ÿ In a cluster-tree network, each cluster consists of a coordinator with leaf nodes, and
these coordinators are connected to a parent coordinator that initiates the entire
network.
Due to the advantages of Zigbee technology like low cost and low power operating modes
and its topologies, this short range communication technology is best suited for several
applications compared to other proprietary communications, such as Bluetooth, WI-Fi,
etc. some of these comparisons such as range of Zigbee, standards, etc., are given below.
11
12. Industrial Automation: In manufacturing and production industries, a communication
link continually monitors various parameters and critical equipments. Hence, Zigbee
considerably reduces this communication cost as well as optimizes the control process
for greater reliability.
Home Automation: Zigbee is perfectly suited for controlling home appliances remotely
as a lighting system control, appliance control, heating and cooling system control, safety
equipment operations and control, surveillance, and so on.
Applications of Zigbee Technology
ZibBee Sub-Ghz Wi-Fi Bluetooth
Physical Layer Standard 802.15.4 Proprietary / 802.11 802.11 802.15.1
Application Focus Monitoring & control Monitoring & control Web, email, video Cable replacement
Battery Life (days) 100 - 1,000+ 1,000+ 0.5-5 1 - 7
Network Size 100s to 1,000s 10s to 100s 32 7
Bandwidth (Kbits/s) 20 - 250 0.5 - 1,000 11,000+ 720
Range (meters) 100 - 100+ 1 - 7,000+ 1 - 30+ 1 - 10+
Network Architecture Mesh Point-to-point, low cost Star Star
Optimized For Reliability, low power,
low cost, scalability
Long range, low power, low cost Speed Low cost,
convenience
Silicon Labs Products Ember ZibBee Em35x
Series
EZRadio, EZRadioPRO
Si10xx wireless MCUs
N/A N/A
12
13. Smart Metering: Zigbee remote operations in smart metering include energy
consumption response, pricing, support, security over power theft, etc.
Smart Grid monitoring: Zigbee operations in this smart grid involve remote
temperature monitoring, fault locating, reactive power management, and so on.
About the Edgefx Team
Right to readers
Legal Info
The credit for each and every bit of information added to this document goes to the team
of Edgefx technical writers and authors. The team of Edgefx, has been relentlessly
working to ensure that the researched and practically implemented and pragmatically
proven written work of this document must serve the purpose of its readers. With the
unmatched technical expertise and pioneering works in the field of electronics, electrical
and robotic engineering Edgefx Kits and solutions is providing technical solutions and
project kits to millions of engineering students around the globe, since 1997. The credit
for the projects and the circuits goes to the technical team of the Edgefx.
This information on this document is intended to give brief description on three phase
induction motor. Any person interested and looking forward to have this note can enjoy
the privilege and authority to download, reprint and distribute this book. However, no
person is entitled to make any modifications or alternations to the book and to use it for
his or her own monetary profits.
The content, information, concepts, technical inputs, and other such data is the sole
property of the Edgefx Technologies and the team involved in research and writing. The
information written in each and every chapter is written based on relevant research and
inputs by the team of authors.
13
14. Ways to Interact With the Edgefx Team
http://www.edgefxkits.com
http://www.elprocus.com/
https://www.facebook.com/edgefx
https://www.facebook.com/elprocus
If you are an engineering student, looking for projects, then the following link will be of
immense help to you:
If you are looking forward to the technical solutions and information on any topic relevant
to electronics, electrical, robotics and communication, then click the links given below:
You can also contact us through the social media by liking the following Facebook pages:
14