SlideShare a Scribd company logo
Today topic is: WPAN According
To ZIGBEE
INTRODUCTION
• Development started 1998, when many engineers
realized that WiFi and Bluetooth were going to be
unsuitable for many applications.
• The IEEE 802.15.4 standard was completed in May
2003.
• The ZigBee specifications were ratified on 14
December 2004.
• The ZigBee Alliance announced public availability of
Specification 1.0 on 13 June 2005.
• Much research is still going on with ZigBee.
WHAT IS ZIGBEE?
•Technological Standard Created for
Control and Sensor Networks
•Based on the IEEE 802.15.4 Standard
•Created by the ZigBee Alliance
ZIGBEE ALLIANCE (COMPANY)
• Organization defining global standards for reliable,
cost‐effective, low power wireless applications.
• Developing applications and network capability
utilizing the 802.15.4 packet delivery mechanism.
CHARACTERISTICS
• Low cost
• Low power consumption
• Low data rate
• Relatively short transmission range
• Scalability (System capacity, capability)
• Reliability
• Flexible protocol design suitable for many applications
IEEE 802.15.4 STANDARD AND ZIGBEE
• The IEEE 802.15.4 standard defines both the physical
and MAC layer protocols for most remote monitoring
and control, as well as sensor network applications.
ZigBee is an industry consortium with the goal of
promoting the IEEE 802.15.4 standard. ZigBee ensures
interoperability by defining higher network layers and
application interfaces.
ZIGBEE
• Zigbee emerging applications of Wireless Sensor
Network is wireless monitoring and control.
• ZigBee is such an application that uses low-power and
low-data-rate networked sensors. It was developed by
the ZigBee Alliance, an industry association of
semiconductor companies and network equipment
companies such as Ember, Honeywell, Mitsubishi
Electric, Motorola, Samsung, and Philips.
ZIGBEE JUST LIKE HONEYBEES
• The term ZigBee refers to the silent communication
between honeybees where the bee dances in a zig-zag
pattern to tell others the location, distance, and
direction of some newly found food.
IEEE 802.15.4 LR-WPAN (ZIGBEE)
• ZigBee technology is simpler (and less expensive) than
Bluetooth.
• The main objectives of an LR-WPAN like ZigBee are ease of
installation, reliable data transfer, short-range operation,
extremely low cost, and a reasonable battery life, while
maintaining a simple and flexible protocol.
• The raw data rate will be high enough (maximum of 250 kbit/s)
to satisfy a set of simple needs such as interactive toys, but is
also scalable down to the needs of sensor and automation
needs (20 kbit/s or below) using wireless communications.
ZIGBEE USAGE
• The initial target markets of ZigBee products are home control,
building control, industrial automation, personal healthcare,
consumer electronics, PC and peripherals control, etc. Key
specs of ZigBee include the following:
● Frequency bands: 868 MHz, 915 MHz, and 2.4 GHz
● Data transfer rate up to 250 Kbps
● Signal transmission range of 10 to 100 m, depending on the
sensors being
used
● AES(Advanced Encryption Standard) encryption of data
● Various ZigBee applications can work with each other
● Low power usage
ZIGBEE FREQUENCIES
• Operates in Unlicensed Bands
• ISM(International Safety Management) 2.4 GHz Global
Band at 250kbps
• 868 MHz European Band at 20kbps
• 915 MHz North American Band at 40kbps
IEEE 802.15.4 & ZIGBEE IN CONTEXT
S
PHY
868MHz / 915MHz / 2.4GHz
MAC
Network
Star / Mesh / Cluster-Tree
Security
32- / 64- / 128-bit encryption
Application
API
ZigBee
Alliance
IEEE
802.15.4
Customer
Silcon Stack App
“the software”
- Network, Security & Application layers
- Brand management
IEEE 802.15.4
- “the hardware”
- Physical & Media Access Control layers
SECURITY
• Encryption specified for MAC, Network and APS layers
• Encryption/Authentication mode CCM(CTR +CBC-MAC)
• CTR is a counter based encryption mode
• CBC-MAC provides data integrity
• All security is based on 128bit key and AES-128 block
encryption method
IEEE 802.15.4 PHYSICAL LAYER
• PHY functionalities:
• Activation and deactivation of the radio transceiver
• Energy detection within the current channel
• Link quality indication for received packets
• Clear channel assessment for CSMA-CA
• Channel frequency selection
• Data transmission and reception
PHY FRAME STRUCTURE
• PHY packet fields
• Preamble (32 bits) – synchronization
• Start of packet delimiter (8 bits) – shall be formatted as “11100101”
• PHY header (8 bits) –PSDU length
• PSDU (0 to 127 bytes) – data field
Start of
Packet
Delimiter
PHY Header
Sync Header
Frame
Length
(7 bit)
Preamble
PHY Payload
PHY Service
Data Unit (PSDU
Reserv
e
(1 bit
4 Octets 1 Octets 1 Octets 0-127 Bytes
WHAT DOES ZIGBEE DO?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s) and
device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats, appliances,
etc.
LIGHTS AND SWITCHES
HOW ZIGBEE WORKS
• States of operation
• Active
• Sleep
• Devices
• Full Function Devices (FFD’s)
• Reduced Function Devices (RFD’s)
• Modes of operation
• Beacon
• Non-beacon
HOW ZIGBEE WORKS
•Topology
•Star
•Cluster Tree
•Mesh
•Network coordinator, routers, end devices
LR-WPAN DEVICE TYPES
Two different device types can participate in an LR-WPAN
network:
• Full-function devices (FFD) can operate in three modes serving
as a personal area network (PAN) coordinator, a coordinator, or
a device.
• Reduced-function devices (RFD) are intended for applications
that are extremely simple.
An FFD can talk to RFDs or other FFDs, while an RFD can talk
only to an FFD.
NETWORK TOPOLOGIES (1)
• Two or more devices communicating on the same physical
channel constitute a WPAN. The WPAN network must include at
least one FFD that operates as the PAN coordinator.
• The PAN coordinator initiates, terminates, or routes
communication around the network. The PAN coordinator is the
primary controller of the PAN.
• The WPAN may operate in either of two topologies: the star
topology or the peer-to-peer topology.
NETWORK TOPOLOGIES (2)
Star topology In a star network, after an FFD is
activated for the first time, it may
establish its own network and become
the PAN coordinator.
The PAN coordinator can allow other
devices to join its network.
PAN coordinator (always FFD) FFD RFD
NETWORK TOPOLOGIES (3)
In a peer-to-peer network, each FFD
is capable of communicating with any
other FFD within its radio sphere of
influence. One FFD will be nominated
as the PAN coordinator.
Peer-to-peer topology
A peer-to-peer network can be ad hoc, self-
organizing and self-healing, and can combine
devices using a mesh networking topology.
ZIGBEE PHY AND MAC PARAMETERS
Topology
RF band
RF channels
Spreading
Chip rate
Modulation
Access method
Ad hoc (central PAN coordinator)
2.4 GHz ISM frequency band
16 channels with 5 MHz spacing
DSSS (32 chips / 4 bits)
2 Mchip/s
Offset QPSK
CSMA/CA (or slotted CSMA/CA)
SPREADING AND MODULATION
• Four consecutive bits are mapped into a data symbol. Each
symbol is mapped into a 32-chip pseudorandom sequence. The
even-indexed and odd-indexed chips of the chip sequence
representing each data symbol are modulated onto the carrier
using Offset-QPSK in the following way:
C0 C2 C4 C6 C8 C10 C12 ...
...
C1 C3 C5 C6 C9 C11 C13 ...
...
I-phase
Q-phase
BEACON FRAMES
• The LR-WPAN standard allows the optional use of a superframe
structure. The format of the superframe is defined by the
coordinator. The superframe is bounded by network beacons,
sent by the coordinator, and is divided into 16 equally sized
slots. The beacon frame is transmitted in the first slot of each
superframe. If a coordinator does not wish to use a superframe
structure, it may turn off the beacon transmissions. The
beacons are used to synchronize the attached devices, to
identify the PAN, and to describe the superframe structure.
CSMA/CA OPERATION (1)
• Nonbeacon-enabled networks use an unslotted CSMA-CA
channel access mechanism. Each time a device wishes to
transmit data frames or MAC commands, it shall wait for a
random period. If the channel is found to be idle, following the
random backoff, the device shall transmit its data. If the
channel is found to be busy, following the random backoff, the
device shall wait for another random period before trying to
access the channel again.
• Acknowledgment frames shall be sent without using a CSMA-
CA mechanism.
CSMA/CA OPERATION (2)
• Beacon-enabled networks use a slotted CSMA-CA channel
access mechanism, where the backoff slots are aligned with the
start of the beacon transmission.
• Each time a device wishes to transmit data frames, it shall wait
for a random number of backoff slots. If the channel is busy,
following this random backoff, the device shall wait for another
random number of backoff slots before trying to access the
channel again. If the channel is idle, the device can begin
transmitting on the next available backoff slot boundary.
ZIGBEE PRODUCTS
• Development Kits
• Sensors
• Transceivers
• Modules
CURRENT ZIGBEE USES
•Environmental Monitoring
•Agricultural Monitoring
•Home Automation Still on Horizon
PRODUCT APPLICATIONS
• Road map products-tracking
• Consumer electronics
• PC
• Personal and healthcare
• Commercial and residential control
ZIGBEE’S FUTURE

More Related Content

What's hot

Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
3G4G
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
Sohan Bappy
 
Next Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart DriversNext Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart DriversRyo Jin
 
ZigBee energy manager Keletron presales
ZigBee  energy manager Keletron presalesZigBee  energy manager Keletron presales
ZigBee energy manager Keletron presales
Yiannis Hatzopoulos
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
SHUBHAM MORGAONKAR
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
Salah Amean
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
EC-Council
 
LTE Long Term Evolution
LTE Long Term EvolutionLTE Long Term Evolution
LTE Long Term Evolution
ajus ady
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
Darren Pauli
 
LTE Introduction - Hello World to LTE
LTE Introduction - Hello World to LTELTE Introduction - Hello World to LTE
LTE Introduction - Hello World to LTE
Sachidananda Sahu
 
LPWAN Technology ~ What is Weightless-P?
LPWAN Technology ~ What is Weightless-P? LPWAN Technology ~ What is Weightless-P?
LPWAN Technology ~ What is Weightless-P?
Jay Wey 魏士傑
 
Aug12 sridhar
Aug12 sridharAug12 sridhar
Aug12 sridhar
Hossein Abbasi
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban Challenges
Digital Catapult
 
Gsc20 session6 5_g_chih_ieee
Gsc20 session6 5_g_chih_ieeeGsc20 session6 5_g_chih_ieee
Gsc20 session6 5_g_chih_ieee
Abdisalam A. Mohamed
 
Weightless - a new standard, a new technology
Weightless - a new standard, a new technologyWeightless - a new standard, a new technology
Weightless - a new standard, a new technology
Dhruvit Rajpura
 
LPWAN for IoT
LPWAN for IoTLPWAN for IoT
LPWAN for IoT
David Fowler
 
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3G4G
 

What's hot (20)

IEEE 802.11n
IEEE 802.11nIEEE 802.11n
IEEE 802.11n
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
 
Next Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart DriversNext Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart Drivers
 
ZigBee energy manager Keletron presales
ZigBee  energy manager Keletron presalesZigBee  energy manager Keletron presales
ZigBee energy manager Keletron presales
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
LTE Long Term Evolution
LTE Long Term EvolutionLTE Long Term Evolution
LTE Long Term Evolution
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
 
LTE Introduction - Hello World to LTE
LTE Introduction - Hello World to LTELTE Introduction - Hello World to LTE
LTE Introduction - Hello World to LTE
 
LPWAN Technology ~ What is Weightless-P?
LPWAN Technology ~ What is Weightless-P? LPWAN Technology ~ What is Weightless-P?
LPWAN Technology ~ What is Weightless-P?
 
Aug12 sridhar
Aug12 sridharAug12 sridhar
Aug12 sridhar
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban Challenges
 
Gsc20 session6 5_g_chih_ieee
Gsc20 session6 5_g_chih_ieeeGsc20 session6 5_g_chih_ieee
Gsc20 session6 5_g_chih_ieee
 
Weightless - a new standard, a new technology
Weightless - a new standard, a new technologyWeightless - a new standard, a new technology
Weightless - a new standard, a new technology
 
LPWAN for IoT
LPWAN for IoTLPWAN for IoT
LPWAN for IoT
 
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)
 
Ch5
Ch5Ch5
Ch5
 

Similar to WPAN According To ZIGBEE

ZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdfZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdf
P0608VikasSontakke
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
National Institute of Technology Karnataka, Surathkal
 
Zigbee
ZigbeeZigbee
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx
20CE112YASHPATEL
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
Nagesh Rao
 
Seminar.pdf
Seminar.pdfSeminar.pdf
Seminar.pdf
RiyasRasheed9
 
Group A IEEE_802.15.4
Group A IEEE_802.15.4Group A IEEE_802.15.4
Group A IEEE_802.15.4
EdlynEstavillo
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
jainam bhavsar
 
Wireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyWireless zigbee communicationtechnology
Wireless zigbee communicationtechnology
M srinivasu
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01
M srinivasu
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Zigbee
 Zigbee    Zigbee
Zigbee
Ammad Marwat
 
ZigBee technology.pptx
ZigBee technology.pptxZigBee technology.pptx
ZigBee technology.pptx
AjaySahre
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
PrarthanaModak1
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
N.CH Karthik
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
Mostafa Ali
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5rajrayala
 

Similar to WPAN According To ZIGBEE (20)

ZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdfZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdf
 
Zigbee
ZigbeeZigbee
Zigbee
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
 
Zigbee
ZigbeeZigbee
Zigbee
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
Main document
Main documentMain document
Main document
 
Seminar.pdf
Seminar.pdfSeminar.pdf
Seminar.pdf
 
Group A IEEE_802.15.4
Group A IEEE_802.15.4Group A IEEE_802.15.4
Group A IEEE_802.15.4
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
Wireless zigbee communicationtechnology
Wireless zigbee communicationtechnologyWireless zigbee communicationtechnology
Wireless zigbee communicationtechnology
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Zigbee
 Zigbee    Zigbee
Zigbee
 
ZigBee technology.pptx
ZigBee technology.pptxZigBee technology.pptx
ZigBee technology.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 

More from Afaq Siddiqui

Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
Afaq Siddiqui
 
Components of System Unit
Components of System UnitComponents of System Unit
Components of System Unit
Afaq Siddiqui
 
Use Of Calculus In Programming
Use Of Calculus In ProgrammingUse Of Calculus In Programming
Use Of Calculus In Programming
Afaq Siddiqui
 
Why We Need To Study Calculus
Why We Need To Study CalculusWhy We Need To Study Calculus
Why We Need To Study Calculus
Afaq Siddiqui
 
Introduction to lambda calculus
Introduction to lambda calculusIntroduction to lambda calculus
Introduction to lambda calculus
Afaq Siddiqui
 
Introduction of calculus in programming
Introduction of calculus in programmingIntroduction of calculus in programming
Introduction of calculus in programming
Afaq Siddiqui
 
Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)
Afaq Siddiqui
 
Job analysis
Job analysisJob analysis
Job analysis
Afaq Siddiqui
 
World wide web with multimedia
World wide web with multimediaWorld wide web with multimedia
World wide web with multimediaAfaq Siddiqui
 

More from Afaq Siddiqui (9)

Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
 
Components of System Unit
Components of System UnitComponents of System Unit
Components of System Unit
 
Use Of Calculus In Programming
Use Of Calculus In ProgrammingUse Of Calculus In Programming
Use Of Calculus In Programming
 
Why We Need To Study Calculus
Why We Need To Study CalculusWhy We Need To Study Calculus
Why We Need To Study Calculus
 
Introduction to lambda calculus
Introduction to lambda calculusIntroduction to lambda calculus
Introduction to lambda calculus
 
Introduction of calculus in programming
Introduction of calculus in programmingIntroduction of calculus in programming
Introduction of calculus in programming
 
Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)
 
Job analysis
Job analysisJob analysis
Job analysis
 
World wide web with multimedia
World wide web with multimediaWorld wide web with multimedia
World wide web with multimedia
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

WPAN According To ZIGBEE

  • 1. Today topic is: WPAN According To ZIGBEE
  • 2. INTRODUCTION • Development started 1998, when many engineers realized that WiFi and Bluetooth were going to be unsuitable for many applications. • The IEEE 802.15.4 standard was completed in May 2003. • The ZigBee specifications were ratified on 14 December 2004. • The ZigBee Alliance announced public availability of Specification 1.0 on 13 June 2005. • Much research is still going on with ZigBee.
  • 3. WHAT IS ZIGBEE? •Technological Standard Created for Control and Sensor Networks •Based on the IEEE 802.15.4 Standard •Created by the ZigBee Alliance
  • 4. ZIGBEE ALLIANCE (COMPANY) • Organization defining global standards for reliable, cost‐effective, low power wireless applications. • Developing applications and network capability utilizing the 802.15.4 packet delivery mechanism.
  • 5. CHARACTERISTICS • Low cost • Low power consumption • Low data rate • Relatively short transmission range • Scalability (System capacity, capability) • Reliability • Flexible protocol design suitable for many applications
  • 6. IEEE 802.15.4 STANDARD AND ZIGBEE • The IEEE 802.15.4 standard defines both the physical and MAC layer protocols for most remote monitoring and control, as well as sensor network applications. ZigBee is an industry consortium with the goal of promoting the IEEE 802.15.4 standard. ZigBee ensures interoperability by defining higher network layers and application interfaces.
  • 7. ZIGBEE • Zigbee emerging applications of Wireless Sensor Network is wireless monitoring and control. • ZigBee is such an application that uses low-power and low-data-rate networked sensors. It was developed by the ZigBee Alliance, an industry association of semiconductor companies and network equipment companies such as Ember, Honeywell, Mitsubishi Electric, Motorola, Samsung, and Philips.
  • 8. ZIGBEE JUST LIKE HONEYBEES • The term ZigBee refers to the silent communication between honeybees where the bee dances in a zig-zag pattern to tell others the location, distance, and direction of some newly found food.
  • 9. IEEE 802.15.4 LR-WPAN (ZIGBEE) • ZigBee technology is simpler (and less expensive) than Bluetooth. • The main objectives of an LR-WPAN like ZigBee are ease of installation, reliable data transfer, short-range operation, extremely low cost, and a reasonable battery life, while maintaining a simple and flexible protocol. • The raw data rate will be high enough (maximum of 250 kbit/s) to satisfy a set of simple needs such as interactive toys, but is also scalable down to the needs of sensor and automation needs (20 kbit/s or below) using wireless communications.
  • 10. ZIGBEE USAGE • The initial target markets of ZigBee products are home control, building control, industrial automation, personal healthcare, consumer electronics, PC and peripherals control, etc. Key specs of ZigBee include the following: ● Frequency bands: 868 MHz, 915 MHz, and 2.4 GHz ● Data transfer rate up to 250 Kbps ● Signal transmission range of 10 to 100 m, depending on the sensors being used ● AES(Advanced Encryption Standard) encryption of data ● Various ZigBee applications can work with each other ● Low power usage
  • 11. ZIGBEE FREQUENCIES • Operates in Unlicensed Bands • ISM(International Safety Management) 2.4 GHz Global Band at 250kbps • 868 MHz European Band at 20kbps • 915 MHz North American Band at 40kbps
  • 12. IEEE 802.15.4 & ZIGBEE IN CONTEXT S PHY 868MHz / 915MHz / 2.4GHz MAC Network Star / Mesh / Cluster-Tree Security 32- / 64- / 128-bit encryption Application API ZigBee Alliance IEEE 802.15.4 Customer Silcon Stack App “the software” - Network, Security & Application layers - Brand management IEEE 802.15.4 - “the hardware” - Physical & Media Access Control layers
  • 13. SECURITY • Encryption specified for MAC, Network and APS layers • Encryption/Authentication mode CCM(CTR +CBC-MAC) • CTR is a counter based encryption mode • CBC-MAC provides data integrity • All security is based on 128bit key and AES-128 block encryption method
  • 14. IEEE 802.15.4 PHYSICAL LAYER • PHY functionalities: • Activation and deactivation of the radio transceiver • Energy detection within the current channel • Link quality indication for received packets • Clear channel assessment for CSMA-CA • Channel frequency selection • Data transmission and reception
  • 15. PHY FRAME STRUCTURE • PHY packet fields • Preamble (32 bits) – synchronization • Start of packet delimiter (8 bits) – shall be formatted as “11100101” • PHY header (8 bits) –PSDU length • PSDU (0 to 127 bytes) – data field Start of Packet Delimiter PHY Header Sync Header Frame Length (7 bit) Preamble PHY Payload PHY Service Data Unit (PSDU Reserv e (1 bit 4 Octets 1 Octets 1 Octets 0-127 Bytes
  • 16. WHAT DOES ZIGBEE DO? • Designed for wireless controls and sensors • Operates in Personal Area Networks (PAN’s) and device-to-device networks • Connectivity between small packet devices • Control of lights, switches, thermostats, appliances, etc.
  • 18. HOW ZIGBEE WORKS • States of operation • Active • Sleep • Devices • Full Function Devices (FFD’s) • Reduced Function Devices (RFD’s) • Modes of operation • Beacon • Non-beacon
  • 19. HOW ZIGBEE WORKS •Topology •Star •Cluster Tree •Mesh •Network coordinator, routers, end devices
  • 20. LR-WPAN DEVICE TYPES Two different device types can participate in an LR-WPAN network: • Full-function devices (FFD) can operate in three modes serving as a personal area network (PAN) coordinator, a coordinator, or a device. • Reduced-function devices (RFD) are intended for applications that are extremely simple. An FFD can talk to RFDs or other FFDs, while an RFD can talk only to an FFD.
  • 21. NETWORK TOPOLOGIES (1) • Two or more devices communicating on the same physical channel constitute a WPAN. The WPAN network must include at least one FFD that operates as the PAN coordinator. • The PAN coordinator initiates, terminates, or routes communication around the network. The PAN coordinator is the primary controller of the PAN. • The WPAN may operate in either of two topologies: the star topology or the peer-to-peer topology.
  • 22. NETWORK TOPOLOGIES (2) Star topology In a star network, after an FFD is activated for the first time, it may establish its own network and become the PAN coordinator. The PAN coordinator can allow other devices to join its network. PAN coordinator (always FFD) FFD RFD
  • 23. NETWORK TOPOLOGIES (3) In a peer-to-peer network, each FFD is capable of communicating with any other FFD within its radio sphere of influence. One FFD will be nominated as the PAN coordinator. Peer-to-peer topology A peer-to-peer network can be ad hoc, self- organizing and self-healing, and can combine devices using a mesh networking topology.
  • 24. ZIGBEE PHY AND MAC PARAMETERS Topology RF band RF channels Spreading Chip rate Modulation Access method Ad hoc (central PAN coordinator) 2.4 GHz ISM frequency band 16 channels with 5 MHz spacing DSSS (32 chips / 4 bits) 2 Mchip/s Offset QPSK CSMA/CA (or slotted CSMA/CA)
  • 25. SPREADING AND MODULATION • Four consecutive bits are mapped into a data symbol. Each symbol is mapped into a 32-chip pseudorandom sequence. The even-indexed and odd-indexed chips of the chip sequence representing each data symbol are modulated onto the carrier using Offset-QPSK in the following way: C0 C2 C4 C6 C8 C10 C12 ... ... C1 C3 C5 C6 C9 C11 C13 ... ... I-phase Q-phase
  • 26. BEACON FRAMES • The LR-WPAN standard allows the optional use of a superframe structure. The format of the superframe is defined by the coordinator. The superframe is bounded by network beacons, sent by the coordinator, and is divided into 16 equally sized slots. The beacon frame is transmitted in the first slot of each superframe. If a coordinator does not wish to use a superframe structure, it may turn off the beacon transmissions. The beacons are used to synchronize the attached devices, to identify the PAN, and to describe the superframe structure.
  • 27. CSMA/CA OPERATION (1) • Nonbeacon-enabled networks use an unslotted CSMA-CA channel access mechanism. Each time a device wishes to transmit data frames or MAC commands, it shall wait for a random period. If the channel is found to be idle, following the random backoff, the device shall transmit its data. If the channel is found to be busy, following the random backoff, the device shall wait for another random period before trying to access the channel again. • Acknowledgment frames shall be sent without using a CSMA- CA mechanism.
  • 28. CSMA/CA OPERATION (2) • Beacon-enabled networks use a slotted CSMA-CA channel access mechanism, where the backoff slots are aligned with the start of the beacon transmission. • Each time a device wishes to transmit data frames, it shall wait for a random number of backoff slots. If the channel is busy, following this random backoff, the device shall wait for another random number of backoff slots before trying to access the channel again. If the channel is idle, the device can begin transmitting on the next available backoff slot boundary.
  • 29. ZIGBEE PRODUCTS • Development Kits • Sensors • Transceivers • Modules
  • 30. CURRENT ZIGBEE USES •Environmental Monitoring •Agricultural Monitoring •Home Automation Still on Horizon
  • 31. PRODUCT APPLICATIONS • Road map products-tracking • Consumer electronics • PC • Personal and healthcare • Commercial and residential control