Thought of the day!!

FAIL is like a steps ,PASS is Like a Lift ,a lift may fail sometimes But, steps will always get u 2 top....!!!
----------------------------------------"A.P.J Abdul Kalam"

Search now!!

Friday, June 25, 2010

ZIG BEE Technologies




ZigBee Technology: Wireless Control that Simply Works

Why is ZigBee

needed?

There are a multitude of standards that address mid to high data rates for voice, PC LANs, video, etc. However, up till now there hasn’t been a wireless network standard that meets the unique needs of sensors and control devices. Sensors and controls don’t need high bandwidth but they do need low latency and very low energy consumption for long battery lives and for large device arrays.

There are a multitude of proprietary wireless systems manufactured today to solve a multitude of problems that also don’t require high data rates but do require low cost and very low current drain.

These proprietary systems were designed because there were no standards that met their requirements. These legacy systems are creating significant interoperability problems with each other and with newer technologies.

The ZigBee Alliance is not pushing a technology; rather it is providing a standardized base set of solutions for sensor and control systems.

· The physical layer was designed to accommodate the need for a low cost yet allowing for high levels of integration. The use of direct sequence allows the analog circuitry to be very simple and very tolerant towards inexpensive implementations.

· The media access control (MAC) layer was designed to allow multiple topologies without complexity. The power management operation doesn’t require multiple modes of operation. The MAC allows a reduced functionality device (RFD) that needn’t have

flash nor large amounts of ROM or RAM. The MAC was designed to handle large numbers of devices without requiring them to be “parked”.

· The network layer has been designed to allow the network to spatially grow without requiring high power transmitters. The network layer also can handle large amounts of nodes with relatively low latencies.

ZigBee is poised to become the global con

trol/sensor network standard. It has been designed to provide the following features:

Low power consumption, simply implemented

Users expect batteries to last many months to years! Consider that a typical single family house has about 6 smoke/CO detectors. If the batteries for each one only lasted six months, the home owner would be replacing batteries every month!

Bluetooth has many different modes and st

ates depending upon your latency and power requirements such as sniff, park, hold, active, etc.; ZigBee/IEEE 802.15.4 has active (transmit/receive) or sleep. Application software needs to focus on the application, not on which power mode is optimum for each aspect of operation.

Even mains powered equipment needs to be conscious of energy. Consider a future home with 100 wireless control/sensor devices,

Case 1: 802.11 Rx power is 667 mW (always on)@ 100 devices/home & 50,000 homes/city = 3.33 megawatts

Case 2: 802.15.4 Rx power is 30 mW (always on)@ 100 devices/home & 50,000 homes/city = 150 kilowatts

Case 3: 802.15.4 power cycled at .1%

(typical duty cycle) = 150 watts.

ZigBee devices will be more ecological than its predecessors saving megawatts at it full deployment.

Low cost (device, installation, maintenance)

Low cost to the users means low device cost, low installation cost and low maintenance. ZigBee devices allow batteries to last up to years using primary cells (low cost) without any chargers (low cost and easy installation). ZigBee’s simplicity allows for inherent configuration and redundancy of network devices provides low maintenance.

High density of nodes per network

ZigBee’s use of the IEEE 802.15.4 PHY and MAC allows networks to handle any number of devices. This attribute is critical for massive sensor arrays and control networks.

Simple protocol, global implementation

ZigBee’s protocol code stack is estimated t

o be about 1/4th of Bluetooth’s or 802.11’s. Simplicity is essential to cost, interoperability, and maintenance. The IEEE 802.15.4 PHY adopted by ZigBee has been designed for the 868 MHz band in Europe, the 915 MHz band in N America, Australia, etc; and the 2.4 GHz band is now recognized to be a global band accepted in almost all countries.

ZigBee/IEEE 802.15.4 - General Characteristics

· Dual PHY (2.4GHz and 868/915 MHz)

Data rates of 250 kbps (@2.4 GHz), 40 kbps (@ 915 MHz), and 20 kbps (@868 MHz)

Optimized for low duty-cycle applications (<0.1%)

CSMA-CA channel access

Yields high throughput and low latency for low duty cycle devices like sensors and controls

Low power (battery life multi-month to

years)

Multiple topologies: star, peer-to-peer, mesh

Addressing space of up to:

18,450,000,000,000,000,000 devices (64 bit IEEE address)

65,535 networks

Optional guaranteed time slot for applications requiring low latency

Fully hand-shaked protocol for tran

sfer reliability

Range: 50m typical (5-500m based on environment)

ZigBee/IEEE802.15.4 - Typical Traffic Types Addressed

Periodic data

Application defined rate (

e.g., sensors)

Intermittent data

Application/external stimulus defined rate (e.g., light switch)

Repetitive low latency data

Allocation of time slots (

e.g., mouse)

Each of these traffic types mandates different attributes from the MAC. The IEEE802.15.4 MAC is flexible enough to handle each of these types.

· Periodic data can be handled using the beaconing system whereby the sensor will wake up for the beacon, check for any messages and then g

o back to sleep.

· Intermittent data can be handled either in a beaconless system or in a disconnected fashion. In a disconnected operation the device will only attach to the network when it needs to communicate saving significant energy.

· Low latency applications may choose to the guaranteed time slot (GTS) option. GTS is a method of QoS in that it allows each device a specific duration of time each Superframe to do whatever it wishes to do without contention or latency.

The IEEE 802.15.4 PHY and MAC along with ZigBee’s Network and Application Support Layer provide:

· Extremely low cost

· Ease of implementation

· Reliable data transfer

· Short range operation

· Very low power consumption

· Appropriate levels of security

There are two physical device types for the lowest system cost

To allow vendors to supply the lowest pos

sible cost devices the IEEE standard defines two types of devices: full function devices and reduced function devices

Full function device (FFD)

· Can function in any topology

· Capable of being the Network coordinator

· Capable of being a coordinator

· Can talk to any other device

Reduced function device (RFD)

· Limited to star topology

· Cannot become a network coordinator

· Talks only to a network coordi

nator

· Very simple implementation

An IEEE 802.15.4/ZigBee network requires at least one full function device as a network coordinator, but endpoint devices may be reduced functionality devices to reduce system cost.

All devices must have 64 bit IEEE ad

dresses

Short (16 bit) addresses can be allocated to reduce packet size

Addressing modes:

Network + device identifier (star)

Source/destination identifier (peer-peer)


Frame Structure


The frame structures have been designed to keep the complexity to a minimum while at the same time making them sufficiently robust for transmission on a noisy channel. Each successive protocol layer adds to the structure with layer-specific headers and footers.

The IEEE 802.15.4 MAC defines four frame structures:

· A beacon frame, used by a coordinator to transmit beacons.

· A data frame, used for all transfers of data.

· An acknowledgment frame, used for confirming successful frame reception.

· A MAC command frame, used for handling all MAC peer entity control transfers.

The data frame is illustrated below:


The Physical Protocol Data Unit is the total information sent over the air. As shown in the illustration above the Physical layer adds the following overhead:

Preamble Sequence 4 Octets

Start of Frame Delimiter 1 Octet

Frame Length 1 Octet

The MAC adds the following overhead:

Frame Control 2 Octets

Data Sequence Number 1 Octet

Address Information 4 – 20 Octets

Frame Check Sequence 2 Octets

In summary the total overhead for a single packet is therefore 15 -31 octets (120 bits); depending upon the addressing scheme used (short or 64 bit addresses). Please note that these numbers do not include any security overhead.


Super Frame Structure


The LR-WPAN standard allows the optional use of a superframe structure. The format of the superframe is defined by the coordinator. The superframe is bounded by network beacons, is sent by the coordinator (See Figure 4) and is divided into 16 equally sized slots. The beacon frame is transmitted in the first slot of each superframe. If a coordinator does not wish to use a superframe structure it may turn off the beacon transmissions. The beacons are used to synchronize the attached devices, to identify the PAN, and to describe the structure of the superframes. Any device wishing to communicate during the contention access period (CAP) between two beacons shall compete with other devices using a slotted CSMA-CA mechanism. All transactions shall be completed by the time of the next network beacon.


For low latency applications or applications requiring specific data bandwidth, the PAN coordinator may dedicate portions of the active superframe to that application. These portions are called guaranteed time slots (GTSs). The guaranteed time slots comprise the contention free period (CFP), which always appears at the end of the active superframe starting at a slot boundary immediately following the CAP, as shown in Figure 5. The PAN coordinator may allocate up to seven of these GTSs and a GTS may occupy more than one slot period. However, a sufficient portion of the CAP shall remain for contention based access of other networked devices or new devices wishing to join the network. All contention based transactions shall be complete before the CFP begins. Also each device transmitting in a GTS shall ensure that its transaction is complete before the time of the next GTS or the end of the CFP.


MAC Data Service Diagrams



Non-beacon network communication

Beacon network communication

MAC Primitives

MAC Data Service

MCPS-DATA – exchange data packets between MAC and PHY

MCPS-PURGE – purge an MSDU from the transaction queue

MAC Management Service

MLME-ASSOCIATE/DISASSOCIATE – network association

MLME-SYNC / SYNC-LOSS - device synchronization

MLME-SCAN - scan radio channels

MLME- COMM-STATUS – communication status

MLME-GET / -SET– retrieve/set MAC PIB parameters

MLME-START / BEACON-NOTIFY – beacon management

MLME-POLL - beaconless synchronization

MLME-GTS - GTS management

MLME-RESET – request for MLME to perform reset

MLME-ORPHAN - orphan device management

MLME-RX-ENABLE - enabling/disabling of radio system



Security

When security of MAC layer frames is desired, ZigBee uses MAC layer security to secure MAC command, beacon, and acknowledgement frames. ZigBee may secure messages transmitted over a single hop using secured MAC data frames, but for multi-hop messaging ZigBee relies upon upper layers (such as the NWK layer) for security. The MAC layer uses the Advanced Encryption Standard (AES) [10] as its core cryptographic algorithm and describes a variety of security suites that use the AES algorithm. These suites can protect the confidentiality, integrity, and authenticity of MAC frames. The MAC layer does the security processing, but the upper layers, which set up the keys and determine the security levels to use, control this processing. When the MAC layer transmits (receives) a frame with security enabled, it looks at the destination (source) of the frame, retrieves the key associated with that destination (source), and then uses this key to process the frame according to the security suite designated for the key being used. Each key is associated with a single security suite and the MAC frame header has a bit that specifies whether security for a frame is enabled or disabled.

When transmitting a frame, if integrity is required, the MAC header and payload data are used in calculations to create a Message Integrity Code (MIC) consisting of 4, 8, or 16 octets. The MIC is right appended to the MAC payload. If confidentiality is required, the MAC frame payload is also left appended with frame and sequence counts (data used to form a nonce). The nonce is used when encrypting the payload and also ensures freshness to prevent replay attacks. Upon receipt of a frame, if a MIC is present, it is verified and if the payload is encrypted, it is decrypted. Sending devices will increase the frame count with every message sent and receiving devices will keep track of the last received count from each sending device. If a message with an old count is detected, it is flagged with a security error. The MAC layer security suites are based on three modes of operation. Encryption at the MAC layer is done using AES in Counter (CTR) mode and integrity is done using AES in Cipher Block Chaining (CBC- MAC) mode [16]. A combination of encryption and integrity is done using a mixture of CTR and CBC- MAC modes called the CCM mode.

The NWK layer also makes use of the Advanced Encryption Standard (AES). However, unlike the MAC layer, the security suites are all based on the CCM* mode of operation. The CCM* mode of operation is a minor modification of the CCM mode used by the MAC layer. It includes all of the capabilities of CCM and additionally offers encryption-only and integrity-only capabilities. These extra capabilities simplify the NWK layer security by eliminating the need for CTR and CBC-MAC modes. Also, the use of CCM* in all security suites allows a single key to be used for different suites. Since a key is not strictly bound to a single security suite, an application has the flexibility to specify the actual security suite to apply to each NWK frame, not just whether security is enabled or disabled




No comments:

Post a Comment

Ads

Popular Posts