Microsoft PowerPoint - E1zigbee ppt

Similar documents
Microsoft PowerPoint - Aqua-Sim.pptx

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot

大同大學數位論文

...1 What?...2 Why?...3 How? ( ) IEEE / 23

穨control.PDF

lan03_yen

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

WLAN 2

中文朗科AirTrackTM T600 迷你无线路由器用户手册.doc

解 除 身 份 验 证 机 密 性 Wep 等 一 些 加 密 机 制 MSDU 传 递 (MAC Service Data Unit) 负 责 将 数 据 传 送 给 实 际 的 接 收 端 传 输 功 率 控 制 (Transmit Power Control 简 称 TPC) 欧 洲 标 准

2/80 2

財金資訊-80期.indd

ebook140-8

BC04 Module_antenna__ doc

输电线路智能监测系统通信技术应用研究

untitled

LH_Series_Rev2014.pdf

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

热设计网

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl

Introduction

untitled

Microsoft PowerPoint - STU_EC_Ch08.ppt

MAN- Metropolitan Area Network Resilient Packet Ring a : 5GHz 54Mbps b : 2.4GHz 11Mbps c : MAC Bridge 802.1D 80

Cube20S small, speedy, safe Eextremely modular Up to 64 modules per bus node Quick reaction time: up to 20 µs Cube20S A new Member of the Cube Family

Master Thesis_專門用來製作目錄.doc


WTO

RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming Media, Transaction, Bulk dat

2

Microsoft PowerPoint - ATF2015.ppt [相容模式]

VASP应用运行优化

IEC 传输帧格式


Microsoft PowerPoint ARIS_Platform_en.ppt

<4D F736F F D205F FB942A5CEA668B443C5E9BB73A740B5D8A4E5B8C9A552B1D0A7F75FA6BFB1A4ACFC2E646F63>

K301Q-D VRT中英文说明书141009

Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies to all d

工程师培训

東吳大學

Outline Speech Signals Processing Dual-Tone Multifrequency Signal Detection 云南大学滇池学院课程 : 数字信号处理 Applications of Digital Signal Processing 2

UDC The Policy Risk and Prevention in Chinese Securities Market

Microsoft PowerPoint - 数据通信-ch1.ppt

随需应变网络,恒久电信质量

致 谢 开 始 这 篇 致 谢 的 时 候, 以 为 这 是 最 轻 松 最 愉 快 的 部 分, 而 此 时 心 头 却 充 满 了 沉 甸 甸 的 回 忆 和 感 恩, 一 时 间 竟 无 从 下 笔 虽 然 这 远 不 是 一 篇 完 美 的 论 文, 但 完 成 这 篇 论 文 要 感 谢

Logitech Wireless Combo MK45 English

Time Estimation of Occurrence of Diabetes-Related Cardiovascular Complications by Ching-Yuan Hu A thesis submitted in partial fulfillment of the requi

PS PS GMM SM.zte.com.

AL-M200 Series

UDC 厦门大学博硕士论文摘要库

2. 佔 中 對 香 港 帶 來 以 下 影 響 : 正 面 影 響 - 喚 起 市 民 對 人 權 及 ( 專 制 ) 管 治 的 關 注 和 討 論 o 香 港 市 民 總 不 能 一 味 認 命, 接 受 以 後 受 制 於 中 央, 沒 有 機 會 選 出 心 中 的 理 想 特 首 o 一

東莞工商總會劉百樂中學

ebook140-9

國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 表 11 國 立 政 治 大 學 教 育 學 系 博 士 班 資 格 考 試 抵 免 申 請 表 論 文 題 目 申 報 暨 指 導 教 授 表 12 國 立 政 治 大 學 碩 博 士 班 論

IP Access Lists IP Access Lists IP Access Lists

XML SOAP DOM B2B B/S B2B B2B XML SOAP

* 1 * *1 *2 2

Microsoft Word - template.doc

HC50246_2009


Microsoft PowerPoint - ARC110_栾跃.ppt

天 主 教 輔 仁 大 學 社 會 學 系 學 士 論 文 小 別 勝 新 婚? 久 別 要 離 婚? 影 響 遠 距 家 庭 婚 姻 感 情 因 素 之 探 討 Separate marital relations are getting better or getting worse? -Exp


(Pattern Recognition) 1 1. CCD

WTO

國立中山大學學位論文典藏.PDF

第 1 章 概 述 1.1 计 算 机 网 络 在 信 息 时 代 中 的 作 用 1.2 计 算 机 网 络 的 发 展 过 程 *1.2.1 分 组 交 换 的 产 生 *1.2.2 因 特 网 时 代 *1.2.3 关 于 因 特 网 的 标 准 化 工 作 计 算 机 网 络 在

國立中山大學學位論文典藏.PDF

Microsoft Word - ChineseSATII .doc

Microsoft PowerPoint - Sens-Tech WCNDT [兼容模式]

untitled

TWGHs S

2015 Chinese FL Written examination


IP505SM_manual_cn.doc


: ( ),,


Microsoft PowerPoint - ch0.ppt

HC20131_2010

P4V88+_BIOS_CN.p65

Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化, 鼓 励 替 代

SAPIDO GR-1733 無線寬頻分享器


History Universal Universal 1958Universal 1984Magnetek Magnetek Lighting Group Universal Technologies Lighting Energy Savin

基于泛在网的智能交通应用系统总体框架

Microsoft PowerPoint - ch2-stallings.ppt

<4D F736F F F696E74202D20C8EDBCFEBCDCB9B9CAA6D1D0D0DEBDB2D7F92E707074>

本科毕业设计(论文)工作细则&撰写规范

一.NETGEAR VPN防火墙产品介绍

Simulator By SunLingxi 2003

PowerPoint Presentation

¶C¶L§§¬_™¨ A.PDF

SERVERIRON ADX

OA-253_H1~H4_OL.ai

Microsoft PowerPoint - FY Q Results.ppt [互換モード]

TX-NR3030_BAS_Cs_ indd


<4D F736F F D C4EAC0EDB9A4C0E04142BCB6D4C4B6C1C5D0B6CFC0FDCCE2BEABD1A15F325F2E646F63>

1.ai

Transcription:

ZigBee/IEEE 802.15.4 Overview Y.-C. Tseng CS/NCTU 1

New trend of wireless technology Most Wireless industry focuses on increasing high data throughput A set of applications require simple wireless connectivity, relaxed throughput, very low power, short distance and inexpensive hardware. Industrial Agricultural Vehicular Residential Medical 2

What is ZigBee Alliance? An organization with a mission to define reliable, cost effective, low-power, wirelessly networked, monitoring and control products based on an open global standard Alliance provides interoperability, certification testing, and branding 3

IEEE 802.15 working group 4

Comparison between WPAN 5

ZigBee/IEEE 802.15.4 market feature Low power consumption Low cost Low offered message throughput Supports large network orders (<= 65k nodes) Low to no QoS guarantees Flexible protocol design suitable for many applications 6

ZigBee network applications monitors sensors automation control INDUSTRIAL & COMMERCIAL CONSUMER ELECTRONIC S TV VCR DVD/CD Remote control monitors diagnostics sensors PERSONAL HEALTH CARE ZigBee LOW DATA-RATE RADIO DEVICES PC & PERIPHERAL S mouse keyboard joystick consoles portables educational TOYS & GAMES HOME AUTOMATION security HVAC lighting closures 7

Wireless technologies Range Meters 10,000 GSM GPRS EDGE 3G 2000 2003-4 2005 1,000 100 ZigBee 802.11b 802.11a/g Hiper Bluetooth 2.0 LAN/2 Bluetooth Bluetooth 1.5 WiMedia Bandwidth 10 kbps 10 100 1,000 10,000 100,000 8

ZigBee/802.15.4 architecture ZigBee Alliance 45+ companies: semiconductor mfrs, IP providers, OEMs, etc. Defining upper layers of protocol stack: from network to application, including application profiles First profiles published mid 2003 IEEE 802.15.4 Working Group Defining lower layers of protocol stack: MAC and PHY 9

How is ZigBee related to IEEE 802.15.4? ZigBee takes full advantage of a powerful physical radio specified by IEEE 802.15.4 ZigBee adds logical network, security and application software ZigBee continues to work closely with the IEEE to ensure an integrated and complete solution for the market 10

IEEE 802.15.4 overview 11

General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star or Peer-to-Peer operation. Support for low latency devices. CSMA-CA channel access. Dynamic device addressing. Fully handshaked protocol for transfer reliability. Low power consumption. Channels: 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band 1 channel in the European 868MHz band. Extremely low duty-cycle (<0.1%) 12

IEEE 802.15.4 basics 802.15.4 is a simple packet data protocol for lightweight wireless networks Channel Access is via Carrier Sense Multiple Access with collision avoidance and optional time slotting Message acknowledgement Optional beacon structure Target applications Long battery life, selectable latency for controllers, sensors, remote monitoring and portable electronics Configured for maximum battery life, has the potential to last as long as the shelf life of most batteries 13

IEEE 802.15.4 Device Types There are two different device types : A full function device (FFD) A reduced function device (RFD) The FFD can operate in three modes by serving as Device Coordinator PAN coordinator The RFD can only serve as: Device 14

FFD vs RFD Full function device (FFD) Any topology Network coordinator capable Talks to any other device Reduced function device (RFD) Limited to star topology Cannot become a network coordinator Talks only to a network coordinator Very simple implementation 15

Star topology Network coordinator Master/slave Full Function Device (FFD) Reduced Function Device (RFD) Communications Flow 16

Peer to peer topology Point to point Tree Full Function Device (FFD) Communications Flow 17

Device addressing Two or more devices communicating on the same physical channel constitute a WPAN. A WPAN includes at least one FFD (PAN coordinator) Each independent PAN will select a unique PAN identifier Each device operating on a network has a unique 64-bit extended address. This address can be used for direct communication in the PAN A device also has a 16-bit short address, which is allocated by the PAN coordinator when the device associates with its coordinator. 18

IEEE 802.15.4 physical layer 19

IEEE 802.15.4 PHY overview PHY functionalities: Activation and deactivation of the radio transceiver Energy detection within the current channel Link quality indication for received packets Clear channel assessment for CSMA-CA Channel frequency selection Data transmission and reception 20

IEEE 802.15.4 PHY Overview Operating frequency bands 868MHz/ 915MHz PHY Channel 0 Channels 1-10 868.3 MHz 902 MHz 2 MHz 928 MHz 2.4 GHz PHY Channels 11-26 5 MHz 2.4 GHz 2.4835 GHz 21

Frequency Bands and Data Rates The standard specifies two PHYs : 868 MHz/915 MHz direct sequence spread spectrum (DSSS) PHY (11 channels) 1 channel (20Kb/s) in European 868MHz band 10 channels (40Kb/s) in 915 (902-928)MHz ISM band 2450 MHz direct sequence spread spectrum (DSSS) PHY (16 channels) 16 channels (250Kb/s) in 2.4GHz band 22

PHY Frame Structure PHY packet fields Preamble (32 bits) synchronization Start of packet delimiter (8 bits) shall be formatted as 11100101 PHY header (8 bits) PSDU length PSDU (0 to 127 bytes) data field Sync Header Preamble Start of Packet Delimiter PHY Header Frame Length (7 bit) Reserve (1 bit) PHY Payload PHY Service Data Unit (PSDU) 4 Octets 1 Octets 1 Octets 0-127 Bytes 23

IEEE 802.15.4 MAC 24

Superframe Beacon CAP CFP Beacon GTS 0 GTS 1 Inactive 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 SD = abasesuperframeduration*2 SO symbols (Active) BI = abasesuperframeduration*2 BO symbols A superframe is divided into two parts Inactive: all station sleep Active: Active period will be divided into 16 slots 16 slots can further divided into two parts Contention access period Contention free period 25

Superframe Beacons are used for starting superframes synchronizing with other devices announcing the existence of a PAN informing pending data in coordinators In a beacon-enabled network, Devices use the slotted CSMA/CA mechanism to contend for the usage of channels FFDs which require fixed rates of transmissions can ask for guarantee time slots (GTS) from the coordinator 26

Superframe The structure of superframes is controlled by two parameters: beacon order (BO) : decides the length of a superframe superframe order (SO) : decides the length of the active potion in a superframe For a beacon-enabled network, the setting of BO and SO should satisfy the relationship 0 SO BO 14 For channels 11 to 26, the length of a superframe can range from 15.36 msec to 215.7 sec (= 3.5 min). 27

Superframe Each device will be active for 2 -(BO-SO) portion of the time, and sleep for 1-2 -(BO-SO) portion of the time Duty Cycle: BO-SO 0 1 2 3 4 5 6 7 8 9 10 Duty cycle (%) 100 50 25 12 6.25 3.125 1.56 0.78 0.39 0.195 < 0.1 28

Data Transfer Model (I) Data transferred from device to coordinator In a beacon-enable network, a device finds the beacon to synchronize to the superframe structure. Then it uses slotted CSMA/CA to transmit its data. In a non-beacon-enable network, device simply transmits its data using unslotted CSMA/CA Communication to a coordinator In a beacon-enabled network Communication to a coordinator In a non beacon-enabled network 29

Data Transfer Model (II-1) Data transferred from coordinator to device in a beacon-enabled network: The coordinator indicates in the beacon that some data is pending. A device periodically listens to the beacon and transmits a Data Requst command using slotted CSMA/CA. Then ACK, Data, and ACK follow Communication from a coordinator In a beacon-enabled network 30

Data transfer model (II-2) Data transferred from coordinator to device in a non-beacon-enable network: The device transmits a Data Request using unslotted CSMA/CA. If the coordinator has its pending data, an ACK is replied. Then the coordinator transmits Data using unslotted CSMA/CA. If there is no pending data, a data frame with zero length payload is transmitted. Communication from a coordinator in a non beacon-enabled network 31

Channel Access Mechanism Two type channel access mechanism: beacon-enabled networks slotted CSMA/CA channel access mechanism non-beacon-enabled networks unslotted CSMA/CA channel access mechanism 32

Slotted CSMA/CA algorithm In slotted CSMA/CA The backoff period boundaries of every device in the PAN shall be aligned with the superframe slot boundaries of the PAN coordinator i.e. the start of first backoff period of each device is aligned with the start of the beacon transmission The MAC sublayer shall ensure that the PHY layer commences all of its transmissions on the boundary of a backoff period 33

Slotted CSMA/CA algorithm (cont.) Each device maintains 3 variables for each transmission attempt NB: number of times that backoff has been taken in this attempt (if exceeding macmaxcsmabackoff, the attempt fails) BE: the backoff exponent which is determined by NB CW: contention window length, the number of clear slots that must be seen after each backoff always set to 2 and count down to 0 if the channel is sensed to be clear The design is for some PHY parameters, which require 2 CCA for efficient channel usage. Battery Life Extension: designed for very low-power operation, where a node only contends in the first 6 slots 34

Slotted CSMA/CA (cont.) need 2 CCA to ensure no collision 35

Why 2 CCAs to Ensure Collision-Free Each CCA occurs at the boundary of a backoff slot (= 20 symbols), and each CCA time = 8 symbols. The standard species that a transmitter node performs the CCA twice in order to protect acknowledgment (ACK). When an ACK packet is expected, the receiver shall send it after a t ACK time on the backoff boundary t ACK varies from 12 to 31 symbols One-time CCA of a transmitter may potentially cause a collision between a newly-transmitted packet and an ACK packet. (See examples below) 36

Why 2 CCAs (case 1) Backoff boundary Existing session New transmitter Backoff end here CCA Detect an ACK New transmitter CCA CCA Backoff end here Detect an ACK 37

Why 2 CCAs (Case 2) Backoff boundary Existing session New transmitter Backoff end here CCA Detect an ACK New transmitter CCA Backoff end here Detect an DATA 38

Why 2 CCAs (Case 3) Backoff boundary Existing session New transmitter Backoff end here CCA CCA Detect an ACK New transmitter CCA Backoff end here Detect a DATA 39

Unslotted CSMA/CA only one CCA 40

GTS Concepts (I) A guaranteed time slot (GTS) allows a device to operate on the channel within a portion of the superframe A GTS shall only be allocated by the PAN coordinator The PAN coordinator can allocated up to 7 GTSs at the same time The PAN coordinator decides whether to allocate GTS based on: Requirements of the GTS request The current available capacity in the superframe 41

GTS Concepts (II) A GTS can be deallocated At any time at the discretion of the PAN coordinator or By the device that originally requested the GTS A device that has been allocated a GTS may also operate in the CAP A data frame transmitted in an allocated GTS shall use only short addressing 42

GTS Concepts (III) Before GTS starts, the GTS direction shall be specified as either transmit or receive Each device may request one transmit GTS and/or one receive GTS A device shall only attempt to allocate and use a GTS if it is currently tracking the beacon If a device loses synchronization with the PAN coordinator, all its GTS allocations shall be lost The use of GTSs be an RFD is optional 43

Association Procedures (1/2) A device becomes a member of a PAN by associating with its coordinator Procedures Coordinator Device Association req. Scan channel ACK Make decision Beacon (pending address) Data req. ACK Association resp. ACK Wait for response 44

Association Procedures (2/2) In IEEE 802.15.4, association results are announced in an indirect fashion. A coordinator responds to association requests by appending devices long addresses in beacon frames Devices need to send a data request to the coordinator to acquire the association result After associating to a coordinator, a device will be assigned a 16-bit short address. 45

ZigBee Network Layer Protocols 46

ZigBee Network Layer Overview Three kinds of networks are supported: star, tree, and mesh networks 47

ZigBee Network Layer Overview Three kinds of devices in the network layer ZigBee coordinator: responsible for initializing, maintaining, and controlling the network ZigBee router: form the network backbone ZigBee end device: must be connected to router/coordinator In a tree network, the coordinator and routers can announce beacons. In a mesh network, there is no regular beacon. Devices in a mesh network can only communicate with each other in a peer-to-peer manner 48

Address Assignment In ZigBee, network addresses are assigned to devices by a distributed address assignment scheme ZigBee coordinator determines three network parameters the maximum number of children (C m ) of a ZigBee router the maximum number of child routers (R m ) of a parent node the depth of the network (L m ) A parent device utilizes C m, R m, and L m to compute a parameter called C skip which is used to compute the size of its children s address pools Cskip 1+ Cm ( Lm d 1), 1+ Cm Rm Cm Rm 1 Rm Lm d 1 ( d) =, if Rm = 1 Otherwise (a) (b) 49

C skip =31 Total:127 For node C 0 1 32 63 94 If a parent node at depth d has an address A parent, the nth child router is assigned to address A parent +(n- 1) C skip (d)+1 nth child end device is assigned to address A parent +R m C skip (d)+n node A Cm=6 Rm=4 Lm=3 Addr = 30 Addr = 31 32 C Addr = 38 Addr = 125 Addr = 1, Cskip = 7 B A Addr = 33, Cskip = 1 Addr = 39 C Addr = 64, Cskip = 1 Addr = 0, Cskip = 31 Addr = 32, Cskip = 7 Addr = 63, Cskip = 7 Addr = 92 Addr = 126 Addr = 40, Cskip = 1 Addr = 45 125,126 50

ZigBee Routing Protocols In a tree network Utilize the address assignment to obtain the routing paths In a mesh network: Routing Capability: ZigBee coordinators and routers are said to have routing capacity if they have routing table capacities and route discovery table capacities There are 2 options: Reactive routing: if having routing capacity Tree routing: if having no routing capacity 51

ZigBee Tree Routing When a device receives a packet, it first checks if it is the destination or one of its child end devices is the destination If so, accept the packet or forward it to a child Otherwise, relay it along the tree Example: 38 45 38 92 Cm=6 Rm=4 Lm=3 Addr = 30 Addr = 31 C Addr = 38 Addr = 125 Addr = 1, Cskip = 7 B A Addr = 33, Cskip = 1 Addr = 39 Addr = 64, Cskip = 1 Addr = 0, Cskip = 31 Addr = 32, Cskip = 7 Addr = 63, Cskip = 7 Addr = 92 Addr = 126 Addr = 40, Cskip = 1 Addr = 45 52

ZigBee Mesh Routing Route discovery by AODV-like routing protocol The cost of a link is defined based on the packet delivery probability on that link Route discovery procedure The source broadcasts a route request packet Intermediate nodes will rebroadcast route request if They have routing discovery table capacities The cost is lower Otherwise, nodes will relay the request along the tree The destination will choose the routing path with the lowest cost and then send a route reply 53

Routing in a Mesh network: Example 54

Summary of ZigBee network layer Pros Cons Star 1. Easy to synchronize 2. Support low power operation 3. Low latency 1. Small scale Tree 1. Low routing cost 2. Can form superframes to support sleep mode 3. Allow multihop communication 1. Route reconstruction is costly 2. Latency may be quite long Mesh 1. Robust multihop communication 2. Network is more flexible 3. Lower latency 1. Cannot form superframes (and thus cannot support sleep mode) 2. Route discovery is costly 3. Needs storage for routing table 55