Compusoft, 2 (12), 422-426 PDF
Compusoft, 2 (12), 422-426 PDF
Compusoft, 2 (12), 422-426 PDF
ISSN:2320-0790
Abstract: The ZigBee pro was developed to provide low-power, wireless connectivity for a Wide range of network
applications concerned with monitoring and control. ZigBee is a worldwide open standard controlled by the ZigBee
Alliance. ZigBee PRO is an Enhancement of the original ZigBee protocol, providing a number of extra features that are
particularly useful for very large networks (that may include hundreds or even thousands of nodes).
The ZigBee standard builds on the established IEEE 802.15.4 standard for packet based wireless transport. ZigBee
enhances the functionality of IEEE 802.15.4 by providing flexible, extendable network topologies with integrated set-up
and routing intelligence to facilitate easy installation and high resilience to failure [1]. ZigBee networks also incorporate
listen-before-talk and rigorous security measures that enable them to co-exist with other wireless technologies (such as
Bluetooth and Wi-Fi) in the same operating environment.
ZigBee's wireless connectivity means that it can be installed easily and cheaply, and its built-in intelligence and flexibility
allow networks to be easily adapted to changing needs by adding, removing or moving network nodes. The protocol is
designed such that nodes can appear in and disappear from the network, allowing some devices to be put into a powersaving mode when not active. This means that many devices in a ZigBee network can be battery-powered, making them
self-contained and, again, reducing installation costs.
Keywords: Zigbee, Zigbee Pro, Wireless nodes.
connector, power amplifier and LNA for extended range.
The modules can implement networking stacks such as
JenNet and ZigBee PRO, as well as customer applications.
ZigBee Network Nodes:
A wireless network comprises a set of nodes that can
communicate with each other by means of radio
transmissions, according to a set of routing rules (for
passing Messages between nodes). A ZigBee wireless
network includes three types of node:
Co-ordinator: This is the first node to be started and is
responsible for forming the network by allowing other
nodes to join the network through it. Once the Network is
established, the Co-ordinator has a routing role (is able to
relay Messages from one node to another) and is also able to
send/receive data. Every network must have one and only
one Co-ordinator.
Router: This is a node with a routing capability, and is also
able to send or receive Data. It also allows other nodes to
join the network through it, so plays a role in extending the
network. A network may have many Routers.
I. INTRODUCTION
The JN5148-001-Myy family is a range of ultra low power,
high performance surface mount modules targeted at JenNet
and ZigBee PRO networking applications, enabling users to
realise products with minimum time to market and at the
lowest cost. They remove the need for expensive and
lengthy development of custom RF board designs and test
suites. The modules use Jennics JN5148 wireless
microcontroller to provide a comprehensive solution with
large memory, high CPU and radio performance and all RF
components included. All that is required to develop and
manufacture wireless control or sensing products is to
connect a power supply and peripherals such as switches,
actuators and sensors, considerably simplifying product
development.
Three module variants are available: JN5148-001-M00 with
an integrated antenna, JN5148-001-M03[2] with an antenna
connector and the JN5148-001-M04 with an antenna
422
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
Key-based Encryption: A very high-security, 128-bit AESbased encryption system (built into the JN5148 device as a
hardware function) is applied to network communications,
preventing external agents from interpreting ZigBee
network data. This encryption is key-based. Normally, the
same network key is used for all nodes in the network.
However, it is possible to use an individual link key
between a given pair of network nodes, allowing
communications (possibly containing sensitive data)
between the two nodes to be private from other nodes in the
same network. Keys can be pre-configured in nodes in the
factory, commissioned during system installation or
distributed around a working network from a central Trust
Centre node. A Trust Centre manages keys and security
policies - for example, changing the network key on all
network nodes, issuing link keys for node pairs and
restricting the hours in which certain events or interactions
can occur. Any node can be nominated as the Trust Centre,
but it is by default the Co-ordinator.
Frame Counters: The use of frame counters prevents
sending the same message twice, and freshness Checking
rejects any such repeated messages, preventing message
replay attacks on the network. An example of a replay
attack would be someone recording the open command for a
garage door opener, and then replaying it to gain
unauthorised entry into the property.
V. NETWORK ADDRESSING:
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
VI. DESCRIPTORS
An application may need to obtain information about the
nodes of the network in which it runs, There are three
mandatory descriptors and two optional descriptors stored in
a node. The mandatory descriptors are the Node, Node
Power and Simple descriptors, while the optional
descriptors are called the Complex and User descriptors For
each node, there is only one Node and Node Power
descriptor, but there is a Simple descriptor for each
endpoint. There may also be Complex and User descriptors
in the device.
Node Descriptor: The Node descriptor contains information
on the capabilities of the node, including: Type (End
Device, Router or Co-ordinator), Frequency band in use
(868 MHz, 902 MHz or 2400 MHz), IEEE 802.15.4 MAC
capabilities - that is, whether: The device can be a PAN Coordinator, The node implements a Full-Function or
Reduced-Function IEEE 802.15.4 device, The device is
mains powered,The device is capable of using MAC
security, The receiver stays on during idle periods,
Manufacturer code.
Node Power Descriptor: The Node Power descriptor
contains information on how the node is powered: Power
mode - whether the device receiver is on all the time, or
wakes up periodically as determined by the network or only
when an application requires (e.g. button press). Available
power sources indicates whether the mains supply, or
rechargeable or disposable batteries can be used to power
the device, Current power sources - indicates which power
source (mains supply, or rechargeable or disposable
batteries) is currently being used to power the device,
Current power source level - indicates the level of charge of
the current power source.
Simple Descriptor: The Simple descriptor for an application
includes:
The endpoint on which the application
communicates, The Application Profile that it implements,
The Application Profile device identifier and version,
Whether there are corresponding Complex and User
descriptors.
425
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
References:
[1]
VIII. CONCLUSION:
The ZigBee standard builds on the established IEEE
802.15.4 standard for packet based wireless transport.
ZigBee networks also incorporate listen-before-talk and
rigorous security measures that enable them to co-exist with
other wireless technologies (such as Bluetooth and Wi-Fi) in
the same operating environment. ZigBee enhances the
functionality of IEEE 802.15.4 by providing flexible,
extendable network topologies with integrated set-up and
routing intelligence to facilitate easy installation and high
resilience to failure.
ZigBee's wireless connectivity can be installed easily and
cheaply, and its built-in intelligence and flexibility allow
networks to be easily adapted to changing needs by adding,
removing or moving network nodes. The protocol is
designed such that nodes can appear in and disappear from
the network, allowing some devices to be put into a powersaving mode when not active. This means that many devices
in a ZigBee network can be battery-powered, making them
self-contained and reducing installation costs.
426