Zigbee Case: Zigbee Protocol

4118 Words17 Pages
ICT-NE ZigBee protocol Supervisor: Tryfon Theodorou Abdulrhman aljbr 202362308 [Submission Date] Table of Contents ABSTRACT 2 1. Introduction 2 2. History 2 3. ZIGBEE USE CASE 2 4. ZIGBEE ARCHITECTURE AND APPLICATIONS 2 4.4. Describe the structure of this manuscript (each chapter with one sentence). 2 2. Background information (History) 3 3. Design and architecture 3 3.1. Requirement (Basic). 3 3.2. Design 3 3.2.1. Use case 3 4. Implementation 3 4.1. implementation tools (small description) 3 4.2. describe the implementation project ( screen shots) 3 5. EVALUATION 3 5.1. Section 4 5.1.1. Sub Section 4 6. Chapter 4, 5, 6, etc. 5 7. Conclusion 5 8. List of references 6 ABSTRACT In this project, I will talk about ZigBee the…show more content…
The technology is intended to be simpler and less expensive than other WPANs, such as Bluetooth. ZigBee is targeted at radio-frequency (RF) applications that require a low data rate, long battery life, and secure networking. INTRODUCTION ZigBee, it looks like Bluetooth, has a large install of operation system, although perhaps traditionally more in industrial settings it a new network protocol based on IEEE802.15.4. This protocol has revolutionized the industry and home automation and has enabled the construction of a wireless sensor network and the switch to wireless automation of laboratories. It is today used in intelligent home automation. This protocol is a Bluetooth protocol that consumes a small amount of power. The battery lasts two years. It also has a low data transfer rate of 50 kb to 250 kb. This is enough to transfer the sensors and transfer the commands to other devices. It has a good level of security and an unlimited number of nodes it can connected to the Unlike Bluetooth network, it only allows for eight devices, one master, and the rest ZigBee is…show more content…
it can be divided in four domains: 1. Device domain: It ensures that only an authorized user can access the device and can program, modify or delete data from a device 2. Network access domain: This ensures that only authorized devices can connect to the network. This ensures that the network services are available only to the legitimate nodes. It also guarantees data privacy and integrity over the wireless link. 3. Network domain: This ensures the security of the network infrastructure like the devices that are acting as coordinator, PAN coordinator or the router in the ZigBee network. It also supports the network security across various connect-In communication channel like the data transmission from a ZigBee network to a wired network with a WLAN in between and thus caters to the security requirements across multiple carriers. 4. Application domain: This ensures that only safe and trusted applications run on the device and the communication between the applications running on the nodes and the coordinator across a communication channel is safe, secure and maintains

More about Zigbee Case: Zigbee Protocol

Open Document