ZigBee and Wireless Radio Frequency Coexistence

合集下载

数字示波器外文翻译文献

数字示波器外文翻译文献

数字示波器外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission AbstractIn this paper, we propose and demonstrate experimentally a new wireless digital encryption hyperchaotic communication system based on radio frequency (RF) communication protocols for secure real-time data or image transmission. A reconfigurable hardware architecture is developed to ensure the interconnection between two field programmable gate array developmentplatforms through XBee RF modules. To ensure the synchronization and encryption of data between the transmitter and the receiver, a feedback masking hyperchaotic synchronization technique based on a dynamic feedback modulation has been implemented to digitally synchronize the encrypter hyperchaotic systems. The obtained experimental results show the relevance of the idea of combining XBee (Zigbee or Wireless Fidelity) protocol, known for its high noise immunity, to secure hyperchaotic communications. In fact, we have recovered the information data or image correctly after real-time encrypted data or image transmission tests at a maximum distance (indoor range) of more than 30 m and with maximum digital modulation rate of 625,000 baud allowing a wireless encrypted video transmission rate of 25 images per second with a spatial resolution of 128 ×128 pixels. The obtained performance of the communication system is suitable for secure data or image transmissions in wireless sensor networks.IntroductionOver the past decades, the confidentiality of multimedia communications such as audio, images, and video has become increasingly important since communications of digital products over the network (wired/wireless) occur more frequently. Therefore, the need for secure data and transmission is increasing dramatically and defined by the required levels of security depending on the purpose of communication. To meet these requirements, a wide variety of cryptographic algorithms have been proposed. In this context, the main challenge of stream cipher cryptography relates to the generation of long unpredictable key sequences. More precisely, the sequence has to be random, its period must be large, and the various patterns of a given length must be uniformly distributed over the sequence. Traditional ciphers like DES, 3DES, IDEA, RSA, or AES are less efficient for real-time secure multimedia data encryption systems and exhibit some drawbacks and weakness in the high streamdata encryption. Indeed, the increase and availability of a high-power computation machine allow a force brute attack against these ciphers. Moreover, for some applications which require a high-levelcomputation and where a large computational time and high computing power are needed (for example, encryption of large digital images), these cryptosystems suffer from low-level efficiency. Consequently, these encryption schemes are not suitable for many high-speed applications due to their slow speed in real-time processing and some other issues such as in the handling of various data formatting. Over the recent years, considerable researches have been taken to develop new chaotic or hyperchaotic systems and for their promising applications in real-time encryption and communication. In fact, it has been shown that chaotic systems are good candidates for designing cryptosystems with desired properties. The most prominent is sensitivity dependence on initial conditions and system parameters, and unpredictable trajectories.Furthermore, chaos-based and other dynamical systembased algorithms have many important properties such as the pseudorandom properties, ergodicity and nonperiodicity. These properties meet some requirements such as sensitivity to keys, diffusion, and mixing in the cryptographic context. Therefore, chaotic dynamics is expected to provide a fast and easy way for building superior performance cryptosystems, and the properties of chaotic maps such as sensitivity to initial conditions and random-like behavior have attracted the attention to develop data encryption algorithms suitable for secure multimedia communications. Until recently, chaotic communication has been a subject of major interest in the field of wireless communications. Many techniques based on chaos have been proposed such as additive chaos masking (ACM), where the analog message signal is added to the output of the chaos generator within the transmitter. In, chaos shift keying is used where the binary message signal selects the carrier signal from two or more different chaotic attractors. Authors use chaotic modulation where the message information modulates a parameter of the chaotic generator. Chaos control methods rely on the fact that small perturbations cause the symbolic dynamics of a chaotic system to track a prescribed symbol sequence. In, the receiver system is designed in an inverse manner to ensure the recovery of theencryption signal. An impulsive synchronization scheme is employed to synchronize chaotic transmitters and receivers. However, all of these techniques do not provide a real and practical solution to the challenging issue of chaotic communication which is based on extreme sensitivity of chaotic synchronization to both the additive channel noise and parameter mismatches. Precisely, since chaos is sensitive to small variations of its initial conditions and parameters, it is very difficult to synchronize two chaotic systems in a communication scheme. Some proposed synchronization techniques have improved the robustness to parameter mismatches as reported in, where impulsive chaotic synchronization and an open-loop-closed-loopbased coupling scheme are proposed, respectively. Other authors proposed to improve the robustness of chaotic synchronization to channel noise, where a coupled lattice instead of coupled single maps is used to decrease the master-slave synchronization error. In, symbolic dynamics-based noise reduction and coding are proposed. Some research into equalization algorithms for chaotic communication systems are also proposed. For other related results in the literature, see. However, none of them were tested through a real channel under real transmission conditions. Digital synchronization can overcome the failed attempts to realize experimentally a performed chaotic communication system. In particular, when techniques exhibit any difference between the master/transmitter and slave/receiver systems, it is due to additive information or noise channel (disturbed chaotic dynamics) which breaks the symmetry between the two systems, leading to an accurate non-recovery of the transmitted information signal at the receiver. In, an original solution to the hard problem of chaotic synchronization high sensibility to channel noise has been proposed. This solution, based on a controlled digital regenerated chaotic signal at the receiver, has been tested and validated experimentally in a real channel noise environment through a realized wireless digital chaotic communication system based on zonal intercommunication global-standard, where battery life was long, which was economical to deploy and which exhibited efficient use of resources, knownas the ZigBee protocol. However, this synchronization technique becomes sensible to high channel noise from a higher transmission rate of 115 kbps, limiting the use of the ZigBee and Wireless Fidelity (Wi-Fi) protocols which permit wireless transmissions up to 250 kbps and 65 Mbps, respectively.Consequently, no reliable commercial chaos-based communication system is used to date to the best of our knowledge. Therefore, there are still plentiful issues to be resolved before chaos-based systems can be put into practical use. To overcome these drawbacks, we propose in this paper a digital feedback hyperchaotic synchronization and suggest the use of advanced wireless communication technologies, characterized by high noise immunity, to exploit digital hyperchaotic modulation advantages for robust secure data transmissions. In this context, as results of the rapid growth of communication technologies, in terms of reliability and resistance to channel noise, an interesting communication protocol for wireless personal area networks (WPANs, i.e., ZigBee or ZigBee Pro Low-Rate-WPAN protocols) and wireless local area network (WLAN, i.e., Wi-Fi protocol WLAN) is developed. These protocols are identified by the IEEE 802.15.4 and IEEE 802.11 standards and known under the name ZigBee and Wi-Fi communication protocols, respectively. These protocols are designed to communicate data through hostile Radio Frequency (RF) environments and to provide an easy-to-use wireless data solution characterized by secure, low-power, and reliable wireless network architectures. These properties are very attractive for resolving the problems of chaotic communications especially the high noise immunity property. Hence, our idea is to associate chaotic communication with theWLAN or WPAN communication protocols. However, this association needs a numerical generation of the chaotic behavior since the XBee protocol is based on digital communications.In the hardware area, advanced modern digital signal processing devices, such as field programmable gate array (FPGA), have been widely used to generate numerically the chaotic dynamics or the encryption keys. The advantage of these techniques is that the parameter mismatch problem does not existcontrary to the analog techniques. In addition, they offer a large possible integration of chaotic systems in the most recent digital communication technologies such as the ZigBee communication protocol. In this paper, a wireless hyperchaotic communication system based on dynamic feedback modulation and RF XBee protocols is investigated and realized experimentally. The transmitter and the receiver are implemented separately on two Xilinx Virtex-II Pro circuits and connected with the XBee RF module based on the Wi-Fi or ZigBee protocols. To ensure and maintain this connection, we have developed a VHSIC (very high speed integrated circuit) hardware description language (VHDL)-based hardware architecture to adapt the implemented hyperchaotic generators, at the transmitter and receiver, to the XBee communication protocol. Note that the XBee modules interface to a host device through a logic-level asynchronous serial port. Through its serial port, the module can communicate with any logic and voltage-compatible Universal Asynchronous Receiver/Transmitter (UART). The used hyperchaotic generator is the well-known and the most investigated hyperchaotic Lorenz system. This hyperchaotic key generator is implemented on FPGA technology using an extension of the technique developed in for three-dimensional (3D) chaotic systems. This technique is optimal since it uses directly VHDL description of a numerical resolution method of continuous chaotic system models. A number of transmission tests are carried out for different distances between the transmitter and receiver. The real-time results obtained validate the proposed hardware architecture. Furthermore, it demonstrates the efficiency of the proposed solution consisting on the association of wireless protocols to hyperchaotic modulation in order to build a reliable digital encrypted data or image hyperchaotic communication system.Hyperchaotic synchronization and encryption techniqueContrary to a trigger-based slave/receiver chaotic synchronization by the transmitted chaotic masking signal, which limits the performance of the rate synchronization transmission, we propose a digital feedback hyperchaoticsynchronization (FHS). More precisely, we investigate a new scheme for the secured transmission of information based on master-slave synchronization of hyperchaotic systems, using unknown input observers. The proposed digital communication system is based on the FHS through a dynamic feedback modulation (DFM) technique between two Lorenz hyperchaotic generators. This technique is an extension and improvement of the one developed in for synchronizing two 3D continuous chaotic systems in the case of a wired connection.The proposed digital feedback communication scheme synchronizes the master/transmitter and the slave/receiver by the injection of the transmitted masking signal in the hyperchaotic dynamics of the slave/receiver. The basic idea of the FHS is to transmit a hyperchaotic drive signal S(t) after additive masking with a hyperchaotic signal x(t) of the master (transmitter) system (x , y , z ,w ). Hyperchaotic drive signal is then injected both in the three subsystems (y , z ,w ) and (r r r w z y ,,). The subscript r represents the slave or receiver system (r r r r w z y x ,,,). At the receiver, the slave system regenerates the chaotic signal )(t x r and a synchronization is obtained between two trajectories x(t) and )(t x r if()()0||lim =-∞→t X t X r t (1) This technique can be applied to chaotic modulation. In our case, it is used for generating hyperchaotic keys for stream cipher communications, where the synchronization between the encrypter and the decrypter is very important. Therefore, at the transmitter, the transmitted signal after the additive hyperchaos masking (digital modulation) isS(t) = x(t) + d(t). (2)where d(t) is the information signal and x(t) is the hyperchaotic carrier. At the receiver, after synchronization of the regenerated hyperchaotic signal )(t x rwith the received signal )(t S r and the demodulation operation, we can recover the information signal d(t) correctly as follows:)()()(t x t S t d r r -=. (3)Therefore, the slave/receiver will generate a hyperchaotic behavior identical to that of the master/transmitter allowing to recover correctly the information signal after the demodulation operation. The advantageof this technique is that the information signal d(t) doesnot perturb the hyperchaotic generator dynamics, contraryto the ACM-based techniques of and, because d(t) is injected at both the master/transmitter and slave/receiver after the additive hyperchaotic masking. Thus, for small values of information magnitude, the information will be recovered correctly. It should be noted that we have already confirmed this advantage by testing experimentally the HS-DFM technique performances for synchronizing hyperchaotic systems (four-dimensional (4D) continuous chaotic systems) in the case of wired connection between two Virtex-II Pro development platforms. After many experimental tests and from the obtained real-time results, we concluded that the HS-DFM is very suitable for wired digital chaotic communication systems. However, in the present work, one of the objectives is to test and study the performances of the HS-DFM technique in the presence of channel noise through real-time wireless communication tests. To performthe proposed approach, a digital implementation of the master and slave hyperchaotic systems is required. Therefore, we investigate the hardware implementation of the proposed FHS-DFM technique between two Lorenz hyperchaotic generators using FPGA. To achieve this objective, we propose the following details of the proposed architecture.译文:无线超混沌通信系统安全的实时图像传输的设计和FPGA实现摘要在本文中,我们提出并论证了一种基于无线电频率通信协议对数据或图像安全实时传输的新的无线数字超混沌加密通信系统。

物联网复习

物联网复习

考试题型●1。

单项选择题(本大题共24小题,每小题1分,共24分)●2。

判断题(本大题共12空,每空1分,共12分)● 3. 名词解释(本大题共6小题,每小题4分,共24分)●4。

问答题(本大题共3小题,每小题8分,共24分)● 5. 论述题(本大题共1小题,每小题16分,共16分)●考试范围:第1章——第10章第1章物联网概述●简述物联网的定义。

●简述物联网的三个特征。

●简述对物联网的认识有哪些误区?●简述物联网的关键技术。

物联网定义:通过射频识别RFID装置、红外感应器、全球定位系统、激光扫描器等信息传感设备,按约定协议,把任何物品与互联网相连接,进行信息交换和通信,以实现智能化识别、定位、跟踪、监控和管理的一种网络。

物联网的三大特征●全面感知:利用RFID、传感器、二维码等随时随地获取物体信息●可靠传递:通过无线网络与互联网的融合,将物体的信息实时准确地传递给用户●智能处理:利用云计算、数据挖掘以及模糊识别等人工智能技术,对海量的数据和信息进行分析和处理,对物体实施智能化的控制物联网数据特点是:海量、多态、动态、关联物联网认识方面的误区●误区之一,把传感器网络或RFID网等同于物联网●误区之二,把物联网当成互联网的无边无际的无限延伸,把物联网当成所有物的完全开放、全部互连、全部共享的互联网平台●误区之三,认为物联网就是物物互联的无所不在的网络,因此认为物联网是空中楼阁,是目前很难实现的技术.●误区之四,把物联网当成个筐,什么都往里装;基于自身认识,把仅仅能够互动、通信的产品都当成物联网应用。

●物联网的发展主要面临五个主要技术问题:●技术标准问题●安全问题●协议问题●IP地址问题●终端问题第2章物联网架构技术●简述物联网的框架结构。

●物联网感知识别层的主要作用是什么?●物联网网络构建层通常使用的网络形式有哪几种?●物联网管理服务层的主要技术有哪些?物联网结构:感知识别层、网络构建层、管理服务层、综合应用层●感知层是物联网发展和应用的基础,RFID技术、传感和控制技术、短距离无线通信技术是感知层的主要技术●网络构建层存在各种网络形式,通常使用的网络形式有:互联网、无线宽带网、无线低速网、移动通信网●管理服务层解决数据如何存储(数据库与海量存储技术)、如何检索(搜索引擎)、如何使用(数据挖掘与机器学习)、如何不被滥用(数据安全与隐私保护)等问题。

物联网概论-第2章 物联网体系架构

物联网概论-第2章 物联网体系架构

物 联 网 概 论
2.4.6 物联网应用前景展望
美国权威咨询机构Forrester预测,2020年物联网将 大规模普及,世界上“物物互联”的业务与“人与人通 信”的业务相比,将达到30比1。 欧洲智能系统集成技术平台(EPOSS)预测,2020 年之后物体将进入全智能化。
2.3.2 接入网
传统的接入网主要以铜缆的形式为用户提供一般 的语音业务和数据业务。随着网络的不断发展,出现了 一系列新的接入网技术,包括无线接入技术、光纤接入 技术、同轴接入技术、电力网接入技术等。物联网要满 足未来不同的信息化应用,在接入层面需要考虑多种异 构网络的融合与协同。
物 联 网 概 论
物 联 网 概 论
2.2.2 物品标识与数据采集
1. 标识符 物联网中的标识符应该能够反映每个单 独个体的特征、历史、分类和归属等信息,应该具有唯 一性、一致性和长期性,不会随物体位置的改变而改变, 不会随连接网络的改变而改变。现在许多领域已经开始 给物体分配唯一的标识符,例如,EPC系统已经开始给 全球物品分配唯一的标识符。
物 联 网 概 论
2.2.2 物品标识与数据采集
2. 数据采集 在现实生活中,各种各样的活动或者 事件都会产生这样或者那样的数据。数据采集主要有两 种方式,一种是利用自动识别技术进行物体信息的数据 采集,一种是利用传感器技术进行物体信息的数据采集。
物 联 网 概 论
2.2.2 物品标识与数据采集
2.3.2 接入网
2. 有线接入技术 铜线接入技术,是指在非加感的用户 线上,采用先进的数字处理技术来提高双绞线的传输容 量,向用户提供各种业务的技术。光纤接入技术是一种 光纤到楼、光纤到路边、以太网到用户的接入方式,它 为用户提供了可靠性很高的宽带保证。混合光纤/同轴 网(Hybrid Fiber Coax,HFC)也是一种宽带接入技术, 它的主干网使用光纤,分配网则采用同轴电缆系统,用 于传输和分配用户信息。

论电气工程与网络化控制系统的研究

论电气工程与网络化控制系统的研究

论电气工程与网络化控制系统的研究随着工业通信网络的发展,控制系统的结构发生了变化,网络控制系统便应运而生了。

网络控制系统的发展同工业通信网络的发展有着密切的关系,因而对工业通信网络的发展历程、现状及发展趋势等予以必要的关注。

一、基于网络的闭环伺服控制系统伺服控制系统是以控制器为核心,以电力电子功率变换装置为驱动电路,以电动机为执行机构,在控制理论指导下组成的电力传动控制系统。

这类系统控制电动机的转矩、转速和转角,将电能转换为机械能,实现运动机械的各种运动要求。

伺服系统的控制目标是:(1)要求的位置、速度控制的精度高;(2)要求系统动态响应快,稳定性好;(3)启动力矩大,等等。

将网络引入控制系统后,则要求以网络闭环的伺服控制系统要保持原有系统的高精度、稳定性和较好的动态性能。

针对伺服系统定位或跟踪精度高,响应速度快等特点,在以网络闭环的伺服系统中,如何补偿网络时延、数据包丢失等对系统稳定性和性能的影响成为亟待解决的问题。

其次,针对系统实时性的要求,寻求的控制策略能在保证系统控制性能接近最优的情況下,减小算法运行时间,使得该方法具有较大的实际应用价值。

二、基于网络控制的逆变器并联系统电力电子的通信应用与研究,越来越引起人们的重视。

电力电子系统中的网络不仅仅是一般信息传递的媒介,更应成为控制系统的重要参与者。

为提高电力电子系统的性能,可通过让网络配合控制环运行,利用网络的调度与控制器的控制使电力电子信息流能合理运动。

逆变器是实现直流电能转换为交流电能的功率变换装置,在交流电动机变频调速系统、柔性交流输电系统、有源电力滤波器、不间断电源(UPS)、非空调列车的车轴发电机供电系统等得到了广泛的应用。

为了扩展供电容量、实现冗余以提高系统的可靠性,需要实现逆变器并联技术。

根据并联系统运行时各个模块之间是否有信号连线,并联控制方案可以分成两大类:有互联信号线并联技术和无互联信号线并联技术。

采用有互联信号线的控制方法是为了获得良好的并联特性而牺牲冗余度和增加复杂连线,采用无互联信号线的并联控制方法实现了冗余度但电流均分效果下降。

物联网中的几种短距离无线传输技术

物联网中的几种短距离无线传输技术

短距离无线通信场指的是 100m 以内的通信,主要技术包括 Wifi、紫蜂(Zigbee)、蓝牙技术(Bluetooth)、超宽带技术(Ultra-wideband ,UWB)、射频识别技术(Radio Frequency IDentification ,RFID)以及近场通信(Near Field Communication,NFC)等类型。

低功耗、微型化是用户对当前无线通信产品尤其是便携产品的强烈要求,作为无线通信技术重要分支的短距离无线通信技术正逐步引起越来越广泛的关注。

各国也相应地制定短距离通信技术标准,特别是RFID 和 NFC 在物联网、移动支付和手机识别方面的应用标准,例如主要的RFID 相关规范有欧美的 EPC 规范、日本的 UID(Ubiquitous ID)规范和 ISO 18000 系列标准。

中国政府也高度重视短距离通信的发展,制定了一系列的政策来扶持短距离通信产业。

例如科技部、工信部联合 14 部委制订的《中国 RFID 发展策略白皮书》等。

此外,包括诺基亚、英特尔、IBM、东芝、华为、中兴和联想等众多企业也积极参与到短距离无线通信中各技术的研究中。

1、Wi-Fi技术Wi-Fi(Wireless Fidelity,无线高保真)是一种无线通信协议(),Wi-Fi的传输速率最高可达11Mb/s,虽然在数据安全性方面比蓝牙技术要差一些,但在无线电波的覆盖范围方面却略胜一筹,可达100 m左右。

Wi-Fi是以太网的一种无线扩展,理论上只要用户位于一个接入点四周的一定区域内,就能以最高约11Mb/s的速率接入互联网。

实际上,如果有多个用户同时通过一个点接入,带宽将被多个用户分享,Wi-Fi的连接速度会降低到只有几百kb/s,另外,Wi-Fi的信号一般不受墙壁阻隔的影响,但在建筑物内的有效传输距离要小于户外。

最初的规范是在1997年提出的,称为,主要目的是提供WLAN接入,也是目前WLAN的主要技术标准,它的工作频率是,与无绳电话、蓝牙等许多不需频率使用许可证的无线设备共享同一频段。

zigbee无线传感器网络英文文献

zigbee无线传感器网络英文文献

zigbee无线传感器网络英文文献兰州交通大学毕业设计(英文文献)Zigbee Wireless Sensor Network in Environmental MonitoringApplicationsI. ZIGBEE TECHNOLOGYZigbee is a wireless standard based on IEEE802.15.4 that was developed to address theunique needs of most wireless sensing and control applications. Technology is low cost, low power, a low data rate, highly reliable, highly secure wireless networking protocol targeted towards automation and remote control applications. It’s depicts two keyperformance characteristics – wireless radio range and data transmission rate of the wireless spectrum. Comparing to other wireless networking protocols such as Bluetooth, Wi-Fi, UWB and so on, shows excellent transmission ability in lower transmission rate and highly capacity of network.A. Zigbee FrameworkFramework is made up of a set of blocks called layers. Each layer performs a specificset of services for the layer above. As shown in Fig.1. The IEEE 802.15.4 standard definesthe two lower layers: the physical (PHY) layer and the medium access control (MAC) layer. The Alliance builds on this foundation by providingthe network and security layer and the framework for the application layer.Fig.1 FrameworkThe IEEE 802.15.4 has two PHY layers that operate in two separate frequency ranges: 868/915 MHz and 2.4GHz. Moreover, MAC sub-layer controls access to the radio channel using a CSMA-CA mechanism. Its responsibilities may also include transmitting beacon frames, synchronization, and providing a reliable transmission mechanism. B. Zigbee’s TopologyThe network layer supports star, tree, and mesh topologies, as shown in Fig.2. In a startopology, the network is controlled by one single device called coordinator. The coordinator1兰州交通大学毕业设计(英文文献)is responsible for initiating and maintaining the devices on the network. All other devices, known as end devices, directly communicate with the coordinator. In mesh and tree topologies, the coordinator is responsible for starting the network and for choosing certain key network parameters, but the network may be extended through the use ofrouters. In tree networks, routers move data and control messagesthrough the network using a hierarchical routing strategy. Mesh networks allow full peer-to-peer communication.Fig.2 Mesh topologiesFig.3 is a network model, it shows that supports both single-hopstar topology constructed with one coordinator in the center and the end devices, and mesh topology. In the network, the intelligent nodes are composed by Full Function Device (FFD) and Reduced Function Device (RFD). Only the FFN defines the full functionality and can become a network coordinator. Coordinator manages the network, it is to say that coordinator can start a network and allow other devices to join or leave it. Moreover, it can provide binding and address-table services, andsave messages until they can be delivered.Fig.3 Zigbee network model2兰州交通大学毕业设计(英文文献)II. THE GREENHOUSE ENVIRONMENTAL MONITORINGSYSTEM DESIGNTraditional agriculture only use machinery and equipment which isolating and no communicating ability. And farmers have to monitor crops’ growth by themselves. Even ifsome people use electrical devices, but most of them were restricted to simple communication between control computer and end devices like sensors instead of wire connection, which couldn’t be strictly defined as wireless sensor network. Therefore, bythrough using sensor networks and, agriculture could become more automation, more networking and smarter.In this project, we should deploy five kinds of sensors in the greenhouse basement. By through these deployed sensors, the parameters such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity can be detected real time. It is key to collect different parameters from all kinds of sensors. And in the greenhouse, monitoring the vegetables growing conditions is the top issue. Therefore, longer battery life and lower data rate and less complexity are very important. From the introduction about above, we know that meet the requirements for reliability, security, low costs and low power.A. System OverviewThe overview of Greenhouse environmental monitoring system, which is made up by one sink node (coordinator), many sensor nodes, workstation and database. Mote node and sensor node together composed of each collecting node. When sensors collect parameters real time, such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity, these data will be offered to A/D converter, then by through quantizing and encoding become the digital signal that is able to transmit by wireless sensor communicating node. Each wireless sensor communicating node has ability of transmitting, receiving function.In this WSN, sensor nodes deployed in the greenhouse, which can collect real time data and transmit data to sink node (Coordinator) by the way of multi-hop. Sink node complete the task of data analysis and data storage. Meanwhile, sink node is connected with GPRS/CDMA can provide remote control and data download service. In the monitoring and controlling room, by running greenhouse management software, the sink node can periodically receives the data from the wireless sensor nodes and displays them on monitors.3兰州交通大学毕业设计(英文文献)B. Node Hardware DesignSensor nodes are the basic units of WSN. The hardware platform is made up sensor nodes closely related to the specific application requirements. Therefore, the most important work is the nodes design which can perfect implement the function of detecting and transmissionas a WSN node, and perform its technology characteristics. Fig.4 shows the universal structure of the WSN nodes. Power module provides the necessary energy for the sensor nodes. Data collection module is used to receive and convert signals of sensors. Data processing and control module’s functions are node device control, task scheduling, and energy computing and so on. Communication module is used to senddata between nodes and frequency chosen and so on.Fig.4 Universal structure of the wsn nodesIn the data transfer unit, the module is embedded to match the MAC layer and the NET layer of the protocol. We choose CC2430 as the protocol chips, which integrated the CPU,RF transceiver, net protocol and the RAM together. CC2430 uses an 8 bit MCU (8051), andhas 128KB programmable flash memory and 8KB RAM. It also includesA/D converter, some Timers, AES128 Coprocessor, Watchdog Timer, 32K crystal Sleep mode Timer, Poweron Reset, Brown out Detection and 21 I/Os. Based on the chips, many modules for theprotocol are provided. And the transfer unit could be easily designed based on the modules.As an example of a sensor end device integrated temperature, humidity and light, the design is shown in Fig. 5.4兰州交通大学毕业设计(英文文献)Fig.5 The hardware design of a sensor nodeThe SHT11 is a single chip relative humidity and temperature multi sensor module comprising a calibrated digital output. It can test the soil temperature and humidity. The DS18B20 is a digital temperature sensor, which has 3 pins and data pin can link MSP430directly. It can detect temperature in greenhouse. The TCS320 is a digital light sensor.SHT11, DS18B20 and TCS320 are both digital sensors with small size and low powerconsumption. Other sensor nodes can be obtained by changing the sensors.The sensor nodes are powered from onboard batteries and the coordinator also allows to be powered from an external power supply determined by a jumper.C. Node Software DesignThe application system consists of a coordinator and several end devices. The general structure of the code in each is the same, with an initialization followed by a main loop.The software flow of coordinator, upon the coordinator being started, the first action of the application is the initialization of the hardware, liquid crystal, stack and application variables and openingthe interrupt. Then a network will be formatted. If this net has been formatted successfully, some network information, such as physical address, net ID, channel number will be shown on the LCD. Then program will step into application layer and monitor signal. If there is end device or router want to join in this net, LCD will shown this information, and show the physical address of applying node, and the coordinator will allocate a net address to this node. If the node has been joined in this network, the data transmitted by this node will be received by coordinator and shown in the LCD.The software flow of a sensor node, as each sensor node is switched on, it scans all5兰州交通大学毕业设计(英文文献)channels and, after seeing any beacons, checks that the coordinatoris the one that it is looking for. It then performs a synchronizationand association. Once association is complete, the sensor node enters a regular loop of reading its sensors and putting out a frame containing the sensor data. If sending successfully, end device will step into idle state; by contrast, it will collect data once again and send to coordinator until sending successfully.D. Greenhouse Monitoring Software DesignWe use VB language to build an interface for the test and this greenhouse sensor network software can be installed and launched on any Windows-based operating system. It has 4dialog box selections: setting controlling conditions, setting Timer, setting relevant parameters and showing current status. By setting some parameters, it can perform the functions of communicating with port,data collection and data viewing.6兰州交通大学毕业设计(英文文献)无线传感器网络在环境监测中的应用Zigbee技术I. Zigbee是一种基于802.15.4的无线标准上被开发用来满足大多数无线传感ZigbeeIEEE和控制应用的独特需求。

智能实验室管理系统的设计——智能电源控制系统的设计

智能实验室管理系统的设计——智能电源控制系统的设计智能实验室管理系统的设计--智能电源控制系统的设计摘要紧跟人才市场的需求,各大高校日益注重实践教学,培养创新型、实用型人才。

其中,实验室作为培养学生动手能力的场所,在教学过程中扮演着重要的角色。

为了更高效率地配合教学,摆脱传统实验室繁琐混乱的管理模式,本文将从实验室的电源改造开始,进行实验室智能电源控制系统的设计。

本次设计选择STM32系列单片机为主控制器。

以机智云为云服务平台,手机APP为客户端,基于WIFI模块与云服务平台进行通信,构建物联网。

实现实验室各个电源开关的远程控制。

运用RFID技术,配合校园卡,只有刷卡验证通过,给设备上电的插座才能通电。

实现刷卡取电和记录使用者的信息。

关键词:STM32; WIFI模块;远程控制;RFID技术;Design of Intelligent Laboratory Management System--Design of Intelligent Power Supply Control SystemAbstractKeeping up with the demands of the talent market, major universities are increasingly focusing on practical teaching, to train innovative, practical talents. Among them, the laboratory as a place to train students hands-on ability, as an important role in the teaching process. In order to cooperate with teaching more efficiently and get rid of the tedious and chaotic management mode of the traditional laboratory, this paper will start with the power supply transformation of the laboratory and design the laboratory intelligent power supply control system.This design chooses the STM32 series single chip microcomputer as the main controller. With Gizwits as the cloud service platform, and the mobile APP as the client,communication with cloud service platform based on WIFI module , build the Internet of Things. Realize the remote control of each power switch in the laboratory. Using the RFID technology and thecampus card, the socket that powers on the device can only be powered if the card is verified. Realize swiping card to get electricity and record user information.Keywords: STM32; WIFI module; remote control; RFID technology;目录第一章绪论 (1)1.1 研究的背景及意义 (1)1.2 国内外发展现状 (1)1.3 本设计研究内容和主要工作 (2)第二章相关技术与设计方案 (2)2.1 技术分析 (2)2.1.1 WIFI通信技术 (2)2.1.2 云平台 (3)2.1.3 RFID无线射频识别技术 (4)2.2 总体设计方案 (4)第三章智能电源控制系统的硬件设计 (6)3.1 主控部分 (6)3.2 模块部分 (8)3.2.1 ESP8266-01S (8)3.2.2 RFID—RC522 (10)3.2.3 光耦继电器 (12)3.2.4 电压转换模块 (13)3.3 硬件电路图 (14)第四章智能电源控制系统的软件系统设计 (14)4.1 机智云平台 (15)4.2 机智云开发流程 (15)4.3 程序移植 (18)4.3.1 使用STM32CubeMX软件辅助生成驱动文件 (18)4.3.2 用KEIL 5软件完善程序 (20)4.4 WIFI模块烧录机智云固件 (24)4.5 RFID-RC522模块的功能设计 (27)4.6 本章小结 (28)第五章系统调试 (28)5.1 模块调试 (28)5.1.1 调试WIFI模块 (28)5.1.2 调试RFID模块 (30)5.2 完整的硬件调试 (31)5.3 调试总结 (32)第六章结论 (33)第七章展望 (33)参考文献 (35)谢辞 (36)附录 (37)第一章绪论1.1 研究的背景及意义随着国内经济和科技的发展速度不断加快,社会需要各个领域的人才不断地融入市场。

欧瑞博温湿度传感器SNZB-02P说明书

SNZB-02PZigbee Temperature andHumidity Sensor产品介绍设备重量<1kg,该设备只适合安装在≤2m 的高度。

信号指示灯配网按键功能特点SNZB-02P是一款低功耗的温湿度传感器,可以实时检测环境的温度和湿度。

安装在任何你想要的地方,即贴即用。

通过设置智能场景控制不同设备,让你时刻处于舒适的家庭环境中。

下载易微联App并添加SONOFF Zigbee网关以上功能特点取决于Zigbee网关的功能智能场景低功耗① 拔出电池绝缘片完成设备通电。

② 设备后通电后首次使用,默认进入配网状态,设备指示灯呈“慢闪状态”。

① 3分钟内没进行和网关配对,设备将退出配网状态。

如需再次配网,请长按设备配网按键5秒直到设备指示灯呈“慢闪状态”即可。

② 如设备为不带电池版本,请安装电池(CR2477)给设备通电。

有效距离验证在选定的设备安装位置,短按设备的配网按键,设备指示灯双闪,表明该设备和Zigbee网络下的设备(路由设备或网关)处于有效通讯距离。

在eWeLink App Zigbee网关主界面,点击 "添加" 子设备,等待添加。

如添加失败,请将设备移近网关后再重新添加。

>安装好铁片,再把设备磁吸到铁片上。

123在 eWeLink App 端“删除设备”,设备即恢复出厂设置。

恢复出厂设置3.0V微功率设备使用说明1、 本产品使用的 Zigbee 技术符合“微功率短距离无线电发射设备目录和技术要求” 中通用微功率设备F类设备的技术要求,用于数据传输应用。

采用一体化天线,控制、调整及开关等使用方法请参考产品说明书中相关内容;2、不得擅自改变使用场景或使用条件、扩大发射频率范围、加大发射功率(包括额外加装射频功率放大器),不得擅自更改发射天线;3、 不得对其他合法的无线电台(站)产生有害干扰,也不得提出免受有害干扰保护;4、 应当承受辐射射频能量的工业、科学及医疗(ISM)应用设备的干扰或其他合法的无线电台(站)干扰;5、 如对其他合法的无线电台(站)产生有害干扰时,应立即停止使用,并采取措施消除干扰后方可继续使用;6、 在航空器内和依据法律法规、国家有关规定、标准划设的射电天文台、气象雷达站、卫星地球站(含测控、测距、接收、导航站)等军民用无线电台(站)、机场等的电磁环境保护区域内使用微功率设备,应当遵守电磁环境保护及相关行业主管部门的规定;7、 禁止在以机场跑道中心点为圆心、半径5000米的区域内使用各类模型遥控器;8、 微功率设备使用温度为-10℃ ~ 60℃,供电为注意:① 本产品含纽扣电池② 不要吞咽电池,否则会有化学灼伤危险③ 本产品包含纽扣电池。

易联云ZigBee智能开关使用说明书

Function introductionImportant: Read All Instructions Prior to Installation •DO NOT install with power applied to device. •DO NOT expose the device to moisture.Safety & WarningsOperation•ZigBee in wall smart switch based on latest ZigBee 3.0 protocol •100-240VAC Wide Input and Output Voltage•Supports resistive loads, capacitive loads or inductive loads •1 channel output, max. load up to 4.8A•Input and Output with Screw Terminals, Safe and Reliable •Enables to control ON/OFF of connected light source•ZigBee end device that supports Touchlink commissioning•Can directly pair to a compatible ZigBee remote via Touchlink without coordinator•Supports self-forming zigbee network without coordinator and add other devices to the network •Supports find and bind mode to bind a ZigBee remote•Supports zigbee green power feature and can bind max. 20 zigbee green power remotes •Compatible with universal ZigBee gateway products•Mini Size, Easy to be Installed into a standard size wall box •Radio Frequency : 2.4GHz •Waterproof grade: IP20Input VoltageOutput VoltageOutput CurrentProduct DataSize(LxWxH)100-240VACResistive load: max. 4.8ACapacitive/Inductive load: max. 1.4A100-240VAC45.5x45x20.3mm1.Do wiring according to connection diagram correctly.Input Clusters •0x0000: Basic• 0x0003: Identify•0x0004: Groups• 0x0005: Scenes• 0x0006: On/off•0x0b04: Electrical Measurement Output Clusters •0x0019: OTAZigBee Clusters the device supports are as follows:2.This ZigBee device is a wireless receiver that communicates with a variety of ZigBee compatible systems. This receiver receives and is controlled by wireless radio signals from the compatible ZigBee system.•0x0702: Simple Metering •0x0b05: DiagnosticsMain Features:• Can operate under two-wire connection with no neutral lead or three-wire connection with neutral lead • Soft start function,• Works with various types of switches – momentary, toggle, three-way, etc.• Active element: semiconductor electronic switch,• To be installed in wall switch boxes of dimensions allowing for installation, conforming to provisions of applicable regulations,• The Bypass is an extension unit.The switch operates under the following loads:• Conventional incandescent and HV halogen light sources • ELV halogen lamps (with electronic transformers)• MLV halogen lamps (with ferromagnetic transformers)• Compact fluorescent CFL tube lamps with electronic ballast • Fluorescent tube lamps with electronic ballast• Supported light sources (power factor > 0.5) with minimal power of 3W using the Bypass (depending on the type of load)reset of the switch,short press to turn on/off load(3-wire with Neutral input)(2-wire with No Neutral output)(3-wire with Neutral output)3.Zigbee Network Pairing through Coordinator or Hub (Added to a Zigbee Network )Step 1: Remove the device from previous zigbee network if it has already been added to , otherwise pairing willfail . Please refer to the part "Factory Reset Manually ".Step 2: From your ZigBee Controller or hub interface, choose to add lighting device and enter Pairing mode as Step 4LED indicator, stays solid onwhen power on the switch, turns off after added to a zigbee hub,indicates (same status as connected load) when program the switch (network pairing, touchlink, factory reset)40160394.TouchLink to a Zigbee Remote5.Removed from a Zigbee Network through Coordinator or Hub InterfaceFrom your ZigBee controller or hubinterface, choose to delete or reset thelighting device as instructed. Theconnected light blinks 3 times to indicatesuccessful reset.Step 1: Method 1: Short press“Reset” button (or re-power on: Re-power on theStep 4:Step 2: Bring thepanel within10cm of theStep 3Note: 1) Directly TouchLink (both not added to a ZigBee network), each device can link with 1 remote.2) TouchLink after both added to a ZigBee network, each device can link with max. 30 remotes.3) For Hue Bridge & Amazon Echo Plus, add remote and device to network first then TouchLink.4) After TouchLink, the device can be controlled by the linked remotes.6.Step 2: Short press “Reset.”7.Factory Reset through a Zigbee Remote (Touch Reset)Note: Make sure the device already added to a network, the remote added to the same one or not added to anynetwork.Step 4: There shall be indicationon the remote and connected lightflashes 3 times for successfulStep 2:Bring the remote or touchpanel within 10cm of the lightingdevice.Step 3: SSet the remote or touchpanel into Touch Reset procedureto reset the device, please refer tocorresponding remote or touchpanel manual to learn how.8.Find and Bind ModeStep 2:or touch panel manualStep 3control it thenNote: Make sure the device and remote already added to the same zigbee network.9.Learning to a Zigbee Green Power RemoteStep 2:Step 3LiveNeutral11. Setup a Zigbee Network & Add Other Devices to the Network (No Coordinator Required): Short press “Reset.” 10. Delete Learning to a Zigbee Green Power RemoteStep 2: Step 3Wiring DiagramNotes for the diagrams:L - terminal for live leadN - terminal for neutral leadOut - output terminal of the switch (controlling connected light source)S1 - terminal for switch (has the option of entering the device in inclusion/exclusion mode)COM - terminal for grounding to the switch connected to the switchCompatible load types and recommended values of power for supported loads:Supported external switch types (should be configured by factory setting):1) Push switch (default factory setting)2) Normal On/Off switch (should be configured by factory setting upon request)3) 3-Way switch (should be configured by factory setting upon request)(2) 3-Wire Connection With Neutral Lead The Bypass is a device designed to work with the micro smart dimmer. It should be used in case of connecting LED bulbs or energy saving compact fluorescent lamps. The Bypass prevents flickering of the LED lights and glowing of the turned off compact fluorescent lamps. In the case of 2-wire connection, the Bypass allows to reduce minimum power of load required by the dimmer for correct operation. The Bypass provides powering of the dimmer in case of controlling the low loads of minimum power down to 3W (for cos φ>0.5).(1) 2-Wire Connection With No Neutral LeadNOTE: Switch connected to the S1 terminal activates the basic functionality of the dimmer (turning the lighton/off).Live NeutralWith PUSH LVWith PUSHLive NeutralWith PUSH LV With PUSHNOTE: Switch connected to the S1 terminal activates the basic functionality of the dimmer (turning the light on/off).(4) Multiple Momentary or Push Switches Connection (3) 3-Way Switch Connection 3-Way Switch (SPDT)3-Way Switch (SPDT)With PUSH LVLive Without AC inputLive NeutralNeutral。

常见的七种无线定位技术总结

常见的七种无线定位技术总结
 常见的无线定位技术有以下七种:
 红外线定位、超声波定位、蓝牙定位、射频识别定位、超宽带定位、无线高保真定位和Zigbee(传感器)定位。

 红外线定位
 基本原理:主要通过在已知节点处的红外线发射设备发射红外线,然后在待测节点布置好的光学传感器接收这些红外信号,经过对红外信号的处理,计算出距离,从而达到定位效果。

 优缺点:一是红外线传播距离较短,二是红外线没有越过障碍物的能力,这就要求定位环境没有障碍物,或说定位只能在可视距条件下。

 超声波定位。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

June 2007ZigBee and Wireless Radio Frequency CoexistenceForewordSince its inception, the ZigBee Alliance has worked with a singular focus: create a much needed global wireless language capable of giving “voices” to the myriad of everyday devices which surround us as we go about our daily lives. This focus has been aimed at the little devices, often overlooked in an IT centric world, such as light switches, thermostats, electricity meters and more complex sensor devices found abundantly in the commercial building and industrial automation worlds. As a result, ZigBee Alliance members have created a wireless standard offering extraordinary control, expandability, security, ease-of-use and the ability to use ZigBee technology in any country around the world. Today, companies use ZigBee to effectively deliver solutions for a variety of areas including energy management and efficiency, home and commercial building automation as well as industrial plant management. With this comprehensive set of attributes, the non-profit, open membership and volunteer driven Alliance has become a thriving ecosystem of more than 400 members. As an ecosystem, the Alliance offers everything prospective product and service companies need to develop ZigBee products and services and benefit from the Alliance’s competitive and stable supply chain.Executive SummaryZIGBEE AND WLAN: HARMONIOUS COEXISTENCE FOR RELIABLE OPERATIONZigBee is built using the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard and follows strict IEEE guidelines to ensure long-term sustainability and reliable operation. The IEEE, a non-profit organization, is the world’s leading professional association for the advancement of technology. IEEE is a globally respected standards development group whose members are volunteers working in an open and collaborative manner. Other well known technologies like Bluetooth® (802.15.1) and W i-Fi® (802.11) are part of the IEEE 802 standards family. The IEEE 802 group continually evaluates its standards to identify areas of ambiguity or concern and works to improve its standards to ensure robustness and long-term success. To be approved as an IEEE 802 standard, IEEE 802 wireless standards must develop a Coexistence Assurance Document and implement a plan as part of the standard that ensures that all 802 wireless standards can operate and coexist in the same space.Thousands of IEEE members, some of the world’s leading scientists and technologist, collaborate and spend thousands of man hours to define standards. Also, since many of the same scientists and technologists work together in several groups at the IEEE, standards such as 802.15.4 and 802.11 are designed to ensure reliable co-existence. In fact, products using both ZigBee and Wi-Fi have been designed and shipped by Alliance members, including Control4 and Digi International, and these products work as promised.In addition to real-world use by customers, ZigBee members regularly show and demonstrate products around the world at some of largest tradeshows: Consumer Electronics Show, Electronica, Hannover Messe and Wireless Japan, to name a few. These shows often present the harshest locations for radio frequencies (RF) technologies to operate, with dozens of wireless networks including Wi-Fi, Bluetooth and other RF traffic. At times, it can be difficult to get wireless devices to operate properly at these shows, yet users and demonstrators of ZigBee networks report reliable performance.ZIGBEE ALLIANCE: QUALITy INDEPENDENTLy ASSUREDThe ZigBee Alliance’s more than 400 members are spending billions of dollars around ZigBee. These companies range from well known global brands to independent start-ups. Most have thoroughly and independently investigated ZigBee prior to investing funds to develop new ZigBee products and services. Two independent and global test labs National Technical Systems and TUV Rheinland test and verify ZigBee platforms and products. These labs have global reputations to protect and are not ZigBee Alliance funded, rubber stamping organizations. The Alliance sets stringent standards for all products or platforms to ensure everything operates as promised, allowing customers to buy products wearing the ZigBee logo with confidence.ZIGBEE: CONTROL yOUR WORLDHundreds of companies have selected ZigBee as their wireless technology because ZigBee works. The following pages also provide evidence from both laboratory and real world environments proving reliability. Companies ZigBee Technology FactsAttribute ZigBeeNumber of Channels 27Radio Frequency • 2.4 GHz with 16 channels Band[s]for global use• 915 MHz with 10 channelsfor N. America, Australiaand a few additionalcountries• 868 MHz with 1 channelfor EU countriesNetwork Capabilities Self-organizing andself-healing dynamic meshnetwork based on ZigBeepublic standardNetwork Size Thousands of devices pernetworkare selling products with both Wi-Fi and ZigBee installed in the same device. Paul Williams, vice president of Support Services at Control4, says the following about coexistence with Wi-Fi:“In the two years we have been shipping products, we have not encountered an issue where ZigBeeor Wi-Fi has interfered with, or caused problems with, the operation of products using either communications protocol. We ship products that contain both ZigBee and Wi-Fi technologies inthe same physical product. Additionally, we have thousands of systems in operation today aroundthe world with the majority of the installations containing both large ZigBee and Wi-Fi network implementations, all working without interferenceor problems.”The Alliance has deliberately maintained a commitment to quality by delivering a solid, robust and secure technology, rather than rushing to market. Independent industry analysts, members of the news media and other experts regularly praise ZigBee’s technical merits, market approach and durability. As a result, ZigBee is seeing broad adoption by industries which demand products based on standards that deliver long-term stability and feature a solid and competitive supply chain.Table of ContentsIntroduction (1)Users of the 2.4 GHz ISM Band (1)Coexistence in ZigBee (1)IEEE 802.15.4 (1)DSSS (1)Multiple Channels (2)Data Rate (3)Built-In Scanning and Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 CSMA (3)Acknowledged Transmission and Retry (4)Additional Features of ZigBee (4)Network Formation Procedures (4)Mesh Networking and Path Diversity (4)Network-Layer Frequency Agility (5)End-to-End Acknowledgement and Retransmission (5)ZigBee Performs (5)Methodology (7)RF Activity (8)ZigBee Delivers (8)FUD: Proprietary Technology Attacks ZigBee (8)Conclusion (10)List of FiguresFigure 1 - The ZigBee Stack (1)Figure 2 - Narrow-Band Signals (2)Figure 3 - Spread-Spectrum Signal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Figure 4 - The 802.15.4 2.4 GHz Spectrum (3)Figure 5 - CSMA (4)Figure 6 - Mesh Network (5)Figure 7 - Mesh Network with Interference (5)Figure 8 - Hannover Messe Spectrum (6)Figure 9 - Test Setup (7)Figure 10 - Interference Sources (8)Figure 11 - Latency Figures (9)List of TablesTable 1 - Minimum Jamming Resistance (3)Table 2 - Wi-Fi Activity (7)Table 3 - ZigBee Performance (7)Table 4 - Interference Sources (8)INTRODUCTIONThe license-free industrial scientific and medical (ISM) bands have been crucial to the burgeoning market for wireless embedded technology but, as with any resource that is held in common, it is equally crucial that all users of the band act as good citizens. In particular, the designers and implementers of platforms and products must assume that, in the normal case, they will be sharing the RF medium with a variety of other radiators, both intentional and unintentional.This white paper describes the efforts that the ZigBee Alliance and the IEEE 802.15.4 working groups have undertaken to ensure that ZigBee devices act as good citizens, and describes some experimental results demonstrating that these efforts have been successful. USERS OF THE 2.4GHZ ISM BANDThe 2.4GHz ISM band has become particularly popular in the last few years such that households, and virtually all commercial buildings, are likely to have equipment that operates in this band. A short list of possible users and possible interferers includes:•802.11b networks•802.11g networks•802.11n networks•Bluetooth Pico-Nets•802.15.4-based Personal Area Network (PAN)•Cordless Phones•Home Monitoring Cameras•Microwave ovens•Wireless headsets•Motorola Canopy systems•WiMax networksWith so many users, one might reasonably be concerned that crowding in the 2.4GHz band would be a problem. Furthermore, certain promoters of competing technologies that use a different but nonetheless crowded pair of ISM bands have attempted to exploit this concern to commercial advantage with a recent white paper. Fear, uncertainty and doubt (FUD) aside, however, the sensible approach to the possibility of interference is to expect it and to design the system from the ground up with coexistence in mind. This is what the ZigBee Alliance has done.COEXISTENCE IN ZIGBEEThe ZigBee stack, as shown in Figure 1, has four layers of which the top two are described in the ZigBee specification and the bottom two – the MAC sub-layer and PHY layer – are described in the IEEE 802.15.4 – 2003 standard.Figure 1 - The ZigBee StackBoth specifications contain a great deal of functionality that is specifically designed to promote coexistence and mitigation of interference, and this functionality is distributed across all four layers.IEEE 802.15.4The policies of the IEEE require that each standards committee under its aegis publish a coexistence statement along with the text of the standard itself. A standard, regardless of its other merits, will not be approved until this coexistence statement has been deemed satisfactory. As a result, the IEEE 802.15.4 – 2003 specification provides support for coexistence at both the PHY layer and the MAC sub-layer, beginning with the physical layer and the adoption of direct sequence spread spectrum (DSSS) technology.DSSSThe term “spread spectrum” refers to a class of technologies, which are designed to promote coexistence and robustness in the face of interference. There is a broadening consensusZigBee Application (APL) LayerZigBee Network (NWK) LayerIEEE 802.15.4 2003 Medium Access Control (MAC) Sub-LayerIEEE 802.15.4 2003 Physical (PHY) Sub-LayerNLDE-SAPMLDE-SAPPD-SAPNLME-SAPMLME-SAPPLME-SAPin the standards community that proper use of spread spectrum is crucial for the fair and equitable sharing of ISM spectrum. To illustrate this point, Figure 2 shows a collision between two narrow-band signals, i.e. signals that use only a small band of frequencies around their designated center frequency or channel to encode and transmit information.Note that even if the center frequencies of these signals are not exactly the same, the overlap can be substantial and is likely to cause data loss. It has been the function of regulatory bodies like the U.S. Federal Communications Commission (FCC) to prevent exactly these sorts of collisions between narrow-band signals by strictly regulating which radiators can operate on which channels of a particular band, and in which geographical regions. This protection is not available in the ISM bands and so users of narrow-band technology run the risk of encountering exactly these kinds of collisions.Figure 2 – Narrow-Band SignalsContrast Figure 2 with Figure 3, which shows a spread signal in collision with a narrow-band signal. There are various spreading methods in common use, but the essential idea behind all of them is to use a bandwidth that may be several orders of magnitude greater than strictly required by the information that is being sent. Because the signal is spread over a large bandwidth, it can coexist with narrow-band signals, which generally appear to the spread-spectrum receiver as a slight reduction in the signal-to-noise ratio over the spectrum being used.Spread spectrum technologies, such as the well-known code division multiple access technology employed in some mobile phones, can also be used to provide multiple access to a single channel.Figure 3 - Spread-Spectrum SignalThus, in the ISM bands, a kind of “more is less” approach, exactly opposite to the approach adopted by regulators like the FCC, turns out to be effective.DSSS, the spreading technique employed by 802.15.4, makes use of a pseudo-random code sequence, often called a “chipping sequence,”which is transmitted at a maximum rate called thechip rate. The chipping sequence is used to directly modulate the basic carrier signal – hence the name “direct sequence” – and to encode the data being transmitted. This method is employed, as pointed out above, in some cell-phone platforms, as well and in the widely deployed 802.11b and 802.11g WLAN technologies.MULTIPLE CHANNELSIn addition to DSSS, 802.15.4 increases the opportunities for coexistence by employing a technique, generally known as frequency division multiple access (FDMA). This simply means that the standard divides the 2.4GHz ISM band into 16 non-overlapping channels, which are 5 MHz apart as shown in Figure 4. At least two of these channels, specifically 15 and 20, fall between the often-used and non-overlapping 802.11 channels 1, 6 and 11.Narrow-band Signals fNarrow-band SignalSpread SignalfThe minimum required resistance to signals from 802.15.4 devices operating other channels, called the jamming resistance, for a compliant radio is shown in Table 1.As a result of these jamming resistance requirements, compliant devices operating in adjacent channels can coexist comfortably and that devices operating in more widely spaced channels will basically not hear each other. DATA RATEMany of the intended applications for ZigBee devices require a very low data rate. The obvious example is lighting where it should not take much more than a single bit, or a byte if the protocol designer is feeling profligate, to communicate the intention that a lighting device be turned on or off.Many designers of RF systems intended to address these same applications have exploited this fact by building transmitters with data rates as low as 9.6Kbps. The designers of the IEEE 802.15.4 PHY; however, have chosen the relatively high data rate of 250Kbps. The reasoning here is that one of the best ways to promote coexistence is to reduce channel occupancy. Clearly, a radio with a high data rate will occupy the channel far less and offer fewer opportunities for collision with other users than one with a lower data rate.BUILT-IN SCANNING AND REPORTINGIn order to fully exploit the opportunity afforded by multiple channels under 802.15.4, the interface to the PHY layer provides the ability to sample a channel and report whether the channel is clear to transmit. It also measures the energy, and thus the interference, that is present on a particular channel. The latter capability is carried through to the MAC and higher layers so that users of 802.15.4 radios have the ability to select the best available channel for operation.CSMAEven with the techniques described above in place, a ZigBee device may find itself sharing a channel with interferers. Undoubtedly, a ZigBee device will find itself sharing the channel with other ZigBee devices. One might then assume that if every device just transmits whenever it wants to, collisions would arise; however, this scenario has been accounted for. There are a number of ways to approach this problem but the approach taken by the IEEE in the 802.15.4 standard is one known as carrier sense multiple access (CSMA). This technique, which has been used successfully for years in Ethernet, has the virtue that it requires no synchronization between devices. Instead, it employs a simple “listen before you talk” strategy. The device, on listens to see if the channel is busy, and if it is, it waits before checking again. The concept is like the strategy of people trying to talk on a busy conference call – simply wait and then speak when no one else is talking. In a simplified form, the algorithm is as shown in Figure 5. Note that, if the channel is busy and the device keeps failing to find a clear channel, the wait intervals increase exponentially. Also note that the wait intervals are random, which makes subsequent collisions less likely.ch 11 ch 12 ch 13 ....f (MHz) 2405 2410Table 1 - Minimum Jamming Resistance Adjacent Channel Alternate Channel Rejection Rejection0dB 30dBFigure 5 - CSMA ACkNOWLEDGED TRANSMISSION AND RETRy Often, devices transmit messages, but sometimes, the message is not successfully received. All communications are normally acknowledged in 802.15.4. Each device, on receipt of a message, has a brief time window in which it is required to send back a short message acknowledging receipt. The transmitting device will wait to hear this response, commonly known as an ACK. If it does not hear the ACK, it will assume that the message was not received, and will retry its message again. This process repeats until the message and ACK are both received or until, usually after a few tries, the transmitter gives up and reports a failure.ADDITIONAL FEATURES OF ZIGBEEThe ZigBee standard builds on the IEEE 802.1.5.4 standard and adds networking and application support functionality. Among the many additional features are several that are intended to promote coexistence and mitigate interference.NETWORk FORMATION PROCEDURESWhen a ZigBee network is formed, the device that initiates formation, the ZigBee Coordinator (ZC), is required to scan through the list of available channels using the features provided by 802.15.4, and automatically select the best channel with the least interference.MESH NETWORkING AND PATH DIvERSITy ZigBee uses mesh networking technology. Mesh networking is motivated by the following two observations: 1. In many environments, the devices of interest aresufficiently close together that a robust network can be formed by simply allowing some of them to route messages on each other’s behalf.2. In this kind of environment, better use of the channelcan be made if devices limit their transmit power and communicate only with their near neighbors.Once a mesh network is in place, a number of possible paths exist between devices in the network as shownBE=Minimumvaluewait for randominterval <2BEBE = BE+1Channel ClearIs this takingtoo long?Give UpSend Datain Figure 6. ZigBee exploits this path diversity by using a form of dynamic routing.Figure 6 - Mesh NetworkShould a chosen path fail, as a result of interference or some other change in the environment, the network will pick a different path as shown in Figure 7.Figure 7 - Mesh Network with InterferenceNETWORk-LAyER FREQUENCy AGILITyIn cases where the interference detected by the ZC, as described above in Section 3.2.1, changes or fails to reflect the interference profile for the network as a whole, ZigBee devices use the scanning facilities in 802.15.4 to detect interference and report it to the ZC or a device acting asthe network manager. This device may direct the network to leave the channel it is currently using and form on another channel.END-TO-END ACkNOWLEDGEMENT AND RETRANSMISSIONJust as single-hop transmissions in 802.15.4 are acknowledged and retried if they fail, multi-hop transmissions through the mesh may also be acknowledged and retried in ZigBee.ZigBee PerformsThere has been a great deal of evidence to suggest that ZigBee devices perform efficiently and effectively in a variety of environments. For example, ZigBee Alliance member Control4 (/) produces wireless home automation solutions. Paul Williams, theirVP of Support Services, says the following about coexistence with Wi-Fi:“In the two years we have been shipping products, we have not encountered an issue where ZigBee or Wi-Fi has interfered with, or caused problems with, the operation of products using either communications protocol. We ship products that contain both ZigBee and Wi-Fi technologies in the same physical product. Additionally, we have thousands of systems in operation today around the world with the majority of the installations containing both large ZigBee andWi-Fi network implementations, all working without interference or problems.”Furthermore, ZigBee Alliance members demonstrate products at some of the world’s largest trade shows each year. These shows provide a great Petri dish for studying ZigBee coexistence. The show floor at a trade show is a soup of communications technologies including IEEE802.11b/g, Bluetooth, IEEE 802.15.4, 2.4GHz frequency hopping spread spectrum portable phones and numerous proprietary wireless technologies. Even in this demanding environment, ZigBee networks continue to operate successfully.As an example, Figure 8 shows spectrum analysis over a 14-minute period, captured at Hannover Messe – Europe’s largest electronics show. The capture was done using the excellent and inexpensive Wi-Spy tool and displayed using the Chanalyzer package (/).The channel numbers along the bottom are ZigBee channels.The figure shows a very active air environment with a number of Wi-Fi networks in operation, notably around ZigBee channels 12 and 21. There is at least one ZigBee network operating as well, visible as a cluster of activity on ZigBee channel 17 and overlapping with the adjacent Wi-Fi activity. A table of the actual (and considerable) Wi-Fi activity measured on the floor, using NetStumbler (/), is shown in. Table 2. Note that the channels in the table are Wi-Fi channels and not ZigBee channels. Service set identifiers (SSIDs) are not shown.ZigBee performance for the network situated on ZigBee channel 17 was measured with the Daintree Sensor Network Analyzer (/). The results are summarized in Table 3.It is important to note that all of these figures are measured at the ZigBee network layer and that the modest 2% packet loss rate at the NWK layer results in an effective loss rate of 0% if application retries are also employed.Finally, Daintree Networks recently carried out a round of formal testing. The results appear below. ZigBee platform suppliers Ember Corporation, Texas Instruments, Freescale Semiconductors and Crossbow all publish application notes covering their own testing, which largely agree with the results published below.Figure 8 - Hannover Messe SpectrumMETHODOLOGyThe test setup is as shown, in schematic form, in Figure 9.Figure 9 - Test SetupZigBee devices were placed at fixed distances from each other and a single interfererwas placed within 5 centimeters of one of them – A at the left. The devices were set to use ZigBee channel 18. The ZigBee devices were all standard development boards from a single vendor and were not subject to any kind of amplification, nor was any effort made to select devices based on their performance.All communications in this test setup were line-of-sight and single-hop.In each test run, 1,000 application messages were sent over the air separated by intervals of approximately 50 milliseconds. The message used was a 4-byte message that is employed in the ZigBee Home Automation profile to switch lights on and off. Tests were run for all pairs of devices and in both directions for a total of eight tests. Some runs were repeated at the discretion of the testers but no data were discarded.Table 2 - Wi-Fi ActivityType [ SNR Sig Noise] Beacon Data Channel Interval Rate BSS [ 62 111 49 ] 100 110 9ad-hoc [ 47 96 49 ] 100 540 11BSS [ 50 99 49 ] 100 110 11BSS [ 45 94 49 ] 100 540 11BSS [ 49 98 49 ] 100 540 7BSS [ 62 111 49 ] 100 540 6BSS [ 61 110 49 ] 100 110 9BSS [ 31 80 49 ] 100 540 11BSS [ 37 86 49 ] 100 540 7BSS [ 49 98 49 ] 100 540 11BSS [ 56 105 49 ] 100 540 11BSS [ 41 90 49 ] 100 540 6BSS [ 60 109 49 ] 100 540 6BSS [ 54 103 49 ] 100 110 1BSS [ 53 102 49 ] 100 540 7BSS [ 41 90 49 ] 100 540 6ad-hoc [ 40 89 49 ] 100 110 1ad-hoc [ 50 99 49 ] 100 110 11BSS [ 49 98 49 ] 100 540 11BSS [ 35 84 49 ] 100 540 11ad-hoc [ 44 93 49 ] 200 540 11ad-hoc [ 50 99 49 ] 100 540 11BSS [ 31 80 49 ] 100 540 2BSS [ 30 79 49 ] 100 540 3ad-hoc [ 50 99 49 ] 100 540 11ad-hoc [ 51 100 49 ] 100 540 11BSS [ 27 76 49 ] 100 110 7ad-hoc [ 37 86 49 ] 100 110 1ad-hoc [ 49 98 49 ] 100 540 2ad-hoc [ 53 102 49 ] 100 540 2ad-hoc [ 47 96 49 ] 100 540 11BSS [ 26 75 49 ] 100 540 9ad-hoc [ 43 92 49 ] 100 540 11ad-hoc [ 48 97 49 ] 100 540 11ad-hoc [ 51 100 49 ] 100 540 11ad-hoc [ 35 84 49 ] 100 110 1ad-hoc [ 33 82 49 ] 100 110 1ad-hoc [ 48 97 49 ] 100 540 11ad-hoc [ 49 98 49 ] 100 540 11ad-hoc [ 51 100 49 ] 100 540 11ad-hoc [ 37 86 49 ] 100 110 10BSS[ 28 77 49 ] 100 1107Table 3 - ZigBee PerformanceTotal Tx Total lost Average Maximum packets packets latency (ms) latency (ms) 25676 555 4.42 874.83Figure 10 - Interference SourcesRF ACTIvITyThe interference sources used in the test were as shown in Figure 10. All of the devices used for the test were off-the-shelf consumer devices. Measurements were made from the “ZigBee’s eye view” using an actual ZigBee device located approximately 1 meter from the device shown as A in Figure 9.The interferers employed in this test, and shown in Figure 10, are further described in Table 5.ZIGBEE DELIvERSThe test results can be summarized as follows:• During the entire test exercise in which tens of thousands of messages were sent, not one was lost.• Interference was nonetheless seen to have an impact on latency.• Figure 11 below provides more detail on both the average overall latency (bottom blue measurement) and the average maximum latency over all runs with that interferer. Latencies are in milliseconds.FUD: PROPRIETARy TECHNOLOGy ATTACkS ZIGBEEA small company with proprietary radio and networking technology, recently published a white paper, “WLAN Interference with IEEE 802.15.4”, which attempts to paint a much bleaker picture of WLAN and 802.15.4 coexistence than the one shown in the current document. Briefly summarized, the paper claims that, except under the most benign and favorable of conditions, Wireless LAN, where the paper mostly refers to 802.11b/g, will effectively prevent 802.15.4 networks from operating.The ZigBee Alliance offers the following points:• This other white paper only reports on the RF performance of 802.15.4 and does not include tests involving ZigBee technology, namely the ZigBee stack. This is done intentionally and makes the performance data look worse. It leaves out the network functionality, such as retries and packet acknowledgement, added by a ZigBee stack which enhances the robustness and performance of an 802.15.4 network.• The white paper is based on an earlier paper showing results generated by a ZigBee Alliance member company, which is also a promoter of another proprietary 900 MHz technology. One significant difference between the twoTable 4 - Interference SourcesInterferer Color ChannelNotes Ambient Dark Blue- A scan using iStumbler () showed 17 networks of which the strongest were on WiFi channels 1 and 6.802.11g Red 6 Streaming audio.802.11g Yellow 6 ftp 802.11b Green 6 ftpBluetooth Purple - Computer-to-PDA file transfer.FHSS Phone Pink - Idle.FHSS PhoneLight Blue-Intercom in use.。

相关文档
最新文档