Zigbee Technology Analysis

Great Essays
ABSTRACT
This paper basically compares various wireless networking technologies which can be used for industrial automation and sensing. Among all these technologies, special emphasis is given on Zigbee. Zigbee is a technology known for its low power consumption, low data rates, and self-healing reliable networks, which makes it very efficient for industrial applications. The layer by layer protocol stack architecture of Zigbee illustrates these advantageous features. Zigbee is used for automation and networking purposes in manufacturing and pharmaceutical plants, for monitoring purposes in chemical plants. In this paper, such features and applications of Zigbee are explained with concentration on the networking aspect.
Keywords
Automation,
…show more content…
Every robot is connected with numerous sensors which help in automating the whole process. So, once the robot is programmed for a specific task, the sensors then continuously monitor the task being undertaken by the robot and help the robot to perform that task optimally. These sensor values have to be monitored continuously by a system. The system consists of controllers and processors which process the data provided by the sensors and then send control signals to the robots. Now, big manufacturing plants can have hundreds of such robots and taking values of sensors of each robot individually and processing those values is impractical. So, these sensors can all be connected using Zigbee modules and a network can be formed of such sensors. These modules can be then connected in a star or tree topology where each module is connected to the central Coordinator module. The coordinator is connected to a main system where the values of all the sensors are input and processing is done. Then, according to the task of the robot, different control signals can be sent to every …show more content…
FUTURE SCOPE OF ZIGBEE
Zigbee is fast becoming one of the most used wireless networking standard. That is because of its ease of expansion and low power consumption. Zigbee is also used for its interoperability. Nowadays, cellular radiation is one of the problems affecting the lives of people. So, the device used for checking radiation of the base station towers is to be taken near the tower for radiation measurement. Instead of that, if the radiation measuring device is installed with the towers and a Zigbee module is connected to the measuring device, then a network can be created which will send continuous updates to the main system using which radiation can be controlled.
Also, using the gateway device, the Zigbee based devices can be connected to the internet. So, a local or a personal network of an industry can be easily connected to the internet and the data of various such industrial plants can be transferred to a single location for monitoring. The only parameter which has to be considered very carefully is security.

6.

Related Documents

  • Decent Essays

    If the incoming frames slave ID matches with their own slave ID then they accept the frame and sends the parameter back to the master .If the slave ID does not match then the slave discards the frame. Wireless sensor nodes will measure the different parameters like temperature, light intensity and Gas by using different sensors and will send back the sensed data to PC master unit through sub master units. The data will also be displayed on LCD of the sub master unit. Relays are used for controlling action.…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As the number of IoT devices in the future increases there will be an overwhelming amount of data that needs to be processed, analyzed and transferred back to the end device. For this a robust architecture is needed that is capable of processing high amount of data in real time in a very fast and orderly process. The storage of such huge data also must be taken into consideration. This is because there should be a centralized data management system.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Most WLAN nowadays use the IEEE 802.11 standards Network…

    • 918 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    4.4.1 Personal Server The personal server is responsible for interfacing and communicate with the medical server via the Internet, interfacing the WBAN sensors and fusing sensor data, and providing an intuitive graphical and/or audio interface to the end user. The personal server application can run on a variety of platforms with a variety of wide area network (WAN) access possibilities for Internet access. Platform selection is system specific and should be selected to minimize obtrusiveness for a given user [46]. The personal server needs ZigBee or Bluetooth capability for communicating within the WBAN; depending on the platform, this may be incorporated in the electronic device or setted as a separate plug in network coordinator (NC).…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Zombee's Research Paper

    • 71 Words
    • 1 Pages

    A biologist John Hafer was the first to notice the zombee’s. When a female zombie fly lands on any honey bee and she inject fly eggs into the honey bee. When the larvae are ready they burst out of the bee.(up to 16 can come out of a single bee!) They wanted to know if the zombee’s are just in San Francisco or are they in other parts of the…

    • 71 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Pc 517 Project

    • 674 Words
    • 3 Pages

    Letter of Intent for EEC 517 Project PC based home automation and Energy Saving System using PIC18F4520 Parth Rathod Department of Electrical engineering and Computer Science Cleveland State University p.rathod@vikes.csuohio.edu Feb 09, 2018 1. Introduction Home Automation is an approach to provide a network in the house which links computers and peripheral equipment like dish washers, washing machines, microwaves, sub systems like Heating, Ventilation, Air conditioning and other electrical appliances. The aim of the project is to control home appliances like lights, fans, AC, etc. through simple mouse click on the personal computer. Here microcontroller is interfaced to light and temperature sensors and separately the PC is interfaced with…

    • 674 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The proposed technology solution is comprised of the collective decision from the interdisciplinary project team. COHC technical experts, and the NICU project team reviewed gathered information from vendors and specialists, and concluded that a connected care alarm management communication system will meet their needs, as well as support future growth. An important consideration in the development of the proposed solution is the workflow and configuration of clinical staff assignment. It is critical that care team assignments are accurate, and accessible to various systems to ensure that notification is sent to the appropriate caregiver.…

    • 658 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Abstract - It automatically detect trespassers in borders, an autonomous intelligent Robot can be used. Our borders extend thousands of miles and therefore our soldiers will not be able to provide complete security. Illegal immigration, smuggling and trafficking in drugs and arms can be prevented if the borders are secured. Every government gives more priority for border security. As technology increases new threads and risks arise towards national security.…

    • 129 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Tableau Report

    • 602 Words
    • 3 Pages

    utilize any reporting utility such as Tableau or IBM cognos to access the data and run customized reports in Real time. They can also create Reporting Alerts to inform them if a particular department in the hospital is getting too many alerts and rectify the issue in real time. This Data Flow Diagram shows us how Alarm will flow to the Data Warehouse. Patient comes to a hospital and gets admitted to a Bed.…

    • 602 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Problem Of Zombees

    • 131 Words
    • 1 Pages

    People should be concerned about the problem that zombees are. To start off, The author describes how, “A couple of weeks later, he discovered that the bees had died and that the container was filled with tiny brown pupae.”. Tons of bees are painfully dying from this phenomenon. Equally important, “As a result, the bee begins to show signs of strange, zombie-like behavior. For example, “zombees leave their hives at night, which is something that healthy bees never do.”.…

    • 131 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Introduction RFID (Radio Frequency Identification) technology is a rapidly expanding technology being utilized more and more in our daily life. This paper will explain the history, uses, benefits, obstacles and innovations of RFID. I will examine why it is being employed by so many industries and what can limit its expansion. RFID Background RFID types consist of either passive systems, which do not have an internal power source, or active systems, which have a power supply and can transmit a signal.…

    • 1464 Words
    • 6 Pages
    Great Essays