How much do you know about Zigbee wireless connection?

How much do you know about Zigbee wireless connection?

Zigbee has a wide range of applications and can operate in three frequency bands: 2.4 GHz, 868 MHz, and 915 MHz. It has transmission rates of up to 250 kbit/s, 20 kbit/s, and 40 kbit/s, respectively. It can be used within a transmission distance range of 10-75 m, but this can be increased.

Since Zigbee has a low transmission rate, a transmission power of only 1mW, and uses a sleep mode with low power consumption, Zigbee devices are very energy-efficient. It is estimated that a Zigbee device can last for 6 months to 2 years with only two AA batteries, which is far beyond the reach of other wireless devices. The initial cost of a Zigbee module is around $6, and it is estimated that it will soon drop to $1.5-2.5, and the Zigbee protocol is free of patent fees. Low cost is also a key factor for Zigbee.

[[200568]]

The size of the Zigbee protocol is generally 4-32KB, while Bluetooth and Wi-Fi are generally over 100KB. The communication delay and the delay from sleep state activation are very short, with a typical search device delay of 30ms, a sleep activation delay of 15ms, and an active device channel access delay of 15ms. Therefore, Zigbee technology is suitable for wireless control applications with strict latency requirements.

A star-shaped Zigbee network can accommodate up to 254 slave devices and one master device. A maximum of 100 Zigbee networks can exist in one area at the same time, and the network composition is flexible. And there can be up to 65,000 nodes connected in one network. Zigbee can automatically establish the network it wants. A collision avoidance strategy is adopted, and dedicated time slots are reserved for communication services that require fixed bandwidth, avoiding competition and conflicts in sending data. The MAC layer adopts a fully confirmed data transmission mode, and each data packet sent must wait for the receiver's confirmation information. If there is a problem during the transmission process, it can be retransmitted. A data packet integrity check function based on cyclic redundancy check (CRC) is provided, authentication and certification are supported, and the AES-128 encryption algorithm is adopted. Each application can flexibly determine its security attributes.

<<:  In the "5G era", a large number of "unicorn" companies will emerge to seize the opportunity

>>:  How to ensure the reliability and number of nodes in CAN network communication

Recommend

Understand RFID technology in one article! 3 types, 6 fields, 7 major advantages

Why can our express deliveries always be accurate...

Fiber optic technology breakthrough could increase Internet speeds 100 times

[[247528]] According to foreign media reports, an...

"Online Documents" crashes in real time?

[[420464]] There is a magical phenomenon in this ...

Guangzhou: More than 80,000 5G base stations will be built by 2023

Recently, the Guangzhou Municipal Bureau of Indus...

Explore the changing landscape in 2024

As we head into 2024, 5G success is on the agenda...

Dapr Practice in Alibaba Cloud Native

What is Service Mesh? Since 2010, SOA architectur...

2021 China Internet Haha List 3: Top Ten Keywords

With change comes new opportunities. The Internet...

Multi-process communication methods and a series of problems

[[434195]] This article is reprinted from the WeC...

Seven trends in enterprise networking in 2018

As enterprises gradually establish their own digi...