Telecoms, Datacoms, Wireless, IoT


Tips for building reliable Zigbee-based solutions

5 September 2007 Telecoms, Datacoms, Wireless, IoT AI & Data Analytics

With the growing market visibility and momentum of Zigbee, there is great value in deploying a certified Zigbee solution.

Recent advances in the Zigbee specification have made it possible to develop a reliable Zigbee solution using the current framework. Designers must choose between developing their own hardware and software from scratch, and integrating a proven Zigbee module solution.

Hardware selection

In developing a Zigbee solution, the first step is to determine the hardware platform that will be used. Typically, a hardware platform consists of either a chipset or a module. The Zigbee Alliance has defined a Zigbee Certified Platform (ZCP) certification for platforms that are verified to be capable of supporting a Zigbee solution. If the Zigbee end product should carry the Zigbee logo and be marketed as a Zigbee-certified product, the hardware platform and Zigbee software stack must be certified as a Zigbee-compliant platform.

Modules offer substantial advantages over a chipset. Selecting a module spares the developer the cost and pains of RF front-end design, board prototyping, production testing and EMC testing. Module providers have often been through rigorous testing of the application and network stack, and have added features to simplify the Zigbee interface. Some module providers offer a flexible alternative if the module firmware does not meet all the needs of a particular application. In some cases, designers can develop their own application on the module hardware and customise the Zigbee application for their own needs. Such a solution requires some firmware development, but still frees up the time and costs associated with RF design, prototyping and EMC testing.

If a chipset is used, the designer must be prepared to support the extensive design, test and production requirements of a radio design. Using a chipset on a custom board requires supporting the hardware production process, including board-level testing, debugging and rework. If this path is chosen, a 24-bit organisational unique identifier must be obtained from the IEEE to assign a unique 64-bit address to each unit.

Figure 1. Zigbee defines three node types – a coordinator, router and end devices
Figure 1. Zigbee defines three node types – a coordinator, router and end devices

If a chipset is used for a custom board, the designer must also select a Zigbee network layer stack. The designer must port the stack to their hardware, test the Zigbee application carefully and evaluate the network performance. Many or all of the unresolved Zigbee issues may need to be addressed by the application, which will add significant overhead to development time.

Application development

If it becomes necessary to develop custom firmware on a chipset or module platform, the following steps can be helpful:

* Select a profile type. To begin developing a Zigbee application, the designer must determine whether a public or private profile would best fit their needs. Is the device meant to be compatible with generally available Zigbee devices, or is the product intended for a specific application? Should the settable stack parameters be adjusted to optimise performance? If a private profile makes more sense, a request must be made to the Zigbee Alliance to obtain a private profile.

* Determine routing strategy. The developer should consider whether tree routing should be allowed. For simple, static networks, tree routing may suffice. If nodes could potentially go down and/or reliable data delivery is required, tree routing may be insufficient. In this case, time should be spent evaluating when the stack invokes route discovery.

If the selected Zigbee stack is compliant with the enhanced Zigbee specification, the application layer can take advantage of the (NLME) route-discovery-request primitive and the nwkUseTreeRouting attribute to control route discovery and remove tree routing. If mesh routing is used, the developer should consider how the system performs when all of the routing table entries are used. Since the Zigbee specification makes no provisions for ageing or expiring routing table entries, some Zigbee stack implementations do not remove old entries. Once all of the routing table entries are used, the device can no longer participate in route discovery. If the stack does not age or replace outdated entries, the application should add its own provisions to do so.

Figure 2. The enhanced Zigbee specification added a nwkUseTreeRouting attribute that can disable tree routing (left) entirely, and a (NLME) route-discovery-request primitive to force route discovery as needed. This takes full advantage of mesh routing (right)
Figure 2. The enhanced Zigbee specification added a nwkUseTreeRouting attribute that can disable tree routing (left) entirely, and a (NLME) route-discovery-request primitive to force route discovery as needed. This takes full advantage of mesh routing (right)

* Consider fixed-channel operation. For many applications, a Zigbee network can operate reliably on a fixed channel, even in the presence of occasional interferers. However, for systems that must coexist with other systems in the same frequency band, or that cannot tolerate occasional packet loss, it may be necessary to support channel migration. Since the existing Zigbee specification does not currently have a defined mechanism to do this, the application developer can decide on conditions to move a network to a new channel and develop a solution to accomplish this.

* Overcome addressing limitations. In many applications, the current network address assignment mechanism may be sufficient. However, to prevent the possibility of address duplication, a robust Zigbee solution should have a mechanism to reset the network addresses in the network (eg, if a coordinator is replaced).

Since the network address of a device is unreliable and could change (eg, if the device cannot discover its parent after a power cycle or reset), the application may also require a solution to uniquely identify each node.

Some Zigbee solutions rely on the unique 64-bit addresses to ensure that data is delivered to the correct device. If such an approach is used, the application must include provisions to resolve the 64-bit address to a 16-bit network address prior to transmitting data.

* Testing. This should include efforts to verify how the system reacts to applicable scenarios. How does the system respond when a router is turned off? How does the system perform when interference occurs on the operating channel? If a device receives a new network address, how is the new address discovered?

Some module and stack providers have developed provisions to deal with these issues, offloading a significant burden from the application developer.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Large-scale AI boosts manufacturing efficiency
Hikvision South Africa Surveillance Industrial (Industry) AI & Data Analytics
Video systems, once used mainly for security, are rapidly becoming one of the most valuable sources of operational data in factories and industrial parks, accelerating smart manufacturing process.

Read more...
Strategic agreement for eSIM solutions
Avnet Silica Telecoms, Datacoms, Wireless, IoT
This agreement between Avent Silica and Thales covers the latter’s eSIM solutions that are compliant with GSMA SGP.22 and SGP.32 standards.

Read more...
High precision multi-GNSS antenna
RS South Africa Telecoms, Datacoms, Wireless, IoT
The Amphenol PCTEL GNSS-L125-DH-NF multi-GNSS antenna is a high-performance antenna designed for reliable global navigation satellite system reception in demanding environments.

Read more...
Designing IoT devices for deterministic LPWAN environments
Editor's Choice Telecoms, Datacoms, Wireless, IoT
Built on Ultra Narrow Band communication technology, the Sigfox network focuses on low power, wide area M2M connectivity rather than maximising data throughput.

Read more...
Robust LoRaWAN for distributed IoT
CST Electronics Telecoms, Datacoms, Wireless, IoT
InHand Networks has unveiled its latest LoRaWAN gateway, the EC312, marking an evolution in industrial-grade connectivity solutions for distributed IoT environments.

Read more...
Miniaturised tuneable harmonic filter bank
RFiber Solutions Telecoms, Datacoms, Wireless, IoT
Modern RF and microwave communication systems require compact, high power filtering solutions to suppress unwanted harmonic signals generated by power amplifiers, and to address this challenge, Tri-TeQ has developed a miniaturised broadband tuneable harmonic switched filter bank.

Read more...
Nordic accelerates cellular IoT leadership
RF Design Telecoms, Datacoms, Wireless, IoT
The company unveiled its next-generation portfolio featuring Cat 1 bis, satellite NTN, and advanced LTE-M/NB-IoT with edge AI, delivering secure and resilient connectivity across billions of IoT devices.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved