Zigbee Protocol Overview - Copy
Zigbee Protocol Overview - Copy
Architecture
Application Layer (APL)
Application Framework
ZigBee Device Object
Application Support Sub-layer
Network Layer (NWK)
Security Managem.
Message Broker
Routing Managem.
Network Managem.
Medium Access Control (MAC)
Beacon mode
Slotted CSMA/CA
GTS allocation
Non-beacon mode
Non slotted CSMA/CA
Defined in zigbee specification
Defined in 802.15.4 standard
Physical Layer (PHY)
2.4 GHz/ 250 kbps
915 MHz/ 40 kbps
868 MHz/ 20 kbps
Physical Layer
Activation and deactivation of the radio transceiver
Receiver Energy Detection
Link Quality Indication
Clear Channel Assessment
Channel Frequency Selection
• Transmitting
• Receiving
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 2/19
Sleeping
Estimating received signal power
Quality of a received signal
Tune its transceiver in to specific channel
Energy Detection mode
• Carrier Sense mode
Carrier Sense with Energy Detection mode
Tune its transceiver in to specific channel
MAC Layer
Contention access period(without GTS)
Slotted CSMA/CA
Slotted CSMA/CA/slot allocations
Unslotted CSMA/CA
Super frame
BEACON- ENABLED MODE
802.15.4 MAC
NON BEACON- ENABLED MODE
Contention Free Period(with GTS)
Network Layer
NETWORK DATA SERVICE
Generates NPDU
Topology specific routing
NETWORK MANAGEMENT SERVICE
Configuring a new device
Starting a network
Joining or leaving a network
Addressing
Neighbor discovery
Route discovery
Reception control
Application Layer
APPLICATION SUPPORT SUB-LAYER
THE APPLICATION FRAMEWORK
APPLICATION OBJECTS
ZIGBEE DEVICE OBJECT
Maintaining tables for binding
Message forwarding between bound end devices
• Providing services
Key Value Pair service
Generic Message service
Manufacturer defined component
Holds key-value attributes
Role of the device
Responsible for Discovery
1. Low Power & Data Rate: Zigbee is designed for applications that require low power, which
makes it suitable for battery-powered devices. It provides a data rate of up to 250 kbit/s, ideal for
intermittent data transmissions.
2. Short Transmission Range: Transmission distances typically range from 10–100 meters,
depending on environmental factors and power output. Zigbee devices use mesh networking to
extend range.
3. Mesh Networking: Zigbee can pass data through intermediate devices in a mesh network,
allowing data to reach distant nodes by hopping through other devices in the network.
4. Security: Zigbee employs 128-bit symmetric encryption keys, which provides a level of security
suitable for low-power applications.
2.4 GHz Band: Used worldwide, offering a data rate of 250 kbit/s. Sixteen channels are available,
each spaced 5 MHz apart but using only 2 MHz of bandwidth.
915 MHz Band: Used in the Americas and Australia, with a data rate of 40 kbit/s.
868 MHz Band: Used in Europe, offering a data rate of 20 kbit/s.
Zigbee’s radio hardware is designed with minimal analog circuitry, maximizing the use of digital
components to reduce power consumption and cost. It employs Binary Phase-Shift Keying (BPSK) in
the 868 and 915 MHz bands, while Offset Quadrature Phase-Shift Keying (OQPSK) is used in the 2.4
GHz band.
Zigbee Architecture
The Zigbee stack consists of several layers based on the OSI model, each responsible for specific
functions:
Network Data Service: Generates NPDU (Network Protocol Data Units) and provides topology-
specific routing.
Network Management Service: Manages device configuration, network initiation, joining, or
leaving a network.
Provides Neighbor and Route Discovery functions to support efficient routing.
Reception Control and addressing for device communication within the network.
Application Support Sub-layer: Provides binding and messaging services for data exchange
between devices.
Application Framework: Defines application objects and the Zigbee Device Object (ZDO),
which maintains device roles, binding tables, and services.
Zigbee Device Object (ZDO): Handles device discovery, network joining, and key-value services
to facilitate communication and device roles.
Provides generic message services and device functionality based on the application.
1. Zigbee Coordinator (ZC): The central device in a Zigbee network that forms the root of the
network tree and manages security keys. It acts as the trust center and can bridge to other
networks.
2. Zigbee Router (ZR): An intermediary device that can forward data between devices, extending
the range of the network.
3. Zigbee End Device (ZED): A simple device that communicates with its parent node (coordinator
or router) and remains asleep for extended periods to conserve power. This is the least
expensive device type due to minimal memory requirements.
Operating Modes
Beacon-Enabled Mode: Utilizes slotted CSMA/CA with guaranteed time slots, where the
coordinator periodically sends beacons to synchronize devices.
Non-Beacon Mode: Uses unslotted CSMA/CA, where devices compete for access to the medium
without synchronization.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 5/19
Layer Key Functions Zigbee Specification
Application Binding, messaging, device discovery, ZDO Zigbee Specification
Zigbee is ideal for small-scale, battery-efficient, secure, and low-bandwidth applications, such as
sensors in a smart home or medical monitoring, where continuous high-speed data transmission is
not required. Its robust mesh networking allows it to operate effectively even in challenging wireless
environments, making it a popular choice for IoT applications.
Certainly! Let’s go deeper into each of the four layers in the Zigbee architecture—Physical (PHY),
Medium Access Control (MAC), Network (NWK), and Application (APL)—and their roles in enabling
communication within a Zigbee network.
The Physical Layer (PHY) is the foundation of the Zigbee communication stack, responsible for directly
interfacing with the radio hardware. It handles everything related to the actual sending and receiving
of signals over the air.
Key Functions:
Activation and Deactivation of the Radio Transceiver: This layer turns the radio on or off,
which helps manage power consumption. The radio is activated when sending or receiving data
and deactivated during idle times to save battery.
Channel Frequency Selection: It selects the appropriate frequency channel for communication.
Zigbee uses specific frequencies in the ISM bands, such as 2.4 GHz, to operate globally without
requiring licenses.
Clear Channel Assessment (CCA): Before transmitting, the PHY layer checks if the channel is
free. This helps avoid interference with other devices that may be using the same frequency.
Receiver Energy Detection (RED) and Link Quality Indication (LQI): These functions help
assess the quality of received signals and measure signal strength, enabling better decisions
about routing and device placement.
Modulation: For encoding data, Zigbee uses Binary Phase-Shift Keying (BPSK) in the 868 and 915
MHz bands and Offset Quadrature Phase-Shift Keying (OQPSK) in the 2.4 GHz band.
In essence, the PHY layer focuses on getting data bits onto the airwaves reliably and efficiently,
managing signal strength, and ensuring data transmission integrity.
The MAC Layer operates right above the PHY layer and is responsible for coordinating how devices
share access to the communication channel. This is especially important in wireless networks to avoid
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 6/19
data collisions.
Key Functions:
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): This protocol listens to the
channel before sending data to avoid interference. If the channel is busy, the device waits and
tries again.
Beacon-Enabled Mode: In this mode, a coordinator sends regular beacon signals to synchronize
network devices. These beacons help organize when devices should communicate and are part
of the superframe structure.
Slotted CSMA/CA: When using beacons, communication is organized into time slots.
Devices only transmit during their designated slot, reducing collision risk.
Non-Beacon Mode: In networks without beacons, Zigbee devices use unslotted CSMA/CA.
Devices transmit data without a structured time slot, suitable for simpler applications without
tight synchronization.
Guaranteed Time Slots (GTS): Certain devices can reserve specific time slots for communication,
ensuring they can transmit without waiting, which is useful for critical data.
The MAC layer’s primary job is to control when devices can access the shared communication medium,
preventing data collisions and ensuring orderly communication in the network.
The Network Layer (NWK) provides Zigbee’s routing and network management capabilities. This layer
allows devices to join and leave the network and ensures data reaches the correct destination, even if
it needs to pass through multiple devices in a mesh network.
Key Functions:
Topology Management: Manages the network structure, such as star, tree, or mesh topology. In
a mesh topology, data can hop from one device to another, extending the communication range.
Routing: Decides the best path for data to travel across the network. If a direct route isn’t
available, the NWK layer finds an alternative path through other devices.
Addressing: Assigns unique network addresses to devices, ensuring data is routed to the correct
recipient. It handles both short and long addresses for efficient communication.
Device Discovery: Detects and manages devices as they join or leave the network, keeping track
of neighbors and routes.
Network Management: Configures devices and controls joining or leaving processes. This
includes tasks like initiating a network, finding routes, and adjusting routes dynamically if a
device becomes unavailable.
In short, the NWK layer manages the structure, routing, and organization of the Zigbee network,
enabling devices to communicate with one another reliably, even if they are not within direct range.
The Application Layer is the topmost layer, where the actual application logic resides. It supports
various services and ensures that data is correctly passed between applications on different Zigbee
devices. This layer defines the device roles and functions within the network, such as sensors,
controllers, and other user-defined applications.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 7/19
Key Components:
Application Support Sub-layer (APS): Manages binding tables, which keep track of relationships
between devices. For example, a sensor may be “bound” to an alarm device so that when a
condition is detected, the sensor can trigger the alarm.
Binding: A method for connecting two devices so they can communicate directly. Binding
tables tell devices where to send messages.
Message Forwarding: Directs messages between devices based on the binding.
Zigbee Device Object (ZDO): This component manages device discovery, network roles, and
security. It also assigns device roles (e.g., coordinator, router, end device) and allows devices to
discover and communicate with each other.
Device Discovery: Helps devices find each other on the network.
Role Management: Assigns each device a role, such as coordinator or end device.
Application Framework: Defines the set of application objects and provides communication
between them. Devices can have multiple application objects (like a temperature sensor and a
humidity sensor) that communicate within the application framework.
The Application Layer is where Zigbee’s specific functions, like device control and monitoring, happen.
It enables services and applications that need a secure and efficient communication system within the
Zigbee network.
Summary
Together, these layers form the Zigbee stack, supporting low-power, low-data-rate wireless
communication ideal for smart homes, medical devices, and industrial automation. Each layer handles
its specialized tasks to ensure data is transmitted efficiently, securely, and with minimal power usage.
Guaranteed Time Slot (GTS) allocation is a mechanism in Zigbee’s MAC layer (Medium Access Control)
that reserves specific time slots for devices to communicate without contention or interference from
other devices. It is particularly useful for applications that need predictable, low-latency
communication, such as real-time data collection from sensors in industrial automation or medical
monitoring systems.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 8/19
1. Beacon-Enabled Mode: GTS allocation only operates in networks with a beacon-enabled mode.
In this mode, the network coordinator periodically sends out beacons (signals) to synchronize
the devices in the network.
3. Guaranteed Time Slots (GTS): Within the CFP, specific devices are allocated GTSs, allowing them
exclusive access to the network at that time. This ensures that these devices can transmit data
without delay from other devices. Each GTS is dedicated to one device and can be used in either
direction—sending or receiving data.
Reduced Latency: Since the device doesn’t need to wait for other devices, GTS allocation reduces
transmission delays.
Predictability: Devices can count on having a dedicated time slot in each superframe, which is
helpful for applications requiring regular data updates.
Power Efficiency: Devices can enter low-power sleep modes when it’s not their turn to transmit,
extending battery life.
In a Zigbee-based medical monitoring system, a heart rate monitor might require a GTS allocation to
ensure it can send critical data at regular intervals without interference, ensuring reliable and timely
monitoring.
In summary, GTS allocation provides a way to secure specific time slots for devices that need
uninterrupted, predictable communication within a Zigbee network’s beacon-enabled mode.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 9/19
• As with 4G (LTE), it is based on OFDM
• 5G NR uses frequency bands in two frequency ranges:
• Frequency Range 1 (FR1), for bands within 410 MHz – 7125 MHz
• Frequency Range 2 (FR2), for bands within 24250 MHz – 71000 MHz
• Deployment modes
• Non-standalone mode
• Dynamic spectrum sharing
• Standalone mode
5G Protocol Stack
• The mobile is controlled by the 5G core network, the next-generation radio access
network (NG-RAN) and a master next-generation Node B (gNB) alone
• Most of the protocols have the same names and objectives as their 4G equivalents,
but their low-level implementations are different
• In the user plane
• The mobile exchanges packets with an external data network such as the Internet
• Those packets are created by applications in the mobile and the data network, and are
transported over that network using protocols such as TCP and IP
• In the control plane, the mobile
• Exchanges non-access stratum signaling messages with the core network using the 5G
mobility management (5GMM) and 5G session management (5GSM) protocols
• Exchanges access stratum messages with the radio access network using the protocol for radio
resource control (RRC)
• The next four protocols form layer 2 of an OSI protocol stack
• The service data adaptation protocol (SDAP) is new to 5G, and maps the quality of service
(QoS) flows used by the 5G core network onto the data radio bearers used by the NG-RAN
• The packet data convergence protocol (PDCP) secures the air interface’s traffic and signaling
messages, and routes packets through the correct base station in cases of dual connectivity
• The radio link control (RLC) protocol segments any large data packets before transmission,
and handles the high-level re-transmissions
• The medium access control (MAC) protocol schedules transmissions between the mobile and
the base station, and controls the low-level operation of the physical layer. The MAC protocols
in the mobile and network can also communicate with each other by the exchange of MAC
control elements (CEs)
• The physical layer has three main parts:
• The transport channel processor handles the remaining error management tasks
from Chapter 5, including low-level re-transmissions by means of hybrid
automatic repeat request (HARQ)
• The physical channel processor handles the remaining digital signal processing
tasks, notably orthogonal frequency division multiple access (OFDMA) and
multiple antenna processing
• The analogue processor converts the information to analogue form and transmits
it
• The physical layer also handles several procedures for measurement and control
• Inside the core network
• The 5GMM and 5GSM protocols are respectively implemented in the access and mobility
management function (AMF) and the session management function (SMF)
• In the radio access network
• The SDAP is in the gNBcentral unit’s user plane, and the PDCP is split between its user and
control planes
• The RRC protocol lies mainly in the central unit’s control plane, although the distributed unit can
send and receive a small number of unciphered RRC signaling messages as well
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 10/19
• The RLC, MAC and physical layer protocols all lie in the distributed unit
• The information flows between the different protocols are known as channels and signals
• Data and signaling messages travel on
• RLC channels between the PDCP and the RLC
• Logical channels between the RLC and MAC
• Transport channels between the MAC and physical layer
• Physical data channels within the physical layer itself
• Within the physical layer
• The transport channel processors in the mobile and network communicate by exchanging
uplink
and downlink control information, which is delivered by means of physical control channels
• The two physical channel processors communicate by exchanging physical signals
The layer 2/3 protocols in NR protocol stack
5G Protocol Stack
User plane
Control plane
Application
5GMM, 5GSM
TS 24.501
QoS flows
TCP, IP etc.
RRC
TS 38.331
Data radio bearers
SDAP
TS 37.324
Signalling
RLC channels
PDCP
TS 38.323
radio bearers
Logical channels
RLC
→
TS 38.322
Transport channels
MAC
TS 38.321
Physical layer
TS 38.133, 213, 214, 215
Physical data channels
Transport channel processing
TS 38.212
Physical control channels
Physical channel processing
TS 38.211
Physical signals
Analogue processing
TS 38.101-1, 2, 3
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 11/19
TS 38.104
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 13/19
The 5G New Radio (NR) protocol stack is structured to enable high-speed, reliable, and low-latency
communication in 5G networks. It builds on concepts from 4G but introduces new protocols and
improvements, such as increased bandwidth, reduced latency, and support for a greater range of
devices and use cases. Here’s an explanation of the components and layers involved in the 5G NR
protocol stack:
Overview of 5G NR
5G NR is a new radio access technology (RAT) designed by 3GPP for 5G networks. It aims to become
the global standard for 5G communication, supporting two frequency ranges:
5G Protocol Stack
The 5G protocol stack is divided into control plane and user plane functions, enabling
communication between mobile devices and the core network:
1. User Plane: Handles the transmission of data packets (such as internet data) between the
mobile device and an external data network.
2. Control Plane: Manages signaling between the mobile device and the network for session
management, mobility management, and resource allocation.
The 5G NR protocol stack follows the OSI model and includes layers like the physical layer, MAC, RLC,
PDCP, SDAP, and control protocols like RRC and NAS.
The physical layer is responsible for the actual transmission and reception of data over the air
interface, performing tasks like channel coding, modulation, and signal processing:
Transport Channel Processor: Manages error correction using HARQ (Hybrid Automatic Repeat
Request).
Physical Channel Processor: Performs signal processing for orthogonal frequency division
multiplexing (OFDMA) and multi-antenna processing.
Analog Processor: Converts digital signals into analog form for transmission over the air.
Layer 2 Protocols
Layer 2 in 5G NR includes SDAP, PDCP, RLC, and MAC, each performing a specific role in handling data
packets before transmission over the physical layer.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 14/19
1. Service Data Adaptation Protocol (SDAP):
New to 5G, SDAP maps quality of service (QoS) flows from the 5G core network onto data
radio bearers, ensuring that data packets are prioritized and handled based on QoS
requirements.
Layer 3 Protocols
Layer 3 in 5G includes the Radio Resource Control (RRC) and Non-Access Stratum (NAS).
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 15/19
Information flows between different layers via channels and signals:
Logical Channels: Carry specific types of information between RLC and MAC.
Transport Channels: Transfer data between MAC and the physical layer.
Physical Channels: Enable communication within the physical layer, including both data and
control channels for managing the transmission process.
Summary
The 5G NR protocol stack is a sophisticated structure designed to support the high-speed, low-latency
requirements of 5G networks. It leverages advanced protocols and processes for data management
and ensures reliable communication across the user plane and control plane, with each layer
performing specific functions to achieve efficient communication across the 5G air interface.
i cant understand
Let's simplify the 5G New Radio (NR) protocol stack step-by-step. This overview will explain the
purpose and roles of each part in plain terms.
1. What is 5G NR?
5G New Radio (NR) is the technology that allows devices (like smartphones) to connect to 5G networks.
It’s designed to provide faster speeds, lower latency (delay), and more reliable connections compared
to previous generations like 4G.
User Plane: Deals with data transmission (e.g., your internet browsing or video streaming).
Control Plane: Manages signaling and control functions (e.g., setting up and maintaining
connections, switching towers as you move).
Think of the 5G protocol stack as a set of layers that each play a specific role in getting data from your
device to the internet, or vice versa. These layers follow the OSI Model, a standard structure used for
organizing network communications.
What it Does: This layer takes the digital data (like a webpage or video) and prepares it for
transmission as radio signals over the air.
Key Tasks:
Channel coding: Adds error correction codes to data to help recover it if it’s partially lost.
Modulation: Turns digital data into radio waves that can be transmitted.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 16/19
Signal Processing: Manages how the signals are spread over the air to reduce interference.
1. The user data starts in SDAP, where it’s mapped to the correct priority level.
2. It moves down to PDCP (for compression and encryption), then to RLC (for segmentation).
3. Finally, MAC schedules it, and the Physical Layer converts it to radio signals that get transmitted.
When the network sends data back (like a webpage response), it goes through the same layers in
reverse order, reaching your device as usable data.
Summary
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 17/19
Each layer has a unique role, ensuring that data moves from your device to the network and back,
quickly and reliably. Let me know if there’s a specific part you’d like more detail on!
Layer 3, known as the Network Layer in the 5G New Radio (NR) protocol stack, is primarily
responsible for controlling and managing the connection between a device (like your smartphone)
and the network. This layer includes a protocol called Radio Resource Control (RRC), which is
essential for managing communication between the device and the 5G network.
Purpose of RRC: RRC is responsible for managing the connection between your device and the
network. It ensures that the connection is secure, stable, and can handle movement if you’re
traveling (such as switching between cell towers).
Role of RRC in 5G:
Connection Setup and Release: When you start using the network (e.g., when you make a
call or access data), RRC establishes a connection between your device and the network.
When you finish, it releases the connection to save resources.
Mobility Management: RRC helps your device stay connected when you’re moving, like
when you’re in a car or walking. It handles switching from one cell tower to another (known
as handover) to maintain a stable connection.
Security: RRC also manages security by initiating encryption and authentication
procedures, so only authorized devices can access the network.
Configuration of QoS: Quality of Service (QoS) settings ensure that important data, like
video calls, gets priority over less time-sensitive data, like background app updates.
Layer 3 in the 5G protocol stack is part of the Control Plane. This plane is responsible for controlling
and managing connections but doesn’t carry the actual user data (like internet traffic or video).
Instead, the Control Plane is about the communication between the device and network that helps
manage connections and maintain quality.
The User Plane (handled in Layer 2) is where actual data (like your internet or streaming data) flows.
To understand better, here are some examples of RRC messages and what they do:
RRC Connection Request: Sent when your device wants to connect to the network. The network
responds, and once the connection is confirmed, data can start flowing.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 18/19
RRC Reconfiguration: Sent when the network needs to adjust the connection (like changing QoS
settings if you start a video call).
RRC Handover: If you’re moving between cell towers, this message helps transition your
connection smoothly from one tower to another without dropping the call or data session.
RRC Connection Release: Sent when you no longer need the connection (e.g., you finish your
call). This message tells the network to end the session, freeing up resources.
Summary of Layer 3
In simple terms, Layer 3 in the 5G protocol stack manages the “control” aspects of your connection:
The RRC protocol in Layer 3 is what makes your device’s connection to the 5G network smart, secure,
and adaptive to changes. Let me know if you need more detail on any specific part!
ChatGPT can make mistakes. Check important info.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 19/19