ZigBee环境监测技术中英文资料对照外文翻译文献综述
外文原文
基于ZigBee技术农业无线温湿度传感器网络与农业生产实践相结合,提出了农业无线和湿度传感器网络设计,它基于ZigBee技术。
我们使用基于CC2530 ZigBee协议作为数据的采集,传输和显示的传感器节点和协调器节点的芯片,目的是实现农业生产自动化和精确农业。
关键词:农业,生产,温度和湿度,无线网络,传感器。
1.简介目前,生产和生活的许多方面都需要提取和加工周围环境的温度和湿度信息。
在过去的技术是收集温度和湿度传感器的温湿度信息,并通过RS-485总线或现场总线再次发送数据到监控中心,所以你需要铺设大量的电缆来收集温度和湿度信息。
传统农业主要使用孤立的机械设备,没有沟通能力,主要依靠的人来监控作物生长状况。
然而,如果使用ZigBee无线传感器网络技术,农业将逐步转变为信息和生产的为主的生产模式,使用更加自动化,网络化,智能化的耕作方式,实现远程无线控制设备。
传感器可以收集信息,如土壤水分,氮浓度,pH值,降水,温度,空气湿度,空气压力等。
采集到的上述信息和所收集信息的位置被传递到中央控制设备用于通过ZigBee网络的决策和参考,所以我们可以提前和准确地识别用于帮助维持和提高作物产量的问题。
在许多面向数据的无线网络传输,低成本和复杂性的无线网络被广泛地使用。
2. ZigBee的技术特点ZigBee技术是一种短距离,低复杂度,低功耗,低数据速率,和低成本,双向无线通信技术,主要是采用在自动控制和远程控制的领域中,可以嵌入各种设备中,以实现他们的自动化[1]。
对于现有的各种无线通信技术,ZigBee技术将是最低功耗和成本的技术。
ZigBee的数据传输速率低,在10KB/ s到250KB/ s的范围内,并主要集中在低速率传输。
在低功耗待机模式下,两个普通的5号电池可以持续6至24个月。
ZigBee的数据传输速率低,并且它的协议很简单,所以它大大降低了成本。
而它的网络容量大,可容纳65000设备。
延迟时间很短,一般在15毫秒〜30毫秒。
Zigbee无线传感器网络英文文献与翻译
Zigbee Wireless Sensor Network in Environmental MonitoringApplicationsI. ZIGBEE TECHNOLOGYZigbee is a wireless standard based on IEEE802.15.4 that was developed to address the unique needs of most wireless sensing and control applications. Technology is low cost, low power, a low data rate, highly reliable, highly secure wireless networking protocol targeted towards automation and remote control applications. It’s depicts two key performance characteristics –wireless radio range and data transmission rate of the wireless spectrum. Comparing to other wireless networking protocols such as Bluetooth, Wi-Fi, UWB and so on, shows excellent transmission ability in lower transmission rate and highly capacity of network. A. Zigbee FrameworkFramework is made up of a set of blocks called layers.Each layer performs a specific set of services for the layer above. As shown in Fig.1. The IEEE 802.15.4 standard defines the two lower layers: the physical (PHY) layer and the medium access control (MAC) layer. The Alliance builds on this foundation by providing the network and security layer and the framework for the application layer.Fig.1 FrameworkThe IEEE 802.15.4 has two PHY layers that operate in two separate frequency ranges: 868/915 MHz and 2.4GHz. Moreover, MAC sub-layer controls access to the radio channel using a CSMA-CA mechanism. Its responsibilities may also include transmitting beacon frames, synchronization, and providing a reliable transmission mechanism.B. Zigbee’s TopologyThe network layer supports star, tree, and mesh topologies, as shown in Fig.2. In a star topology, the network is controlled by one single device called coordinator. The coordinator is responsible for initiating and maintaining the devices on the network. All other devices, knownas end devices, directly communicate with the coordinator. In mesh and tree topologies, the coordinator is responsible for starting the network and for choosing certain key network parameters, but the network may be extended through the use of routers. In tree networks, routers move data and control messages through the network using a hierarchical routing strategy. Mesh networks allow full peer-to-peer communication.Fig.2 Mesh topologiesFig.3 is a network model, it shows that supports both single-hop star topology constructed with one coordinator in the center and the end devices, and mesh topology. In the network, the intelligent nodes are composed by Full Function Device (FFD) and Reduced Function Device (RFD). Only the FFN defines the full functionality and can become a network coordinator. Coordinator manages the network, it is to say that coordinator can start a network and allow other devices to join or leave it. Moreover, it can provide binding and address-table services, and save messages until they can be delivered.Fig.3 Zigbee network modelII.THE GREENHOUSE ENVIRONMENTAL MONITORINGSYSTEM DESIGNTraditional agriculture only use machinery and equipment which isolating and no communicating ability. And farmers have to monitor crops’ growth by themselves. Even if some people use electrical devices, but most of them were restricted to simple communication between control computer and end devices like sensors instead of wire connection, which couldn’t be strictly defined as wireless sens or network. Therefore, by through using sensor networks and, agriculture could become more automation, more networking and smarter.In this project, we should deploy five kinds of sensors in the greenhouse basement. By through these deployed sensors, the parameters such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity can be detected real time. It is key to collect different parameters from all kinds of sensors. And in the greenhouse, monitoring the vegetables growing conditions is the top issue. Therefore, longer battery life and lower data rate and less complexity are very important. From the introduction about above, we know that meet the requirements for reliability, security, low costs and low power.A. System OverviewThe overview of Greenhouse environmental monitoring system, which is made up by one sink node (coordinator), many sensor nodes, workstation and database. Mote node and sensor node together composed of each collecting node. When sensors collect parameters real time, such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity, these data will be offered to A/D converter, then by through quantizing and encoding become the digital signal that is able to transmit by wireless sensor communicating node. Each wireless sensor communicating node has ability of transmitting, receiving function.In this WSN, sensor nodes deployed in the greenhouse, which can collect real time data and transmit data to sink node (Coordinator) by the way of multi-hop. Sink node complete the task of data analysis and data storage. Meanwhile, sink node is connected with GPRS/CDMA can provide remote control and data download service. In the monitoring and controlling room, by running greenhouse management software, the sink node can periodically receives the data from the wireless sensor nodes and displays them on monitors.B. Node Hardware DesignSensor nodes are the basic units of WSN. The hardware platform is made up sensor nodes closely related to the specific application requirements. Therefore, the most important work isthe nodes design which can perfect implement the function of detecting and transmission as a WSN node, and perform its technology characteristics. Fig.4 shows the universal structure of the WSN nodes. Power module provides the necessary energy for the sensor nodes. Data collection module is used to receive and convert signals of sensors. Data processing and control module’s functions are node device control, task sche duling, and energy computing and so on. Communication module is used to send data between nodes and frequency chosen and so on.Fig.4 Universal structure of the wsn nodesIn the data transfer unit, the module is embedded to match the MAC layer and the NET layer of the protocol. We choose CC2430 as the protocol chips, which integrated the CPU, RF transceiver, net protocol and the RAM together. CC2430 uses an 8 bit MCU (8051), and has 128KB programmable flash memory and 8KB RAM. It also includes A/D converter, some Timers, AES128 Coprocessor, Watchdog Timer, 32K crystal Sleep mode Timer, Power on Reset, Brown out Detection and 21 I/Os. Based on the chips, many modules for the protocol are provided. And the transfer unit could be easily designed based on the modules.As an example of a sensor end device integrated temperature, humidity and light, the design is shown in Fig. 5.Fig.5 The hardware design of a sensor nodeThe SHT11 is a single chip relative humidity and temperature multi sensor module comprising a calibrated digital output. It can test the soil temperature and humidity. The DS18B20 is a digital temperature sensor, which has 3 pins and data pin can link MSP430 directly. It can detect temperature in greenhouse. The TCS320 is a digital light sensor. SHT11, DS18B20 and TCS320 are both digital sensors with small size and low power consumption. Other sensor nodes can be obtained by changing the sensors.The sensor nodes are powered from onboard batteries and the coordinator also allows to be powered from an external power supply determined by a jumper.C. Node Software DesignThe application system consists of a coordinator and several end devices. The general structure of the code in each is the same, with an initialization followed by a main loop.The software flow of coordinator, upon the coordinator being started, the first action of the application is the initialization of the hardware, liquid crystal, stack and application variables and opening the interrupt. Then a network will be formatted. If this net has been formatted successfully, some network information, such as physical address, net ID, channel number will be shown on the LCD. Then program will step into application layer and monitor signal. If there is end device or router want to join in this net, LCD will shown this information, and show the physical address of applying node, and the coordinator will allocate a net address to this node. If the node has been joined in this network, the data transmitted by this node will be received by coordinator and shown in the LCD.The software flow of a sensor node, as each sensor node is switched on, it scans all channelsand, after seeing any beacons, checks that the coordinator is the one that it is looking for. It then performs a synchronization and association. Once association is complete, the sensor node enters a regular loop of reading its sensors and putting out a frame containing the sensor data. If sending successfully, end device will step into idle state; by contrast, it will collect data once again and send to coordinator until sending successfully.D. Greenhouse Monitoring Software DesignWe use VB language to build an interface for the test and this greenhouse sensor network software can be installed and launched on any Windows-based operating system. It has 4 dialog box selections: setting controlling conditions, setting Timer, setting relevant parameters and showing current status. By setting some parameters, it can perform the functions of communicating with port, data collection and data viewing。
ZigBee Wireless Networks and Transceivers中文翻译 第一章 ZigBee基础
由于国内暂时还没有该文献的中文版本,而ZigBee Wireless Networks and Transceivers又是ZigBee界的葵花宝典,为了自己更好的学习,所以决定将比较多的蛋疼的时间拿出来做点有意义的事,虽然翻译水平不是很高,但是在翻译的过程中肯定能得到进步,最关键的就是检验自己的毅力,看看能否坚持。
在这个过程中,如果还能帮到一些正在入门ZigBee的朋友那就更好了。
废话不多说,开始ZigBee Wireless Networks and TransceiversZigBee无线网络和收发器1第一章ZigBee基础本章主要介绍了短距离无线网络通信的ZigBee标准,本章的主要目的就是对ZigBee的基础特性进行一下简单的概述,包括它的网络拓扑、信道访问机制和每个协议层所扮演的角色,在后续章节中对本章所讨论的内容有详细的解释。
1.1 什么是ZigBee?ZigBee是为低数据速率、短距离无线网络通信定义的一系列通信协议标准。
基于ZigBee的无线设备工作在868MHZ, 915MHZ和2.4Z频带。
其最大数据速率是250Kbps. ZigBee技术主要针对以电池为电源的应用,这些应用对低数据速率、低成本、更长时间的电池寿命有较高的需求。
在一些ZigBee应用中,无线设备持续处于活动状态的时间是有限的,大部分时间无线设备是处于省电模式(也称休眠模式)的。
因此,ZigBee设备在电池需要更换以前能够工作数年以上。
ZigBee的其中一个应用就是室内病人监控。
例如,一个病人的血压,心率可以通过可穿戴设备测量出来,病人戴的ZigBee设备来周期性的收集血压等健康相关的信息,然后这些数据被无线传送到当地服务器,例如病人家中的一台个人电脑,电脑再对这些数据进行初始分析,最后重要的信息通过互联网被发送到病人的护士或者内科医生那里做进一步的分析。
另一个ZigBee的应用例子就是大型楼宇结构安全的监控。
study on Zigbee
Impact Factor: 1.852 IJESRTINTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCHTECHNOLOGYStudy on ZIGBEE TechnologyAbhishek Kumar*1, Sandeep Gupta2*1,2Department Of ECE, Bharat Institute of Technology, Partapur, Meerut-250003, India999electro.abhi@AbstractZIGBEE is one of the most widely used transceiver standard in wireless sensor networks. Zigbee over IEEE 802.15.4., defines specifications for low rate WPAN(LR-WPAN) to support lower monitoring and controlling devices. Zigbee is developed by Zigbee alliance ,which has hundreds of member companies. Zigbee alliance(software) defines the network, security and application layers. IEEE802.15.4(hardware) defines the physical and media access control layers for LR-WPAN. This paper presents a detailed study of Zigbee wireless standard, IEEE802.15.4 specification, Zigbee device types, the protocol stack architecture and its application.Keywords: Zigbee, IEEE802.15.4. Standard, LR-WPAN.IntroductionWireless Technology is being developed rapidly nowadays. Advancement in micro electromechanical systems brings integration of sensing, signal processing and RF capability on very small devices. All kind of portable applications tend to be able to communicate without the use of any wires. Aim of wireless communication is to gather information or perform certain task in the environment. A typical sensor node contains three C’s, are Collection, Computation and Communication units. Based on the request of sink, gathered information will be transmitted wirelessly. The collection unit has series of sensors. Computation unit contains microcontroller and memory. Finally the communication unit contains transceiver to transmit and receive data; various transceivers (such as RFM TR1000 family, Hardware accelerators, ChipconCC1000 and CC2420 family , Infineon TDA 525x family, IEEE802.15.4/Ember EM2420 RF transceiver, ConexantRDSSS9M) used for this purpose.The reasons [1] for using Zigbee are,•Reliable and self healing• Supports large number of nodes.•Easy to deploy•Very long battery life•Secure•Low cost•Can be used globally• Vibrant industry support with thirty or more vendors supplying products and services •Open Standards protocol with no or negligible licensing fees•Chipsets available from multiple sources•Remotely upgradeable firmware• No new wires•Low power (ability to operate on batteriesmeasured in years)•Low maintenance (meshing, self organizing)•Standards based security [AES128]•Ability to read gas metersAll of the technologies are young – Bluetooth being the oldest with developments started in 1997. ZigBee started its developments in 2001. Different companies developed other technologies within the last three or four years. Zigbee is one of the most widely utilized Wireless Sensor Network standards with low power, low data rate, low cost and short time delay characteristics, simple to develop and deploy and provides robust security and high data reliability. Name of the Zigbee came from zigzagging patterns of honey bees between flowers, represents the communication between nodes in a mesh network [1].ZIGBEE and IEEE 802.15.4ZigBee is developed by ZigBee alliance, which has hundreds of member companies (Ember, Freescale, Chipcon, Invensys, Mitsubishi, CompXs, AMI Semiconductors, ENQ Semi conductors), from semiconductor and software developers to original equipment manufacturers. ZigBee and 802.15.4 are not the same. ZigBee is a standard based network protocol supported solely by the ZigBee alliance that uses the transport services of the IEEE802.15.4 networkhttp: // (C) International Journal of Engineering Sciences & Research Technology[2733-2738]specification. ZigBee alliance is responsible for ZigBee standard and IEEE is for IEEE802.15.4. It is like TCP/IP using IEEE 802.11b network specification [2]. ZigBee alliance (software) defines the network, security and application layers. IEEE802.15.4 (hardware) defines the physical and media access control layers for LR-WPAN in figure1. Power needed for ZigBee is very small. In most cases it uses 1mW (or less power). But still it provides range up to 150 meters in outdoor which is achieved by the technique called direct sequence spread spectrum (DSSS). Also DSSS consumes less power compared to Frequency Hopping Spread Spectrum (FHSS). It works in the 868 MHz (Europe),915 MHz (North America and Australia) and 2.4 GHz(available worldwide) ISM band with up to 20kbps, 40kbps and 250kbps data rate respectively .Because these wave bands are different from the bands of current common wireless networks, Wireless Fidelity (Wi-Fi), Bluetooth, Wireless USB etc. Mutual interferences between them will not occur, therefore, this guarantees our system will not interfere other wireless networks and will not be affected as well.Figure 1: ZigBee adds network, security, and application-services layers to the PHY and MAC layers of the IEEE811.15.4 radio.The IEEE 802.15.4 standard employs 64-bit and16-bit short addresses to support theoretically more than 65,000 nodes per network [7]. ZigBee network can have up to 653356 devices, the distance between ZigBee devices can be up to 50 meters, and each node can relay data to other nodes. This leads capability of making a very big network which covering significant distances.ZIGBEE StandardZigBee device are the combination of application (such as light sensor, lighting control etc), ZigBee logical(coordinator, router, end device), and ZigBee physical device types (Full Function Device and Reduced Function Device)[1].A,ZigBee physical device types: Based on dataprocessing capabilities, two types of physical devices are provided in IEEE 802.15.4: Full Function Devices (FFD)and Reduced Function Devices(RFD). Full Function Devices can perform all available operations within the standard, including routing mechanism, coordination tasks and sensing task. The FFD plays role of coordinator or router or end devices (It can be either FFD or RFD depends on its intended application). A typical FFD in a ZigBee network will be powered from an AC-fed mains supply, as it must always be active and listening to the network . Reduced Function Devices, on the other hand,implements a limited version of the IEEE 802.15.4 protocol. The RFDs do not route packets and must be associated with an FFD. These are end devices such as sensors actuators which only doing limited tasks like recording temperature data, monitoring lighting condition or controlling external devices. The current ZigBee standard requires FFDs to be always on, which in practice means that FFDs must be constantly powered. Battery-powered FFDs have a lifetime on the order of a few days. B. ZigBee logical device types :There are three categories of nodes in a ZigBee system.They are Coordinator, Router and End devices. 1) Coordinator : Forms the root of the network tree and might bridge to other networks. There is exactly one coordinator in each network. It is responsible for initiating the network and selecting the network parameters such as radio frequency channel, unique network identifier and setting other operational parameters. It can also store the information about network, security keys.2) Router: Router acts as intermediate nodes, relaying data from other devices. Router can connect to an already existent network, also able to accept connections from other devices and be some kind of re- transmitters to the network. Network may be extended through the use ofZigBee routers.Figure 2: Zigbee Networkhttp: // (C) International Journal of Engineering Sciences & Research Technology[2733-2738]3) End Devices : End Device can be low-power/ battery-powered devices. They can collect various information from sensors and switches. They have sufficient functionality to talk to their parents (either the coordinator or a router) and cannot relay data from other devices. This reduced functionality allows for the potential to reduce their cost. They support better low power models. These devices do not have to stay awake the whole time, while the devices belonging to the other two categories have to. Each end device can have up to 240 end nodes which are separate applications sharing the same radio.C. Access Modes:Two ways of multi-access inZigBee protocol, are Beacon and Non-beacon. In non beacon enabled network, every node in the network can send the data when the channel is free. In beacon enabled network, nodes can only transmit in predetermined time slots. Here PAN coordinator allocates guaranteed time slots (GTS) for each device; therefore devices will transmit their data during their own slot. All devices should be synchronized for this process. This will be achieved by sending beacon signal. The coordinator is responsible to transmit beacon signals to synchronize the devices attached to it [4]. Network in which the coordinator does not transmit beacon signal is known as non-beacon network. It cannot have GTS and contention free periods, because the devices are not synchronized. Battery life is better than beacon enabled network, because the devices are wake up less often.ZIGBEE Protocols StackProtocol architecture is based on Open systeminterconnection (OSI). ZigBee builds on IEEE standard 802.15.4 which defines the physical and media access control (MAC) layers.ZigBee alliance defines the network layer andapplication layer. Fig.2 shows protocol stack of ZigBeesystem.Figure 3. ZigBee Protocol StackA. Physical Layer: The physical layer of the IEEE802.15.4 standard is the closest layer to the hardware, which control and communicate with the radio transceiver directly. It handles all tasks involving the access to the ZigBee hardware ,including initialization of the hardware, channel selection ,link quality estimation, energy detection measurement and clear channel assessment to assist the channel selection. Supports three frequency bands, 2.45GHz band which using 16 channels, 915MHz band which using 10 channels and 868MHz band using 1 channel. All three using Direct Spread Spectrum Sequencing (DSSS) access mode.Parameters/frequency 868Mhz 915Mhz 2450Mhz Channels 1 10 16 Data rate 20Kbps 40Kbps 250Kbps Applicability Europe USA WorldB. MAC Layer: This layer provides interface between physical layer and network layer. This provides two services; MAC data services and MAC management service interfacing to the MAC sub Layer Management Entity (MLME) Service Access Point called (MLME-SAP). The MAC data service enables the transmission and reception of MAC Protocol Data Units (MPDUs) across the PHY data service. MAC layer is responsible for generating beacons and synchronizing devices to the beacon signal in a beacon enabled services. It is also performing association and dissociation function. It defines four frame structures, are Beacon frame, Data frame, Acknowledge frame, MAC command frame. Basically there are two types of topology; star and peer to peer. Peer to peer topology can take different shapes depends on its restrictions. Peer to peer is known as mesh, if there is no restriction. Another form is tree topology. Interoperability is one of the advantages of ZigBee protocol stack. ZigBee has wide range of applications, so different manufacturer provides ZigBee devices. Z igBee devices can interact witheach other regardless of manufacturer (even if the message is encrypted).C. Network Layer: Network layer interfaces between application layer and MAC Layer. This Layer is responsible for network formation and routing. Routing is the process of selection of path to relay the messages to the destination node. This forms the network involving joining and leaving of nodes, maintaining routing tables (coordinator/router), actual routing and address allocation. ZigBee coordinator or router will perform the route discovery. This layer Provides network wide security and allows low power devices to maximize their battery life. From the basic topologies, there are threehttp: // (C) International Journal of Engineering Sciences & Research Technology[2733-2738]network topologies are considered in IEEE802.15.4 arestar, cluster tree and mesh.D. Application Layer: The application Layer is thehighest protocol layer and it hosts the application objects.ZigBee specification separates the APL layer into threedifferent sub-layers: the Application Support Sub layer, the ZigBee Device Objects, and Application Frameworkhaving manufacturer defined Application Objects.1) The application objects (APO) : Control and managesthe protocol layers in ZigBee device. It is a piece ofsoftware which controls the hardware. Each applicationobjects assigned unique end point number that otherAPO’s can use an extension to the network deviceaddress to interact with it [6]. There can be up to 240application objects in a single ZigBee device. A ZigBeeapplication must conform to an existing applicationprofile which is accepted ZigBee Alliance. Anapplication profile defines message formats andprotocols for interactions between application objects.The application profile framework allows differentvendors to independently build and sell ZigBee devicesthat can interoperate with each other in a, givenapplication profile.2) ZigBee Device Object: The key definition of ZigBeeis the ZigBee device object, which addresses three mainoperations; service discovery, security and binding. Therole of discovery is to find nodes and ask about MACaddress of coordinator/router by using uncast messages.The discovery is also facilitating the procedure forlocating some services through their profile identifiers. So profile plays an important role. The security services in this ZigBee device object have the role to authenticate and derive the necessary keys for data encryption. The network manager is implemented in the coordinator and its role is to select an existing PAN to interconnect. It also supports the creation of new PANs. The role of binding manager is to binding nodes to recourses and applications also binding devices to channels [5].3) Application support sub layer: The ApplicationSupport (APS) sub layer provides an interface betweenthe NWK and the APL layers through a general set ofservices provided by APS data and management entities. The APS sub layer processes outgoing /incoming framesin order to securely transmit/receive the frames andestablish/manage the cryptographic keys. The upperlayers issue primitives to APS sub layer to use itsservices. APS Layer Security includes the followingservices: Establish Key, Transport Key, Update Device,Remove Device, Request Key, Switch Key, EntityAuthentication, and Permissions Con guration Table.4) Security service provider: ZigBee provides security mechanism for network layer and application support layers, each of which is responsible for securing their frames. Security services include methods for key establishment, key transport, frame protection and device management.E. Topologies: There are following topologies (1)Star Topology: Star topology consists of one coordinator and any number of end devices. In star topology a master slave network model is adopted where master is the ZigBee coordinator which is FFD and slave will be either FFD or RFD. ZigBee end devices are physically and electrically separated from each other end devices and pass information through coordinator. Devices can only communicate with the coordinator. This is does not provide multi-hop networking and mesh networking. (2)Cluster Tree Topology: The cluster tree topology is similar to the star topology. The difference is that other nodes can communicate with each other so that more RFD/FFDs can be connected to non-coordinator FFDs. The advantage of this topology is the possible geographical expansion of network. (3)Mesh Topology: In mesh topology, each node can communicate any other node within its range. Mesh topology is complex to maintain and beaconing is not allowed here. But it is more robust and tolerance to fault.Figure 4: topologiesZIGBEE ApplicationZigbee Alliance targets applications “acrossconsumer, commercial, industrial and governmentmarkets worldwide”. Unwired applications are highlysought after in many networks that are characterized bynumerous nodes consuming minimum power andenjoying long battery lives.http: // (C) International Journal of Engineering Sciences & Research Technology[2733-2738]Zigbee technology is designed to best suit these applications ,for the reason that it enables reduced costs of development, very fast market adoption, and rapid ROI.Airbee Wireless Inc has tied up with Radio craft AS to deliver “Zigbee-ready solutions; the former supplying the software and the latter making the module platforms .With even light controls and thermostat producers and includes big OEM names like HP ,Philips,Motorola and Intel.With Zigbee designed to enable two-way communication , not only will the consumer be able to monitor and keep track of domestic utilities usage, but also feed it to a computer system for data analysis.Futurists are sure to hold Zigbee up and says,” See I told you so”. The Zigbee Alliance is nearly 200 strong and growing, with more OEM’s signing up. This means that more and more products and even later, all devices and their controls will be based on this standard. Since Wireless personal Area Networking applies not only to household devices, but also to individualized office automation applications, Zigbee is here to stay .It is more than likely the basis of future home-networking solutions.Table 1 Application of ZigbeeComparison to Blue ToothZigbee was developed t serve very differentapplications than Bluetooth and leads to tremendous optimizations in power consumption. Some of the key differentiators are :(a) Zigbee: It has very low duty cycle, very long primary battery life ,Static and Dynamic star and mesh networks,>65,000 nodes, with low latency available, Ability to remain quiescent for long periods without communications, Direct Sequence Spread spectrum allows devices to sleep without the requirement for close synchronization.(b) Bluetooth: It has Moderate duty cycle ,secondary battery lasts same as master, very high QoS and very low, guaranteed latency, Quasi –static star networks up to seven clients with ability to participate in more than one network, Frequency Hopping Spread Spectrum is extremely difficult to create extended networks without large synchronization cost.Advantages of ZIGBEEThe main advantages include productinteroperability, vendor independence, and accessibility to broader markets. Customers can expect increased product innovation as a result of the industry standardization of the physical radio and logical networking layers. Instead of having to invest resources to create a new proprietary solution from scratch every time, companies will now be able to leverage these industry standards to instead focus their energies on finding and serving customers. the United States. This specification maintains the same usage and architecture as wired USB devices with a high-speed host-to-device connection and connects to a maximum of 127 devices. WUSB is based on a hub and spoke topology.ConclusionThe main conclusion of this Master’s thesis project is that, yes, ZigBee is a suitable base for embedded wireless development. The main reason is that development is easy and fast. ZigBee also meets the promised technical requirements. The areas that ZigBee is likely to be used in is building automation and industrial networks. The chances seem highest in the industry since ZigBee is currently the only option for such standardized wireless networks. Even though there are some competition, due to better performance, price and compliance, ZigBee is likely to dominate the home automation market as well. PC peripherals and consumers electronics are two areas that ZigBee is very unlikely to be used in, because it offers very little over the competition.“Just as the personal computer was a symbol of the '80s, and the symbol of the '90s is the World Wide Web, the next nonlinear shift, is going to be the advent of cheap sensors.”References[1].[2]"Hands-on ZigBee: implementing 802.15.4 withmicrocontrollers" Fredeady[3]ZigBee-2007 security essentials ender y¨ ukselhanne riis nielson flemming nielson informaticsand mathematical modelling, technicaluniversity of denmark richard petersens pladsbldg 321, dk-2800 kongens lyngby, Denmark[4]Shahin farahani, "ZigBee wireless networks andtransceivers"[5]H. labiod,h. afifi,c. de santis "wi-fitm,bluetooth,zig bee and wimax".[6]Wireless sensor networks: a survey on the stateof the art and the 802.15.4 and ZigBee standardspaolo baronti, prashant pillai, vince chook ,stefano chessa , alberto gotta, y. fun hu.[7]Khanh tuan le. designing a ZigBee-ready ieee802.15.4-compliant radio transceiver. chipcon,11/2004.[8]Protocols and architectures for wireless sensornetworks holger karl university of paderborn,germany andreas willig hasso-plattnerinstitute atthe university of potsdam, germany[9]Segolene arrigault, vaia zacharaki. ” Design of aZigBee magnetic sensor node” Master ofScience thesis.[10] “Part 15.4: Wireless Medium Access Control(MAC) and Physical Layer (PHY)Specifications for Low-Rate Wireless PersonalArea Networks (LR-WPANs) “SponsorLAN/MAN Standards Committee of the IEEEComputer Society.http: // (C)International Journal of Engineering Sciences & Research Technology[2733-2738]。
ZigBee外文文献加翻译
A Coal Mine Environmental Monitor System with LocalizationFunction Based on ZigBee-Compliant PlatformDongxuan YangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaYan ChenCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, China*****************Kedong WangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaAbstract—This paper describes and implements a new type of coal mine safety monitoring system, it is a kind of wireless sensor network system based on ZigBee technology. The system consists of two parts underground and surface. Wireless sensor networks are constituted by fixed nodes, mobile nodes and a gateway in underground. PC monitoring software is deployed in the surface. The system can not only gather real-time environmental data for mine, but also calculate the real-time location of mobile nodes worn by miners.Keywords:ZigBee; localization; wireless sensor networks; coal MineI.RESEARCH STATUSAs an important energy, coal plays a pivotal role in the economic development. Coal mine monitoring system, is the important guarantee for coal mine safety and high efficiency production [1]. In order to ensure the safe operation, the installation of environment monitoring node in tunnels to real-time detection is very important. However, commonly used traditional monitoring node wired connection to obtain communication with the control system, this node exist wiring difficulties, expensive and other shortcomings. In contrast, wireless sensor node can be easily with current mine monitoring network connection, and good compatibility, facilitate constituted mine gas monitoring network, to suit various size of mine applications. Since wireless nodes are battery powered, so completely out of the shackles of the cable, shorten the construction period can be arranged at any time where the need to use.The ZigBee wireless communication technology is used in this coal mine environmental monitor system. This is a new short-range, low complexity, low power,low data rate, low-cost two-way wireless communication technology [2]. Now, wireless sensor network product based on ZigBee technology are quantity and variety, but the real product can be applied in underground environments of special sensor node is very few[3]. The sensor node that we designed in the system is truly able to apply to in-well environment, it through the wireless sensor node security certification. At the same time, due to the special nature of the wireless network is that it can spread the wireless signal, we can easily locate staff for coal mine safety monitoring provides more protection [4].II. SYSTEM ARCHITECTUREThis system is a comprehensive monitoring system which is combined with software and hardware. Hardware part includes wireless mobile nodes and fixed nodes which were deployed in the underground tunnel, the main function of them is to collect coal mine environment data and require person’s location. Software part refers to the PC monitoring software which is designed in VC++ is used to summarize and display the data of each node. Monitoring node is divided into mobile nodes and fixed nodes; they are using ZigBee protocol for wireless transmission of data. Because the fixed node is also using wireless data transmission method, so it's deployed in the underground roadway becomes very convenient. As the mobile node is carried by the miner, it must be using wireless transmission method. This allows the mine to form a topology of ZigBee wireless sensor network. The fixed node in wireless sensor network is router device and the mobile node carried by miner is the end device. Normally, the router of ZigBee network has no sensor equipment; it is only responsible for data forwarding. But considering the practical application, we believe that add sensor devices on the router will be better on monitoring underground coal mine environment. So in our design, the router also has an environment monitoring function which is usually designed in end device.Fixed node will sent received data from mobile node to the gateway, then the gateway transmits data to monitor computer through RS232 or optical fiber. The PC monitor software in the computer will process all data and display them in a visualization window. The PC software also calculates each mobile node’s real-time location through the specific localization algorithm, according to the received signal strength (RSSI) obtained from mobile nodes.III. NODE DESIGNSince the ZigBee wireless network platform sold on present market was designed for the general environment, for special underground so they are not suitable for the environment. Therefore, we need to customize the system for underground environment whit a special hardware circuit. Node photo are shown in Fig. 1 Then wireless microcontroller CC2530 chip is the core processor of the node device, it can constitute a ZigBee network with very few peripheral circuits. TheCC2530 is an IEEE 802.15.4 compliant true System-on-Chip, supporting theproprietary 802.15.4 market as well as the ZigBee, ZigBee PRO, and ZigBee RF4CE standards. Unlike other wireless chip, CC2530 built-in 8051 monolithic integrated circuits kernel, therefore we no longer need to use a single MCU to control the circuit, and this save us a lot of cost [5].A.Mobile NodeThe mobile node is the end device of a ZigBee network that can be carried by miner; it should be a portable and low power consumption node. So the mobile node we designed is only as small as a mobile phone, and it is by built-in lithium ion battery power supply. In power loss, the core processor CC2530 is a low power consumption chip, when it is in the sleep mode, it only need to use less then 1uA work current. In order to reduce power consumption as much as possible on the display, a 100*32 pixel matrix with no backlighting LCD screen was used. The battery’s capacity of the mobile node is 1500mAh,so it is enough to meet the miner’s long hour works in the underground. The battery charge management chip is TP4057, the maximum charge current can up to 500Ma.Figure 1. Node photo.The mobile node circuit includes the gas concentration sensor MJ4.0 and temperature sensor PT-1000. As far as we know, many wireless sensor platforms use the digital type sensor. The communication between the digital sensor and the MCU need strict timing requirements. But considering the actual application, the wireless MCU usually has a real-time operating system in general, if we use the microcomputer to simulate the strict timing, it will affect the real-time of whole operating system. These two sensors output analog signals not digital signals. Only input this signal into a differential amplifier, can we get an appropriate signal that can be converted to a digital signal by an ADC mode within the CC2530 chip. In order to facilitate the carrying, external antenna was not used in our mobile node, instead ofusing a 2.4GHz patch antenna. And we customize a shell like a cell phone size; it is enough to put all PCBs, sensors and battery in it. Taking into account the small shell of the explosive performance is not very good, the design of PCBs and the selection of component are all carried out the safety assessment.B. Fixed NodeFixed node is installed in the wall of the underground tunnel. Because it is big than the mobile node, it is not appropriate to carry around. The circuit of the fixed node is almost same with the mobile node, it also use a CC2530 chip as core processor. Because of underground tunnels generally deploy with power cable, fixed nodes can use cable power-supply modes. At the same time, because we use wireless signal transmission, the deployment of new fixed nodes become very convenient, which also resolves the problem of the signal lines deployment.As a fixed node, the minor who is doing work may far from it, in order to facilitate the miners observed environmental data around the fixed nodes, it uses LED digital display. At the same time, the large current LED lights and buzzer are designed in the circuit; it makes the fixed node with the function of sound-light alarm. Considering that it may occur the emergency of without electricity, fixed node also built-in a lithium-ion battery. Under normal conditions, lithium-ion battery is in charging status, when external cable disconnect, fixed node is automatic switched to battery power, which can ensure the mobile node can deliver the information through fixed nodes in underground.Without regarding to fixed nodes’ portability, we have a customized shell that has excellent explosion properties, and the internal space is enough to hold down the 2.4 GHz antenna. To ensure safety, all cables and the location of sensors are placed with particular glue sealed, so that it has a good seal.IV.POSITIONING FUNCTIONOne of the important functions of the wireless sensor networks is localization, especially in the underground tunnel, it relates to the safe of the miner's life. Currently most widely used orientation method is GPS satellite positioning, it is a high precision, all-weather and global multifunctional system with the function of radio navigation, positioning and timing. But the GPS positioning method is not suitable for the underground work environment of coal mine, once you enter the underground, it cannot receive satellite signal, thus unable to achieve targeting [6]. We need to consider how to use wireless network to realize positioning function, means using wireless signal between the communications of devices for positioning. The existing distance measuring technology between the wireless-devices basically is the following kinds of methods: TOA, TDOA, AOA and RSSI.About the TOA method, the distance between the two devices is determined by the product of the speed of light and transmission time [7]. Although the precision of this method is accurate, but it require a precise time synchronization, so it demand hardware is higher.TDOA technology need ultrasonic signal,which is setting on a node with receive and transmit function. When measure the distance, it can sent ultrasonic wave and wireless signals together. By measuring the difference between two signals arrival time, we can calculate the distance between two devices [8]. Using this method can also obtain accurate result, but the method need to increase ultrasonic sending and receiving device on the node circuit, it will increase cost.AOA technology needs to install multiple antennas through the nodes so it canobtain adjacent nodes’ signals on deferent directions [9]. With this it can determine the location information from number of adjacent nodes and calculate its own position. This method not only need to add additional hardware, but also it's still very vulnerable to external disturbance, therefore it's not suitable for utilize.RSSI ranging is a cheap and easy technology. By using this method, we don't need to add additional hardware design. We also do not need very precise time requirements. This technique is about with measuring the wireless signals strength in the propagation of the loss, to measure the distance between two nodes. Because of this method requires hardware equipment is less, algorithm is simple, so it has been using in many wireless communication field. Comprehensive all conditions, positioning on the use of RSSI ranging technique.A. Hardware Location EngineThe CC2431 wireless microcontroller chip produced by TI Company has a hardware location engine. From the software's point of view, CC2431’s hardware location engine has a very simple API interface, as long as writing the necessary parameters and waiting for calculation, it can read the location results [10].The hardware location engine is also based on RSSI technology. The localization system includes reference nodes and blind nodes. The reference node is a fixed node that located in a known position, the node know their place and send a packet notifyto other nodes. The blind node receives packets from reference nodes, which can obtains reference nodes’ location and the corresponding RSSI value and put them into the hardware location engine, and then the blind node’s location can be read from the engine [11].On the surface, using the CC2431 hardware location engine targeting the program as a good choice, but considering the practical application, it will encounter the following problems. First of all, we have choose the CC2530 as the main chip of fixed nodes of the system, its internal programs is running in ZigBee2007 protocol, but CC2431 as a early chip, it applies only to ZigBee2006 protocol. In the communications between CC2431 and CC2530 that will have compatibility problems. Secondly, CC2431 hardware location engine use the distributed computing, all mobile nodes’ location are calculated by themselves, and then they upload information to the gateway node, this will not only occupy the mobile node processing time, still it can take up more network resources. For this reason, we have to shelve this approach, consider how to implement location by using CC2530 chip.B. Software Location EngineIf we want to use CC2530 to implement location function, that we must write software location engine by ourselves. Because that chip do not have a hardware location engine inside of it. This software location engine is still used RSSI technology; meanwhile mobile node position is calculated by the PC software, so asto reduce the burden of mobile node computing. To calculate the mobile node location, there must be at least three reference nodes. We will regard router nodes as reference nodes in network, and record the X, Y coordinates of every reference node. Then we let the mobile node send signal to each reference node, so that each reference node can obtain a RSSI values, with these parameters, we can use trilateral measurement method to calculate the specified location of the mobile node. The simpler way give the mobile node to broadcast way to send data, then around it every router node would receive the data from the mobile node, thus obtains RSSI values. Once the mobile node number increasing network, this method will make router nodes more burden, because the every radio message that the router node receives will transmit from the low layer to the top layer. Finally the application layer will analyze data packets. Infact, the mobile node need not to broadcast transmitted data, other routing node can also receive the mobile node packets. Only child mobile nodes of the router node will continue to transmit the packet forwarding upward, the other router nodes will shield out the packet in the bottom of the protocol.In order to let all router nodes can receive the packet which sending by mobile nodes, and send its RSSI values up to the gateway node, we need to modify the relevant function in Z- Stack protocol which is provided by TI. First we find the function named afIncomingData, it deals with the received data from the bottom of protocol, in which we add some code that can obtain packet’s RSSI value. Then through the osal_set_event function to add and send an eventMY_RSSI_REPORT_EVT of RSSI value task to OSAL polling system. This event’s corresponding function will be executed in the task of OSAL interrupt-driven function, thus the mobile node corresponding RSSI values will be sent to gateway node. Through this method, the packet will only be processed by bottom function of the protocol. According to this method we can obtain corresponding RSSI value and save the computation time of mobile nodes.In fact, this software location engine is not implementing with a single mobile node, but through the operation of the whole system to achieve. By which the mobile node is only responsible for sending unicast packets. The mobile node’s parent router node is responsible to forward the packet to the gateway. Other router nodes are not responsible for forwarding this packet, just clipping the mobile node of RSSI value, then forwarded to the gateway. Finally the gateway bring all RSSI values of the mobile node to PC monitoring software, the corresponding mobile node’s location is calculated. In order to reduce the error, monitoring software will collect 10 times of the RSSI value and take average on it, and then select the nearest value of the three fixed nodes. Finally the trilateral measurement method is used to calculate the location of mobile nodes.V.SYSTEM IMPLEMENTATIONAll software systems embedded in nodes are based on Z-Stack. BecauseZ-Stack is an open-source project, it is very beneficial to the secondary development. These nodes were tested in a real coal mine locate in Shanxi Province. We deployed the fixed node every 50 meters in the tunnel, and also set a fixed node in each entrance of the work area. Because the fixed node have large size digital LED displays, so the display content of the fixed node can be seen far from away the miner. Each miner carries a mobile node, the temperature and gas concentration is displayed on the LCD screen at real-time.The gateway node is placed at the entrance of the mine, through the RS232 cable connected to the monitoring computer in the control room. In this system all packets collected by the gateway node are transmitted to PC through a serial port, and it can save historical data backup to a SQL database. The main function of monitoring software is to display and store the data of every node, and calculates related mobile nodes’ location according to RSSI values. The monitoring software has two main dialog interfaces, one is used to display a two- dimensional profile of the coal mine, and user can see all the miners' working position. Another interface is data displaying interface, and environmental data were shown here. The picture of PC monitoring software is shown in Fig. 2.Figure 2. PC monitoring software.VI.SYSTEM EV ALUATIONThrough repeated testing of the system, we made the system an objective assessment. First is the power consumption assess for node hardware, fixed node’s working voltage is in 9V ~ 24V when the power supplied by cable. The maximum operating current for fixed node is 93mA; the average operating current is 92.2mA. When the power cable was disconnected, fixed node powered by lithium-ion battery. On battery power, the fixed node’s maximum working current is 147mA; average working current is 146.3mA. Fixed nodes can work 8 hours on battery power at least.Another quite important performance is the location function of the system performance. At four different locations of tunnel and working areas, mobile nodes were placed there. Two sets of different average error data were shown in From table 1. Because this system uses RSSI technology and it relies mainly on the signal strength, the signal quality will be affected by interferences. From different locations’ errors we can see that, the error in working areas was larger than it in tunnels, because the tunnel is generally straight, but the shape of the working areas are uncertainty.We gratefully acknowledge Texas Instruments for devices provided to us free of charge. And also thank staffs of XinNuoJin Company for giving us supports onsystem testing.REFERENCES[1] Xinyue Zhong Wancheng Xie. “Wireless sensor network in the coal mineenvironment monitoring“. Coal technology, 2009, Vol. 28, No. 9,pp.102-103. [2] Shouwei Gao. “ZigBee Technology Practice Guide”. Beijing: Beijing Universityof Aeronautics and Astronautics Press , 2009, pp. 27-28.[3] Yang Wang, Liusheng Huang, Wei Yang. “A Novel Real-Time CoalMinerLocalization and Tracking System Based on Self-Organized Sensor Networks”.EURASIP Journal onWireless Communications and Networking, Volume 2010, Article ID 142092.[4] Sang-il Ko, Jong-suk Choi, Byoung-hoon Kim. “Indoor Mobile LocalizationSystem and Stabilization of Localizaion Performance using Pre-filtering”.International Journal of Control, Automation and Systems, Vol. 6, No. 2, pp.204-213, April 2008.[5] .[6] Hawkins Warren, Daku Brian L. F, Prugger Arnfinn F. “Positioning inunderg round mines”. IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, 2006, pp. 3159-3163.[7] Zhu, Shouhong, Ding, Zhiguo, Markarian Karina. “TOA based jointsynchronization and localization”. 2010 IEEE International Conference on Communications, ICC 2010, 2010, Article ID 5502036.[8] Ni Hao, Ren Guangliang, Chang Yilin. “A TDOA location scheme in OFDMbased WMANs”. IEEE Transactions on Consumer Electronics,2008, Vol. 54, No. 3, pp. 1017-1021.[9] Dogançay Kutluyil, Hmam Hatem. “Optimal angular sensor separation for AOAlocalization”. Signal Processing, 2008, Vol. 88, No. 5, pp. 1248-1260.[10] K. Aamodt. “CC2431 Location Engine”. Texas Instruments, Application NoteAN042, SWRA095.[11] Tennina Stefano, Di Renzo Marco, Graziosi Fabio, Santucci Fortunato.“Locating zigbee nodes using the tis cc2431 location engine: A testbed platform and new solutions for positioning estimation of wsns in dynamic indoor environments”. Proc Annu Int Conf Mobile Comput Networking, 2008, pp.37-42.摘要-本文介绍并设计了一个新类型的煤矿安全监控系统,它是一种基于ZigBee 技术的无线传感器网络系统。
ZigBee 中文翻译译文 含外文原文
毕业设计(论文)译文及原稿免费下载,免费分享。
让论文写得更简单,更舒适。
更容易……译文题目ZigBee:无线技术,低功耗传感器网络原稿题目ZigBee: Wireless Technologyfor Low-Power Sensor Networks原稿出处电子文献ZigBee:无线技术,低功耗传感器网络加里莱格美国东部时间2004年5月6日上午12:00技师(工程师)们在发掘无线传感器的潜在应用方面从未感到任何困难。
例如,在家庭安全系统方面,无线传感器相对于有线传感器更易安装。
而在有线传感器的装置通常占无线传感器安装的费用80%的工业环境方面同样正确(适用)。
而且相比于有线传感器的不切实际甚至是不肯能而言,无线传感器更具应用性。
虽然,无线传感器需要消耗更多能量,也就是说所需电池的数量会随之增加或改变过于频繁。
再加上对无线传感器由空气传送的数据可靠性的怀疑论,所以无线传感器看起来并不是那么吸引人。
一个低功率无线技术被称为ZigBee,它是无线传感器方程重写,但是。
一个安全的网络技术,对最近通过的IEEE802.15.4无线标准(图1)的顶部游戏机,ZigBee的承诺,把无线传感器的一切从工厂自动化系统到家庭安全系统,消费电子产品。
与802.15.4的合作下,ZigBee提供具有电池寿命可比普通小型电池的长几年。
ZigBee设备预计也便宜,有人估计销售价格最终不到3美元每节点,。
由于价格低,他们应该是一个自然适应于在光线如无线交换机,无线自动调温器,烟雾探测器和家用产品。
(图1)虽然还没有正式的规范的ZigBee存在(由ZigBee联盟是一个贸易集团,批准应该在今年年底),但ZigBee的前景似乎一片光明。
技术研究公司In -Stat/MDR在它所谓的“谨慎进取”的预测中预测,802.15.4节点和芯片销售将从今天基本上为零,增加到2010年的165万台。
不是所有这些单位都将与ZigBee结合,但大多数可能会。
无线微传感器中英文对照外文翻译文献
无线微传感器中英文对照外文翻译文献(文档含英文原文和中文翻译)A Simple Energy Model for Wireless Microsensor TransceiversAbstract—This paper describes the modelling of shortrange transceivers for microsensor applications. A simple energy model is derived and used to analyze the transceiver battery life. This model takes into account energy dissipation during the start-up, receive, and transmit modes. It shows that there is a significant fixed cost in the transceiver energy consumption and this fixed cost can be driven down by increasing the data rate of the transceiver.I. IntroductionWireless microsensor networks can provide short-range connectivity with significant fault tolerances. These systems find usage in diverse areas such as environmental monitoring, industrial process automation, and field surveillance. As an example, Table I shows a detailed specification for a sensor system used in a factory machine monitoring environment.The major characteristics of a microsensor system are high sensor density, short range transmissions, and low data rate. Depending on the application, there can also be stringent BER and latency requirements. Due to the large density and the random distributed nature of these networks, battery replacement is a difficult task. In fact,a primary issue that prevents these networks to be used in many application areas is the short battery life. Therefore, maximizing the battery life time of the sensor nodes is important. Figure 1 shows the peak current consumption limit when a 950mAh battery is used as the energy source. As seen in the figure, battery life can vary by orders of magnitude depending on the duty cycle of each operation. To allow for higher maximum peak current, it is desirable to have the sensor remain in the off-state for as long as possible.However, the latency requirement of the system dictates how often the sensor needs to be active. For the industrial sensor application described above, the sensor needs to operate every 5ms to satisfy the latency requirement.Assuming that the sensor operates for 100µs every 5ms, the duty cycle is 2%. To achieve a one-year battery life, the peak current consumption must be kept under 5.4mA, which translates to approximately 10mW at 2V supply.This is a difficult target to achieve for sensors that communicate at giga-Hertz carrier frequencies.There has been active research in microsensor networks over the past years. Gupta [1] and Grossglauser [2] established information theoretic bounds on the capacity of ad-hoc networks. Chang [3] and Heinzelman [4] suggested algorithms to increase overall network life-time by spreading work loads evenly among all sensors. Much of the work in this area, especially those that deal with energy consumption of sensor networks, require an energy model [5]. This paper develops a realistic energy model based on the power consumption of a state of the art Bluetoothtransceiver [6]. This model provides insights into how to minimize the power consumption of sensor networks and can be easily incorporated into work that studies energy limited wireless sensor networks. The outline of this paper is as follows. Section II derives the transceiver model. Section III applies this model to analyzing the battery life time of the Bluetooth transceiver.Section IV investigates the dependencies in the model and shows how to modify the design of the Bluetooth transceiver to improve the battery life. Section V shows the battery life improvement realized by applying the results in Section IV. Section VI summarizes the paper.II. Microsensor Transceiver ModellingThis section derives a simple energy model for low power microsensors. Figure 2 shows the model of the sensor node.It includes a sensor/DSP unit for data processing, D/A and A/D for digital-to-analog and analog-to-digital conversion, and a wireless transceiver for data communication. The sensor/DSP, D/A, and A/D operate at low frequency and consume less than 1mW. This is over an order of magnitude less than the power consumption of the transceiver. Therefore, the energy model ignores the contributions from these components. The transceiver has three modes of operation: start-up, receive, and transmit. Each mode will be described and modelled.A. Start-up ModeWhen the transceiver is first turned on, it takes some time for the frequency synthesizer and the VCO to lock to the carrier frequency. The start-up energy can be modelled as follows:where P LO is the power consumption of the synthesizer and the VCO. The term t start is the required settling time. RF building blocks including PA, LNA, and mixer have negligible start-up time and therefore can remain in the off-state during the start-up mode.B. Receive ModeThe active components of the receiver includes the low noise amplifier (LNA), mixer, frequency synthesizer, VCO, intermediate-frequency (IF) amplifier (amp), and demodulator (Demod). The receiver energy consumption can be modelled as follows:where P RX includes the power consumption of the LNA,mixer, IF amplifier, and demodulator. The receiver power consumption is dictated by the carrier frequency and the noise and linearity requirements. Once these parameters are determined, to the first order the power consumption can be approximated as a constant, for data rates up to 10’s of Mb/s. In other words, the power consumption is dominated by the RF building blocks that operate at the carrier frequency. The IF demodulator power varies with data rate, but it can be made small by choosing a low IF.C. Transmit ModeThe transmitter includes the modulator (Mod), frequency synthesizer and VCO (shared with the receiver), and power amplifier (PA). The data modulates the VCO and produces a FSK signal at the desired data rate and carrier frequency. A simple transmitter energy model is shown in Equation (3). The modulator consumes very little energy and therefore can be neglected.P LO can be approximated as a constant. P PA depends on additional factors and needs to be modelled more carefully as follows:where η is the PA efficiency, r is the data rate, d is the transmission distance, and n is the path loss exponent. γPA is a factor that depends on E b /N O , noise factor F of the receiver, link margin L mar , wavelength of the carrier frequency λ, and th e transmit/receive antenna gains G T ,G R :From Equations (3) and (4), the transmitter power consumption can be written as a constant term plus a variable term. The energy model thus becomesIII. Bluetooth TransceiverHere we demonstrate how the above model can be used to calculate the battery life time of a Bluetooth transceiver [6]. This is one of the lowest power Bluetooth transceivers reported in literature. The energy consumption of the transceiver depends on how it operates. Assuming a 100-bit packet is received and a 100-bit packet is transmitted every 5ms, Figure 3 showsthe transceiver activity within one cycle of operation.The transceiver takes 120µs to start up. Operating at 1Mb/s, the receiver takes 100µs to receive the packet. The transceiver then switches to the transmit mode and transmits a same-length packet at the same rate. A 10µs interval, t switch , between the receive and the transmit mode is allowed to switch channel or to absorb any transient behavior. Therefore, the energy dissipated in one cycle of operation is simplyBoth the average power consumption and the duty cycle can be found From Figure 3. Knowing that the transceiver operates at 2V, the life time for a 950mAh battery is calculated to be approximately 2-months.IV. Energy OptimizationThe microsensor system described in Section I requires a battery life of one year or better. Although the Bluetooth transceiver described in the last section falls short of this requirement, it serves as a starting point for making improvements. This section examines E op in detail and suggests ways to increase the battery life by considering both circuit and system improvements. A.Start-up EnergyThe start-up energy can be a significant part of the total energy consumption, especially when the transceiver is used to send short packets in burst mode. For the Bluetooth transceiver, E start accounts for 20% of E op .The start-up energy becomes negligible if the following condition is held true:For the receive/transmit scheme shown in Figure 3, the right hand-side of Equation (8)is evaluated to be approximately 450µs. To keep E start an order of magnitude below E op , it is desirable to have a start-up time of less than 45µs. Cho has demonstrated a 5.8GHz frequency synthesizer im- plementation with a start-up time under 20µs [7].B. Power AmplifierThe PA power consumption is given bywhere η is the power efficiency and P out is the RF output power. P out can be determined by link-budget analysis. For a Bluetooth transceiver, the required P out is 1mW [8].This enables a maximum transmission distance of 10 meters, which is adequate for microsensor applications. Note that P out is small as compared to P LO . The Bluetooth transceiver discussed in Section II has a maximum RF output power of 1.6mW and a PA power consumption of 10mW, sothe efficiency is at 16%. At frequencies around 2GHz, the PA efficiency can vary from 10% [9] to 70% [10] depending on linearity, circuit topology, and technology. Since FSK signal has a constant envelope, nonlinea r PA’s can be used so that better efficiency can be achieved. As will be shown in the next section, PA efficiency has a significant impact on the battery life.C. Data RateAssuming a packet of length L pkt is transmitted at dat rate r, then the transmit time isThe transmitter energy consumption can be re-written asEquation (12) shows that the contribution of the fixed cost P LO can be reduced by increasing the data rate. The energy per bit, E bit , is defined as E op divided by the total number of bits received and sent during one cycle of operation. Assuming a packet of length L pkt is received and a packet of the same length is transmitted, E bit can be found by dividing Equation (7) by 2L pkt . Substituting the appropriate expressions for E start , E rx , and E tx and re-arranging the terms, we getThe first term in Equation (13) is the start-up energy cost. The second term is the PA energy cost. The third term is the cost of the rest of the transceiver electronics during the transmit and receive modes. Note that this term is divided by the data rate r. Figure 4 shows E bit as a function of data rate. The two solid curves have start-up time 120µs and PA efficiencies 10% and 70%, respectively. The two dotted curves have start-up time 20µs and efficiencies 10% and 70%, respectively. At low data rate, E bit is dominated by the fixed cost (the 3rd term in Equation (13)). At high data rate, the start-up energy and the PA energy dominates, so in order to increase battery life, good circuit design techniques need to be applied to minimize the start-up time and to maximize the PA efficiency.Figure 5 shows the impact of PA efficiency on the battery life at a data rate of 10Mb/s. At t start = 120µs, the startup energy is so large that the battery life is limited to 7month even if the PA reaches 100% efficiency. At t start =20µs, the battery life is much improved. The PA efficiency needs to be higher than about 30% to have a 1-year or better battery life. This is certainly achievable as discussed previously in the PA section.V. Performance ImprovementThere are three apparent results from the previous section. First, the data rate should be increased to reduce the fixed cost. Second, the start-up time should be minimized. Third, PA efficiency should be maximized. Figure 6 shows the transceiver activity for a transceiver that has 20µs start-up time and 10Mb/s data rate. The power consumption of the electronics are kept the same as in the Bluetooth transceiver except for the PA. The maximum RF output power is set at 10mW to accommodate the higher data rate, and the PA efficiency is assumed to be 50%. The switching time is kept at 10µs, although this is a conservative since the switching time is likely to be shorter for a faster frequency synthesizer. The E op of this transceiver is 8x lower than that of theBluetooth transceiver. The battery life-time extends from 2-months to approximately1.3 years.VI. ConclusionThis paper describes the modelling of short-range transceivers for wireless sensor applications. This model takes into account energy dissipation during the start-up, transmit, and receive modes. This model is first used to analyze the battery life of a state of the art Bluetooth transceiver, and then it is used to optimize E op . This paper shows that the battery life can be improved significantly by increasing the data rate, reducing the start-up time, and improving the PA efficiency. Increasing the data rate drives down the fixed energy cost of the transceiver. Reducing the start-up time decreases the start-up energy overhead. Improving the PA efficiency lowers the energy per bit cost of the PA.一个简单的能量无线微传感器的接收机模型摘要—本文描述了微传感器的近程的收发器的造型的应用程序。
zigbee-相关-外文资料及翻译教程文件
The APL LayerThe application (APL) layer is the highest protocol layer in a ZigBee wireless network. The ZigBee APL layer consists of three sections, shown in Figure 3.44 : the application support (APS) sublayer, ZigBee Device Objects (ZDO), and the application framework.The application support sublayer (APS) provides an interface between the network layer (NWK) and the application layer (APL). The APS sublayer, similar to all lower layers, supports two types of services: data and management. The APS data service is provided by APS Data Entity (APSDE) and is accessed through the APSDE Service Access Point (SAP). The management capabilities are offered by APS Management Entity (APSME) and are accessed through APSME-SAP.The APS sublayer constants and attributes start with apsc and aps , respectively. The APS attributes are contained in the APS Information Base (APS IB or AIB). The list of APS constants and attributes is provided in the ZigBee specification [3].Network The application framework in ZigBee is the environment in which application objects are hosted to control and manage the protocol layers in a ZigBee device. Application objects are developed by manufacturers, and that is where a device is customized for various applications. There can be up to 240 application objects in a single device.The application objects use APSDE-SAP to send and receive data between peer application objects ( Figure 3.44 ). Each application object has a unique endpoint address (endpoint 1 to endpoint 240). The endpoint address of zero is used for the ZDO. To broadcast a message to all application objects, the endpoint address is set to 255. Endpoint addressing allows multiple devices to share the same radio. In the light control example in Section 2.1.4, multiple lights were connected to a single radio. Each light has a unique endpoint address and can be turned on and off independently.The ZigBee Device Objects (ZDO) provide an interface between the APS sublayer and the application framework. The ZDO contains the functionalities that are common in all applications operating on a ZigBee protocol stack. For example, it is the responsibility of the ZDO to configure the device in one of three possible logical types of ZigBee coordinator, ZigBee router, or ZigBee end device. The ZDO uses primitives to perform its duties and accesses the APS sublayer Management Entity via APSME-SAP. The application framework interacts with the ZDO through the ZDO public interface.The details of application framework, ZDO, and APS sublayer are reviewed in the following three subsections.The Application Framework The ZigBee standard offers the option to use application profiles in developing an application. The use of an application profile allows further interoperability between the products developed by different vendors for a specific application. For instance, in a light control scenario, if two vendors use the same application profile to develop their products, the switches from one vendor will be able to turn on and turn off the lights manufactured by the other vendor. The application profiles are also referred to as ZigBee profiles.Each application profile is identified by a 16-bit value known as a profile identifier . Only the ZigBee alliance can issue profile identifiers. A vendor that has developed a profile can request a profile identifier from the ZigBee alliance. The ZigBee alliance evaluates the proposed application profile and if it meets the alliance guidelines, a profile identifier willbe issued. The application profiles are named after their corresponding application use. For example, the home automation application profile provides a common platform for vendors developing ZigBee-based products for home automation use.The general structure of an application profile is shown in Figure 3.45. The application profile consists of two main components: clusters and device descriptions.A cluster is a set of attributes grouped together. Each cluster is identified by a unique 16-bit number called a cluster identifier . Each attribute in a cluster is also identified by a unique 16bit number known as a attribute identifier . These attributes are used to store data or state values. For example, in a temperature control application, a device that acts as the temperature sensor can store the value of the current temperature in an attribute. Then another device that acts as the furnace controller can receive the value of this attribute and turn on or turn off the furnace accordingly. The application profile does not contain the cluster itself. Instead, the application profile has a list of the cluster identifiers. Each cluster identifier uniquely points to the cluster itself.The other part of an application profile is the device descriptions ( Figure 3.45 ). The descriptions provide information regarding the device itself. For example, the supported frequency bands of operation, the logical type of the device (coordinator, router, or end device), and the remaining energy of the battery are provided by the device descriptions. Each device description is identified by a 16-bit value. The ZigBee application profile uses the concept of descriptor data structure . In this method, instead of including the data in the application profile, a 16-bit value is keptand acts as a pointer to the location of the data. This pointer is referred to as the data descriptor . When a device discovers the presence of another device in the network, the device descriptions are transferred to provide the essential information regarding the new device. The device descriptions consist of five sections: node descriptor, node power descriptor, simple descriptor, complex descriptor, and user descriptor. The node descriptor provides information such as the node logical type and the manufacturer code. The node power descriptor determines whether the device is battery powered and provides the current level of the battery. The profile identifier and clusters are provided in the simple descriptor . The complex descriptor is an optional part of the device descriptions and contains information such as the serial number and the device model name. Any additional information regarding the device can be included as the user descriptor . The user descriptor can be up to 16 ASCII characters. For example, in a light control application, the user descriptor field of a wall switch installed in a hallway can read Hall switch .The node descriptor fields for ZigBee-2006 are provided in Figure 3.46 . The node descriptor is a mandatory part of the device descriptions. The logical type can be ZigBee coordinator, router, or end device. The complex descriptor and user descriptor are optional and if their corresponding fields in the node descriptor are set to zero, they are not provided as part of the device descriptions. The APS flag field determines the APS sublayer capabilities. The frequency band (868 MHz, 915MHz, or 2.4 GHz) is specified in the frequency band field. The MAC capacity flags field is the same as the MAC capacity field presented before in Figure 3.25 . A manufacturer can request and receive a manufacturer code from the ZigBee alliance. This code is included in the node descriptor. The maximum size of the APS Sublayer Data Unit (ASDU), in octets, is specified in the maximum buffer size field. The maximum size of a single message that can be transferred to or from a node is provided in the maximum transfer size field (in octets). In ZigBeePro, the maximum incoming transfer size and maximum outgoing transfer size are two separate fields (16 bits each).The server mask field provides information regarding the system server capabilities of this node. A server is a device that provides specific services to other devices in the network. If each bit is set to one, the device has the corresponding capability shown in Figure 3.46 . The trust center is the device trusted by devices within a network to distribute security keys for the purpose of network and end-to-end application configuration management. The security features are reviewed in Section 3.6. The primary binding table cache is a device that allows other devices to store their binding tables with it as long as it has storage space left. The bindingprocedure is further clarified in this subsection. The primary binding table cache can be used to back up the content of binding tables and restore them whenever necessary.A device can choose to keep its own binding table, known as a source binding table , instead of storing it with a primary binding table cache. However, any device can store a backup of the source binding table in the primary biding table cache device and recover it later if necessary.A ZigBee network may have a primary discovery cache device. This device is a ZigBee coordinator or router used to store the descriptors such as node descriptors and power descriptors of some other devices. An end device, for example, that sleeps for long durations can store its descriptors in the primary discovery cache device. If a device in the network tries to locate the information regarding this sleeping end device while the device is inactive, it can get the information from the primary discovery cache device instead. If a network contains sleeping ZigBee end devices, the network must have at least one primary discovery cache device.应用层(APL)是在ZigBee无线网络协议栈中最高的一层。
英文文献翻译(关于zigbee)
英文文献翻译1.1 StandarsWireless sensor standards have been developed with the key design requirement for low power consumption. The standard defines the functions and protocols necessary for sensor nodes to interface with a variety of networks.Someof these standardincludeIEEE802.15.4,ZigBee,WirelessHART,ISA100.11,IETF6LoW-PAN,IE EE802.15.3,Wibree.The follow-ing paragraphs describes these standards in more detail.IEEE802.15.4:IEEE802.15.4[37] is the proposed stan-dard for low rate wireless personal area networks (LR-WPAN's).IEEE802.15.4 focuses on low cost of deployment,low complexity, and low power consumption.IEEE802.15.4 is designed for wireless sensor applications that require short range communication to maximize battery life. The standard allows the formation of the star and peer-to-peer topology for communication between net-work devices.Devices in the star topology communicate with a central controller while in the peer-to-peer topol-ogy ad hoc and self-configuring networks can be formed.IEEE802.15.4devices are designed to support the physical and data-link layer protocols.The physical layer supports 868/915 MHz low bands and 2.4 GHz high bands. The MAC layer controls access to the radio channel using the CSMA-CA mechanism.The MAC layer is also responsible for validating frames, frame delivery, network interface, network synchronization, device association, and secure services.Wireless sensor applications using IEEE802.15.4 include residential, industrial, and environment monitor-ing, control and automation.ZigBee [38,39] defines the higher layer communication protocols built on the IEEE 802.15.4 standards for LR-PANs. ZigBee is a simple, low cost, and low power wireless com- munication technology used in embedded applications.ZigBee devices can form mesh networks connecting hun- dreds to thousands of devices together. ZigBee devices use very little power and can operate on a cell battery for many years. There are three types of ZigBee devices:Zig-Bee coordinator,ZigBee router, and ZigBee end device.Zig-Bee coordinator initiates network formation,stores information, and can bridge networks together. ZigBee routers link groups of devices together andprovide mul-ti-hop communication across devices. ZigBee end devic consists of the sensors, actuators, and controllers that col-lects data and communicates only with the router or the coordinator. The ZigBee standard was publicly available as of June 2005.WirelessHART:The WirelessHART[40,41] standard pro-vides a wireless network communication protocol for pro-cess measurement and control applications.The standard is based on IEEE802.15.4 for low power 2.4 GHz operation. WirelessHART is compatible with all existing devices, tools, and systems. WirelessHART is reliable, secure, and energy efficient. It supports mesh networking,channel hopping, and time-synchronized work com-munication is secure with encryption,verification,authen-tication,and key management.Power management options enable the wireless devices to be more energy effi-cient.WirelessHART is designed to support mesh, star, and combined network topologies. A WirelessHART network consists of wireless field devices,gateways, process auto- mation controller, host applications,and network man-ager.Wireless field devices are connected to process or plant equipment.Gateways enable the communication be-tween the wireless field devices and the host applications.The process automation controller serves as a single con-troller for continuous process.The network manager con-figures the network and schedule communication between devices. It also manages the routing and network traffic. The network manager can be integrated into the gateway, host application, or process automation control-ler. WirelessHART standards were released to the industry in September 2007 and will soon be available in commer- cial products.ISA100.11a: ISA100.11a [42] standard is designed for low data rate wireless monitoring and process automation applications. It defines the specifications for the OSI layer, security, and system management.The standard focuses on low energy consumption,scalability, infrastructure,robustness, and interoperability with other wireless de-vices. ISA100.11a networks use only 2.4 GHz radio and channel hopping to increase reliability and minimize inter-ference.It offers both meshing and star network topolo-gies. ISA100.11a also provides simple, flexible, and scaleable security functionality. 6LoWPAN: IPv6-based Low power Wireless Personal Area Networks [43-45] enables IPv6 packets communica-tion over an IEEE802.15.4 based network.Low power device can communicate directly with IP devices using IP-based protocols. Using 6LoWPAN,low power devices have all the benefits of IPcommunication and management.6LoWPAN standard provides an adaptation layer, new packet format, and address management. Because IPv6 packet sizes are much larger than the frame size of IEEE 802.15.4, an adaptation layer is used. The adaptation layer carries out the functionality for header compression. With header compression, smaller packets are created to fit into an IEEE 802.15.4 frame size. Address management mecha- nism handles the forming of device addresses for commu-nication. 6LoWPAN is designed for applications with low data rate devices that requires Internet communication.IEEE802.15.3:IEEE802.15.3[46] is a physical and MAC layer standard for high data rateWPAN. It is designed to support real-time multi-media streaming of video and mu-sic.IEEE802.15.3 operates on a 2.4 GHz radio and has data rates starting from 11 Mbps to 55 Mbps.The standard uses time division multiple access (TDMA) to ensure quality of service. It supports both synchronous and asynchronous data transfer and addresses power consumption, data rate scalability, and frequency performance. The standard is used in devices such as wireless speakers, portable video electronics, and wireless connectivity for gaming, cordless phones, printers, and televisions.Wibree: Wibree [47] is a wireless communication tech-nology designed for low power consumption, short-range communication, and low cost devices. Wibree allows the communication between small battery-powered devices and Bluetooth devices.Small battery powered devices in-clude watches, wireless keyboard, and sports sensors which connect to host devices such as personal computer or cellular phones. Wibree operates on 2.4 GHz and has a data rate of 1 Mbps. The linking distance between the de-vices is 5-10 m.Wibree is designed to work with Blue-tooth. Bluetooth with Wibree makes the devices smaller and more energy-efficient. Bluetooth-Wibree utilizes the existing Bluetooth RF and enables ultra-low power con-sumption. Wibree was released publicly in October 2006.1.2 IntroductionWireless sensor networks (WSNs) have gained world-wide attention in recent years,particularly with the prolif-eration in Micro-Electro-Mechanical Systems (MEMStechnology which has facilitated the development of smart sensors.These sensors are small, with limited processing and computing resources, and they areinexpensive com-pared to traditional sensors. These sensor nodes can sense, measure, and gather information from the environment and, based on some local decision process, they can trans-mit the sensed data to the user.Smart sensor nodes are low power devices equipped with one or more sensors, a processor, memory, a power supply, a radio, and an actuator. 1 A variety of mechanical, thermal, biological, chemical, optical, and magnetic sensors may be attached to the sensor node to measure properties of he environment. Since the sensor nodes have limited memory and are typically deployed in difficult-to-access locations, a radio is implemented for wireless communica- tion to transfer the data to a base station (e.g., a laptop, a personal handheld device, or an access point to a fixed infra-structure). Battery is the main power source in a sensor node. Secondary power supply that harvests power from the environment such as solar panels may be added to the node depending on the appropriateness of the environment where the sensor will be deployed. Depending on the appli- cation and the type of sensors used, actuators may be incor- porated in the sensors.A WSN typically has ittle or no infrastructure. It con-sists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. There are two types of WSNs: structured and unstructured. An unstructured WSN is one that con-tains a dense collection of sensor nodes. Sensor nodes 2 may be deployed in an ad hoc manner into the field. Once 2 In ad hoc deployment, sensor nodes may be randomly placed into the deployed, the network is left unattended to perform moni-toring and reporting functions. In an unstructured WSN, net-work maintenance such as managing connectivity and detecting failures is difficult since there are so many nodes. In a structured WSN, all or some of the sensor nodes are de-ployed in a pre-planned manner.3The advantage of a struc-tured network is that fewer nodes can be deployed with lower network maintenance and management cost.Fewer nodes can be deployed now since nodes are placed at spe-cific locations to provide coverage while ad hoc deployment can have uncovered regions.WSNs have great potential for many applications in sce-narios such as military target tracking and surveillance [2,3], natural disaster relief [4], biomedical health monitor- ing [5,6], and hazardous environment exploration and seis-mic sensing [7].Inmilitary target tracking and surveillance, a WSN can assist in intrusion detection and identification. Specific examples include spatially-corre-lated and coordinated troop and tank movements. With natural disasters, sensor nodes can sense and detect the environment to forecast disasters before they occur. In bio-medical applications, surgical implants of sensors can help monitor a patient's health.For seismic sensing, ad hoc deployment of sensors along the volcanic area can detect the development of earthquakes and eruptions.Unlike traditional networks,a WSN has its own design resource constraints.Resource constraints include a limited amount of energy,short communication range, low bandwidth, and limited processing and storage in each node. Design constraints are application dependent and are based on the monitored environment. The environment plays a key role in determining the size of the network, the deployment scheme, and the network topology. The size of the network varies with the monitored environ-ment. For indoor environments, fewer nodes are required to form a network in a limited space whereas outdoor envi-ronments may require more nodes to cover a larger area. An ad hoc deployment is preferred over pre-planned deployment when the environment is inaccessible by hu-mans or when he network is composed of hundreds to thousands of nodes. Obstructions in the environment can also limit communication between nodes, which in turn af-fects the network connectivity (or topology).Research in WSNs aims to meet the above constraints by introducing new design concepts,creating or improving existing protocols, building new applications, and develop-ingnewalgorithms.Inthisstudy,wepresentatop-downap-proach to survey different protocols and algorithms proposed in recent years. Our work differs from other sur-veys as follows:•While our survey is similar to [1], our focus has been to survey the more recent literature.•We address the issues in a WSN both at the individual sensor node level as well as a group level.•We survey the current provisioning, management and control issues in WSNs.These include issues such as localization, coverage, synchronization, network secu-rity, and data aggregation and compression.•We compare and contrast the various types of wireless sensor networks.•Finally, we provide a summary of the current sensor technologies.The remainder of this paper is organized as follows: Section 2 gives an overview of the key issues in a WSN. Section 3 compares the different types of sensor networks. Section 4 discusses several applications of WSNs.Section 5 presents issues in operating system support, supporting standards, storage, and physical testbed. Section 6 summa-rizes the control and management issues. Section 7 classi-fies and compares the proposed physical layer,data-link layer, network layer, and transport layer protocols. Section 8 concludes this paper. Appendix A compares the existing types of WSNs. Appendix B summarizes the sensor tech-nologies. Appendix C compares sensor applications with the protocol stack.1.3 Overview of key issuesCurrent state-of-the-art sensor technology provides a solution to design and develop many types of wireless sen-sor applications. A summary of existing sensor technolo-gies is provided in Appendix A. Available sensors in the market include generic (multi-purpose) nodes and gate- way (bridge) nodes. A generic (multi-purpose) sensor node's task is to take measurements from the monitored environment. It may be equipped with a variety of devices which can measure various physical attributes such as light, temperature, humidity, barometric pressure, veloc-ity, acceleration, acoustics, magnetic field, etc.Gateway (bridge) nodes gather data from generic sensors and relay them to the base station. Gateway nodes have higher pro-cessing capability,battery power, and transmission (radio) range. A combination of generic and gateway nodes is typ-ically deployed to form a WSN.To enable wireless sensor applications using sensor tech-nologies, the range of tasks can be broadly classified into three groups as shown in Fig. 1. The first group is the system. Eachsensor nodeis an individual system.In order to support different application software on a sensor system, develop-ment of new platforms, operating systems, and storage schemes are needed. The second group is communication protocols, which enable communication between the appli-cation and sensors. They also enable communication be-tween the sensor nodes. The last group is services which are developed to enhance the application and to improve system performance and network efficiency.From application requirements and network manage-ment perspectives, it isimportant th asensor nodes are capable of self-organizing themselves. That is, the sensor nodes can organize themselves into a network and subse-quently are able to control and manage themselves effi-ciently. As sensor nodes are limited in power, processing capacity, and storage, new communication protocols and management requirements.The communication protocol consists of five standard protocol layers for packet switching:application layer,transport layer, network layer, data-link layer, and physical layer. In this survey, we study how protocols at different layers address network dynamics and energy efficiency.Functions such as localization, coverage, storage, synchro- nization, security, and data aggregation and compression are explored as sensor network services.Implementation of protocols at different layers in the protocol stack can significantly affect energy consumption, end-to-end delay, and system efficiency. It is important to optimize communication and minimize energy usage. Tra-ditional networking protocols do not work well in a WSN since they are not designed to meet these requirements.Hence, new energy-efficient protocols have been proposed for all layers of the protocol stack. These protocols employ cross-layer optimization by supporting interactions across the protocol layers.Specifically, protocol state information at a particular layer is shared across all the layers to meet the specific requirements of the WSN.As sensor nodes operate on limited battery power, en-ergy usage is a very important concern in a WSN; and there has been significant research focus that revolves around harvesting and minimizing energy. When a sensor node is depleted of energy, it will die and disconnect from the network which can significantly impact the performance of the application. Sensor network lifetime depends on the number of active nodes and connectivity of the net- work, so energy must be used efficiently in order to maxi- mize the network lifetime.Energy harvesting involves nodes replenishing its en-ergy from an energy source. Potential energy sources in- clude solar cells [8,9], vibration [10], fuel cells, acoustic noise, and a mobile supplier [11]. In terms of harvesting energy from the environment [12], solar cell is the current mature technique that harvest energy from light. There is also work in using a mobile energy supplier such as a robot to replenish energy. The robots would be responsible in charging themselves with energy and then deliveringen- ergy to the nodes.Energy conservation in a WSN maximizes network life-time and is addressed through efficient reliable wireless communication, intelligent sensor placement to achieve adequate coverage, security and efficient storage manage-ment, and through data aggregation and data compression. The above approaches aim to satisfy both the energy con-straint and provide quality of service (QoS) 4 for the applica- tion. For reliable communication, services such as congestion control, active buffer monitoring, acknowledge-ments, and packet-loss recovery are necessary to guarantee reliable packet delivery. Communication strength is depen-dent on the placement of sensor nodes. Sparse sensor place-ment may result in long-range transmission and higher energy usage while dense sensor placement may result in short-range transmission and less energy consumption. Cov-erage is interrelated to sensor placement. The total number of sensors in the network and their placement determine the degree of network coverage. Depending on the application, a higher degree of coverage may be required to increase the accuracy of the sensed data. In this survey, we review new protocols and algorithms developed in these areas.1.1 标准协议:无线传感器标准已经发展出关键的设计要求低功率消耗。
ZigBee传感器网络在数据采集和监测方面的应用(中文翻译)
摘要本文提出了一种基于ZigBee地传感器网络地数据采集和监控系统,采用了商业上可行地ZigBee解决方案.ZigBee模块通过USB接口连接到PC机,在整个传感器网络中起到基站作用•数据通过远程设备采集后,通过无线方式发送到基站地PC机,基站起到数据接收器作用•每个远程设备由一个ZigBee模块产品和一个传感器组成, 该传感器由一个热电偶和冷端补偿放大器相连构成.来自放大器地信号输入到ZigBee模块AD转换器地端口•温度数据按照ZigBee协议从远程装置传送到接收数据地PC机.数据采样率是每秒一次;最高地采样率是每秒4次.这些数据通过设备控制软件以十六进制记录,数据文件以文本格式存储在电脑中.按照时间变化地数据可以使用电子表格软件地宏功能监测.根据在大学实验室对实验使用地结果,本系统在教育领域有广泛地应用.关键词:传感器网络ZigBee协议,温度监控,自动数据显示,热功当量第 1 章引言无线传感器网是以下几种应用中地关键技术,如家庭自动化,楼宇控制,节能,汽车监测•开发工具包是由ZigBee模块供应商提供地,如房间地照明和空气调节系统地应用控制器,其中有一个温度传感器,光学传感器,按钮开关,蜂鸣器集成在一个电路板.ZigBee传感器网络适合地潜在许多其他应用.ZigBee模块提供几种类型地接口他们功耗低,通常是小地模块.该控制该模块地软件与产品捆绑或通过互联网免费下载.在这个系统中,远端传感器地数据发送到基站地计算机,在一个相对较低地成本下完成配置. b5E2RGbCAP本文介绍了一种数据采集和监测ZigBee传感器网络.在教育领域被认为是一次新地传感器网络应用.第2章ZigBee地传感器网络无线传感器网络主要功能有两方面:测量和通信.每个传感器装置在网络拓扑结构作为通信节点.该网络由与其他设备通信地传感器组成.由于设备采用无线通讯,因此,不需要网络基础设施.一个设备通过部署在无线通信范围内地相邻设备加入网络.p1EanqFDPwZigBee是一个标准地名称,指地是地小范围,低通信速率无线个人区域网地应用层.一个近距离,小规模地网络用ZigBee模块很容易配置.另一方面,由于一个ZigBee 地网络可管理多达65000个设备,因此可以配置一个大型网络.DXDiTa9E3d IEEE 802.15.4指定无线个人局域网物理层和媒介访问控制层.物理层是网络通信地硬件.媒介访问控制层对应于开放系统互联vOSI )参考模型地数据链路层•它指定了两个相邻设备之间地数据传输和接收方法.RTCrpUDGiT一个设备与周边装置通过无线进行通信.射频灵敏度可以根据设备所处环境变化.设备间通信通过选择互连设备维持,通信线路随着每次数据发送和接收变化.该网络是一个典型地星形,网状或树形拓扑结构.依据所支持地功能,设备分为两种类型•半功能设备发射和接收数据信号,全功能设备<FFD)除了发射和接收还互连数据信号. 5PCzVD7HxA设备通过无线通信链路传输数据到电脑.PC机起到控制和管理网络地基站作用.如果远程设备处于PC机射频范围外,它地数据通过与其他设备互联传到PC机.远程设备可以通过与其他设备合作来与PC机通信.jLBHrnAILg第 3 章温度监测系统ZigBee网络由Telegesis公司地ETRX2设备组成.ETRX2设备通过USB接口与PC 机相连,作为基站.该ETRX2设备设置为一个数据接收器,因此远程设备地数据由基站地PC机收集.XHAQX74J0X以下是该ETRX2设备作为ZigBee模块地基本特点:发射频率:2.4 GHz频段;数据传输率: 250千比特/秒;通道数:16<802.15.4频道11至26);I / O端口:12个通用I / 0端口和2个模拟输入端口;典型距离:100? 300M.图1显示了一个带有ETRX2设备地温度测量远程设备.热电偶与冷端补偿放大器连接.来自放大器地信号输入到ETRX2设备地AD转换器端口•由于此模块作为全功能设备,它发送来自其他测量设备地温度数据和互连讯号•一个J型热电偶作为温度传感器•放大器输出灵敏度是10毫伏对应1摄氏度.LDAYtRyKfE温度数据按照ZigBee协议从远端ETRX2设备传送到数据接收PC机.数据采样率是每秒1次.它可以提高到每秒4次采样.Zzz6ZB2Ltk数据通过TelegesiS终端软件以十六进制格式记录,数据在数据接收PC机存储为文本文件•成功地从远程设备PC机地数据以逗号分隔文件记录•图2显示数据格式. 每一行包含四个数据项•第一个工程,在“ SDATA ”旁,是ZigBee模块地ID号.第二个是12个数字输入/输出端口地状态,表示为4位十六进制数字.由于一位十六进制数对应4位二进制数,四个十六进制数字地3位就是数字输入输出端口地12位数据.第三个和第四个工程是模数转换地值,对应端口#1和端口#2.这样,冷端补偿地输出电压加到端口# 1•十六进制数'00C1是等于十进制数’193'•它表示模数转换器端口1地电压幅值为193毫伏.温度计算为19.3摄氏度,系数为0.1摄氏度/毫伏.dvzfvkwMi1 由于数据采样率是1次/秒,时间相关数据地图形变化在PC屏幕上显示,通过使用电子表格软件地宏功能.一个半实时地数据地变化显示出来.rqyn14ZNXI第4章实验测量用ZigBee测量系统做了一次测试实验.本实验地目地是确认ZigBee测量系统与当前过程实测数据一致.上述地温度测量设备插入到目前地实验器具中测量热功当量.EmxvxOtOco模块图1温度测量装置该仪器在实验中使用地是水量热计带有一个电加热器元件和搅拌器,一个水银温度计,一个电源,一个电流表和一个电压表.图3展示了测量热工当量实验装置地结构图.所有操作是在福冈大学地科学课程实验室由学生亲自动手完成地.水热量计中地蒸馏水是通过电源加热地.作者:热功当量值通过电压和电流值以及加热前后温度变化量计算出来地.SixE2yXPq5图2图4显示水热量计地组件•温度计,热电偶,加热器和搅拌器注入装有蒸馏水地铜容器.由加热器加热地水在铜容器内被搅动,以保持在容器中地水温均匀•水温由测ZigBee测量系统地热电偶测量,以及水银温度计人工测试地方法.容器中地水被不断地,充分搅拌很重要.6ewMyirQFL 仪器打开5分钟,以稳定水温.水被加热5分钟,给加热器提供电流.加热器电流后关闭后,该仪器冷却5分钟,以稳定水温.一个实验周期为15分钟.kavU42VRUs热功当量值J 计算由以下公式计算:<1 )其中I 是加热器电流,V 是加热端子间电压丄是水地加热时间,C 是水地比热,m 是 蒸馏水质量W 是铜容器,搅拌器和温度计等量地水,9 2 - 9 1是水加热前后地温度 差.y6v3ALoS89三个测量操作是为三搅拌条件:1)持续15分钟搅,一次一秒;2)无搅拌15分 钟,3)每5秒搅拌5次,持续15分钟.M2ub6vSTnP图5显示了水地温度随时间地变化地三种情况和 2种温度测量方法.由ZigBee 系 统所测量地数据与由水银温度计测量地一致•该ZigBee 地温度测量系统被认为适合 温度监测• ZigBee 系统由于热电偶热容量小响应更迅速.oYujCfmucw情况一,被认为是均匀测量容器中地水温,在加热期间水温在与时间成固定比 率•加热后水温几乎保持不变•情况二,热量在水中以对流方式转移•在加热初期,水温地上升速度很慢•之后,温 度快速增长,接着变慢.加热停止后,温度逐渐下降.eUts8ZQVRd温度计I 隔离 层搅拌—A ; 电流表 屯压表V ) 屯源铜容器加热器 水热量订 图3温度装置情况三,是一个介于中间地情况.温度迅速变化发生在搅拌开始后.这不是水银温度计检测地.在每次搅拌后,水温测量值升高接着迅速下降.后来,几乎不变.sQsAEJkW5T结果值,温度B 1和B 2,热功当量J列于表1.其中J值地计算为B 1和B 2,分别是0s到300 s和600 s到900秒之间温度地平均值.表1中情况1地J值,4.19 J /卡路里,与热功当量地定义值4.18605 J卡吻合.GMsIasNXkA温度数据和情况1,2和3地热功当量地计算值,其中V= 2.50V,I= 1.50J,T= 600 秒,? = 1.00卡/克,M= 150 克,w =8.80克.TIrRGchYzg表119 4021.10 4.1919.3021.23 3.6719.3320.97433实验室通常班级包含科学和技术专业地大一和大二年级课程.对于部分学生进行实验操作时困难地,因为他们在高中教育课程缺乏经验.成立一个支持学生地系统是必要地,帮助他们进行合适地实验和获得正确地结果.7EqZcWLZNX 教案人员<指导教师)与学生在实验室讨论实验结果是非常有意义地.如果导师同时有4个或5个实验工程,他们很少检查所有学生地实验过程.四组地两名学生每人都有进行一个实验题目,课程期间<180分钟)有16至20个工程开放.一名指导教师要负责32至40名学生地实验操作」zq7IGf02E 教师对正在进行实验地数据检查是值得地.在ZigBee地数据采集系统适用于监测学生地实验过程.鉴于在现有地实验室设施和空间地限制以及实验设备布局变化频繁,基于ZigBee地数据采集系统,适用于此情况.无线网络配置和小型设备对于实验室数据监测系统是非常可取地.zvpgeqJ1hk 在实验期间学生不正确地操作可以被导师及时发现,通过回放监测系统报告地实验数据.该系统有助于教师帮助学生及指导学生取得正确结果.这被认为是传感器网络在教育领域独特地应用.NrpoJac3v1总结基于传感器设备和ZigBee地传感器网络模块地温度测量系统,被应用到大学实验课程地自动测量.该系统适用于在物理实验室研究热功当量地概念.无线网络和小模块是使系统适合现有地实验室设施地关键部分.1nowfTG4KI。
基于Zigbee技术外文翻译(英汉对照)
集成低功耗无线传感器网络通信系统的设计摘要无线传感器网络系统目前在国际社会关键应用在贸易,医疗保健和安全方面。
这些系统具有独特的特点和面临的许多实施的挑战。
在所有系统中,长寿命的要求是对无线传感器节点能源供应施加的最严重的设计约束。
这就需要创新的设计方法来解决这一严格的要求。
本文首先提供了无线传感器网络技术的概述。
然后介绍了通信系统,电路设计和系统包装的考虑。
在无线电架构和电路技术的选择是重点讨论了关于低功耗的实施和经营特色相匹配的传感器网络应用需求。
最后,设计,实施和最具挑战性的组成部分,一个完整的低功耗CMOS接收系统,提出证明这些设计原则。
简介一个无线传感器网络由自组织无线通信系统相连密集分布的节点。
传感器节点架构包括传感,信号处理,嵌入式计算和无线网络组件。
每个节点可配备多种应用程序特定的传感器和节点信号所需的物理环境信息的提取处理系统。
相邻节点之间的合作可能有助于信号处理的敏感性和特异性环境事件检测。
通过节能高效的无线通讯,局部处理的信息(需要大大减少数据未处理的传感器有效载荷的数据传输带宽)可传达给用户。
低功耗是最重要的,以便为无线传感器网络的长期工作寿命。
虽然这是促进了低工作周期操作,本地信号处理,多跳网络节点间的部分也可以引进,以减少传感器网络中的每个节点的通信链路的范围。
由于通信路径作为一个尺度范围内的损失功法(有4或更大权力的规则在许多应用中指数),这在连接范围大幅度减少导致电力需求减少。
与传统远程无线系统的特点相比,减少的范围和数据链路带宽产量为典型的无线传感器应用的一个重要的链路预算的优势。
然而,极为有限的能源为无线感应器(小型电池系统)建立更强的设计挑战。
随着低成本的要求,这些极大地激发了新的基于低功耗无线通信系统和传感器应用优化技术的有利互补金属氧化物半导体(CMOS)电路技术的发展。
在下面的章节中,我们将介绍基于无线传感器网络的无线通信系统和电路设计。
无线技术不同的电路设计要求大大不同无线通信技术。
zigbee-相关-外文资料及翻译
zigbee-相关-外文资料及翻译Dexample, the supported frequency bands of operation, the logical type of the device (coordinator, router, or end device), and the remaining energy of the battery are provided by the device descriptions. Each device description is identified by a 16-bit value. The ZigBee application profile uses the concept of descriptor data structure . In this method, instead of including the data in the application profile, a 16-bit value is kept and acts as a pointer to the location of the data. This pointer is referred to as the data descriptor . When a device discovers the presence of another device in the network, the device descriptions are transferred to provide the essential information regarding the new device. The device descriptions consist of five sections: node descriptor, node power descriptor, simple descriptor, complex descriptor, and user descriptor. The node descriptor provides information such as the node logical type and the manufacturer code. The node power descriptor determines whether the device is battery powered and provides the current level of the battery. The profile identifier and clusters are provided in the simple descriptor . The complex descriptor is an optional part of the device descriptions and contains information such as the serial number and the device model name. Any additional information regarding the device can be included as the user descriptor . The user descriptor can be up to 16 ASCII characters. For example, in a light control application, the user descriptor field of a wall switch installed in a hallway can read Hall switch .The node descriptor fields for ZigBee-2006 are provided in Figure 3.46 . The node descriptor is a mandatory part of the device descriptions. The logical type can be ZigBee coordinator, router, or end device. The complex descriptor and user descriptor are optional and if their corresponding fields in the node descriptor are set to zero, they are not provided as part of the device descriptions. The APS flag field determines the APS sublayer capabilities. The frequency band (868 MHz, 915MHz, or 2.4 GHz) is specified in the frequency band field. The MAC capacity flags field is the same as the MAC capacity field presented before in Figure 3.25 . A manufacturer can request and receive a manufacturer code from the ZigBee alliance. This code is included in the node descriptor. The maximum size of the APS Sublayer Data Unit (ASDU), in octets, is specified in the maximum buffer size field. The maximum size of a single message that can be transferred to or from a node is provided in the maximum transfer size field (in octets). In ZigBeePro, the maximum incoming transfer size and maximum outgoing transfer size are two separate fields (16 bits each).The server mask field provides information regarding the system servercapabilities of this node. A server is a device that provides specific services to other devices in the network. If each bit is set to one, the device has the corresponding capability shown in Figure 3.46 . The trust center is the device trusted by devices within a network to distribute security keys for the purpose of network and end-to-end application configuration management. The security features are reviewed in Section 3.6. The primary binding table cache is a device that allows other devices to store their binding tables with it as long as it has storage space left. The binding procedure is further clarified in this subsection. The primary binding table cache can be used to back up the content of binding tables and restore them whenever necessary. A device can choose to keep its own binding table, known as a source binding table , instead of storing it with a primary binding table cache. However, any device can store a backup of the source binding table in the primary biding table cache device and recover it later if necessary.A ZigBee network may have a primary discovery cache device. This device is a ZigBee coordinator or router used to store the descriptors such as node descriptors and power descriptors of some other devices. An end device, for example, that sleeps for long durations can store its descriptors in the primary discovery cache device. If a device in the network tries to locate the information regarding this sleeping end device while the device is inactive, it can get the information from the primary discovery cache device instead. If a network contains sleeping ZigBee end devices, the network must have at least one primary discovery cache device.应用层(APL)是在ZigBee无线网络协议栈中最高的一层。
关于煤矿以及Zigbee的外文文献加翻译
摘要-本文介绍并设计了一个新类型的煤矿安全监控系统,它是一种基于ZigBee 技术的无线传感器网络系统。
该系统包括地下和地面两部分。
地下的无线传感器网络由固定节点,移动节点和网关构成。
电脑监控软件部署在地面。
该系统不仅可以实时收集矿井环境数据,也可以通过计算矿工所穿的移动节点来实时定位。
关键词:ZigBee;定位;无线传感器网络;煤矿一、研究现状作为一种重要的能源,煤炭在经济发展中起着举足轻重的作用。
煤矿监控系统是煤矿安全和生产效率高的重要保证[1]。
为了确保安全运行,环境监测节点的安装是非常重要的。
然而,常用的传统监控节点通过有线连接获得与控制系统的通信,这个节点存在布线困难,价格昂贵等缺点。
相比之下,无线传感器网络节点可以很容易地与当前矿井监测网络连接,和良好的兼容性,方便组成煤矿瓦斯监测网络,以适应各种大小煤矿的应用。
由于无线节点是电池供电,所以完全摆脱线缆的束缚,缩短建设周期,可以随时安排使用。
这是一个新的短距离,低复杂度,低功耗,低数据速率,低成本的双向无线通信技术[2]。
现在,无线传感器ZigBee无线通信技术应用于煤矿环境监测系统。
基于ZigBee技术的网络产品的数量和种类很多,但真正的产品可以应用在地下环境中的特殊传感器节点是很少的[3]。
我们设计的系统,是真正能够适用于在井下环境,它通过无线传感器网络节点的安全认证。
同时,由于无线网络的特殊性质,它可以传播无线信号,我们可以很容易地找到工作人员以便对煤矿安全监控提供更多的保护[4]。
二、系统架构该系统是一个软件和硬件综合监控系统的融合。
硬件部分包括无线移动节点和固定节点而被地下隧道部署,它的主要功能是收集煤炭矿山环境的数据和人的位置。
电脑监控软件由VC++设计,是用于以总结和展示每个监控节点中移动节点和固定节点的数据。
他们正在使用的数据由无线传输ZigBee协议传输,由于在固定节点也使用无线数据传输的方法,所以在地下巷道部署变得非常方便。
zigbee 相关 外文资料及翻译
The APL LayerThe application (APL) layer is the highest protocol layer in a ZigBee wireless network. The ZigBee APL layer consists of three sections, shown in Figure 3.44 : the application support (APS) sublayer, ZigBee Device Objects (ZDO), and the application framework.The application support sublayer (APS) provides an interface between the network layer (NWK) and the application layer (APL). The APS sublayer, similar to all lower layers, supports two types of services: data and management. The APS data service is provided by APS Data Entity (APSDE) and is accessed through the APSDE Service Access Point (SAP). The management capabilities are offered by APS Management Entity (APSME) and are accessed through APSME-SAP.The APS sublayer constants and attributes start with apsc and aps , respectively. The APS attributes are contained in the APS Information Base (APS IB or AIB). The list of APS constants and attributes is provided in the ZigBee specification [3].Network The application framework in ZigBee is the environment in which application objects are hosted to control and manage the protocol layers in a ZigBee device. Application objects are developed by manufacturers, and that is where a device is customized for various applications. There can be up to 240 application objects in a single device.The application objects use APSDE-SAP to send and receive data between peer application objects ( Figure 3.44 ). Each application object has a unique endpoint address (endpoint 1 to endpoint 240). The endpoint address of zero is used for the ZDO. To broadcast a message to all application objects, the endpoint address is set to 255. Endpoint addressing allows multiple devices to share the same radio. In the light control example in Section 2.1.4, multiple lights were connected to a single radio. Each light has a unique endpoint address and can be turned on and off independently.The ZigBee Device Objects (ZDO) provide an interface between the APS sublayer and the application framework. The ZDO contains the functionalities that are common in all applications operating on a ZigBee protocol stack. For example, it is the responsibility of the ZDO to configure the device in one of three possible logical types of ZigBee coordinator, ZigBee router, or ZigBee end device. The ZDO uses primitives to perform its duties and accesses the APS sublayer Management Entity via APSME-SAP. The application framework interacts with the ZDO through the ZDO public interface.The details of application framework, ZDO, and APS sublayer are reviewed in the following three subsections.The Application Framework The ZigBee standard offers the option to use application profiles in developing an application. The use of an application profile allows further interoperability between the productsdeveloped by different vendors for a specific application. For instance, in a light control scenario, if two vendors use the same application profile to develop their products, the switches from one vendor will be able to turn on and turn off the lights manufactured by the other vendor. The application profiles are also referred to as ZigBee profiles.Each application profile is identified by a 16-bit value known as a profile identifier . Only the ZigBee alliance can issue profile identifiers. A vendor that has developed a profile can request a profile identifier from the ZigBee alliance. The ZigBee alliance evaluates the proposed application profile and if it meets the alliance guidelines, a profile identifier willbe issued. The application profiles are named after their corresponding application use. For example, the home automation application profile provides a common platform for vendors developing ZigBee-based products for home automation use.The general structure of an application profile is shown in Figure 3.45. The application profile consists of two main components: clusters and device descriptions. A cluster is a set of attributes grouped together. Each cluster is identified by a unique 16-bit number called a cluster identifier . Each attribute in a cluster is also identified by a unique 16bit number known as a attribute identifier . These attributes are used to store data or state values. For example, in a temperature control application, a device that acts as the temperature sensor can store the value of the current temperature in an attribute. Then another device that acts as the furnace controller can receive the value of this attribute and turn on or turn off the furnace accordingly. The application profile does not contain the cluster itself. Instead, the application profile has a list of the cluster identifiers. Each cluster identifier uniquely points to the cluster itself.The other part of an application profile is the device descriptions ( Figure 3.45 ). The descriptions provide information regarding the device itself. For example, the supported frequency bands of operation, the logical type of the device (coordinator, router, or end device), and the remaining energy of the battery are provided by the device descriptions. Each device description is identified by a 16-bit value. The ZigBee application profile uses the concept of descriptor data structure . In this method, instead of including the data in the application profile, a 16-bit value is kept and acts as a pointer to the location of the data. This pointer is referred to as the data descriptor . When a device discovers the presence of another device in the network, the device descriptions are transferred to provide the essential information regarding the new device. The device descriptions consist of five sections: node descriptor, node power descriptor, simple descriptor, complex descriptor, and user descriptor. The node descriptor providesinformation such as the node logical type and the manufacturer code. The node power descriptor determines whether the device is battery powered and provides the current level of the battery. The profile identifier and clusters are provided in the simple descriptor . The complex descriptor is an optional part of the device descriptions and contains information such as the serial number and the device model name. Any additional information regarding the device can be included as the user descriptor . The user descriptor can be up to 16 ASCII characters. For example, in a light control application, the user descriptor field of a wall switch installed in a hallway can read Hall switch .The node descriptor fields for ZigBee-2006 are provided in Figure 3.46 . The node descriptor is a mandatory part of the device descriptions. The logical type can be ZigBee coordinator, router, or end device. The complex descriptor and user descriptor are optional and if their corresponding fields in the node descriptor are set to zero, they are not provided as part of the device descriptions. The APS flag field determines the APS sublayer capabilities. The frequency band (868 MHz, 915MHz, or 2.4 GHz) is specified in the frequency band field. The MAC capacity flags field is the same as the MAC capacity field presented before in Figure 3.25 .A manufacturer can request and receive a manufacturer code from the ZigBee alliance. This code is included in the node descriptor. The maximum size of the APS Sublayer Data Unit (ASDU), in octets, is specified in the maximum buffer size field. The maximum size of a single message that can be transferred to or from a node is provided in the maximum transfer size field (in octets). In ZigBeePro, the maximum incoming transfer size and maximum outgoing transfer size are two separate fields (16 bits each). The server mask field provides information regarding the system server capabilities of this node. A server is a device that provides specific services to other devices in the network. If each bit is set to one, the device has the corresponding capability shown in Figure 3.46 . The trust center is the device trusted by devices within a network to distribute security keys for the purpose of network and end-to-end application configuration management. The security features are reviewed in Section 3.6. The primary binding table cache is a device that allows other devices to store their binding tables with it as long as it has storage space left. The binding procedure is further clarified in this subsection. The primary binding table cache can be used to back up the content of binding tables and restore them whenever necessary. A device can choose to keep its own binding table, known as a source binding table , instead of storing it with a primary binding table cache. However, any device can store a backup of the source binding table in the primary biding table cache device and recover it later if necessary.A ZigBee network may have a primary discovery cache device. This device is a ZigBee coordinator or router used to store the descriptors such asnode descriptors and power descriptors of some other devices. An end device, for example, that sleeps for long durations can store its descriptors in the primary discovery cache device. If a device in the network tries to locate the information regarding this sleeping end device while the device is inactive, it can get the information from the primary discovery cache device instead. If a network contains sleeping ZigBee end devices, the network must have at least one primary discovery cache device.应用层(APL)是在ZigBee无线网络协议栈中最高的一层。
ZigBee中英文翻译 本科毕业设计
ZigBee: Wireless Technology for Low-Power Sensor Networks Technologists have never had trouble coming up with potential applications for wireless sensors. In a home security system, for example, wireless sensors would be much easier to install than sensors that need wiring. The same is true in industrial environments, where wiring typically accounts for 80% of the cost of sensor installations. And then there are applications for sensors where wiring isn't practical or even possible.The problem, though, is that most wireless sensors use too much power, which means that their batteries either have to be very large or get changed far too often. Add to that some skepticism about the reliability of sensor data that's sent through the air, and wireless sensors simply haven't looked very appealing.A low-power wireless technology called ZigBee is rewriting the wireless sensor equation, however. A secure network technology that rides on top of the recently ratified IEEE 802.15.4 radio standard (Figure 1), ZigBee promises to put wireless sensors in everything from factory automation systems to home security systems to consumer electronics. In conjunction with 802.15.4, ZigBee offers battery life of up to several years for common small batteries. ZigBee devices are also expected to be cheap, eventually selling for less than $3 per node by some estimates. With prices that low, they should be a natural fit even in household products like wireless light switches, wireless thermostats, and smoke detectors.Figure 1: ZigBee adds network, security, andapplication-services layers to the PHY and MAC layers of theIEEE 811.15.4 radioAlthough no formal specification for ZigBee yet exists (approval by the ZigBee Alliance, a trade group, should come late this year), the outlook for ZigBee appears bright. Technology research firm In-Stat/MDR, in what it calls a "cautious aggressive" forecast, predicts that sales of 802.15.4 nodes and chipsets will increase from essentially zero today to 165 million units by 2010. Not all of these units will be coupled with ZigBee, but most probably will be. Research firm ON World predicts shipments of 465 million wireless sensor RF modules by 2010, with 77% of them being ZigBee-related.In a sense, ZigBee's bright future is largely due to its low data rates—20 kbps to 250 kbps, depending on the frequency band used (Figure 2)—compared to a nominal 1 Mbps for Bluetooth and 54 Mbps for Wi-Fi's 802.11g technology. But ZigBee won'tbe sending email and large documents, as Wi-Fi does, or documents and audio, as Bluetooth does. For sending sensor readings, which are typically a few tens of bytes, high bandwidth isn't necessary, and ZigBee's low bandwidth helps it fulfill its goals of low power, low cost, and robustness.Figure 2: ZigBee's data rates range from 20 kbps to 250kbps, depending on the frequency usedBecause of ZigBee applications' low bandwidth requirements, a ZigBee node can sleep most of the time, thus saving battery power, and then wake up, send data quickly, and go back to sleep. And, because ZigBee can transition from sleep mode to active mode in 15 msec or less, even a sleeping node can achieve suitably low latency. Someone flipping a ZigBee-enabled wireless light switch, for example, would not be aware of a wake-up delay before the light turns on. In contrast, wake-up delays for Bluetooth are typically around three seconds.A big part of ZigBee's power savings come from the radio technology of 802.15.4, which itself was designed for low power. 802.15.4 uses DSSS (direct-sequence spread spectrum) technology, for example, because the alternative FHSS (frequency-hopping spread spectrum) would have used too much power just in keeping its frequency hops synchronized.ZigBee nodes, using 802.15.4, can communicate in any of several different ways, however, and some ways use more power than others. Consequently, ZigBee users can't necessarily implement a sensor network any way they choose and still expect the multiple-year battery life that is ZigBee's hallmark. In fact, some technologists who are planning very large networks of very small wireless sensors say that even ZigBee is too power hungry for their uses.A ZigBee network node can consume extra power, for example, if it tries to keep its transmissions from overlapping with other nodes' transmissions or with transmissions from other radio sources. The 802.15.4 radio used by ZigBee implements CSMA/CA (carrier sense multiple access collision avoidance) technology, and a ZigBee node that uses CSMA/CA is essentially taking a listen-before-talk approach to see if any radio traffic is already underway. But, as noted by Venkat Bahl, marketing vice president for sensor company Ember Corp. and vice chairman of the ZigBee Alliance, that's not a preferred approach. "Having to listen burns power," says Bahl, "and we don't like to do that."Another ZigBee and 802.15.4 communications option is the beacon mode, in which normally sleeping network slave nodes wake up periodically to receive a synchronizing "beacon" from the network's control node. But listening for a beaconwastes power, too, particularly because timing uncertainties force nodes to turn on early to avoid missing a beacon.In-Your-Face CommunicationTo save as much power as possible, ZigBee employs a talk-when-ready communication strategy, simply sending data when it has data ready to send and then waiting for an automatic acknowledgement. According to Bob Heile, who is chairman of both the ZigBee Alliance and IEEE 802.15, talk-when-ready is an "in-your-face" scheme, but one that's very power efficient. "We did an extensive analysis that led to the best power-saving strategy in various kinds of environments from quiet to noisy," Heile says. "We discovered that, hands down, we were better off just sending the packet and acknowledging it. If you don't get an ack, it just means you got clobbered, so send it again. You wind up having much better power management than if you listen and determine if it's quiet before you talk."Fortunately, this in-your-face strategy leads to very little RF interference. That's largely because ZigBee nodes have very low duty cycles, transmitting only occasionally and sending only small amounts of data. Other ZigBee nodes, as well as Wi-Fi and Bluetooth modules, can easily deal with such small, infrequent bursts. ZigBee's talk-when-ready scheme doesn't suit all purposes, however. For example, in a network of thousands of tiny sensors dropped into a war zone to monitor enemy troop movements, the power savings provided still might not be enough. With each network node sending data periodically—and with transmissions repeated numerous times through other nearby nodes of a mesh network configuration in order to reach a network controller—large numbers of packet collisions and retransmissions could waste power and significantly shorten sensor node battery life. If the sensor batteries are very small and power-limited, that's especially problematic.Although contention for airwave access isn't generally a problem for ZigBee, it can be. Sensor-network company Dust Networks, in fact, says contention issues are keeping the company from turning to ZigBee—for now, at least—even though Dust remains a member of the ZigBee Alliance. "Each ZigBee device needs to contend for airspace with its neighbors," says Dust director of product management Robert Shear, "so there's inevitably some contention and some inefficiency." To avoid ZigBee's access contention, Dust uses contention-free TDMA (time division multiple access) technology. ZigBee, through the 802.15.4 MAC layer, provides guaranteed time slots in a scheme that somewhat resembles TDMA, but only as part of an optional "superframe" that's more complex and less power-efficient than TDMA.ZigBee has still more power-saving tricks up its sleeve, however. For example, it reduces power consumption in ZigBee components by providing for power-saving reduced-function devices (RFDs) in addition to more capable full-function devices (FFDs). Each ZigBee network needs at least one FFD as a controller, but most network nodes can be RFDs (Figure 3). RFDs can talk only with FFDs, not to other RFDs, but they contain less circuitry than FFDs, and little or no power-consuming memory.Figure 3: ZigBee networks can contain as many as 65,536nodes in a variety of configurationsZigBee conserves still more power by reducing the need for associated processing. Simple 8-bit processors like an 8051 can handle ZigBee chores easily, and ZigBee protocol stacks occupy very little memory. An FFD stack, for example, needs about 32 kbytes, and an RFD stack needs only about 4 kbytes. Those numbers compare with about 250 kbytes for the far more complex Bluetooth technology.From ZigBee's relatively simple implementations, cost savings naturally accrue. RFDs, of course, reduce ZigBee component costs by omitting memory and other circuitry, and simple 8-bit processors and small protocol stacks help keep system costs down. Often, an application's main processor can easily bear the small additional load of ZigBee processing, making a separate processor for ZigBee functions unnecessary. But the main strategy for keeping ZigBee prices low is to have big markets and high volumes. The ZigBee Alliance, by making ZigBee an open standard and by vigorously promoting interoperability among ZigBee devices, expects that ZigBee will be very big in applications such as home and building automation. The alliance is currently working on interoperability procedures for those particular applications, which it expects to complete later this year along with ZigBee Specification 1.0.One reason for optimism about ZigBee adoption for home automation and security is its ease of use. ZigBee networks are self-forming, making it easy even for consumers to set them up. "In the residential space, there's no configuration involved," says the ZigBee Alliance's Heile. "You take something out of the box, put the batteries in, and maybe do something as simple as button-press security—bring two devices close together, push the buttons until the green lights come on, and you're done."ZigBee networks can also self-form in commercial and industrial settings, but professional installers will have tools that provide additional control, particularly for security. ZigBee security is flexible, says Heile, to give both consumer and professional users what they need. "You don't have to have 128-bit public-key encryption for a smoke detector," he says, "but if I'm in a high-rise office complex, that's exactly the level of security I'm going to have for my fluorescent light fixtures. If you're in a high-rise building on Fifth Avenue, you don't want someone going downthe street and turning your lights off."Proprietary CompetitionCompetition for ZigBee comes almost entirely from proprietary technologies. Sensor company Dust, as noted, is sticking with its own technology, and Ember, although pushing strongly into the ZigBee arena, plans to keep offering its proprietary EmberNet as well. In addition, Zensys is providing its Z-Wave technology to customers. Sylvania, for example, is already using Z-Wave for lighting control, while ZigBee systems remain at least several months away.By offering interoperability, however, ZigBee adds capabilities that proprietary products can't. For example, says Ember's Bahl, interoperability allows the ZigBee nodes of a lighting system to work with the ZigBee network of an HV AC system, or vice versa. "Philips Lighting is really excited about this," Bahl, says, "because it turns them from a ballast manufacturer into the infrastructure backbone of a building-automation system."Needless to say, many of the major semiconductor companies, and especially those that are big in embedded systems, are eagerly anticipating ZigBee's entry into mass markets. Freescale Semiconductor (until recently known as Motorola's Semiconductor Products Sector) is already providing ZigBee-ready technology to select customers. Other semiconductor companies, including AMI, Atmel, Microchip, Philips, and Renesas, are members of the ZigBee Alliance.ZigBee will likely be slow to penetrate the industrial market for wireless sensors, however. According to market research firm ON World, it will take five to seven years to convince industrial customers of the reliability, robustness, and security of wireless-sensor systems. ON World does predict significant long-term growth of ZigBee in industry, though. By 2010, the company projects, RF modules used in industrial monitoring and control will reach 165 million units, up from 1.9 million in 2004. About 75% of those, ON World predicts, will be based on ZigBee and 802.15.4. Eventually, ZigBee could go into a wide variety of applications. In household appliances, it could help monitor and control energy consumption. In automotive applications, it could provide tire-pressure monitoring and remote keyless entry. ZigBee could also be used in medical devices or even in computer peripherals, such as wireless keyboards or mice.Concern is increasing, though, that ZigBee could turn into a one-size-fits-all technology that doesn't fit any application particularly well. Some skeptics, for example, worry that an attempt to make ZigBee all-encompassing could make the ZigBee protocol stack too large for ZigBee's twin goals of very low power consumption and very low cost. If that happens, then ZigBee's low-power, low-data-rate niche—narrow as it is—will have proven to be too broad. And then, perhaps, we'll need yet another wireless standard to go with the burgeoning number we already have.ZigBee:无线技术,低功耗传感器网络技师(工程师)们在发掘无线传感器的潜在应用方面从未感到任何困难。
ZigBee传感器网络在数据采集和监测方面的应用(中文翻译)
摘要本文提出了一种基于ZigBee的传感器网络的数据采集和监控系统,采用了商业上可行的ZigBee解决方案。
ZigBee模块通过USB接口连接到PC机,在整个传感器网络中起到基站作用。
数据通过远程设备采集后,通过无线方式发送到基站的PC机,基站起到数据接收器作用。
每个远程设备由一个ZigBee模块产品和一个传感器组成,该传感器由一个热电偶和冷端补偿放大器相连构成。
来自放大器的信号输入到ZigBee模块AD转换器的端口。
温度数据按照ZigBee协议从远程装置传送到接收数据的PC机。
数据采样率是每秒一次;最高的采样率是每秒4次。
这些数据通过设备控制软件以十六进制记录,数据文件以文本格式存储在电脑中。
按照时间变化的数据可以使用电子表格软件的宏功能监测。
根据在大学实验室对试验使用的结果,本系统在教育领域有广泛的应用。
关键词:传感器网络,ZigBee协议,温度监控,自动数据显示,热功当量第1章引言无线传感器网是以下几种应用中的关键技术,如家庭自动化,楼宇控制,节能,汽车监测。
开发工具包是由ZigBee模块供应商提供的,如房间的照明和空气调节系统的应用控制器,其中有一个温度传感器,光学传感器,按钮开关,蜂鸣器集成在一个电路板。
ZigBee传感器网络适合的潜在许多其他应用。
ZigBee模块提供几种类型的接口,他们功耗低,通常是小的模块。
该控制该模块的软件与产品捆绑或通过互联网免费下载。
在这个系统中,远端传感器的数据发送到基站的计算机,在一个相对较低的成本下完成配置。
本文介绍了一种数据采集和监测ZigBee传感器网络。
在教育领域被认为是一次新的传感器网络应用。
第2章ZigBee的传感器网络无线传感器网络主要功能有两方面:测量和通信。
每个传感器装置在网络拓扑结构作为通信节点。
该网络由与其他设备通信的传感器组成。
由于设备采用无线通讯,因此,不需要网络基础设施。
一个设备通过部署在无线通信范围内的相邻设备加入网络。
ZigBee是一个标准的名称,指的是的小范围,低通信速率无线个人区域网的应用层。
英文翻译 ZIigbee技术在易燃易爆环境下的应用实现
在石油、化工和其他易燃易爆生产环境中,有必要在生产场所的一些信息(如压力、温度、气体浓度等)进行数据收集和网络传输,以实现远程监测和控制。
目前,广泛采用有线的方式通过各种各样的信息发送到监控中心, 然而,大多数的现场监控地理分散,环境,复杂的地形,这就遇到了许多实际的应用:1)建立一个合理的有线传输网络,有建设的复杂性和实现的困难;2)为了实现全面有效的环境监测的生产,必须多种分散布局,大量的节点监控数据采集,电缆监测通常是难以实现;3)有线监控系统有其自身的局限性,如高固定成本的通信线路的铺设。
近年来,无线局域网技术的出现提供了一些很好的想法解决上面提到的这些问题。
在本文中,无线局域网技术的无线传感器网络远程监控易燃易爆生产环境已经提出并付诸设计。
场景的系统布局能够使无线传感器节点采集到的各种各样的信息发送到中心节点,中心节点的数据通过GPRS或RS232接口模块到监控主机(PC机),实现生产环境的远程监控。
监控系统具有低成本、低功耗、少线缆的传输和可靠通信的优势。
Zigbee技术无线局域网是一个相对较近出现的无线网络通信技术,超过100个知名的以硬件和软件公司的全球联盟致力于开发一系列周期短、低速率、低功耗无线网络标准,无线传感器网络的主要发展方向,家庭自动化、远程控制、工业自动化、农业自动化、医疗和其他应用程序。
ZigBee-based建设无线网络正具有以下特点:1)数据传输速率低:只有20 k字节/ s - 250 k字节/秒,关注低传输速率的应用程序;2)低功耗:由于使用DSSS技术无线局域网取代传输技术,和使用休眠唤醒机制机器的工作,两个5号普通干电池可用于6个月至2年,这消除了频繁更换电池或充电的麻烦;3)成本低:由于低数据率无线局域网,协议简单、免版税,大大降低成本;4)网络容量:无线个域网网络节点可管理次级节点的数量。
一个节点可以管理254 次级节点。
与此同时,可以从该节点一个网络节点管理,可以组成的65536个大规模网络节点;5)短时间延迟:对延迟敏感的应用程序的优化通信延迟的设计,激活休眠也是非常短的延迟,通常15毫秒到30毫秒的延迟时间;6)安全:无线局域网提供数据完整性检查和身份验证功能,使用常见的加密算法AES2128,可以灵活确定其安全属性;7)可靠:用于避免碰撞的机制,需要固定带宽的通信业务留出专门的时间槽,在发送数据以避免竞争和冲突;自动节点模块之间的动态网络的功能在整个无线局域网网络信息的方式通过自动路由传输,从而保证信息传输的可靠性;8)灵活的工作频带:通道的使用2.4 GHz,868 MHz(欧洲)和915 MHz(美国)免证书频带。
光纤传感器的文献综述
ZIGBEE路由分析摘要ZIGBEE作为新一代无线通信技术的命名,是一种高可靠的无线数传网络技术,是基于IEEE802.15.4标准的一种具有强大组网能力的新型无线个域网,所以其稳定可靠的路由就成了研发工作的重点。
本文重点综述了ZIGBEE无线传感网的网络结构,协议网络层的路由算法,分析了Z-AODV路由和Cluster-Tree路由的协议并在此基础上提出了ZIGBEE的基于Mesh路由的路由选择机制,该机制在网络性能和低功耗方面有明显的优势,适合未来通信网络发展的方向。
关键词:ZIGBEE协议;路由算法;Z-AODV路由ZIGBEE路由分析1前言无线传感网络采用了微小型的传感节点来获取信息,它们的节点之间具有自动组网和协调工作的能力,网络内部采用了无线的方式来采集和处理信息。
基于ZIGBEE网络技术是一种短距离,低成本的无线网络技术,在监控领域,以及传感和自动工业控制得到普片的应用,因此是国家安全还是国民经济等方面均有着广泛的应用前景。
最终将成为数字世界和现实世界的接口并深入到人们的生活中,它有着广阔前景,将像互联网一样改变着人们的生活。
因而对ZIGBEE无线传感网络协议的层路由分析计算,以及链路控制在实际应用中显得非常重要,且意义重大。
经过多年的研发讨论,ZIGBEE联盟于2004年12月,在IEEE 802.15.4 定义的物理层(PHY)和媒体接入层(MAC)的基础上定义了网络层和应用层,正式发布了基于IEEE 802.15.4的ZIGBEE标准协议,它将推动物联网的飞速发展,加速无线数传的更新进步[1]。
2 ZIGBEE网络层的结构在ZIGBEE网络中将终端的设备分为两类:一类是全功能设备(FFD),它的空间很大,用来处理和存放路由信息,它就是网络中的协调者,可以同网络中的任何设备进行通信,切实用于任何一种网络拓扑结构,起到网关的作用;另一类设备就是就是简化功能设备(RFD),这种设备功耗很低、内存空间较小,它在网络中的功能就是与(FFD)通信,应用范围受一定的限制,只能用于星型拓扑结构中,在网络中作为基本的传感节点来采集信息并将其信息传给相应的网关节点,他们的通信关系如下图。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
ZigBee环境监测技术中英文资料对照外
文翻译文献综述
简介
本文综述了有关ZigBee环境监测技术的中英文资料,并提供
了对照的外文翻译文献。
ZigBee是一种低功耗的无线通信技术,特别适用于物联网应用中的环境监测。
通过对这些资料的对比和研究,可以更好地了解和应用ZigBee环境监测技术。
中文资料
1. 许明宝, 胡永凡, 钟红民. 基于ZigBee的环境监测系统研究[J]. 现代检测技术, 2011, 31(1): 5-8.
2. 杨洛, 李明洲. 基于ZigBee的温湿度监测系统设计[J]. 现代电
子技术, 2012(9): 29-32.
3. 谭勇, 王群, 李吉庆. 基于ZigBee的室内环境监测系统设计[J]. 仪器仪表学报, 2015, 36(3): 571-575.
英文资料
1. Wang, X., Hu, Z., & Hang, L. Wireless sensor network-based indoor temperature and humidity monitoring system using ZigBee technology[C]. 2020 6th International Conference on Control, Automation and Robotics (ICCAR), 2020: 100-105.
2. Gao, J., Li, R., & Zhang, L. Study on wireless temperature and humidity monitoring system based on ZigBee[C]. 2019 4th International Conference on Green Technology and Sustainable Development (GTSD), 2019: 1-5.
外文翻译文献
1. 许明宝, 胡永凡, 钟红民. 基于ZigBee的环境监测系统研究(英文翻译). 现代检测技术, 2011, 31(1): 5-8. (Translation of "Research on ZigBee-based Environmental Monitoring System" by Xu Mingbao, Hu Yongfan, and Zhong Hongmin)
2. 杨洛, 李明洲. 基于ZigBee的温湿度监测系统设计(英文翻译). 现代电子技术, 2012(9): 29-32. (Translation of "Design of ZigBee-based Temperature and Humidity Monitoring System" by Yang Luo and Li Mingzhou)
3. 谭勇, 王群, 李吉庆. 基于ZigBee的室内环境监测系统设计(英文翻译). 仪器仪表学报, 2015, 36(3): 571-575. (Translation of "Design of ZigBee-based Indoor Environment Monitoring System" by Tan Yong, Wang Qun, and Li Jiqing)
以上是有关ZigBee环境监测技术的中英文资料对照外文翻译文献综述。
通过研读这些文献,可以深入了解ZigBee技术在环境监测方面的应用和设计。