Computerworld - With its oddball name, you might expect ZigBee to be a carbonated beverage, a child's toy or perhaps some sort of cult. In fact, it's yet another type of wireless network. Any wireless networking technology inevitably represents a compromise among a number of competing and conflicting characteristics, including power consumption, reliability, range of operation, speed of communications, cost, security, and the size and type of network connectivity. Thus, the specific data communications needs of any particular application will dictate which wireless technologies are likely to work most effectively.
ZigBee is designed for relatively short distances, low-cost implementation and extremely low power consumption. It supports connectivity over a mesh network topology, which makes for exceptional reliability and path redundancy and virtually unlimited scalability to any number of connected devices. These specialized characteristics make ZigBee particularly well suited for use in building automation and in industrial, medical and residential control and monitoring applications. If this new protocol achieves the sort of widespread acceptance that Wi-Fi has, in a few years we might see ZigBee-based wireless light switches, smoke and carbon-monoxide detectors, thermostats, home security devices, remote controls for consumer electronics equipment, medical sensing and monitoring units, and even motorized blinds and window shades.
ZigBee starts with the IEEE 802.15.4 packet radio standard, which defines the low-rate physical layer and the media access control portion of the data link layer. It communicates over unlicensed areas of the spectrum that cordless telephones and microwave ovens use. Most chips and modules use the 2.4-GHz band. A few make use of the 900-MHz band, which offers longer range and greater penetration through walls.
To this direct-sequence spread-spectrum radio specification, ZigBee adds a network layer that incorporates ad hoc self-organizing multi-hop routing. ZigBee can be configured in three different network topologies -- star, peer-to-peer and mesh -- but it is the latter that offers the most promise. Just as the Internet does, a mesh network provides multiple pathways from device to device, ensuring that a message will get through. If nodes stop working or are taken out of the network, ZigBee signals can still use other pathways to reach their destinations, which dramatically improves overall reliability by eliminating a single point of failure. ZigBee was designed to coexist with hostile radio frequencies, such as those typically found in industrial and commercial applications, which adds to its reliability.
Depending on the frequency band used, ZigBee devices can pass data and messages at rates of 20K to 250Kbit/sec. and have a range of 10 to 400 meters from one device to the next in the mesh. A security toolbox for ZigBee includes the use of access control lists, packet freshness timers, and encryption based on the AES-128 standard certified by the National Institute of Standards and Technology.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts