A-Mode (Automatic)A ZigBee Commissioning mode, whereby devices and networks self-commission with no direct human involvement. See also E-Mode and S-Mode.Access Control ListThis is a table used by a device to determine which devices are authorized to perform a specific function. This table may also store the security material (e.g. keys, frame counts, key counts, security level information) used for securely communicating with other devices.ACKThe 802.15.4 ACK (Acknowledgment) provides feedback from the receiver to the sender confirming that a packet was received without error.Active AnalysisRefers to a piece of test hardware that can actively interact with a live network and perform tasks such as starting and joining networks, channel Scans and network discovery, device polling to obtain information such as battery levels and Link Quality, and over-the-air device Commissioning and configuration. An example of an active analysis device is Daintree's 2400E Sensor Network Adapter.Active Network KeyThis is a key used by a ZigBee device to secure outgoing NWK frames, and that is available for use to process incoming NWK frames.AddressAll 802.15.4 devices have a unique 64-bit (long) IEEE address for identification. To extend battery life, shorter addresses are used to decrease packet sizes and hence the time a device is actively communicating. ZigBee requires that all communications after joining the network be made on a 16-bit (short) network address (assigned to each newly joining device by its parent).Advanced (Smart) MeterA meter capable of measuring and recording time-differentiated data, enabling demand response and real-time pricing programs, and providing additional functionality beyond data recording. Examples of additional functionality include leak detection in a water meter and tamper detection in an electric meter. AFGThe ZigBee Alliance's Application Framework Working Group (AFG) is responsible for realizing applications that use the Network and Security components of the //ZigBee Stack//. Their brief is to provide a framework for application development, and to standardize individual profiles.Alternate Network KeyThis is a key available to process incoming NWK frames in lieu of the Network Key.AMI (Advanced Metering Infrastructure)The two-way fixed network and associated systems for providing advanced metering data and energy management capability. Provides the capabilities to improve data tracking above and beyond AMR with the goal of influencing energy usage. ZigBee's Application Profile for AMI is called Smart Energy.AMR (Automated Meter ReadingRemotely reading the usage data tracked by a metering device via an automated process. AMR is accomplished through the use of a mobile or fixed system that replaces manual meter reading and data tracking process.AnalyzerAn analyzer is a diagnostic tool that allows you to see what is going in a ZigBee network, and to identify and troubleshoot problems that occur. It should be based on the latest standards, and provide functionality that includes network visualization, protocol and packet analysis, searching and filtering to help quickly locate packets of interest, and the ability to monitor network operation and measure performance. Some analyzers also supportActive Analysis, which provides the ability to actively interact with a live network to perform tasks including device polling and over-the-air commissioning.ApplicationZigBee technology is well suited to a wide range of building automation, industrial, medical and residential control and monitoring applications. Essentially, applications that require interoperability and/or the RF performance characteristics of the IEEE 802.15.4 standard would benefit from a ZigBee solution. Examples include lighting controls, automatic meter reading, heating control, home security, and industrial and building automation.Application Framework (AF)The portion of the Application Layer that provides a description of how to build a profile onto the ZigBee stack so that profiles can be generated in a consistent manner. It also specifies a range of standard data types for profiles, descriptors to assist in service discovery, frame formats for transporting data, and a key value pair construct to rapidly develop simple, attribute based profiles.Application KeyThis is a master key or a link key transported by the Trust Center to a device for the purpose of securing end-to-end communication.Application Layer (APL)The top layer in the ZigBee protocol stack consisting of the Application Framework (AF), Application Support sublayer (APS) and ZigBee Device Object (ZDO).
Application ObjectThis is a component of the top portion of the Application Layer defined by the manufacturer that actually implements the application.Application ProfileA profile that describes a collection of devices employed for a specific application, and implicitly, the messaging scheme between those devices. For instance, there are application profiles defined for home automation systems and commercial, industrial and institutional systems. A profile ID is allocated to each application to uniquely identify it. Application profiles can be either Public (defined by the ZigBee Alliance and supporting interoperability) or Private (manufacturer-specific or proprietary).Application Programming Interface (API)A set of routines, protocols and tools for building software applications.Application Support sublayer (APS)The portion of the Application Layer responsible for providing a data service to the application and ZigBee device profiles. In addition, it provides a management service to maintain binding links and the storage of the binding table itself.APS Command FrameThis is a command frame from the APSME on a device addressed to the peer entity on another device.AssociationThe service provided by the MAC sublayer that is used to establish membership in a network..AttributeA data entity that represents a physical quantity or state of a particular device. Attributes are communicated to other devices through commands.
AuthenticationSecurity measure designed to establish the validity of a transmission message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.Automated Meter Reading (AMR)A ZigBee Alliance Application Profile and working group. AMR allows remote reading of industrial meters to measure consumption of things like electricity, water and gas. It helps to reduce costs and increase efficiency of meter reading, with added benefits including energy balance and monitoring and fraud detection.Auto ModePart of ZigBee Locationing. In Auto mode, a Blind Node starts collecting Reference Node data automatically in a periodic fashion (typically by timer or user event) without having to be manually asked by the host system. By default it sends its calculated location to the network coordinator. See also Polled mode.AUXThe AUX Header is part of NWK layer security. The AUX Header consists of the Security Field, Frame Counter, Source Address, and Key Sequence Number.
Return to top
Battery LevelA measurement available through popular ZigBee Analyzer tools that shows you whether a device is running on mains power or battery, and the level remaining for the battery-powered devices.BeaconA transmission by ZigBee routers to confirm their presence to other network devices. Devices typically sleep between beacons to lower their power usage and extend their battery life. Beacons are important for Mesh topology networks to keep all nodes synchronized without requiring those nodes to consume precious battery energy by listening for long periods of time.Beacon-enabled NetworkA network containing at least one device that transmits Beacon frames at a regular interval.BindingConnections between end devices in a ZigBee network. For example, a connection between a light switch and the light that it operates. Each binding supports a specific Application Profile, and each message type is represented by a Cluster (within that profile).
Binding TableA master lookup table, managed by the network coordinator, that shows details of all device Bindings.Blind NodeA device that, when requested, will calculate its location. This device will query neighboring Reference nodes for their position, and use this position information, along with the received signal strength, in its location calculation. Blind nodes must contain a Location Engine. See Locationing.BreakpointA marker inserted into a capture file used to mark interesting events. During playback of the file, the playback can be paused whenever it reaches a breakpoint.BridgeA network device used to connect two network segments that use the same communications protocol. Compare with Gateway.BroadcastThe transmission of a message to every device within a network.
Return to top
CCAClear Channel Assessment. CCA is performed to detect if the channel is busy or empty. A mode in CCA further performs RF energy detection in the channel. With CCA, contention with other wireless networks, such as Wireless LAN, is avoided.CCM*The mode of authentication and encryption used by ZigBee. See the ZigBee Security Services specification for more information.
CertificateA digital representation of information which at least identifies the certificate authority issuing it; names or identifies its subscriber; contains the subscriber's public key; identifies its operational period; and is digitally signed by the certification authority issuing it.CertificationCertification is the process your product goes through where it is tested to ensure it complies with the ZigBee standards. There are three types of certification available: ZigBee Compliant Platform (ZCP), ZigBee Network Capable (ZNC), and ZigBee Certified Product. Only the ZigBee Certified Products are allowed to display the ZigBee logo.ChannelA specific portion of the radio spectrum along which a communications signal is transmitted. IEEE 802.15.4 supports three bands with 27 channels specified: Channel 0 on the 868MHz Band, Channels 1 to 10 on the 915MHz Band, and Channels 11 to 26 on the 2.4GHz Band.CIS/MDMSUtility Customer Information System and Meter Data Management System.Clear Channel Assessment (CCA)CCA is performed to detect if the channel is busy or empty. A mode in CCA further performs RF energy detection in the channel. With CCA, contention with other wireless networks, such as Wireless LAN, is avoided.ClusterDevices within an Application Profile communicate with each other by means of clusters, which may be inputs to our outputs from the device. For example, in the home automation profile there is a cluster dedicated to the control of lighting subsystems. A cluster ID uniquely identifies clusters within the scope of a particular profile.Commercial Building Automation (CBA)A ZigBee Alliance Application Profile and working group. CBA is designed to provide wireless lighting and HVAC control and monitoring for energy management and "green buildings" compliance.CommissioningCommissioning, also referred to as deployment, covers everything involved in installing and configuring ZigBee devices and networks, ready for operation. In its broadest sense, commissioning encompasses a wide range or tasks including a survey of the radio and physical environment, the placement of devices, configuration of parameters application binding, optimization of network and device parameters, and testing and verification of correct operation.ComplianceAdherence to the ZigBee specifications to ensure that applications and devices are interoperable. Products are tested by independent test houses to ensure that they conform to the specifications before they are deemed to be compliant (which entitles them to bear the ZigBee logo).ConfigureThe act of changing settings for a device, for example, specifying the device's addressing, protocols and security for commissioning.ConnectA ZigBee Commissioning startup control that tells the current device to connect to the first network it finds with settings that you specify. See also Join and Rejoin.CoordinatorThe device that sets up the network and acts as a portal to monitor network performance and configure parameters.CPP (Critical Peak Pricing)A type of pricing by utilities whereby certain hours of the day (corresponding to peak consumption or demand times) are subject to much higher than usual consumption pricing. Customers are typically notified one day or one hour in advance depending on the criticality.Cycle TimePart of ZigBee Locationing. You can specify a cycle time to determine how often a Blind Node should start location calculations.
Return to top
Daintree NetworksA leading provider of tools for developing, testing, commissioning, and maintaining wireless sensor and control devices and networks based on ZigBee and IEEE 802.15.4 standards and protocols. Daintree's products include the Sensor Network Analyzer (SNA) and 2400E Sensor Network Adapter.Data KeyA key shared between two devices for Peer-to-peer data communicationsDecodeConvert information into a form in which it is easier to read. For example, you can decode an individual ZigBee packet to show all bytes in hexadecimal and ASCII to better be able to understand its content.DecryptionThe process of "unscrambling" an encrypted or coded message (changing ciphertext into plaintext using a cryptographic algorithm and key).DeploySee Commissioning.DestinationThe device to which a transmission is delivered. All transmissions have a source (sending device) and destination (receiving device).Developer KitThee kits are provided by semiconductor companies. They contain hardware and software for developers to investigate or develop ZigBee products and applications.DevconZigBee Alliance Developers Conference designed to inform developers about the latest ZigBee developments.DeviceAny entity that contains an implementation of the ZigBee protocol stack.Device DescriptionThis is a description of a specific device within an Application Profile. For example, the light sensor device description is a member of the Home Automation application profile. The device description also has a unique identifier that is exchanged as part of the discovery process.Device ManagerPart of Daintree's Sensor Network Analyzer. This tool provides tools for managing devices under test and for commissioning devices and networks.Direct Load ControlThe capability of a utility to control customer loads directly including turn-off and cycling capability.DisassociationThe service provided by the MAC sublayer used to discontinue the membership of a device in a network.DiscoveryThe process of polling a ZigBee device or network to find out information. For example, you can use an Analyzerand hardware that supports Active Analysis to discover the topology of a network that has already formed.DongleA piece of hardware that connects to a PC, typically via USB. In ZigBee, dongles can be used as both passive capture devices, and as Active Analysis and Commissioning devices.
Return to top
E-Mode (Easy)A ZigBee commissioning mode, whereby devices contain stimulus and feedback mechanisms to facilitate basic commissioning by the end user or installer. See also A-Mode and S-Mode.Encryption Cryptographic transformation of data (called "plaintext) into a form (called "ciphertext") that conceals the data's original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called decryption, which is a transformation that restores encrypted data to its original state.End DeviceA network device that can start or receive a message, but cannot forward messages upstream or downstream. It can communicate with the coordinator or a router, but not directly with other end devices. Also referred to as an RFD (Reduced Function Device).EndpointEvery ZigBee device can contain up to 241 endpoints. An endpoint is analogous to a TCP port: each endpoint can provide a distinct application service. Endpoint 0 itself is reserved for device management, and is called the ZigBee Device Object (ZDO). Endpoint 0 provides the means to control and manage devices and endpoints. The remaining 240 endpoints can be allocated for any required services.Energy Services PortalAny device that provides the capability to transition messages from Wide Area Networks to ZigBee-based networks.Energy Management System (EMS)Business-level applications that manage or control when and how Energy Management programs take place within premises.EPAbbreviation for Endpoint.EPIDExtended PAN ID. The globally unique 64-bit PAN identifier of the network. This identifier is used to avoid PAN ID conflicts between distinct networks.EthernetA common method of networking computers in a local area network (LAN).EventAn occurrence that can be triggered manually or can simply occur during device or network operation. ZigBeeAnalyzers provide the ability to identify and investigate events of interest.Extended PAN IDThis is the globally unique 64-bit PAN identifier of the network. This identifier should be unique among the PAN overlapping in a given area. This identifier is used to avoid PAN ID conflicts between distinct networks.
Return to top
FCSThe Frame Check Sequence bit within a frame contains transmission error checking information. It is typically the last bit in the frame. A value of 0 indicates errors (with a value of 1 indicating no errors).FFD (Full Function Device)See Router.FilterThe process of selecting to view a subset of items currently on display. For example, you can filter a list of packets displayed by an Analyzer to show only those that match a certain criteria.FirmwareFirmware is software (or instructions) stored in the memory of a hardware device.FrameA data structure used in network transmissions. Also referred to as a packet. Supported 802.15.4 frame formats include the Data Frame with up to 104 byte data payload capacity, Acknowledgment (ACK) Frame to provide feedback, MAC Command Frame for remote control and configuration, and the Beacon Frame to wake up devices when they are required for communications.
FrequencyThe band on which communications are transmitted. IEEE 802.15.4 supports three frequency bands: 868MHz, 915MHz, and 2.4GHz.Frequency AgilityOne of the advantages of 2.4GHz-based ZigBee networks is the choice of 16 different operating channels, compared with a single channel for some competing lower-frequency proprietary systems. ZigBee PRO's Frequency Agility function makes utilization of these channels easier. When a ZigBee network is initiated, the node forming the network scans for an available channel with the least existing traffic or noise. Over time, if the busyness of the chosen channel increases or a new interference source emerges, the Frequency Agility function may be used by the application to scan for a better channel and seamlessly "move" the entire network to the new channel. This allows the network to adapt to changing environments over months or years.
Return to top
GatewayA network device that acts as an entrance to another network, for example, between a wired and wireless network. It contains translators and other functionality that enables communication between networks that use different protocols.GroupPart of ZigBee Commissioning that specifies one-to-many and many-to-many connections between devices in the same network.
Return to top
HANHome Area NetworkHCLHome Controls, LightingHeaderAddress information on packets that say where each one should go.Home Automation (HA)A ZigBee Alliance Application Profile and working group for the residential automation market. OEMs will be able to produce products based on this profile that meet the needs of customers ranging from DIY homeowners to professional installers. The initial application areas include lighting, HVAC, audio/video control, irrigation, and access control.HopOne leg of a journey taken be a packet from router to router to reach its destination.HVACHeating, Ventilating, and Air Conditioning
Return to top
IEEEThe Institute of Electrical and Electronics Engineers is a non-profit professional organization for the advancement of technology. Their 802.15 working group is responsible for the 802.15.4 standard on which ZigBee is based.Industrial Plant Monitoring (IPM)A ZigBee Alliance Application Profile and working group for the monitoring of time varying attributes related to operating environment and machinery conditions such as vibration, temperature, flux and chemicals. Analysis of the measurement data can be used to trigger binary or more complex control actions.InterferenceInterference can occur when different wireless networks are communicating using the same RF channels in close proximity. ZigBee addresses this potential problem by supporting up to 27 different Channels for communications, which reduces the probability of interfering with other users.Internet of ThingsA term coined by the ITU to describe the next step in "always on" communications, in which new technologies like ZigBee promise a world of networked and interconnected devices that provide relevant content and information whatever the location of the user. Everything from tires to toothbrushes will be in communications range, heralding the dawn of a new era, one in which today's Internet (of data and people) gives way to tomorrow's Internet of Things.InteroperabilityThe ability for ZigBee devices from one manufacturer to work seamlessly with devices from a second manufacturer. One of the major benefits of ZigBee is that devices that comply with the ZigBee Alliance's Standards andApplication Profiles are interoperable, regardless of which manufacturer builds them.IPv6Internet Protocol version 6. Working groups are currently looking at creating a minimal IPv6 stack to work on IEEE 802.15.4 radios to provide communications using a simple but sufficient mesh network, security model, packet format, and interface/control mechanisms.
Return to top
JoinThis occurs when a device attempts to join (or associate, which is the 802.15.4-MAC-equivalent function) a network. Join is also used as a ZigBee Commissioning startup control that tells the current device to join the first network it finds. See also Connect and Rejoin.
Return to top
KeyThere are several different security key types used by ZigBee. They are Standard and High Security Network Keys, Application and Trust Center Link Keys, and Application and Trust Center Master Keys. Key management is performed by the Trust Center device.Key EstablishmentThis is a mechanism that involves the execution of a protocol by two devices to derive a mutually shared secret key.Key-Load KeyThis is a key derived from a Link Key used to protect key transport messages carrying a Master Key.Key TransportThis is a mechanism for communicating a key from one device to another device or other devices.Key-Transport KeyThis is a key derived from a Link Key used to protect Key Transport Messages carrying a key other than a Master Key.Key UpdateThis is a mechanism implementing the replacement of a key shared among two or more devices by means of another key available to that same group.
Return to top
LatencyThe length of time between a Packet being send, and the response to that packet being returned.LeaveThe act of a device that is leaving a network, as well as a command request to explicitly instruct a device to leave the network.Link KeysLink Keys are used to secure unicast messages between two devices at the Application Layer. Application broadcast messages cannot be secured using a Link Key; they are secured using the Network Key. For encryption and decryption purpose the Trust Center and Application Layer Link Key are used in an identical manner. The different Link Key names are simply used to distinguish whether the source of the key was the Trust Center or not. Link Keys cannot be used to secure frames at the Network Layer. See also Network Keys and Master Keys.Link Quality Indicator (LQI)This indicator shows the quality of the link between devices within a ZigBee network.Location DongleA hardware device used by Daintree's Sensor Network Analyzer to communicate with Blind and Reference nodes and calculate the location of the Blind nodes. See Locationing.Location EngineCode that is embedded into a device that allows the device's location to be calculated. See Locationing.LocationingThe process of finding the position of a device whose where-abouts is unknown or subject to change. A number of devices with known locations (called Reference nodes) send broadcast requests to the node to be located (called aBlind node). The Blind node's location is then calculated using the signal strength and direction of the responses received by the Reference nodes. Note that locations can only be calculated for Blind Nodes that contain a Location Engine.
Return to top
MACThe IEEE 802.15.4 Media Access Control layer, which controls access to the radio channel. Its responsibilities may also include transmitting beacon frames, synchronization and providing a reliable transmission mechanism.
MalformedSomething that contains errors or omissions. For example, a malformed Route is one where a given packet correctly arrived at its destination but some Hops were not detected. This means that an Analyzer cannot be 100% sure of the path taken by the packet.Master KeysMaster Keys are not used to encrypt any frames. They are used as an initial shared secret by two devices when they perform the Key Establishment Procedure, SKKE, to generate Link Keys. As far as the security algorithms are concerned, there is no difference between a Trust Center and Application Master Key. The different key names are just used to distinguish the source of the key. The Trust Center Master Key may be unique for each device on a network. See also Link Keys and Network Keys.MembershipPart of ZigBee Commissioning, membership encompasses all aspects of how networks and devices determine which devices are included in (or excluded from) a specific network. All commands required to achieve membership can be found in the ZigBee Device Profile and ZigBee Commissioning Cluster.Mesh TopologyThis topology, also called peer-to-peer, consists of a mesh of interconnected devices. Each router is typically connected through at least two pathways, and can relay messages for its neighbors. This topology supports multi-hop communications, which hops from device to device looking for the most effective communication path, and providing fault tolerance by automatically rerouting around failed devices.
Metering DeviceGas Meter, Water Meter, Electric Meter, or Heat (Thermal) Meter.MICThe Message Integrity Check (MIC) field is part of ZigBee security. The length of the MIC field is used to authenticate packets.MulticastThis is a transmission to every device in a particular PAN belonging to a dynamically defined multicast group, and within a given transmission radius measured in hops.MultihopThe process of passing data by hopping from device to device using the most reliable communication links and most cost-effective path until the destination is reached. Multi-hop helps to provide fault tolerance, in that if one device fails or experiences interference, the network can reroute itself using the remaining devices. Multi-hop is typical in Mesh Topology networks.Multihop NetworkThis is a network, in particular a wireless network, in which there is no guarantee that the transmitter and the receiver of a given message are connected or linked to each other. This implies that intermediate devices must be used as routers.
Return to top
Neighbor TableThis is a table used by a ZigBee device to keep track of other devices within the POS.NetworkAn interconnected system of computers and "smart" things. Connections between these objects can be physical/cabled or wireless. Network devices can communicate with each other and share information.Network AddressThe address assigned to a device by the Network Layer and used by the Network layer for routing messages between devices.Network DiscoveryThis is a feature provided by some tools that allows you to discover all the devices and the structure of a network that already exists (as compared with watching a new network form).Network KeysThe Standard and High Security Network Keys are used to perform Network Layer security on a ZigBee network. All devices on a ZigBee network share this key. The only difference between the Standard and High Security Network Keys are the rules that are enforced on how they are distributed to devices. A High Security Network Key can never be sent unencrypted over the air; however a Standard Security Network Key can be. As far as the security algorithms used to do the encryption and decryption are concerned, they are identical. See also Link Keys andMaster Keys.Network ManagerThis is a ZigBee device that implements network management functions including PAN ID conflict resolution and frequency agility measures in the face of interference.NodeA collection of independent device descriptions and applications residing in a single unit and sharing a common 802.15.4 radio.Non-beacon-enabled NetworkA network that does not contain any devices that transmit Beacon frames at a regular interval.NoncePart of MAC, NWK, and APS layer security. The Nonce is formed using the 64-bit Source Address, 32-bit Frame Counter, and 8-bit Security field.NWKThe ZigBee Network Layer, which along with the 802.15.4 MAC and PHY layers is used to create and maintain the communication network interconnecting individual ZigBee devices. The NWK layer performs functions including network management and addressing, message routing, and route discovery and maintenance.
Orphaned DeviceA device that has lost communication with or information about the ZigBee device through which it has its PANmembership.OTAOver the Air.Over-the-air Download (OAD)A mechanism by which the firmware on wireless embedded devices can be download (or upgraded) wirelessly.
Return to top
PacketA block of data sent over a network that transmits the identifies of the sending and receiving devices, sequence number, error-control information, and message.PAN CoordinatorThe principal controller of a network that is responsible for the network formation and maintenance. The PAN coordinator must be a Router.Peer-to-peerDirect communication between two network devices without the need for messages to pass through a network controller.PerformancePerformance of ZigBee devices and networks is measured by things including the speed and efficiency of communications, and the number of packets lost or errored.Permit JoinA Commissioning command provided through the ZDP (ZigBee Device Profile) that offers basic controls to temporarily or permanently enable or disable permission to join an individual router, a set of routers, or all routers in a network. It sets the "permit join" flag for the router, which indicates whether or not other devices can join it.Personal/Home Health Care (PTG)A ZigBee Alliance Application Profile and working group,PHYIEEE 802.15.4 has two Physical (PHY) layers that operate in two separate frequency ranges 868MHz, 915MHz and 2.4GHz. The lower frequency PHY layer covers both the 868MHz European band and the 915MHz band used in countries such as the US and Australia. The higher frequency PHY layer is used virtually worldwide.
PICSA Protocol Implementation Conformance Statement lists all parameters and features included in the ZigBee Alliance specification and relevant test documents. It rates which items are mandatory or optional for product certification.Point-to-pointThe most simple of network topologies consisting of a direct link between two nodes.Polled ModePart of ZigBee Locationing. In Polled mode, any node within the ZigBee network can request the position of a Blind Node on demand. After receiving the request, the Blind Node acquires data from Reference Nodes, calculates its location, and then sends that location back to the original requester. See also Auto mode.Private Application ProfileAlso called manufacturer-specific or proprietary, these Application Profiles are developed by product developers creating private networks for their own applications where interoperability is not required. Compare with Public Application Profile.Private MethodAttributes that are accessible only to ZigBee device objects and unavailable to the end applications.Professional EditionThe fully-featured version of the Daintree Networks Sensor Network Analyzer (SNA), which provides a complete toolkit for ZigBee and 802.15.4 development, testing, commissioning, and maintenance. Features include multi-node capture, advanced network visualization, detailed performance measurements, active analysis of live networks, advanced troubleshooting, and a commissioning tool. Compare with Standard Edition.ProfileA collection of clusters and device descriptions, which together form a cooperative application.ProprietarySomething that is privately developed and owned that cannot be used by other parties without negotiations. Proprietary standards, technologies and (private) Application Profiles do not provide the same types ofInteroperability and cost savings that are available through the Open versions being offered by the ZigBee Alliance.ProtocolA set of formalized rules that determine how information is transmitted over a network. Communication within a ZigBee network is managed according to the ZigBee Stack Architecture.Protocol Data Unit (PDU)The unit of data that is exchanged between two peer entities.Proxy BindingThe procedure through which a device can create or remove a Binding link on the ZigBee Coordinator between two devices (neither of which can be the device itself).PTGA ZigBee Alliance Application Profile and working group focused on telecom applications,Public Application ProfileAlso called open or standard, these Application Profiles are developed by members of the ZigBee Alliance to ensure devices from different manufacturers can interoperate. Compare with Private Application Profile.Public MethodAttributes that are accessible to End Applications.
Return to top
RadioThe IEEE 802.15.4 radio that is part of every ZigBee device.RedundancyOne of the keys to making a Mesh Network self healing. By ensuring that each device is connected to several others (redundancy), if one drops out of the network, its neighbors simply find another route.Reference NodeA stationary device with a well-known and stable location (X/Y position) that can be used for Locationing. Reference nodes should be placed to bound the extremities of an area where Blind nodes are located. Blind nodes will broadcast a request to all Reference nodes in radio range. Reference nodes respond with their location and the received signal strength of the Blind node request. The Blind node's location can then be calculated using this information.RejoinA ZigBee Commissioning startup control that tells the current device to connect to a network with a specific EPID (and other settings) that you specify. See also Join and Connect.RFD (Reduced Function Device)See End Device.RFIDRadio Frequency Identifier.RouteThe communication path taken within a ZigBee network to take a message from its source to its destination.
Route DiscoveryAn operation in which a ZigBee coordinator or router attempts to discover a route to a remove device by issuing a route request command frame.Route Discovery TableA table used by a ZigBee Coordinator or ZigBee Router to store temporary information used during route discovery.Route RequestA ZigBee network layer command frame used to discover paths through the network over which subsequent messages can be delivered.RouterA network device that extends network area coverage, dynamically routes around obstacles, and provides backup routes in case of network congestion or device failure. Routers can connect to the network coordinator, other routers, and end devices. Also referred to as an FFD (Full Function Device).Routing TableA table in which a ZigBee coordinator or ZigBee router stores information required to participate in the routing of frames.RSSIReceive Signal Strength Indication, where the lower the number is, the stronger the signal.
Return to top
S-Mode (Simple)A ZigBee commissioning mode, whereby external tools are used to facilitate more extensive commissioning. See also A-Mode and E-Mode.SAS (Startup Attribute Set)Part of the ZigBee Commissioning Cluster, the SAS determines how a device starts up and chooses a network to join. The SAS includes information such as Extended PAN ID (EPID), channel mask, and security information.SecurityAn important part of ZigBee that provides the means to prevent unwanted monitoring of the system by encrypting all packet communication in highly secure 128-bit AES protocols.Security KeySee Key.Security LevelA value from 0 to 5 that specifies the level of security for a ZigBee network, where 5 is the highest security level and 0 indicates no security.SensorA device that responds to a physical stimulus (such as heat, light, or pressure), and generates a signal that can be measured or interpreted.Sensor Network Analyzer (SNA)An Analyzer from Daintree Networks, that provides a comprehensive solution for ZigBee and 802.15.5 testing, analysis and commissioning. The SNA is standards-based, supported by an extensive range of chipset evaluation boards, and used by the ZigBee Alliance for their Interoperability test events.
Sequence NumberA value inserted into the header of every frame, which is incremented by 1 with each new transmitted frame. The values of the source address and sequence number fields of a frame, taken as a pair, can be used to uniquely identify that frame.Service DiscoveryThe ability of a device to locate services of interest.ScanSending Beacon requests on each channel and monitoring the responses. You can scan to discover things including what the ambient energy level is on each channel, what devices are on each channel, and information about each device including its detected LQI and whether it is accepting associations. Scanning typically requires a hardware device capable of Active Analysis and supporting Analyzer software.SimpliciTIA proprietary protocol from Texas Instruments, SimpliciTI is a simple low-power RF network protocol aimed at small RF networks. Such networks typically contain battery-operated devices that require long battery life, low data rate and low duty cycle, and have a limited number of nodes talking directly to each other or through an access point or range extenders.
Smart EnergyThe name by which the ZigBee Alliance Application Profile for AMI is known.SnifferAn application that passively monitors network traffic, and captures packets for offline analysis. Compare withAnalyzer.SoftProfilesAn XML-based tool that provides the ability to create and edit Application Profiles. Part of the Sensor Network Analyzer.SourceThe device at which a transmission is originated. All transmissions have a source (sending device) and destination (receiving device).SpecificationSee //ZigBee Specification//.Stack ProfileThe ZigBee stack profile defines network, application services, and security parameters for the entire network. The stack profile is selected by the ZigBee coordinator, and is chosen on the basis of application areas such as Home Controls, Building Automation, or Plant Control. Each Stack Profile defines parameters such as the overall dimensions of the network, supported routing algorithms, routing and application binding table sizes, and the nature of security services.Standard EditionThe mid-range version of the Daintree Networks Sensor Network Analyzer (SNA), which provides an essential set of tools for ZigBee and 802.15.4 development and testing. Key features include comprehensive protocol analysis with detailed packet lists and packet decodes, filters and extensive capture playback controls, and network visualization. Compare with Professional Edition.Standards-basedDevices and applications based on the ZigBee and 802.15.4 standards.Star TopologyIn a Star network topology, also called point-to-point, all devices are within direct communication range to the coordinator, through which all messages are routed.
Startup CommandPart of ZigBee Commissioning, the Startup command is used to determine how a device should join a network. As aCoordinator, or as a device that either Joins, Rejoins, or Connects to a network. A coordinator typically starts a new network, but can also an existing network. Use Join to join any network. Use Rejoin or Connect to join a network with a specific EIPD.StreamThe packet flow from Source to Destination without any information about which intermediate hops were traversed by the packets.Symmetric-key Key EstablishmentA mechanism by which two parties establish a shared secret, based on a pre-shared secret (a so-called Master Key).SynkroA proprietary protocol from Freescale Semiconductor, Synkro is a lightweight networking stack built on top of the IEEE 802.15.4 standard. The protocol was created to control, monitor and automate consumer electronic products including televisions, DVD players and recorders, set top boxes, audio video receivers, remote control and many more. Synkro overcomes the growing technology challenges that today's consumer electronic products face with 30-year-old infrared (IR) technology by removing the line of sight and field of vision issues while providing a fast bi-directional link to enhance user experiences.
Return to top
Telecom Applications (PTG)A ZigBee Alliance Application Profile and working group,TimelineA filtering option provided by some Analyzers. For example, a Packet Timeline could show packet events over time on a per device basis.TimestampA time code used to identify a packet. Timestamps are used for captured packets, to allow them to be replayed at the same rate as they were originally captured. They are also useful for multi-device and multi-channel captures, to allow synchronization of captured packets.TopologyRefers to the configuration of the hardware components and how data is transmitted through that configuration. See also star and mesh.Trust CenterThe device trusted by all devices within a ZigBee network to distribute Keys for the purpose of network and end-to-end application configuration management.
Return to top
UnicastThe transmission of a message to a single device in a network.USBUniversal Serial Bus. USB is a "plug and play" interface between a computer and hardware device.USNUbiquitous Sensor Network.
Return to top
Visual Device Layout (VDL)Part of the Daintree Sensor Network Analyzer. The VDL window provides a graphical representation of the devices and communications on the network. It allows the use of custom icons and labels for each device, and the inclusion of a background image, such as a floor plan, on which to position devices.
Visual Device Tree (VDT)Part of the Daintree Sensor Network Analyzer. The VDT window provides a graphical rendition of network topology and information flows between devices in an 802.15.4 or ZigBee network. It automatically detects network formation, reports changes to the network structure, and notifies of the state of individual devices in the network especially with regard to formation.
ViewPart of the Daintree Sensor Network Analyzer. User-defined views can be used to filter information, and select what details are and are not shown in the VDL and VDT windows.
Return to top
WirelessUsing the radio-frequency spectrum for transmitting and receiving data.Wireless Sensor Network (WSN)Also referred to as a Wireless Sensor and Control Network (WSCN), These networks contain numerous small independent Sensor nodes. The nodes are self-contained units that consist of a battery, radio, sensors, and a minimal amount of on-board computing power.
Return to top
XMLXML (Extensible Markup Language) is a flexible way to create and share common information formats.
Return to top
ZigBeeA specification for a suite of high-level communication protocols using small, low-power digital radios based on the IEEE 802.15.4 standard for wireless personal area networks (WPANs). ZigBee is targeted at RF applications that require a low data rate, long battery life, and secure networking.ZigBee AllianceAn association of companies working together to enable reliable, cost-effective, low-power, wirelessly networked monitoring and control products based on an open global standard. Visit the ZigBee Alliance website atwww.zigbee.org.
ZigBee Certified ProductThis level of ZigBee Compliance applies to end products that use a ZigBee a public Application Profile and are built on a ZigBee Compliant Platform. After successful completion, the product may bear the ZigBee Alliance logo to signify that it has passed certification. See also ZigBee Network Capable.ZigBee Cluster Library (ZCL)A library that contains ZigBee clusters, which are messages or collections of similar messages). These clusters can be used to create custom Application Profiles.ZigBee Commissioning Cluster (ZCC)Specified by the ZigBee Alliance, this cluster delivers a standard set of over-the-air ZigBee commands forMembership commissioning. See also SAS.ZigBee Compliant Platform (ZCP)This level of ZigBee Compliance applies to modules or platforms that are intended as building blocks for end products. See also ZigBee Network Capable and ZigBee Certified Product.ZigBee Device Object (ZDO)The portion of the ZigBee Application Layer responsible for defining the role of the device within the network (e.g. coordinator, router, or end device), initiating and/or responding to binding and discovery requests, and establishing a secure relationship between network devices. It also provides a rich set of management commands, defined in the ZigBee Device Profile (ZDP).ZigBee Device Profile (ZDP)Used in ZigBee commissioning, this profile provides a suite of standard commands to use during commissioning. It includes commands for binding and group commissioning, discovery commands to examine the network, and membership commands such as "permit join" and "leave".ZigBee Network Capable (ZNC)This level of ZigBee Compliance applies to end products are built on a ZigBee Compliant Platform and use non-public (proprietary) ZigBee Application Profiles. Testing is intended to ensure that such products coexist successfully with products and networks certified by the ZigBee Appliance, in that they do not adversely impact the operation of other ZigBee-certified products and networks. See also ZigBee Certified Product.ZigBee PROFunctionality to be included in the ZigBee 2007 Specification that includes features including an industrial strength stack, and support for commercial building automation, HVAC, and Industrial Plant Monitoring Application Profiles.ZigBee SpecificationA specification developed by the member companies of the ZigBee Alliance that provides the framework for developing Interoperable ZigBee devices and applications. It contains specifications for things like the ZigBee Stack Architecture, Application Profiles, and Commissioning tools.ZigBee Stack ArchitectureUsing a layered communications architecture, ZigBee makes use of the IEEE 802.15.4 Media Access Control (MAC)and Physical (PHY) layers and itself defines a Network (NWK) layer, along with an Application Layer and security components.
ZigBee StandardSee ZigBee Specification (above).ZigFestA ZigFest is a ZigBee Alliance interoperability event where manufacturers gather together to showcase their products and network with other wireless technology professionals. Several test cases and runs are facilitated to test device interoperability.
Return to top
2400EThe 2400E Sensor Network Adapter (available from Daintree Networks) is a hardware device that can join live networks to passively monitor and capture, actively poll, and commission devices.
6LoWPANAn acronym of IPv6 over Low power Wireless Personal Area Networks. 6LoWPAN is a standard from the IETF (RFC 4944 published in 2007), which optimizes IPv6 for use with low-power, low-bandwidth communication technologies such as the IEEE 802.15.4 radio. The IETF 6LoWPAN working group was specifically chartered to tackle the problem of defining how to carry IP-based communication over 802.15.4 links in a manner that conforms to open standards and provides interoperability with other IP links and devices, as well as among 802.15.4 (LoWPAN) devices.
802.15.4An IEEE task group and resulting standard that provides a low data rate solution with multi-month to multi-year battery life and very low complexity. It operates in an unlicensed, international frequency band. 802.15.4 provides the PHY and MAC layers on which ZigBee operates (with ZigBee providing the network and application layers).