Zigbee版本比较<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
|
| 2004 | 2006 | 2007 | PRO |
Interference avoidance |
|
|
|
| |
| Network coordinator selects best available RF channel/Network ID at startup time. | Y | Y | Y | Y |
| Support for ongoing interference detection under operational conditions and wholesale adoption of a new operating RF channel and/or Network ID. |
|
| Y | Y |
Automated/distributed address management |
|
|
|
| |
| Device addresses automatically assigned using a hierarchical, distributed scheme. | Y | Y | Y |
|
| Device addresses automatically assigned using a stochastic scheme. |
|
|
| Y |
Group addressing |
|
|
|
| |
| Devices can be assigned to groups, and whole groups can be addressed with a single frame; thereby reducing network traffic for packets destined for groups. |
| Y | Y | Y |
Centralized data collection |
|
|
|
| |
| Low-overhead data collection by ZigBee Coordinator explicitly supported. | Y | Y | Y | Y |
| Low-overhead data collection by other devices supported under special circumstances (e.g. with Tree Routing). | Y | Y | Y | Y |
| Many-to-one routing allows the whole network to discover the aggregator in one pass. |
|
|
| Y |
| Source routing allows the aggregator to respond to all senders in an economical manner. |
|
| Y | |
Security |
|
|
|
| |
| 128-bit AES encryption with 32-bit Message Integrity Code (MIC) and frame counters to assure message freshness. | Y | Y | Y | Y |
| Security applied at the NWK layer by default, with key rotation to prevent hacking of the NWK key. | Y | Y | Y | Y |
| Higher-layer security supported. | Y | Y | Y | Y |
| <?xml:namespace prefix = st1 ns = "urn:schemas-microsoft-com:office:smarttags" />Trust Center application, operating on the ZigBee Coordinator, manages trust on behalf of network devices and acts as the central authority on what devices can join the network. | Y | Y | Y | Y |
| Trust Center can run on any device in the network. |
|
|
| Y |
| "High Security" mode available, which is selectable by TrustCenter policy, and requires Application Layer Link keys; peer-entity authentication; and peer-to-peer key establishment using Master Keys. |
|
|
| Y |
Network scalability |
|
|
|
| |
| Network scales up to the limits of the addressing algorithm. Typically, networks with tens to hundreds of devices are supported. | Y | Y | Y |
|
| An addressing algorithm that relaxes the limits on network size. Networks with hundreds to thousands of devices are supported. |
|
|
| Y |
Message size |
|
|
|
| |
| < 100 bytes. Exact size depends on services employed, such as security. | Y | Y |
|
|
| Large messages, up to the buffer capacity of the sending and receiving devices, are supported using Fragmentation and Reassembly. |
|
| Y | Y |
Standardized commissioning |
|
|
|
| |
| Standardized startup procedure and attributes support the use of commissioning tools in a multi-vendor environment. |
| Y | Y | Y |
Robust mesh networking |
|
|
|
| |
| Fault tolerant routing algorithms respond to changes in the network and in the RF environment. | Y | Y | Y | Y |
| Every device keeps track of its "neighborhood"; thereby further improving reliability and robustness. |
|
|
| Y |
Cluster Library support |
|
|
|
| |
| The ZigBee Cluster Library, as an adjunct to the stack, standardizes application behavior across profiles and provides an invaluable resource for profile developers. |
| Y | Y |
|
YYY科技/3Y科技
文章评论(0条评论)
登录后参与讨论