ZigBee technology seamlessly integrates with existing control network standards

ZigBee technology seamlessly integrates with existing control network standards. The network is automatically established through the network coordinator (Coordinator), and the channel access is performed by means of carrier sense/collision detection (CSMA-CA). For reliable delivery, a full handshake protocol is also provided.       Security: Zigbee provides data integrity checking and authentication functions, and provides three levels of security in data transmission. The first level is actually no security mode. For a certain application, if security is not important or the upper layer has provided sufficient security protection, the device can choose this mode to transfer data. For the second level of security, the device can use an access control list (ACL) to prevent unauthorized devices from obtaining data, and no encryption is used at this level. The third level of security uses symmetric cryptography belonging to the Advanced Encryption Standard (AES) in data transfers. AES can be used to protect the data payload and prevent attackers from posing as legitimate devices, and each application can flexibly determine its security attributes.DC-DC isolation type       Low implementation cost: The initial cost of the module is estimated to be about 6 US dollars, which will soon be reduced to 1.5-2.5 US dollars, and the Zigbee protocol is free of patent fees. Low-speed, low-power UWB chipsets currently cost at least $20. ZigBee's price target is only a few cents. Low cost is also a key factor for ZigBee. Short delay: The communication delay and the delay of activation from dormant state are very short. The typical search device delay is 30ms, the delay of sleep activation is 15ms, and the delay of active device channel access is 15ms. Therefore, ZigBee technology is suitable for the application of wireless control (such as industrial control occasions, etc.) with strict requirements on time delay.convert ethernet to wifi