Comparison of the advantages and disadvantages of LoRa and ZigBee : homeautomation


LoRa

LoRa is a kind of LPWAN communication technology. It is an ultra-long-distance wireless transmission scheme based on spread spectrum technology adopted and promoted by Semtech in the United States.

This solution changes the previous compromise between transmission distance and power consumption, and provides users with a simple system that can achieve long-distance, long battery life, and large capacity, and expand the sensor network.

At present, LoRa mainly operates in free frequency bands around the world, including 433, 868, 915 MHz, etc. LoRa technology has the characteristics of long distance, low power consumption (long battery life), multiple nodes, and low cost. LoRaWAN has been deployed in the market for some time, and it has the following characteristics:

  1. Long life: LoRaWAN’s battery performance is very strong, and the entire system can work under very power-saving conditions. It has three energy efficiency modes, which can choose different working states according to the power consumption.

  2. Long distance: LoRaWAN can realize data transmission of tens of kilometers, and the whole system architecture is very simple and the cost is very low.

  3. Security: LoRaWAN has developed a security protocol for data confidentiality, which is divided into two levels, one is on the gateway, and the other is encryption on the transmission data. Two keys are required, and the data can be transmitted through the gateway and received There is also a decoded Key at the end.

  4. Expandable capacity: When the installed capacity is relatively large, expandable capacity support is required, and the LoRaWAN network protocol allows adding gateways at will.

  5. Positioning: LoRaWAN can provide positioning without GPS support.

r/homeautomation - Comparison of the advantages and disadvantages of LoRa and ZigBee

ZigBee

ZigBee technology is a short-distance, low-complexity, low-power, low-speed, low-cost two-way wireless communication technology.

ZigBee is mainly used for data transmission between various electronic devices with short distances, low power consumption and low transmission rates, and typical applications with periodic data, intermittent data and low response time data transmission.

ZigBee is a wireless connection that can work in the 2.4GHz (globally popular) frequency band, with the highest transmission rates of 250kbits, 20kbits and 40kbits respectively. Its transmission distance is within the range of 100-300. As a wireless communication technology, ZigBee has the following characteristics:

  1. Low power consumption: Due to the low transmission rate of ZigBee, the transmission power is only 1mW, and the sleep mode is adopted, which has low power consumption, so ZigBee devices are very power-saving.

  2. Low cost: ZigBee protocol is royalty-free. Low cost is also a key factor for ZigBee.

  3. Short delay: The communication delay and the delay of activation from the sleep state are very short. The typical search device delay is 30ms, the sleep activation delay is 15ms, and the mobile device channel access delay is 15ms. Therefore, ZigBee technology is suitable for wireless control (such as industrial control occasions, etc.) applications with demanding delay requirements.

  4. Large network capacity: A star-shaped Zigbee network can accommodate multiple slave devices and one master device at most, and up to 80 ZigBee networks can exist in an area at the same time, and the network composition is flexible.

  5. Reliability: A collision avoidance strategy is adopted, and a dedicated time slot is reserved for communication services that require a fixed bandwidth to avoid competition and conflicts in sending data. The MAC layer adopts a fully confirmed data transmission mode, and each data packet sent must wait for the receiver’s confirmation information. If there is a problem in the transmission process, it can be retransmitted.

  6. ​​Security: ZigBee provides a cyclic redundancy check (CRC)-based data packet integrity check function, supports authentication and authentication, and uses the AES-128 encryption algorithm, so that each application can flexibly determine its security attributes.



Source link

We will be happy to hear your thoughts

Leave a reply

Everything's A Deal!