SWAY034 April   2021 CC1312R7 , CC1352P , CC1352P7 , CC1352R , CC2642R , CC2642R-Q1 , CC2652P , CC2652P7 , CC2652PSIP , CC2652R , CC2652R7 , CC2652RB , CC2652RSIP

 

  1. At a glance
  2. 2
  3. Introduction
  4. Design considerations
  5. Wireless protocols
  6. Zigbee
  7. Thread
  8. Similarities Between Zigbee and Thread
  9. Differences Between Zigbee and Thread
  10. 10 Project CHIP
  11. 11Conclusion
  12. 12References
  13. 13Important Notice

Wireless protocols

Wireless networking technologies offer a number of advantages over wired networking technologies when an existing infrastructure does not exist.

Table 5-1 compares the different wireless technologies for home and building automation.

Table 5-1 Comparison of Wireless Technologies for Home and Building Automation
Zigbee Thread Bluetooth Low Energy Wi-Fi
Band 2.4-GHz industrial- scientific-medical (ISM) 2.4-GHz ISM 2.4-GHz ISM 2.4-GHz/5-GHz ISM
Throughput 250 kbps 250 kbps As high as 2 Mbps As high as hundreds of Mbps
One-hop range As high as a few hundreds of meters; routers can extend range through multihop As high as a few hundreds of meters; routers can extend range through multihop Can go as high as a few hundreds of meters, with long-range mode in Bluetooth 5 Tens of meters; extendable using multiple access points
Battery type and life Years on a coin cell Years on a coin cell Years on a coin cell AAA/AA for years
Topology Mesh Mesh Point-to-point, mesh Star; some mesh being standardized
Traffic profile Local device-to-device, many to one and one to many Device-to-device and device-to-cloud Best for device-to-smartphones Device-to-cloud
Protocol layering Network and application Network with Internet Protocol (IP) standards on top Network and application Network with IP standards on top
Certification program and interoperability End product certification Stack certification Stack certification Data-link layer and some upper-layer stack certification
Security Networkwide encryption and authentication through installation codes Password-based authentication with Datagram Transport Layer Security (DTLS) Asymmetric encryption for key generation and exchange, connection pairwise keys Password and certificate-based authentication, supports all IP-based security standards
IP connectivity and support Requires gateway to perform IP address translation Native IPv6 networking Requires gateway to perform IP address translation Native