0% found this document useful (0 votes)
36 views72 pages

IIOT - Module 3

Industrial IIOT

Uploaded by

1032221441
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views72 pages

IIOT - Module 3

Industrial IIOT

Uploaded by

1032221441
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Principles, Processes and

Protocols Industrial
Automation
By
Kshama Shukla
AP MME
Contents (Iot protocols and security)
• Protocol Standardization for IoT
• M2M and WSN Protocols
• SCADA and RFID Protocols
• Unified Data Standards
• Protocol – Modbus
• KNX, Zigbee
• Network layer
• API key
• Different IIOT Cloud platforms
Protocol Standardization for IoT

• IoT protocols are a crucial part of the IoT technology stack — without them, hardware would be
rendered useless as the IoT protocols enable it to exchange data in a structured and meaningful
way.
• Out of these transferred pieces of data, useful information can be extracted for the end user and
thanks to it, the whole deployment becomes economically profitable, especially in terms of IoT
device management.
• When talking about the Internet of Things, we always think about communication.
• Interaction between sensors, devices, gateways, servers, and user applications is the essential
characteristic that makes the Internet of Things what it is.
• But what enables all this smart stuff to talk and interact are the IoT protocols which can be seen
as languages that the IoT gear uses in order to communicate.
M2M

• Machine-to-machine communication, or M2M, is exactly as it sounds: two


machines “communicating,” or exchanging data, without human interfacing or
interaction.
• This includes serial connection, powerline connection (PLC), or wireless
communications in the industrial Internet of Things (IoT).
• Switching over to wireless has made M2M communication much easier and
enabled more applications to be connected.
• In general, when someone says M2M communication, they often are referring to
cellular communication for embedded devices.
• Examples of M2M communication in this case would be vending machines
sending out inventory information or ATM machines getting authorization to
despense cash.
What is Machine-to-Machine (M2M)?

• M2M communications is basically a concept where a machine or a


device gets connected through a network and communicates.
• Sensors and communication modules included in M2M devices that
enable data transmission between devices across wired and wireless
communications networks.
• M2M is also the base for the IoT (Internet of Things).
• It can result in significant, measurable social and economic
advantages, by providing better effective services to the citizens.
Contd..
• Using wired or wireless communication channels, M2M is a technique
that enables straightforward, direct communication between devices.
• It gathers the data and sends them to the other connected devices.
• It is a technology that makes it possible to connect things together
without the need of the internet as well.
• Monitoring and tracking household devices, manufacturing equipment
and facility management are just a few of the many uses for M2M
communications.
• Machine-to-machine communication is the verbal exchange of
information between two machines without human involvement.
• M2M verbal communication is easier with wireless connectivity, and
more devices can now be connected.
How does M2M work?

• The primary goal of machine-to-machine communication was to


collect sensor data and send it via a network.
• In contrast to SCADA or other remote monitoring tools, M2M systems
leverage open networks and access techniques, including cellular or
Ethernet, to make them more affordable.
• The core elements of an M2M system are sensors, RFID, Wi-Fi or
cellular communications, and autonomic computing software.
• These are designed to assist a network device in interpreting data and
making choices.
• Then the M2M applications translates the data, which can start
predefined, automatic activities.
Contd..
• One of the most well-known methods of machine-to-machine
communication is Telemetry.
• It has been used to send operational data since the turn of the past
century.
• Telemetrics pioneers used telephone lines, then radio waves, to send
performance measurements they gathered from monitoring
instruments from remote locations.
• Telemetry is now used in devices like heaters, electric meters, and
internet-connected appliances on a daily basis.
• This is thanks to the Internet and better wireless technology
standards. Telemetry was only used for industries like manufacturing
and engineering.
• The main advantage of M2M is to track and communicate with devices
and systems.
M2M architecture
Components of M2M architecture are :
1) M2M Devices
2) M2M Area Network i.e Device Domain
3) M2M Gateway
4) M2M Communcation N/w’s : Network Domain
5) M2M Applications i.e Application Domain
M2M Devices
• Device that are capable of replying to request for data
contained within those devices or capable of transmitting data
autonomously are M2M Devices.
• Sensors and communication devices are the endpoints of M2M
applications.
SCADA (Supervisory Control and Data
Acquisition)
•Supervisory Control and Data Acquisition
•One of the IoT pillars to represent the whole industrial automation
arena
•IEEE created standard specification called Std C37.1 , for SCADA &
automation systems in 2007
•In recent years, network-based industrial automation has greatly
evolved
•With the use of intelligent electronic devices (IEDs), or IoT devices in
our terms, in substations and power stations
• SCADA (supervisory control and data acquisition) is a category of software
applications for controlling industrial processes, which is the gathering of
data in Real Time from remote locations in order to control equipment and
conditions. SCADA provides organizations with the tools needed to make and
deploy data-driven decisions regarding their industrial processes.
• SCADA systems include hardware and software components. The hardware
gathers and feeds data into field controller systems, which forward the data
to other systems that process and present it to a human-machine interface
(HMI) in a timely manner. SCADA systems also record and log all events
for reporting process status and issues. SCADA applications warn when
conditions become hazardous by sounding alarms.

Components of a SCADA system
SCADA systems include components deployed in the field to gather real-
time data, as well as related systems to enable data collection and
enhance industrial automation. SCADA components include the following:
Components of a SCADA system

• Sensors and actuators. A sensor is a feature of a device or system that detects


inputs from industrial processes.
• An actuator is a feature of the device or system that controls the mechanism of the
process.
• In simple terms, a sensor functions like a gauge or meter, which displays the status
of a machine;
• an actuator acts like a switch, dial or control valve that can be used to control a
device.
• Both sensors and actuators are controlled and monitored by SCADA field controllers
Components of a SCADA system

• SCADA field controllers. These interface directly with sensors and


actuators. There are two categories of field controllers:

• Remote telemetry units, also called remote terminal units (RTUs),


interface with sensors to collect telemetry data and forward it to a
primary system for further action.

• Programmable logic controllers (PLCs) interface with actuators to


control industrial processes, usually based on current telemetry collected
by RTUs and the standards set for the processes.
Components of a SCADA system

• SCADA supervisory computers. These control all SCADA processes and are
used to gather data from field devices and to send commands to those
devices to control industrial processes.
• HMI software. This provides a system that consolidates and presents data
from SCADA field devices and enables operators to understand and, if
needed, modify the status of SCADA-controlled processes.
• Communication infrastructure. This enables SCADA supervisory systems to
communicate with field devices and field controllers. This infrastructure
enables SCADA systems to collect data from field devices and to control
those devices.
Features of SCADA Systems
• Data acquisition is a foundation of SCADA systems; sensors collect data and
deliver it to field controllers, which, in turn, feed data to the SCADA
computers.
• Remote control is achieved through the control of field actuators, based on
the data acquired from field sensors.
• Networked data communication enables all SCADA functions. Data
collected from sensors must be transmitted to SCADA field controllers,
which, in turn, communicate with the SCADA supervisory computers; remote
control commands are transmitted back to actuators from the SCADA
supervisory computers.
• Data presentation is achieved through HMIs, which represent current and
historical data to the operators running the SCADA system.
Features of SCADA Systems
• Real-time and historical data are both important parts of the SCADA
system, as they enable users to track current performance against historical
trends.
• Alarms alert SCADA operators to potentially significant conditions in the
system. Alerts can be configured to notify operators when processes are
blocked, when systems are failing, or when other aspects of SCADA
processes need to be stopped, started or adjusted.
• Reporting on SCADA system operations can include reports on system
status, process performance and reports customized to specific uses.
SCADA architecture
• Level 0. The field level includes field devices, such as sensors, used to
forward data relating to field processes and actuators used to control
processes.
• Level 1. The direct control level includes local controllers, such as PLCs and
RTUs, that interface directly with field devices, including accepting data
inputs from sensors and sending commands to field device actuators.
• Level 2. The plant supervisory level includes local supervisory systems that
aggregate data from level controllers and issue commands for those
controllers to carry out.
• Level 3. The production control level includes systemwide supervisory
systems that aggregate data from Level 2 systems to produce ongoing
reporting to the production scheduling level, as well as other site or
regionwide functions, like alerts and reporting.
• Level 4. The production scheduling level includes business systems used to
manage ongoing processes.
What Is the Modbus Protocol?
• Modbus is a request-response protocol implemented using a master-slave
relationship.
• In a master-slave relationship, communication always occurs in pairs—one
device must initiate a request and then wait for a response—and the
initiating device (the master) is responsible for initiating every interaction.
• Typically, the master is a human machine interface (HMI) or Supervisory
Control and Data Acquisition (SCADA) system and the slave is a sensor,
programmable logic controller (PLC), or programmable automation
controller (PAC).
• The content of these requests and responses, and the network layers across
which these messages are sent, are defined by the different layers of the
protocol.
MODBUS
• The most commonly used form of Modbus protocol is RTU over RS-485.
• Modbus RTU is a relatively simple serial protocol that can be transmitted via
traditional UART technology.
• Data is transmitted in 8-bit bytes, one bit at a time, at baud rates ranging
from 1200 bits per second (baud) to 115200 bits per second.
• The majority of Modbus RTU devices only support speeds up to 38400 bits
per second.
MODBUS
• A Modbus RTU network has one Master and one or more Slaves.
• Each slave has a unique 8-bit device address or unit number.
• Packets sent by the master include the address of the slave the message is
intended for.
• The slave must respond only if its address is recognized, and must respond
within a certain time period or the master will call it a "no response" error.
• Each exchange of data consists of a request from the master, followed by a
response from the slave.
• Each data packet, whether request or response, begins with the device
address or slave address, followed by function code, followed by parameters
defining what is being asked for or provided.
• The exact formats of the request and response are documented in detail in
the Modbus protocol specification.
• The general outline of each request and response is illustrated below.
• https://www.renkeer.com/modbus-protocol-and-its-types/
WSN Protocols

• Wireless sensor networks (WSNs) were an emerging application field of


microelectronics and communications in the first decade of the twenty-first century.
• In particular, WSNs promised wide support of interactions between people and their
surroundings.
• The potential of a WSN can be seen in the three words behind the acronym:
“Wireless” puts the focus on the freedom that the elimination of wires gives, in terms of
mobility support and ease of system deployment;
• “Sensor” reflects the capability of sensing technology to provide the means to perceive
and interact — in a wide sense — with the world;
• “Networks” gives emphasis to the possibility of building systems whose functional
capabilities are given by a plurality of communicating devices, possibly distributed over
large areas.
• Wireless Sensor Networks (WSNs)• Wireless sensor networks are
made up of wirelessly connected smart objects, which are sometimes
referred to as motes.• flexible deployments• variety of design
constraints• The following are some of the most significant limitations
of the smart objects in WSNs:• Limited processing power• Limited
memory• Lossy communication• Limited transmission speeds •
Limited power•These limitations greatly influence how WSNs are
designed, deployed, and utilized.
• Smart objects with limited processing, memory, power, and so on are
often referred to as constrained nodes.• Large numbers of sensors
permit the introduction of hierarchies of smart objects.• Such a
hierarchy provides, among other organizational advantages, the
ability to aggregate similar sensor readings from sensor nodes that
are in close proximity to each other.• These data aggregation
techniques are helpful in reducing the amount of overall traffic (and
energy) in WSNs with very large numbers of deployed smart objects.•
This data aggregation at the network edges is where fog and mist
computing
• Wirelessly connected smart objects generally have one of the
following two communication patterns:• Event-driven: Transmission
of sensory information is triggered only when a smart object detects
a particular event or predetermined threshold.• Periodic:
Transmission of sensory information occurs only at periodic
intervals.• The decision of which of these communication schemes is
used depends greatly on the specific application.• For example, in
some medical use cases sensors• Sends periodically, such as
temperature or blood pressure readings• blood pressure or
temperature readings are triggered to be sent only when certain
critically low or high readings are measured
WSN
• Wireless Sensor N/w
• It senses and gathers data
using sensors which are
spatially distributed
• It collects this data into a
centralized location with the
help of wired / wireless
connection
WSN elements
Working of WSN
In the above diagram we can see the sensors (nodes) are sensing the
device values
• These transmit the information to the measuring device (data
gatherer) which transmits the values to external systems using
Ethernet, Wifi, or GPRS.
SCADA
Supervisory Control and Data Acquisition
• These connect , monitor and control equipment's using short range
n/w inside a building or an industrial plant
• Uses BacNet (communication protocol) , CanBus (Controller Ara N/w)
and Wired FieldBuses(Industrial Computer Network Protocols)
• Supervisory means top level Control means controlling things
• Data Acquisition means acquiring the data / reading the data
• SCADA ia a s/w used to control the hardware i.e PLC, drives , servers ,
sensors and also acquire the data which is stored on the personal
computer or Human Machine Interface(HMI)
SCADA Image
SCADA Architecture
SCADA Architecture

• SCADA Architecture has a control centre connected to the main


hub(i.e the ethernet port)
• The PLC(Relay Reader is connected to the ethernet board which is
overall connected to the CPU.
• PLC on other hand is connected to various field instruments which
can be the temperature sensors or actuators that can be analog or
digital;
Example of SCADA Architecture
The PC has a SCADA s/w which can interact with the field instruments
• PC is also connected to various other PLC’s UnitsI , Unit II, as shown in
Diagram.
• There is an Human Machine Interface(HMI) which is individually
connected to the PLC
• The HMI individually monitors and controls the PLC
• TO read information from all the units we need a SCADA system.
• PLC (Programmable Logic Unit) monitor and control the data
• RTU(Remote Terminal Units) receive data from sensors and convert
Example of SCADA
Architecture
As shown in the figure the Pump is
controlled by the PLC1, which controls
speed of the pump.
• There is a water level sensor that senses the level
of water in water tank and gives the
information to PLC2 that monitors the level
of the water.
• The PLC1 and PLC2 are connected to the
SCADA system.
The system contains the database which can
store the data of speed of the pump and
water level.
Radio Frequency Identification Uses radio frequency to read and capture
information stored on a tag attached to an object.
• A tag can be read from up to several feet away and does not need to be
RFID within direct line-of- sight of the reader to be tracked.

• Uses NFC (Next Field Communication protocol), IC (Integrated Circuit) Cards,


Radio Waves
Passive Tags do not have their own
power supply, hence rely on
radiowaves for source of energy
• SemiPassive Tag have their own
power supply, but for transmitting
back they rely on signals coming
from RFID Reader
• Active Tag uses their own power
supply for both transmitting and
receiving
• Range of Passive Tags is less than
that of Semi and Active Tags
Passive Tags do not have their own power supply, hence rely on
radiowaves for source of energy
• SemiPassive Tag have their own power supply, but for transmitting
back they rely on signals coming from RFID Reader
• Active Tag uses their own power supply for both transmitting and
receiving
• Range of Passive Tags is less than that of Semi and Active Tags
• Passive Tags are cheaper
• Passive tags do not use any power source hence are compact
RF Signal Generator Generates
radio waves which
are transmitted through the
antenna • Receiver or signal
detector receives the signals
coming from the object Passive
Tags are cheaper
• Passive tags do not use any
power source hence are
compact
• And to process these signals
microcontroller is used
Transponder receives signals
from reader and sends back
feedback to the reader
• The Passive Tags use the
rectifier circuit to store the
energy coming from the radio
waves.
• This energy is used as the
supply for the controller and
the memory element
MODBUS
• The MODBUS TCP is a byte-oriented, industrial communication protocol, open de facto
standard, used for data exchange between embedded systems, devices, and industrial
applications.
• Devices,
• reacting as clients, may benefit from the inexpensive implementation of such a
lightweight protocol for polling industrial devices that react as servers.
• Polling communications follow the request–response mechanism, where a client
queries the server for specific data or executes commands in the server using a frame
of bytes arranged in a specific way, called a frame format.
• The server replies to the client queries via a frame of bytes either holding
measurement data from sensors or confirming the execution of commands.
• Sixteen-bit data registers store measurement values, and coils hold the status of ON
and OFF switches.
• Therefore, MODBUS TCP uses the polling mechanism, as opposed to the event-
based mechanism,
• Modbus is the fundamental network protocol used in most industrial applications
today.
• It is universal, open and an easy to use protocol. Modbus has been around industries
for over 30 years, but it’s still the dominant voluntary standard used in almost all
major industrial process control, instrumentation and automation products in the
market today.
• New industrial products such as PLC, PAC, I/O devices, and meters may have an
Ethernet, serial or even perhaps wireless interface, but Modbus is still the preferred
protocol
• The pivotal advantage of Modbus is that it can run over virtually all communication
media, including twisted pair wires, wireless, fibre optics, Ethernet, telephone
modems, cell phones and microwave which would imply that a Modbus connection
could be easily established on a new or existing factory floor
What is MODBUS ?
• The Modbus protocol was developed in 1979 by Modicon, incorporated, for
industrial automation systems and Modicon programmable controllers.
• It has since become an industry standard method for the transfer of discrete/ analog
I/O information and register data between industrial control and monitoring
devices. Modbus is now a widely-accepted, open, public-domain protocol that
requires a license, but does not require royalty payment to its owner.
• Modbus devices communicate using a master-slave (client-server) technique in
which only one device (the master/client) can initiate transactions (called queries).
• The other devices (slaves/servers) respond by supplying the requested data to the
master, or by taking the action requested in the query.
• A slave is any peripheral device (I/O transducer, valve, network drive, or other
measuring device) which processes information and sends its output to the master
using Modbus.
• The I/O Modules form slave/server devices, while a typical master device is a host
computer running appropriate application software.
• Other devices may function as both clients (masters) and servers (slaves).
Types of Modbus Communication Protocol
• Modbus serial protocol (the original
version) is a master/slave protocol,
e.g. one master that controls the
Modbus data transactions with
multiple slaves that respond to the
master’s requests to read from or
write data to the slaves. Network
architectures are shown Figures 1.
• Modbus TCP, also known as Modbus
TCP/IP, uses a client/server
architecture. Network architectures
are shown Figures
• In a standard Modbus serial network,
there is only one master and as many
as 247 slaves, each with a unique slave
address. And there are two types of
serial Modbus, Modbus RTU and ASCII.
Properties of Modbus ASCII and Modbus RTU
Modbus TCP (Ethernet)

• Modbus TCP is often referred to as Modbus over Ethernet. Modbus


TCP (also ModbusTCP/IP) is simply the Modbus RTU protocol with a
TCP interface that runs on Ethernet. The Modbus messaging structure
is the application protocol that defines the rules for organizing and
interpreting the data independent of the data transmission medium.
TCP/IP refers to the Transmission Control Protocol and Internet
Protocol, which provides the transmission medium for Modbus TCP/IP
messaging.
• This enables Modbus/TCP devices to immediately and easily
connect and communicate over existing Ethernet and fibre networks.
• Modbus/TCP also allows many more addresses than RS485, the use
of multiple Masters and speeds in the gigabit range.
• While Modbus RTU has a limitation of 247 nodes per network,
Modbus/TCP networks can have as many slaves as the physical layer
can handle.
• Often this number is somewhere around 1,024. Ethernet’s rapid
adoption within the process control and automation industry has
allowed Modbus/TCP to become the most widely used, fastest growing
and supported industrial protocol over Ethernet. Network
architectures are shown Figures 2.
Modbus TCP
Architecture

• Unlike Modbus RTU and Modbus


ASCII, Modbus/TCP will allow
multiple Clients to poll the same
Server device simultaneously. This
is permitted because over
Ethernet via TCP/IP, multiple
messages can be sent, buffered
and delivered without the
requirement of token passing or
total bus control, which is often
the case with many RS485 and
RS422 protocols.
Addressing and messaging

• Modbus memory addressing is


generally organized around 16-
bit registers that contain 16
coils or on/off (0/1) states or
integer values in 16-bit
registers (input/output or
holding registers).
• While some devices will use
their own Modbus addressing,
typical Modbus addressing can
be seen in Figure
• Modbus messaging is based on what is called an application data unit
(ADU) and a Protocol Data Unit (PDU).
• The Modbus message includes the slave/server address for the
slave/server involved, a function code, data start addresses, and the
data being sent to (written) or to be send back (read) to the
master/client, with an error checksum at the end
(CRC/LRC/Checksum).
• The size of the serial Modbus PDU is limited by the size constraint
that was inherited from the first Modbus serial network
implementation of 256 bytes. Modbus slave addresses are limited to 1-
255.
• Addresses 1-247 are available to the user and addresses 248-255 are
reserved
• A typical Modbus serial data transaction is shown in Figure 3.
• The Modbus TCP data transactions are essentially the same except the
server address is an IP address, there is some Ethernet overhead, and
the error checksum is different.
• Modbus data can include starting data addresses, data quantity or
count, and actual data that is read or is to be written.
• If the Modbus slave/server has a problem with the master/client
request, the slave/server will issue an error response back to the
master/client.
• In the Modbus TCP/IP message format, the Modbus PDU is typically
wrapped into the Ethernet package and consists of the Modbus
function code and the Modbus data request.
• The slave address and error code (CRC) are typically not needed as
the Modbus TCP/IP packet is routed by the network to the desired IP
address (unless there is to be a connection into a serial network), and
the error check is done as part of the Ethernet packet.
• The Function Code defines the command that the slave device is to
execute, such as read data, accept data, report status, etc.
Modbus Applications

• On the market today, most control and


automation devices are supported with
the Modbus protocol.
• Typical as temperature
sensor, pressure sensor, temperature
controller, PLC, inverter…
• In addition ,with the growing growth
of the iot community, more and more
electrical and electronic devices have
been using the Modbus protocol.
Advantages
• Modbus is the first widely accepted fieldbus standard. In a short time,
hundreds of vendors implemented the Modbus messaging system in
their devices and Modbus became the de facto standard for industrial
communication networks.
• Standard transports. The transport layer for Modbus RTU commands
is also simple to understand. It uses RS485, a differential
communication standard which supports up to 32 nodes in a multi-
dropped bus configuration. RS485 provided noise immunity superior
to the RS232 electrical standard.
• Modbus implements a very simple data representation. Modbus is
very easy to understand. Its primary purpose is simply to move data
between an RTU Master device (a Client in Modbus TCP) and an RTU
Slave device (a Server in Modbus TCP).
Disadvantages

• Modbus does not have any inherent protections against inadvertent


or malicious assaults on its data transactions from cybersecurity
attacks, and requires additional protections
Difference between Modbus RTU and Modbus
ASCII
• The difference between Modbus RTU and Modbus ASCII
• There are just two basic transmission ways found in RTU, ASCII and MODBUS
connections.
• These transmission modes determine the way in which the MODBUS messages
are coded.
• In ASCII format, the messages are readable, whereas in RTU the messages are in
binary coding and cannot be read while monitoring.
• The trade off is the RTU messages are smaller-size, which allows for more data
exchange in an identical time period.
• One must be aware that all nodes within one MODBUS network should be of
exactly the same transmission style, meaning MODBUS ASCII cannot
communicate with MODBUS RTU and vice versa.
ZIGBEE
• ZigBee solutions are aimed at smart objects and sensors that have
low bandwidth, interoperate and low power needs.• Sets of
Commands and Message• Sets of commands and message types are
called clusters.•ZigBee is the most well-known include automation for
commercial, retail, and home applications and smart energy
• • ZigBee utilizes the IEEE 802.15.4 standard at the lower PHY and MAC
layers• Network and security layer and application support layer that sit on
top of thelower layers.• The ZigBee network and security layer provides
mechanisms for network startup, configuration, routing, and securing
communications.• This includes calculating routing paths in what is often a
changing topology, discovering neighbors, and managing the routing tables
as devices join for the first time.• Network layer• For forming the
appropriate topology, which is a mesh, star or tree.• Security layer,• ZigBee
utilizes 802.15.4 for security at the MAC layer, using the Advanced
Encryption Standard (AES) with a 128-bit key and also provides security at
the network and application layers.• Application Layer• Interfaces the
lower portion of the stack dealing with the network of ZigBee devices and
with the higher-layer applications.
• • ZigBee IP• IEEE 802.15.4 , IP and TCP/UDP protocols and various
other openstandards are supported at the network and transport
layers.• Open standards like LLNs, IPv6, 6LoWPAN, and RPL. These
provides for low-bandwidth, low-power, and cost-effective
communications when connecting smart objects.• ZigBee IP
Applications like• Smart Energy (SE) Profile 2.0 or SE 2.0• smart
metering and residential energy management systems
• The 802.15.4 standard supports an extensive number of PHY options
that range from 2.4 GHz to sub-GHz frequencies in ISM bands.• These
standards is based on DSSS (direct sequence spread spectrum), is a
modulation technique in which a signal is intentionally spread in the
frequency domain, resulting in greater bandwidth.•The original
physical layer transmission options were as follows:• 2.4 GHz, 16
channels, with a data rate of 250 kbps • 915 MHz, 10 channels, with a
data rate of 40 kbps • 868 MHz, 1 channel, with a data rate of 20
kbps• Note - only the 2.4 GHz band operates worldwide
IEEE 802.15.4
• The IEEE 802.15.4 protocol was created to specify a sub- layer for Medium Access Control (MAC)
and a physical layer (PHY) for low-rate wireless private area networks (LR- WPAN)
• Due to its specifications such as low power consumption, low data rate, low cost, and high
message throughput, it also is utilized by the IoT, M2M, and WSNs.
• It provides a reliable communication, operability on different platforms, and can handle a large
number of nodes (about 65k).
• It also provides a high level of security, encryption and authentication services.
• However, it does not provide QoS guarantees.
• This protocol is the base for the ZigBee protocol as they both focus on offering low data rate
services on power
• constrained devices and they build a complete network
• protocol stack for WSNs.
IEEE 802.11
• IEEE 802.11 Wireless Local Area Network (WLAN) is part of IEEE 802 Local
Area Network protocols, and specifies a set of Physical Layers & Data Link Layers of Wireless Local
Area Networks in different unlicensed frequency bands, mainly in 2.4 and 5GHz frequency range.
• Developed and established since 1997, it isthe world's most widely adopted wireless
networking standard, used in most home, office, hotspot and campus networks to allow devices
to connect to local networks and to access the Internet.
• The IEEE 802.11 family of standards, as shown in Figure 6-5, consist of a series of half-
duplex over-the-air modulation techniques that use the same basic protocol.
• The 802.11 protocol family employ carrier-sense multiple access with collision avoidance whereby
equipment listens to a channel for other users before transmitting data (listen before talk).
• The Wi-Fi standard is managed by the Wi-Fi Alliance.

You might also like