Ioe Unit 3
Ioe Unit 3
IEEE 802.15.4
IEEE 802.15.4 standard is specifically designed for low-rate wireless personal area network (LR-
WPAN). Its characteristics is low data rate. The nodes can communicate at low data rate. IEEE
802.15.4 is used for low power wireless connectivity solutions like ZigBee, 6LoWPAN and many more.
It is operated at a low data rate with good performance of battery life. It is operated with lower
distance communication {<100m}.
The Physical Layer is responsible for sending and receiving data over the air. It defines the hardware
aspects of communication and ensures that the signals are correctly transmitted and received.
Key Functions:
o Uses Offset Quadrature Phase-Shift Keying (O-QPSK) modulation in the 2.4 GHz
band for reliable and efficient data transmission.
2. Frequency Bands:
2.4 GHz (Worldwide): The most common, providing a faster data rate of 250
kbps.
3. Spread Spectrum:
o Uses Direct Sequence Spread Spectrum (DSSS) to spread data across a wide
frequency range. This makes the communication more resilient to interference and
noise.
4. Channel Selection:
5. Power Efficiency:
o Optimized for low-power devices, enabling them to run on small batteries for long
periods.
The MAC Layer is like a traffic controller. It ensures that devices take turns to communicate, avoiding
collisions and managing data flow in an orderly manner.
Key Functions:
1. Channel Access:
A device listens to the channel first. If the channel is free, it transmits data; if
not, it waits and retries later.
2. Frame Types:
3. Beacon-Enabled Mode:
o Coordinators send periodic beacon signals to help devices synchronize and manage
communication.
4. Non-Beacon Mode:
6. Retransmissions:
3. Network Topologies
Topologies describe how devices are arranged and communicate in a network. IEEE 802.15.4
supports three types of topologies to suit different applications:
a. Star Topology:
Structure:
o All devices (called End Devices) communicate directly with the coordinator.
Advantages:
Disadvantages:
Use Case: Home automation, where all sensors report to a central hub.
Structure:
Advantages:
o Offers high flexibility and redundancy (data can take multiple paths).
Disadvantages:
Use Case: Industrial monitoring, where sensors need to communicate with each other.
c. Cluster-Tree Topology:
Structure:
o Devices form clusters. Each cluster has a Cluster Head, which connects to a central
coordinator.
Advantages:
o Combines the simplicity of star topology with the flexibility of mesh topology.
Disadvantages:
Use Case: Agricultural monitoring, where sensors in different fields report to their respective
cluster heads.
4. Security
Since IEEE 802.15.4 is often used in wireless networks with low-power devices, security is crucial to
protect against attacks and ensure data privacy.
Key Security Features:
1. AES-128 Encryption:
o Uses Advanced Encryption Standard (AES) with a 128-bit key to encrypt the data.
o Ensures that only authorized devices can read the transmitted data.
2. Access Control:
o Maintains a list of trusted devices and restricts communication to those devices only.
3. Message Integrity:
o Uses Message Integrity Codes (MIC) to ensure data hasn’t been altered during
transmission.
4. Replay Protection:
o Prevents attackers from re-sending old data packets by using unique frame counters
for each transmission.
5. Key Management:
IEEE 802.15.4g
The IEEE 802.15.4g standard is a specialized amendment to IEEE 802.15.4, tailored for Smart
Utility Networks (SUNs), such as smart meters, energy management systems, and other
industrial or utility applications. It enhances IEEE 802.15.4 by optimizing it for outdoor, large-
scale, low-power, and long-range communication.
IEEE 802.15.4e
IEEE 802.15.4e is an amendment to the IEEE 802.15.4 standard that enhances its Medium Access
Control (MAC) layer. It addresses limitations in the original standard, focusing on applications
requiring reliability, low latency, energy efficiency, and scalability, such as industrial automation,
smart grids, and IoT systems.
The Physical Layer (PHY) in IEEE 802.15.4e remains largely the same as in IEEE 802.15.4. It handles
how data is transmitted over the air.
Key Features:
1. Frequency Bands:
Sub-GHz bands like 868 MHz (Europe) and 915 MHz (North America).
2. Data Rates:
3. Modulation:
o DSSS (Direct Sequence Spread Spectrum) with O-QPSK (Offset Quadrature Phase
Shift Keying) for resilience against interference.
4. Range:
5. Channel Bandwidth:
6. Energy Efficiency:
The MAC layer in IEEE 802.15.4e introduces significant enhancements to support low-power,
reliable, and deterministic communication.
Key Features:
o Divides time into slots, where each slot is assigned to specific devices or tasks.
2. Deterministic Scheduling:
o Ensures that critical messages are transmitted on time, making it ideal for
applications like industrial control.
3. Low Latency:
4. Energy Efficiency:
o Devices can enter sleep mode between scheduled slots, extending battery life.
6. Enhanced Beaconing:
o CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance): For non-
deterministic traffic.
8. Scalability:
3. Network Topology
Supported Topologies:
1. Star Topology:
o Coordinators form a hierarchical structure, with each acting as a relay for its child
nodes.
3. Mesh Topology:
o Devices communicate with each other, relaying data to extend the network's range
and resilience.
4. Multi-hop Communication:
4. Security
Security is a critical component in IEEE 802.15.4e, ensuring that communication is protected against
unauthorized access and tampering.
1. Encryption:
o Verifies the identity of devices before allowing them to join the network.
3. Message Integrity:
4. Replay Protection:
o Prevents attackers from reusing old messages by using unique sequence numbers or
timestamps.
6. TSCH Security:
o Minimizes the impact of malicious traffic by controlling device access and managing
network resources effectively.
IEEE 1901.2a
The IEEE 1901.2a standard is a refinement of IEEE 1901.2, focusing on low-frequency power line
communications (PLC) in the frequency range of 10 kHz to 500 kHz. It is primarily designed for
applications in smart grids, home automation, and industrial control, where reliable and secure data
communication over existing power line infrastructure is critical.
The Physical Layer (PHY) in IEEE 1901.2a ensures that data is transmitted and received effectively
over power lines, which are noisy and subject to interference.
Key Features:
1. Frequency Bands:
o Operates in the low-frequency spectrum (10 kHz to 500 kHz) for improved range
and penetration.
o Bands are selected to comply with global regulations, such as CENELEC (Europe), FCC
(USA), and ARIB (Japan).
2. Modulation Techniques:
3. Data Rates:
o Offers data rates ranging from up to 500 kbps, suitable for low-bandwidth
applications like smart metering.
4. Channel Coding:
o Implements Forward Error Correction (FEC) to detect and correct errors caused by
noise and interference.
6. Transmission Range:
The MAC Layer ensures orderly and efficient communication over the shared medium (power lines),
where multiple devices may need to communicate simultaneously.
Key Features:
2. Prioritization of Traffic:
o Supports Quality of Service (QoS) to prioritize critical data (e.g., grid control signals)
over less critical traffic (e.g., usage reporting).
3. Frame Types:
4. Reliability:
o Uses retransmission mechanisms and acknowledgments to ensure reliable
communication.
5. Energy Efficiency:
3. Network Topology
IEEE 1901.2a supports various topologies to meet the needs of different applications, ranging from
small home networks to large utility grids.
Supported Topologies:
1. Point-to-Point:
o Structure:
o Use Case:
o Structure:
o Use Case:
Smart grid applications where a central hub collects data from meters in a
neighborhood.
o Structure:
o Use Case:
4. Tree Topology:
o Structure:
4. Security
Given its use in critical infrastructure, security is a major focus of IEEE 1901.2a. It incorporates robust
mechanisms to protect data integrity, confidentiality, and network availability.
1. Encryption:
2. Authentication:
3. Message Integrity:
4. Replay Protection:
o Protects against replay attacks by using unique sequence numbers or timestamps for
each message.
5. Key Management:
o Ensures secure distribution and management of encryption keys, which can be pre-
shared, distributed dynamically, or derived during communication.
o Includes measures to detect and respond to excessive or malicious traffic that could
disrupt communication.
IEEE 802.11ah
IEEE 802.11ah, also known as Wi-Fi HaLow, is a wireless communication standard designed to
operate in the sub-1 GHz spectrum. It is tailored for low-power, long-range applications like IoT,
smart agriculture, industrial automation, and smart cities. By leveraging sub-GHz frequencies, it
achieves greater range and better penetration through obstacles compared to traditional Wi-Fi
standards.
The Physical Layer (PHY) of IEEE 802.11ah is optimized for low-power and long-range
communication.
Key Features:
1. Operating Frequency:
o Sub-1 GHz bands (e.g., 433 MHz, 868 MHz, 915 MHz), depending on regional
regulations.
3. Data Rates:
o Range from 150 kbps to 347 Mbps, scalable to match application needs.
4. Channel Bandwidth:
o Narrower channels (e.g., 1 MHz, 2 MHz) for longer range and lower power
consumption.
5. Transmission Range:
6. Energy Efficiency:
The MAC Layer in IEEE 802.11ah is designed for efficient, scalable communication among thousands
of IoT devices.
Key Features:
o Each group communicates during a specific time period, managed by the Access
Point (AP).
o Reduces collisions and improves energy efficiency by allowing devices to sleep when
not scheduled to transmit.
3. Traffic Prioritization:
o Supports Quality of Service (QoS) to prioritize critical traffic (e.g., alarms) over non-
critical data.
4. Efficient Beaconing:
o Optimized beacons minimize overhead and extend battery life for devices.
o Can manage up to 8191 devices per Access Point, making it ideal for IoT applications
with many endpoints.
3. Network Topology
Supported Topologies:
1. Star Topology:
o A central Access Point (AP) communicates directly with multiple devices (stations).
o Example: Smart home networks where the AP connects to sensors and actuators.
2. Hierarchical Star:
3. Mesh Networks:
4. Security
IEEE 802.11ah incorporates robust security mechanisms to ensure the confidentiality, integrity, and
authenticity of data.
1. Authentication:
2. Encryption:
3. Data Integrity:
4. Replay Protection:
5. Key Management:
6. Energy-Aware Security:
LoRaWAN
o End Devices (Nodes): These are the IoT devices that communicate with the network
using LoRa (Long Range) radio modulation. They send and receive data to/from
gateways, which relay the data to a network server. End devices typically operate in
either Class A (low power, two-way communication) or Class C (constant listening
mode) for energy efficiency.
o Gateways: These are intermediary devices that receive data from end devices over
LoRa radio and forward it to the network server via IP (Internet Protocol)
connectivity. Gateways do not process data but serve as bridges for LoRaWAN
devices to connect to the network server.
o Network Server: The network server manages communication, security, and routing
of messages between the end devices and the application servers. It ensures
message integrity, handles security features like encryption, and filters duplicates.
The network server also manages the radio frequency (RF) usage to prevent
interference.
o Adaptive Data Rate (ADR): LoRaWAN adjusts data transmission rates based on the
signal quality to optimize energy consumption and improve network capacity.
o Security: LoRaWAN employs AES encryption to secure data during transmission. Each
device has a unique DevEUI (Device Unique Identifier), and communication is
encrypted with a session key.
o Star Topology: End devices communicate directly with gateways, which then relay
messages to the network server.
2. IP Versions in LoRaWAN:
LoRaWAN itself does not directly support traditional IP networking like IPv4 or IPv6. However, there
are ways to integrate LoRaWAN into IP-based systems, either via the use of gateways or by
implementing adaptations to support IP communication. Here's how:
o LoRaWAN to IP Gateway:
Since LoRaWAN operates at the network and MAC layers, gateways are often used to
bridge LoRaWAN communication to traditional IP networks (IPv4/IPv6). These
gateways act as translators, forwarding LoRaWAN data to IP-based servers or
application platforms. This allows LoRaWAN-based devices to interact with systems
that operate over the internet, enabling the integration of IoT devices with cloud
services and IP-based networks.
o Long Range and Low Power: LoRaWAN can provide long-range communication with
minimal energy consumption, which is ideal for IoT applications like remote sensing
and tracking.
Constrained Networks: These networks have limited bandwidth, high latency, or intermittent
connectivity, typically used for communication between constrained nodes. Examples include LPWAN
(e.g., LoRaWAN) and Zigbee networks. They often experience interference or signal degradation due
to environmental factors or physical obstructions, which further limit reliability and data throughput.
RPL stands for Routing Protocol for Low Power and Lossy Networks for heterogeneous traffic
networks. It is a routing protocol for Wireless Networks. This protocol is based on the same standard
as by Zigbee and 6 Lowpan is IEEE 802.15.4 It holds both many-to-one and one-to-one
communication.
It is a Distance Vector Routing Protocol that creates a tree-like routing topology called
the Destination Oriented Directed Acyclic Graph (DODAG), rooted towards one or more nodes called
the root node or sink node.
The Directed Acyclic Graphs (DAGs) are created based on user-specified specific Objective Function
(OF). The OF defines the method to find the best-optimized route among the number of sensor
devices.
In an RPL Network, each node acts as a router and becomes part of a mesh network. Routing is
performed at the IP Layer. Each node examines every received IPv6 packet and determines the next-
hop destination based on the information contained in the IPv6 header. No information from the
MAC layer header is needed to perform the next determination.
Modes of RPL:
1. Storing mode
All nodes contain the entire routing table of the RPL domain. Every node knows how to reach every
other node directly.
2. Non-Storing mode
Only the border router(s) of the RPL domain contain(s) the full routing table. All other nodes in the
domain maintain their list of parents only and use this as a list of default routes towards the border
router. The abbreviated routing table saves memory space and CPU. When communicating in non-
storing mode, a node always forwards its packet to the border router, which knows how to ultimately
reach the final destination.
RPL is based on the concept of a Directed Acyclic Graph (DAG). A DAG is Directed Graph where no
cycle exists. This means that from any vertex or point in the graph, we cannot follow an edge or a line
back to this same point. All of the edges are arranged in a path oriented toward and terminating at
one or more root nodes.
A basic RPL process involves building a Destination Oriented Directed Acyclic Graph (DODAG). A
DODAG is a DAG rooted in one destination. In RPL this destination occurs at a border router known
as the DODAG root. In a DODAG, three parents maximum are maintained by each node that
provides a path to the root. Typically one of these parents is the preferred parent, which means it is
the preferred next hop for upward roots towards the root.
SCADA collects data from sensors and devices in the field, processes the data, and allows operators
to monitor and control the processes remotely. The system ensures smooth operations, improves
efficiency, and helps detect and resolve problems quickly.
1. Field Devices:
o These devices collect data (e.g., temperature, pressure, or flow rates) and execute
commands (e.g., open/close a valve).
o RTUs and PLCs act as intermediaries between field devices and the central system.
o They collect raw data from the sensors, process it, and send it to the SCADA system.
o They also receive commands from the SCADA system and relay them to the field
devices.
3. Communication Infrastructure:
o The HMI is the interface operators use to monitor and control the system.
o Operators can issue commands, like turning equipment on/off or adjusting settings.
o Uses cloud computing and IoT for better flexibility and cost-efficiency.
Uses of SCADA
1. Energy Sector:
3. Manufacturing:
5. Transportation:
6. Building Automation:
Why is SCADA Important?
Data Analytics: Provides insights into system performance and areas for improvement.
These protocols are designed to facilitate lightweight communication between IoE devices and
applications, especially for constrained environments.
Examples:
These protocols ensure real-time communication between devices and applications, often used for
time-sensitive applications.
Examples:
1. WebSocket:
These protocols manage the transfer of structured or unstructured data between IoE devices and
systems.
Examples:
These protocols enable devices in an IoE ecosystem to discover each other and configure
connections automatically.
Examples:
These protocols handle the delivery and control of audio, video, and multimedia content in IoE
applications.
Examples:
Examples:
7. Security Protocols
Security-focused application layer protocols ensure data confidentiality, integrity, and authenticity in
IoE applications.
Examples:
3. OAuth
CoAP
The Constrained Application Protocol (CoAP) is a special web transfer protocol that operates with
constrained nodes and networks. These networks are commonly used for applications such as the
Internet of Things (IoT), where devices may have limited processor, memory, and power resources.
CoAP is intended to be simple, low-overhead, and efficient, making it ideal for machine-to-machine
communication.
Working of CoAP:
Client-Server Model: CoAP model is essentially a client/server model enabling the client to
request for service from server as needed and the server responds to client's request.
Resource-Oriented: CoAP treats various objects in the network as resources, each uniquely
identified by a URI (Uniform Resource Identifier). Clients can request information about
these resources, and servers provide responses2.
o GET
o POST
o DELETE
o PUT
Asynchronous Messaging: CoAP messages are asynchronous because it uses the User
Datagram Protocol (UDP). Unlike TCP-based protocols, CoAP does not require
acknowledgments for every message, which helps conserve energy in resource-constrained
devices.
Methods in CoAP
GET - The get method is used to retrieve resource information identified by the request URI.
In response to GET method success a 200(OK) response is sent.
POST - The post method creates a new subordinate resource under the parent URI requested
by it to the server. On successful resource creation on the server, a 201 (Created) response is
sent while on failure a 200 (OK) response code is sent.
DELETE - The delete method deletes the resource identified by the requested URI and a 200
(OK) response code is sent on successful operation.
PUT - The PUT method updates or creates the resource identified by the request URI with
the enclosed message body. The message body is considered as modified version of a
resource if it already exists at the specified URI otherwise a new resource with that URI is
created. A 200 (OK) response is received in former case whereas a 201 (Created) response is
received in later case. If the resource is neither created nor modified then an error response
code is sent.
The most fundamental difference between CoAP and HTTP is that CoAP defines a new method which
is not present in HTTP. This method is called Observe method. The observe method is very similar to
the GET method in addition with an observe option. This alerts the server, to send every update
about the resource to the client. Therefore, upon any change in the resource, the server sends a
response to the client. These responses could either be directly sent individually or they can
be piggy-backed.
CoAP messages are encoded in binary-format or 0/1 format. Like other message formats, CoAP
message has a header and a payload section along with an optional section. The size of CoAP header
is 4 bytes or 32 bits. This size is fixed for every CoAP message. Whereas the other part of message is
the optional part which includes payload and tokens of variable size ranging from 0-8 bytes. The
message format of CoAP contains the following fields:
Version - The size of version field is 2 bits. It represents the version of the CoAP protocol.
Type Code - The size of type field is 2 bits. There are four types of messages namely
confirmable, non-confirmable, acknowledgement and reset represented by the bit patterns
00, 01, 10, 11 respectively.
Option Count - The size of option count field is 4 bits. These 4 bits, means there could be a
total of 16 possible options in header.
Code - The size of code field is 8 bits. This indicates whether message is empty, request
message or response message.
Message ID - The size of message ID field is 16 bits. It is used to detect the message
duplication and types of messages.
Tokens [Optio
nal] - The size of
tokens field is
variable which
ranges from
0-8 bytes. It's
used to match a
response with
request.
Options [Opti
onal] - The options
field in CoAP
message has a variable size. It defines the type of payload message.
Payload [Optional] - Similar to options field, the payload field has a variable size. The payload
of requests or of responses is typically a representation of the requested resource or the
result of the requested action.
CoAP Features
RESTful Architecture
UDP-Based
Asynchronous Communication
Multicast Communication
MQTT
MQTT is a simple, lightweight messaging protocol used to establish communication between
multiple devices. It is a TCP-based protocol relying on the publish-subscribe model. This
communication protocol is suitable for transmitting data between resource-constrained devices
having low bandwidth and low power requirements. Hence this messaging protocol is widely used
for communication in the IoT Framework.
Publish-Subscribe Model
This model involves multiple clients interacting with each other, without having any direct
connection established between them. All clients communicate with other clients only via a third
party known as a Broker.
Clients publish messages on different topics to brokers. The broker is the central server that receives
these messages and filters them based on their topics. It then sends these messages to respective
clients that have subscribed to those different topics. The heart of any publish/subscribe protocol is
the MQTT broker. A broker can handle up to thousands of concurrently connected MQTT customers,
depending on how it is implemented. All communications must be received by the broker, who will
then sort them, ascertain who subscribed to each one, and deliver the messages to the clients who
have subscribed. All persistent customers’ sessions, including missed messages and subscriptions, are
likewise kept by the Broker.
Hence client that has subscribed to a specific topic receives all messages published on that topic.
Here the broker is central hub that receives messages, filters them, and distributes them to
appropriate clients, such that both message publishers, as well as subscribers, are clients.
Working of MQTT
When a broker and a subscribing client lose contact, the broker will store messages in a buffer and
send them to the subscriber whenever the broker is back up and running. The broker has the right to
cut off communication with subscribers and send them a cached message containing publisher
instructions if the publishing client abruptly disconnects from the broker.
“Publishers send the messages, subscribers receive the messages they are interested in, and brokers
pass the messages from the publishers to the subscribers,” reads an IBM write-up describing the
pub/sub paradigm. MQTT clients, such as publishers and subscribers, can only speak with MQTT
brokers. Any device or programme that runs a MQTT library can be a MQTT client, ranging from
microcontrollers like the Arduino to entire application servers housed in the cloud.
Characteristics of MQTT
Lightweight: Designed for low-resource environments like embedded systems and low-
power devices, with minimal bandwidth and processing overhead.
Quality of Service (QoS): Offers three delivery reliability levels (0, 1, 2), suitable for varying
application requirements.
Retained Messages: Brokers store the latest message for a topic, ensuring new subscribers
instantly receive the most recent update.
Last Will and Testament (LWT): Allows a message to be broadcast if a client disconnects
unexpectedly, aiding failure detection.
Advantages of MQTT
Efficient Data Transport: Lightweight protocol with minimal network usage and power
consumption, ideal for connected devices.
Small Packet Size: Fixed header of 2 bytes and payload up to 256 MB ensures low overhead
and quick transmission.
Effective Messaging: Prompt delivery, effective data dissemination, and suitable for remote
sensing and control applications.
Secure Transmission: Uses port 8883 for encrypted communication via TLS.
Disadvantages of MQTT
Slower than CoAP: MQTT has slower send cycles compared to Constrained Application
Protocol (CoAP).
Resource Discovery: Relies on flexible topic subscription, while CoAP uses a more reliable
discovery system.
No Native Encryption: Security depends on external mechanisms like TLS/SSL.