CH 3
CH 3
IEEE 802.15.4e:
802.15.4e for industrial applications and 802.15.4g for the smart utility networks (SUN)
The 802.15.4e improves the old standard by introducing mechanisms such as time slotted
access, multichannel communication and channel hopping.
IEEE 802.15.4e introduces the following general functional enhancements:
1. Low Energy (LE): This mechanism is intended for applications that can trade latency
for energy efficiency. It allows a node to operate with a very low duty cycle.
2. Information Elements (IE) It is an extensible mechanism to exchange information at
the MAC sublayer.
3. Enhanced Beacons (EB): Enhanced Beacons are an extension of the 802.15.4 beacon
frames and provide a greater flexibility. They allow to create application-specific
frames.
4. Multipurpose Frame: This mechanism provides a flexible frame format that can address
a number of MAC operations. It is based on IEs.
5. MAC Performance Metric: It is a mechanism to provide appropriate feedback on the
channel quality to the networking and upper layers, so that appropriate decision can be
taken.
6. Fast Association (FastA) The 802.15.4 association procedure introduces a significant
delay in order to save energy. For time-critical application latency has priority over
energy efficiency.
IEEE 802.15.4e defines five new MAC behaviour modes.
1. Time Slotted Channel Hopping (TSCH): It targets application domains such as industrial
automation and process control, providing support for multi-hop and multichannel
communications, through a TDMA approach.
2. Deterministic and Synchronous Multi-channel Extension (DSME): It is aimed to support
both industrial and commercial applications.
3. Low Latency Deterministic Network (LLDN): Designed for single-hop and single
channel networks
4. Radio Frequency Identification Blink (BLINK): It is intended for application domains
such as item/people identification, location and tracking .
5. Asynchronous multi-channel adaptation (AMCA): It is targeted to application domains
where large deployments are required, such as smart utility networks, infrastructure
monitoring networks, and process control networks
Properties:
2. Physical Layer:
This standard enables a wide range of PHY options in ISM bands, ranging from 2.4 GHz to
sub-GHz frequencies. IEEE 802.15.4 enables data transmission speeds of 20 kilobits per
second, 40 kilobits per second, 100 kilobits per second, and 250 kilobits per second. The
fundamental structure assumes a 10-meter range and a data rate of 250 kilobits per second.
To further reduce power usage, even lower data rates are possible. IEEE 802.15.4 regulates
the RF transceiver and channel selection, and even some energy and signal management
features, at the physical layer. Based on the frequency range and data performance needed,
there are now six PHYs specified. Four of them employ frequency hopping techniques
known as Direct Sequence Spread Spectrum (DSSS). Both PHY data service and
management service share a single packet structure so that they can maintain a common
simple interface with MAC.
3. MAC layer:
The MAC layer provides links to the PHY channel by determining that devices in the same
region will share the assigned frequencies. The scheduling and routing of data packets are
also managed at this layer. The 802.15.4 MAC layer is responsible for a number of
functions like:
Beaconing for devices that operate as controllers in a network.
used to associate and dissociate PANs with the help of devices.
The safety of the device.
Consistent communication between two MAC devices that are in a peer-to-peer
relationship.
Several established frame types are used by the MAC layer to accomplish these functions.
In 802.15.4, there are four different types of MAC frames:
frame of data
Frame for a beacon
Frame of acknowledgement
Frame for MAC commands
4. Topology:
Networks based on IEEE 802.15.4 can be developed in a star, peer-to-peer, or mesh
topology. Mesh networks connect a large number of nodes. This enables nodes that would
otherwise be out of range to interact with each other to use intermediate nodes to relay data.
5. Security:
For data security, the IEEE 802.15.4 standard employs the Advanced Encryption Standard
(AES) with a 128-bit key length as the basic encryption technique. Activating such security
measures for 802.15.4 significantly alters the frame format and uses a few of the payloads.
The very first phase in activating AES encryption is to use the Security Enabled field in the
Frame Control part of the 802.15.4 header. For safety, this field is a single bit which is
assigned to 1. When this bit is set, by taking certain bytes from its Payload field, a field
known as the Auxiliary Security Header is formed following the Source Address field.
6. Competitive Technologies: The IEEE 802.15.4 PHY and MAC layers serve as a basis
for a variety of networking profiles that operate in different IoT access scenarios. DASH7
is a competing radio technology with distinct PHY and MAC layers.
The architecture of LR-WPAN Device:
IEEE 802.15.4
The Internet of Things (IoT) has been a buzzword for decades, but today this
market is far from theoretical. There are over 10 billion active IoT devices
globally, and one of the key technologies enabling this market growth is
Bluetooth Low Energy (BLE).
Most of us probably have a handful of Bluetooth devices within grabbing distance right now:
cell phones, laptops, headphones, and speakers. In fact, in 2021, there were over 4.7 billion
Bluetooth devices shipped globally. Bluetooth is one of the most widely used technologies
in the world.
Most people on the street would know what Bluetooth is – at least at a high level. But behind
the scenes, it’s a relatively complex technology standard managed by a group known as
the Bluetooth Special Interest Group (SIG). Over the years, the Bluetooth SIG has released
different versions of the Bluetooth Specification. The most popular protocols in the spec
are Bluetooth Classic and Bluetooth Low Energy.
Despite taking many cues from its predecessor, Bluetooth Classic, Bluetooth Low Energy is
regarded as a different technology that specifically targets markets where the demand is for
ultra-low power rather than high throughput.
Data communication with an LE radio happens in short bursts that do not need to be very
frequent. A typical LE use case would include periodically turning on the radio, transferring
or receiving a few bytes or kilobytes of data, and then turning off and going back to sleep.
This contrasts with Bluetooth Classic use cases where the radio is not turned off, like
maintaining a connection for a lengthy period of time to guarantee the least latency when a
call comes in, or use cases like the exchange of a large file.
While Bluetooth Classic and Bluetooth Low Energy protocols share many similarities, such
as both being protocols covered by the Bluetooth Specification and both operating within the
2.4 GHz ISM band, they are two distinct, incompatible protocols.
Bluetooth Classic is designed to handle a lot of data, but it also consumes power quickly.
Think about transmitting music from your phone to Bluetooth headphones. That is a
traditional use case for Bluetooth Classic.
BLE, on the other hand, is designed for applications that don’t require handling a lot of data
but do require really good battery life. Think about a sensor in a temperature-controlled
warehouse that you want to set and forget for months or even years. BLE would be a better fit
for that kind of application.
While there is more technical nuance to the two protocols, at a high level, the difference
between Bluetooth Classic and Bluetooth Low Energy comes down to differences in power
consumption and data throughput.
Advantages of BLE
By now, you understand that BLE was developed with a particular market in mind: that of
devices that require low power and small data transmission. To help meet this market’s
demand, Bluetooth Low Energy provides an array of advantages for both developers and end
consumers of BLE devices. Let’s look at a few of the most valuable advantages of BLE:
Advantages of Bluetooth Low Energy
Even when compared to other low-power technologies. BLE achieves optimized and low
power consumption by keeping the radio off as much as possible and sending small amounts
of data at low transfer speeds.
BLE modules and chipsets are low cost when compared to other similar technologies. This is
a result of the increased adoption rate and competition in the marketplace.
With most other wireless protocols and technologies, you would have to become a member of
the official group or consortium for that standard to access the specification. Becoming a
member of those groups can cost a significant amount (up to thousands of dollars annually).
With BLE, the major version (4.0, 4.1, 4.2, 5.0, 5.1, 5.2, 5.3, etc.) specification documents
are available to download from the Bluetooth.com website for free.
Prevalence in smartphones
This is probably the biggest advantage BLE has over its competitors, such as ZigBee, Z-
Wave, and Thread. The vast majority of people in the world own a smartphone, and almost
all of those smartphones have BLE hardware inside. This gives developers a much larger
potential user base for their applications.
Limitations of BLE
Data Throughput
The data throughput of BLE is limited by the physical radio data rate, which is the rate at
which the radio transmits data. This rate depends on the Bluetooth version used.
For Bluetooth versions earlier than 5.0, the rate is fixed at 1 Mbps. For Bluetooth 5.0 and
later, however, the rate varies depending on the mode, and PHY (discussed later in the
Physical Layer section) used. The rate can be at 1 Mbps like earlier versions or 2 Mbps when
utilizing the high-speed feature.
When utilizing the long-range feature, the rate drops to either 500 or 125 Kbps. At the
application layer and for the end-user, the data rate is much lower than the radio data rate.
Range
BLE was designed for short-range applications; hence, its range of operation is limited. There
are a few factors that limit the range of BLE, including:
It operates in the 2.4 GHz ISM spectrum, which is greatly affected by obstacles that
exist all around us, such as metal objects, walls, and water (especially human bodies).
Performance and design of the antenna of the BLE device.
The physical enclosure of the Bluetooth Low Energy device affects the antenna
performance, especially if it is an internal antenna.
Device orientation – effectively relates to the positioning of the antenna (e.g., in
smartphones).
To transfer data from a BLE-only device to the Internet, another BLE device that has an IP
connection is needed to receive this data and then, in turn, relay it to another IP device (or to
the internet).
BLE Applications
When it was released in 2010, the BLE protocol primarily focused on the Internet of Things
(IoT) applications where small amounts of data are transferred at lower speeds. Over the last
decade, BLE has been used in various applications, from consumer devices to industrial
manufacturing. Let’s take a look at a few of the most common applications we see today:
Home automation: Much of the home automation market is, in part, enabled by the
use of Bluetooth LE. BLE technology enables devices like smart lights, smart
thermostats, smart locks, and sensors that detect smoke or an ajar window.
Fitness tracking: Many of us have smartwatches or Fitbits that track our heart rate,
steps, and more. These health and activity tracking devices communicate with apps on
our phones using BLE. These short bursts of data at close range are a perfect
candidate for BLE technology.
Audio devices: We’re all familiar with Bluetooth headphones, but typically these
devices utilize Bluetooth Classic. One of the latest developments in Bluetooth Low
Energy is LE Audio. This new standard offers several advantages over traditional
Bluetooth, including improved audio quality, lower power consumption, and support
for hearing aids.
Item finding tags: An increase in travel chaos has had some people
adding AirTags or Tiles to their luggage in case it gets lost. These BLE-enabled
precision tracking devices can be used for more than just luggage, though. You can
pop one on anything you think you might lose, like a bicycle or your car keys, and
track its location via a smartphone app.
The Internet of Things is the network of billions of devices – “things” – that are connected
wirelessly to exchange data over the internet. IoT technology helps to connect things like
thermostats, smart lights, people with embedded medical devices, animals with implanted
trackers, and cars with driver-assist sensors. Any person, animal, or man-made object can
become a “thing” in IoT. This means IoT is essentially connecting people, processes, and
systems.
To make all of these connections possible, IoT relies on wireless technologies. ZigBee,
Bluetooth Classic, and WiFi can all be used to connect devices wirelessly. However, BLE is
often viewed as the most optimal technology for IoT applications because of two main
reasons:
1. Low power consumption. Many IoT devices are battery-powered and need to last in
the field for a very long time. For example, it would simply be impractical to
regularly replace the batteries in hundreds of sensors in a warehouse environment.
2. The type of data being exchanged. BLE is optimized to transmit a small amount of
data. This works great for IoT devices like sensors that just need to transfer state data.
BLE Beacons
Bluetooth beacons are small and wireless battery-powered transmitters that use BLE protocol
for transmission. The special thing about beacons is that they usually work in one direction.
They broadcast to nearby Bluetooth Low Energy devices, but they do not receive data. BLE
beacons do not require an internet connection to do this broadcasting. Typically this would
look like a single beacon broadcasting data to smart devices (cell phones, smart watches, etc.)
nearby.
The Bluetooth Low Energy protocol is not straightforward to learn, even if you’re a seasoned
developer. To get you started on your BLE development journey, we’re going to break down
the Bluetooth LE protocol architecture at a high level and each of the BLE protocol layers.
Bluetooth Low Energy is a protocol. And just like any other protocol, it acts as a rulebook
that devices must adhere to in order to communicate or exchange information.
It’s important to understand that a protocol’s general functionality is broken down into
smaller protocols, each of which is responsible for a very specialized role. These smaller
protocols are packaged into a layered architecture called a protocol stack or protocol suite.
The Bluetooth protocol stack is broadly broken down into three primary components or
subsystems: application, host, and controller. Inside each of these blocks are distinct layers.
BLE Protocol Layers
If you are a developer looking to develop BLE applications, you won’t have to worry much
about the layers below the Security Manager and Attribute Protocol layers. But it might still
be helpful to have some context about these layers. Let’s take a look.
The physical layer (PHY) refers to the physical radio used for communication and for
modulating/demodulating the data. It operates in the ISM band (2.4 GHz spectrum).
The Link Layer is the layer that interfaces with the Physical Layer (Radio) and provides the
higher levels an abstraction and a way to interact with the radio (through an intermediary
level called the HCI layer which we’ll discuss shortly). It is responsible for managing the
state of the radio as well as the timing requirements for adhering to the Bluetooth Low
Energy specification.
The Host Controller Interface (HCI)
The (HCI) layer is a standard protocol defined by the Bluetooth specification that allows the
Host layer to communicate with the Controller layer. These layers could exist on separate
chips, or they could exist on the same chip.
The L2CAP layer acts as a protocol multiplexing layer. It takes multiple protocols from the
upper layers and places them in standard BLE packets. These packets are then passed down
to the lower layers beneath it.
The Attribute Protocol (ATT) defines how a server exposes its data to a client and how this
data is structured.
The Generic Attribute Profile (GATT) defines the format of the data exposed by a BLE
device. It also defines the procedures needed to access the data exposed by a device.
There are two Roles within GATT: Server and Client. The Server is the device that exposes
the data it controls or contains and possibly some other aspects of its behaviour that other
devices may be able to control.
A Client, on the other hand, is the device that interfaces with the Server with the purpose of
reading the Server’s exposed data and/or controlling the Server’s behavior. Keep in mind that
a Bluetooth LE device can act as the Server and a Client at the same time.
To understand the GATT, you need to understand Services and Characteristics. Services are
a grouping of one or more Attributes (a generic term for any type of data exposed by the
server). It’s meant to group together related Attributes that satisfy a specific functionality on
the Server. For example, the SIG-adopted Battery Service contains one Characteristic called
the Battery Level.
A Characteristic is always part of a Service, representing a piece of information/data that a
Server wants to expose to a client. For example, the Battery Level Characteristic represents
the remaining power level of a battery in a device that can be read by a Client.
1. Commands
2. Requests
3. Responses
4. Notifications
5. Indications
6. Confirmations
The GAP provides a framework that defines how BLE devices interact with each other. This
includes:
Broadcaster: a device that sends out Advertisements and does not receive packets or
allow Connections from others.
Observer: a device that listens to others sending out Advertising Packets but does not
initiate a Connection with an Advertising device.
Central: a device that discovers and listens to other devices that are Advertising. A
Central also has the capability of connecting to an Advertising device.
Peripheral: a device that Advertises and accepts Connections from Central devices.
Keep in mind that a single device may operate in multiple Roles at the same time. For
example, your smartphone can operate in the Central role when communicating with your
smartwatch and also act in the Peripheral role while communicating with a PC.
LoRa is an RF modulation technology for low-power, wide area networks (LPWANs). The
name, LoRa, is a reference to the extremely long-range data links that this technology enables.
Created by Semtech to standardize LPWANs, LoRa provides for long-range communications:
up to three miles (five kilometers) in urban areas, and up to 10 miles (15 kilometers) or more
in rural areas (line of sight). A key characteristic of the LoRa-based solutions is ultra-low power
requirements, which allows for the creation of battery-operated devices that can last for up to
10 years. Deployed in a star topology, a network based on the open LoRaWAN protocol is
perfect for applications that require long-range or deep in-building communication among a
large number of devices that have low power requirements and that collect small amounts of
data.
Consider the differences between LoRa and other network technologies that are typically used
in IoT or traditional machine-to-machine (M2M) connectivity solutions:
With respect to range, a single LoRa-based gateway can receive and transmit signals over a
distance of more than 10 miles (15 kilometers) in rural areas. Even in dense urban
environments, messages are able to travel up to three miles (five kilometers), depending on
how deep indoors the end devices (end nodes) are located.
As far as battery life goes, the energy required to transmit a data packet is quite minimal given
that the data packets are very small and only transmitted a few times a day. Furthermore, when
the end devices are asleep, the power consumption is measured in milliwatts (mW), allowing
a device’s battery to last for many, many years.
When it comes to capacity, a LoRaWAN network can support millions of messages. However,
the number of messages supported in any given deployment depends upon the number of
gateways that are installed. A single eight-channel gateway can support a few hundred
thousand messages over the course of a 24-hour period. If each end device sends 10 messages
a day, such a gateway can support about 10,000 devices1. If the network includes 10 such
gateways, the network can support roughly 100,000 devices and one million messages. If more
capacity is required, all that is needed is to add additional gateways to the network.
And then, there is cost. Given the capabilities of LoRa-based end nodes and gateways, only a
few gateways – configured in a star network – are required to serve a multitude of end nodes.
This means that capital and operational expenses can be kept relatively low. Also, when the
cost-effective LoRa RF modules that are embedded in inexpensive end nodes are used in
conjunction with the open LoRaWAN standard, the return on investment can be considerable.
LoRa is purely a physical (PHY), or “bits” layer implementation, as defined by the OSI seven-
layer Network Model, depicted in Figure 3. Instead of cabling, the air is used as a medium for
transporting LoRa radio waves from an RF transmitter in an IoT device to an RF receiver in a
gateway, and vice versa.
Figure 3: OSI seven-layer network model
When they are being manufactured, LoRa-based devices are assigned several unique
identifiers. These identifiers are used to securely activate and administer the device, to ensure
the safe transport of packets over a private or public network and to deliver encrypted data to
the Cloud.
LoRaWAN Gateways:
A LoRaWAN gateway receives LoRa modulated RF messages from any end device in hearing
distance and forwards these data messages to the LoRaWAN network server (LNS), which is
connected through an IP backbone. There is no fixed association between an end device and a
specific gateway. Instead, the same sensor can be served by multiple gateways in the area. With
LoRaWAN, each uplink packet sent by the end-device will be received by all gateways within
reach, as illustrated in Figure 10. This arrangement significantly reduces packet error rate (since
the chances that at least one gateway will receive the message are very high), significantly
reduces battery overhead for mobile/nomadic sensors, and allows for low-cost geolocation
(assuming the gateways in question are geolocation-capable).
Network Server:
The LoRaWAN network server (LNS) manages the entire network, dynamically controls the
network parameters to adapt the system to ever-changing conditions, and establishes secure
128-bit AES connections for the transport of both the end to end data (from LoRaWAN end
device to the end users Application in the Cloud) as well as for the control of traffic that flows
from the LoRaWAN end device to the LNS (and back). The network server ensures the
authenticity of every sensor on the network and the integrity of every message. At the same
time, the network server cannot see or access the application data.
Application Servers:
Application servers are responsible for securely handling, managing and interpreting sensor
application data. They also generate all the application-layer downlink payloads to the
connected end devices.
Join Server
The join server manages the over-the-air activation process for end devices to be added to the
network.
The join server contains the information required to process uplink join-request frames and
generate the downlink join-accept frames. It signals to the network server which application
server should be connected to the end-device, and performs the network and application session
encryption key derivations. It communicates the Network Session Key of the device to the
network server, and the Application Session Key to the corresponding application server.
Application of LoRA:
LoRa devices have revolutionized the Internet of Things (IoT) by enabling data communication
over a long range while using very little power. When connected to a non-cellular
LoRaWAN® network, sensor devices with LoRa chipsets accommodate a vast range of IoT
applications by transmitting packets with important information. LoRa is the de facto
technology for IoT based on its widespread adoption and will be responsible for connecting the
next billion IoT devices. LoRa is flexible for rural or indoor use cases in smart agriculture,
smart cities, industrial IoT (IIoT), smart environment, smart homes and buildings, smart
utilities and metering, and smart supply chain and logistics.
What is Wi-Fi?
Weall know about Wi-Fi, in our mobile, laptop everywhere Wi-Fi is supported.
Wi-Fi is a wireless networking technology, by which we can access networks or
connect with other computers or mobile using a wireless medium. In Wi-Fi, data
are transferred over radio frequencies in a circular range.
Wi-Fi, a brand name given by the Wi-Fi Alliance (formerly Wireless Ethernet
Compatibility Alliance), is a generic term that refers to the communication
standard for the wireless network which works as a Local Area Network to operate
without using the cable and any types of wiring. It is known as WLAN. The
communication standard is IEEE 802.11. Wi-Fi works using Physical Data Link
Layer.
Nowadays in all mobile computing devices such as laptops, mobile phones, also
digital cameras, smart TVs has the support of Wi-Fi. The Wi-Fi connection is
established from the access point or base station to the client connection or any
client-to-client connection within a specific range, the range depends on the router
which provides the radio frequency through Wi-Fi. These frequencies operate on
2 types of bandwidth at present, 2.4 GHz and 5 GHz.
All the modern laptops and mobiles are capable of using both bandwidths, it
depends on the Wi-Fi adapter which is inside the device to catch the Wi-Fi signal.
2.4 GHz is the default bandwidth supported by all the devices. 2.4 GHz can cover a
big range of areas to spread the Wi-Fi signal but the frequency is low, so in simple
words, the speed of the internet is less and 5 GHz bandwidth is for a lower range
of area but the frequency is high so the speed is very high
Let’s say, if there is an internet connection of 60 MB/s bandwidth, then for 2.4 GHz
bandwidth, it provides approx 30 to 45 MB/s of bandwidth connection and for 5
GHz bandwidth, it provides approx 50 to 57 MB/s bandwidth.
Applications of Wi-Fi :
Wi-Fi has many applications, it is used in all the sectors where a computer or any
digital media is used, also for entertaining Wi-Fi is used. Some of the applications
are mentioned below –
Accessing Internet: Using Wi-Fi we can access the internet in any Wi-Fi-
capable device wirelessly.
We can stream or cast audio or video wirelessly on any device using Wi-Fi
for our entertainment.
We can share files, data, etc between two or more computers or mobile
phones using Wi-Fi, and the speed of the data transfer rate is also very high.
Also, we can print any document using a Wi-Fi printer, this is very much
used nowadays.
We can use Wi-Fi as HOTSPOTS also, it points Wireless Internet access
for a particular range of area. Using Hotspot the owner of the main network
connection can offer temporary network access to Wi-Fi-capable devices so
that the users can use the network without knowing anything about the main
network connection. Wi-Fi adapters are mainly spreading radio signals
using the owner network connection to provide a hotspot.
Using Wi-Fi or WLAN we can construct simple wireless connections from
one point to another, known as Point to point networks. This can be useful
to connect two locations that are difficult to reach by wire, such as two
buildings of corporate business.
One more important application is VoWi-Fi, which is known as voice-over
Wi-Fi. Some years ago telecom companies are introduced VoLTE (Voice
over Long-Term Evolution ). Nowadays they are introduced to VoWi-Fi,
by which we can call anyone by using our home Wi-Fi network, only one
thing is that the mobile needs to connect with the Wi-Fi. Then the voice is
transferred using the Wi-Fi network instead of using the mobile SIM
network, so the call quality is very good. Many mobile phones are already
getting the support of VoWi-Fi.
Wi-Fi in offices: In an office, all the computers are interconnected using
Wi-Fi. For Wi-Fi, there are no wiring complexities. Also, the speed of the
network is good. For Wi-Fi, a project can be presented to all the members
at a time in the form of an excel sheet, ppt, etc. For Wi-Fi, there is no
network loss as in cable due to cable break.
Also using W-Fi a whole city can provide network connectivity by
deploying routers at a specific area to access the internet. Already schools,
colleges, and universities are providing networks using Wi-Fi because of its
flexibility.
Wi-Fi is used as a positioning system also, by which we can detect the
positions of Wi-Fi hotspots to identify a device location.
Types of Wi-Fi:
Wi-Fi has several types of standards, which are discussed earlier, here just the name
of the standards are defined,
Year of
Standards Release Description
Wi-Fi-5
(802.11ac) 2014 It supports a speed of 1733 Mb/s in the 5 GHz band
A new version will release in 2020 named 802.11ax developed by Huawei, which can
support, a maximum of 3.5 Gb/s. it will know Wi-Fi 6.
Working of Wi-Fi
All the electronics devices read data in binary form, also router or our devices, here
routers provide radio waves and those waves are receive by our devices and read the
waves in binary form. We all know how a wave looks like, the upper pick of the
wave is known as 1 and the lower pick of the wave is known as 0 in binary. Like
below:
Data transmission
Advantages of Wi-Fi
Disadvantages of Wi-Fi
Power consumption is high while using Wi-Fi in any device which has a
battery, such as mobile, laptops, etc.
Many times there may be some security problems happening even it has
encryption. Such as many times has known devices become unknown to the
router, Wi-Fi can be hacked also.
Speed is slower than a direct cable connection.
It has lower radiation like cell phones, so it can harm humans.
Wi-Fi signals may be affected by climatic conditions like thunderstorms.
Unauthorized access to Wi-Fi can happen because it does not have a
firewall.
To use Wi-Fi we need a router, which needs a power source, so at the time
of power cut, we cannot access the internet.
The ESP8266 WiFi Module is a self contained SOC with integrated TCP/IP protocol stack
that can give any microcontroller access to your WiFi network.
The ESP8266 is capable of either hosting an application or offloading all WiFi networking
functions from another application processor. Each ESP8266 module comes pre-programmed
with an AT command set firmware, meaning, you can simply hook this up to your Arduino
device and get about as much WiFi-ability as a WiFi Shield offers (and that's just out of the
box)! The ESP8266 module is an extremely cost effective board with a huge, and ever
growing, community.
Wifi modules or wifi microcontrollers are used to send and receive data over WiFi. They can
also accept commands over the Wi-Fi. Wi-Fi modules are used for communications
bewtween devices. They are most commonly used in the field of Internet of Thnigs.
Interfacing ESP 8266 with Arduino Board:
GSM (Global System For Mobile Communication):
GSM (Global System for Mobile Communications) is a set of mobile communications
standards and protocols governing second-generation or 2G networks, first developed and
deployed in Europe.
GSM is a digital cellular communication standard that is universally accepted. The European
Telecommunications Standards Institute created the GSM standard to define the procedures
for second-generation digital mobile networks that are used by devices such as mobile
phones. It is a wide-area communications technology program that utilizes digital radio
channeling to bring forth audio, information, and multimedia communication systems.
GSM is a mobile network and not a computer network this implies that devices interact with
it by looking for nearby cells. GSM, including other technological advances, has influenced
the evolution of mobile wireless telecommunication services. A GSM system manages
communication between mobile stations, base stations, and switching systems.
Every GSM radio channel is 200 kHz wide and is additionally divided into frames of 8-time
slots. The global system for mobile communication (GSM) was first known as Groupe
Special Mobile, which is the reason for the acronym. The GSM system comprises mobile
stations, base stations, and intertwining switching systems.
The GSM program enables 8 to 16 audio users to share every radio channel, and every radio
transmission location may have multiple radio channels. Because of its simplicity,
affordability, and accessibility, GSM is presently the most commonly used network
technology in the Internet of Things (IoT).
integral to the GSM network architecture’s central network space. The MSC
supports call switching across cellular phones and other fixed or mobile
managing subscriptions. It provides data for each consumer as well as their last
known position. The HLR is regarded as the most significant database because
membership from one of the operators, they are enlisted in that operator’s HLR.
information necessary for the MSC to service passengers. This includes a short-
term version of most of the data stored in the HLR. The visitor location register
one can use particular mobile equipment on the system. This consists of a list of
every functioning mobile device on the system, with each mobile device
Authentication Center (AuC): The AUC is a unit that offers verification and
encryption factors to ensure the user’s identity and the privacy of every call.
The verification center is a secure file that contains the user’s private key in the
SIM card. The AUC shields network operators from various types of fraud
The Base Transceiver Station (BTS): The BTS is responsible for radio
connection protocols with the MS and contains the cell’s radio transceivers.
area. Each network cell has transceivers and antennas that make up the BTS.
Based on the cell’s consumer density, every BTS includes anywhere from one
to sixteen transceivers.
The Base Station Controller (BSC): The BSC is responsible for managing the
configuration and handovers. The BSC serves as the link seen between mobile
slots. Additionally, the BSC is responsible for intercell handover and transmits
signal.
instance, the mobile changes cells while remaining in the BSC. Here, the BSC
BSC can only handle a restricted number of cells, we may have to move a
phone from one BSC to the other. Here, the handover is managed by the MSC.
Inter-MSC handoff: This occurs when a mobile device moves from one MSC
about the patient’s health and guide hospitals and doctors to continue treatment.
Conveying the obtained health records and transmitting obtained data for