Unit 2
Unit 2
(Autonomous)
Unit II
IoT Protocols
Dr.S.Senthilrani
Professor/ Department of Electronics Engineering
(VLSI Design and Technology)
Velammal College of Engineering and Technology- Madurai
(Autonomous)
ZigBee IP An evolution of the ZigBee protocol stack, ZigBee IP adopts the 6LoWPAN
adaptation layer , IPv6 network layer, RPL routing protocol. In addition, it
offers improvement in IP security.
Most well-known protocol stacks
based on 802.15.4
Protocol Description
Thread Constructed on top of IETF 6LoWPAN /IPv6, Thread is a protocol stack for
a secure and reliable mesh network to connect and control products in
the home.
LoRaWAN
• In recent years, a new set of wireless
technologies known as Low-Power Wide-Area
(LPWA) has received a lot of attention from the
industry and press.
• Particularly well adapted for long-range and
battery-powered endpoints, LPWA technologies
open new business opportunities to both services
providers and enterprises considering IoT
solutions.
• LoRaWAN is an unlicensed-band LPWA
technology.
Standardization and Alliances
• Initially, LoRa was a physical layer, or Layer 1, modulation that
was developed by a French company named Cycleo.
• Later, Cycleo was acquired by Semtech. Optimized for
longrange, two-way communications and low power
consumption, the technology evolved from Layer 1 to a
broader scope through the creation of the LoRa Alliance.
• Semtech LoRa as a Layer 1 PHY modulation technology is
available through multiple chipset vendors.
• To differentiate from the physical layer modulation known as
LoRa, the LoRa Alliance uses the term LoRaWAN to refer to its
architecture and its specifications that describe end-to-end
LoRaWAN communications and protocols.
LoRa WAN Layers
High- Level LoRaWAN MAC Frame
Format
LoRaWAN endpoints are uniquely
addressable through a variety of methods
• An endpoint can have a global end device ID or DevEUI
represented as an IEEE EUI64 address.
• An endpoint can have a global application ID or AppEUI
represented as an IEEE EUI64 address that uniquely
identifies the application provider, such as the owner, of
the end device.
• In a LoRaWAN network, endpoints are also known by their
end device address, known as a DevAddr, a 32-bit address.
• The 7 most significant bits are the network identifier
(NwkID), which identifies the LoRaWAN network.
• The 25 least significant bits are used as the network
address (NwkAddr) to identify the endpoint in the network.
LoRa WAN Architecture
LoRaWAN Security
Constrained Nodes
&
Constrained Networks
Introduction
• In IoT solutions, different classes of devices coexist.
• Depending on its functions in a network, “thing” architecture may
or may not offer similar characteristics compared to a generic PC or
server in an IT environment.
• Another limit is that this network protocol stack on an IoT node
may be required to communicate through an unreliable path
• Even if a full IP stack is available on the node, this causes problems
such as limited or unpredictable throughput and low convergence
when a topology change occurs.
• Finally, power consumption is a key characteristic of constrained
nodes.
• Many IoT devices are battery powered, with lifetime battery
requirements varying from a few months to 10+ years.
Introduction
• This drives the selection of networking technologies since
high-speed ones, such as Ethernet, Wi-Fi, and cellular, are
not (yet) capable of multi-year battery life.
• Current capabilities practically allow less than a year for
these technologies on battery-powered nodes.
• Of course, power consumption is much less of a concern on
nodes that do not require batteries as an energy source.
• The power consumption requirements on battery-powered
nodes impact communication intervals.
• To help extend battery life, one could enable a “low-power”
mode instead of one that is “always on.” Another option is
“always off,” which means communications are enabled
only when needed to send data.
Classification of IoT constrained nodes
• Devices that are very constrained in resources,
may communicate infrequently to transmit a
few bytes, and may have limited security and
management capabilities: This drives the need
for the IP adaptation model, where nodes
communicate through gateways and proxies.
Classification of IoT constrained nodes
• Devices with enough power and capacities to
implement a stripped-down IP stack or non- IP
stack: In this case, you may implement either
an optimized IP stack and directly
communicate with application servers
(adoption model) or go for an IP or non-IP
stack and communicate through gateways and
proxies (adaptation model).
Classification of IoT constrained nodes
• Devices that are similar to generic PCs in
terms of computing and power resources but
have constrained networking capacities, such
as bandwidth: These nodes usually implement
a full IP stack (adoption model), but network
design and application behaviors must cope
with the bandwidth constraints.
Introduction- Constrained network
• In the early years of the Internet, network bandwidth capacity
was restrained due to technical limitations.
• Connections often depended on low-speed modems for
transferring data.
• However, these low-speed connections demonstrated that IP
could run over low bandwidth networks.
• But today, the evolution of networking has seen the
emergence of high-speed infrastructures.
• However, high-speed connections are not usable by some IoT
devices in the last mile.
• The reasons include the implementation of technologies with
low bandwidth, limited distance and bandwidth due to
regulated transmit power, and lack of or limited network
services.
Characteristics of constrained network
• A constrained network can have high latency and a
high potential for packet loss.
• Constrained networks have unique characteristics and
requirements.
• In contrast with typical IP networks, where highly
stable and fast links are available, constrained networks
are limited by low-power, low bandwidth links
(wireless and wired).
• They operate between a few kbps and a few hundred
kbps and may utilize a star, mesh, or combined
network topologies, ensuring proper operations.
6LoWPAN
Introduction
• While the Internet Protocol is key for a
successful Internet of Things, constrained
nodes and constrained networks mandate
optimization at various layers and on multiple
protocols of the IP architecture.
• Some optimizations are already available from
the market or under development by the IETF.
Optimizing IP for IoT Using an
Adaptation Layer
Optimizing IP for IoT Using an
Adaptation Layer
• In the IP architecture, the transport of IP
packets over any given Layer 1 (PHY) and Layer
2 (MAC) protocol must be defined and
documented.
• The model for packaging IP into lower-layer
protocols is often referred to as an adaptation
layer
Comparison of an IoT Protocol Stack
Utilizing 6LoWPAN and an IP Protocol Stack
6LoWPAN Header Stack
• The 6LoWPAN working group published several RFCs, but RFC 4994
is foundational because it defines frame headers for the capabilities
of header compression, fragmentation, and mesh addressing.
• These headers can be stacked in the adaptation layer to keep these
concepts separate while enforcing a structured method for
expressing each capability.
• Depending on the implementation, all, none, or any combination of
these capabilities and their corresponding headers can be enabled.