0% found this document useful (0 votes)
13 views

Module 2

Uploaded by

Preethi M S
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Module 2

Uploaded by

Preethi M S
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 72

Smart Objects: The “Things” in IoT

• This chapter provides a detailed analysis of smart objects and their


architecture.
• Sensors, Actuators, and Smart Objects: This section defines
sensors, actuators, and smart objects and describes how they are
the fundamental building blocks of IoT networks.
• Sensor Networks: This section covers the design, drivers for
adoption, and deployment challenges of sensor networks.
Sensors, Actuators, and Smart Objects
Sensors
• A sensor does exactly as its name indicates: It senses. More
specifically, a sensor measures some physical quantity.
• That digital representation is typically passed to another device for
transformation into useful data that can be consumed by intelligent
devices or humans.
• Sensors can measure anything worth measuring.
• They are able to provide an extremely wide spectrum of rich and
diverse measurement data.
• Sensors can be readily embedded in any physical objects that are
easily connected to the Internet by wired or wireless networks.
Different categories of sensors
• Active or passive: Sensors can be categorized based on whether
they produce an energy output and typically require an external
power supply (active) (ex: GPS) or whether they simply receive
energy and typically require no external power supply (passive) (ex:
IR sensor).
• Invasive or non-invasive: Sensors can be categorized based on
whether a sensor is part of the environment it is measuring
(invasive) or external to it (non-invasive).
• Contact or no-contact: Sensors can be categorized based on
whether they require physical contact with what they are measuring
(contact) or not (no contact).
• Absolute or relative: Sensors can be categorized based on whether
they measure on an absolute scale (absolute) or based on a
difference with a fixed or variable reference value (relative).
• Area of application: Sensors can be categorized based on the
specific industry.
• How sensors measure: Sensors can be categorized based on the
physical mechanism used to measure sensory input (for example,
thermoelectric, electrochemical, piezoresistive, optic, electric, fluid
mechanic, photoelastic).
• What sensors measure: Sensors can be categorized based on their
applications or what physical variables they measure.
Actuators
• Actuators, on the others hand, receive some type of control signal
(commonly an electric signal or digital command) that triggers a
physical effect, usually some type of motion, force, and so on.
• Type of motion: Actuators can be classified based on the type of
motion they produce (for example, linear, rotary, one/two/three-
axes).
• Power: Actuators can be classified based on their power output (for
example, high power, low power, micro power)
• Binary or continuous: Actuators can be classified based on the
number of stable-state outputs.
• Area of application: Actuators can be classified based on the
specific industry or vertical where they are used.
• Type of energy: Actuators can be classified based on their energy
type.
Micro-Electro-Mechanical Systems (MEMS)
• Referred to as micro-machines, can integrate and combine electric
and mechanical elements, such as sensors and actuators, on a very
small (millimeter or less) scale.
• Automobiles were among the first to commercially introduce
MEMS into the mass market, with airbag accelerometers.
Smart Objects
• Smart objects are the building blocks of IoT.
• Smart objects transform everyday objects into a network of
intelligent objects that are able to learn from and interact with their
environment in a meaningful way.
• We can call smart objects as smart sensor, smart device, IoT device,
intelligent device, thing, smart thing, intelligent node, intelligent
thing, ubiquitous thing, and intelligent product.
A smart object has following characteristics:
• Processing unit: processing unit for acquiring data, processing and
analyzing sensing information received by the sensor(s),
coordinating control signals to any actuators, and controlling a
variety of functions on the smart object, including the
communication and power systems.
• Sensor(s) and/or actuator(s): A sensor learns and measures its
environment, whereas an actuator is able to produce some change
in the physical world.
• Communication device: The communication unit is responsible for
connecting a smart object with other smart objects and the outside
world.
• Communication devices for smart objects can be either wired or
wireless.
• Power source: Smart objects have components that need to be
powered.
• The power requirements also vary greatly from application to
application.
• Smart objects are limited in power, are deployed for a very long
time, and are not easily accessible.
• This combination, especially when the smart object relies on battery
power, implies that power efficiency, judicious power management,
sleep modes, ultra-low power consumption hardware.
Trends in Smart Objects
• Size is decreasing: Some smart objects are so small the are not even
visible to the naked eye. This reduced size makes smart objects
easier to embed in everyday objects.
• Power consumption is decreasing: The different hardware
components of a smart object continually consume less power. This
is especially true for sensors, many of which are completely passive.
Some battery-powered sensors last 10 or more years without
battery replacement.
• Processing power is increasing: Processors are continually getting
more powerful and smaller. This is a key advancement for smart
objects, as they become increasingly complex and connected.
• Communication capabilities are improving: It’s no big surprise that
wireless speeds are continually increasing, but they are also
increasing in range.
• Communication is being increasingly standardized: There is a
strong push in the industry to develop open standards for IoT
communication protocols.
Sensor Networks
• A sensor/actuator network (SANET), as the name suggests, is a
network of sensors that sense and measure their environment
and/or actuators that act on their environment.
• Smart homes are a type of SANET that display this coordination
between distributed sensors and actuators.
• When a sensor detects a specified temperature, this can trigger an
actuator to take action and heat or cool the home as needed.
The following are some advantages and disadvantages that a
wireless-based solution offers:
Advantages:
• Greater deployment flexibility (especially in extreme environments
or hard-to-reach places)
• Simpler scaling to a large number of nodes
• Lower implementation costs
• Easier long-term maintenance
• Effortless introduction of new sensor/actuator nodes
• Better equipped to handle dynamic/rapid topology changes
Disadvantages:
• Potentially less secure (for example, hijacked
access points)
• Typically lower transmission speeds
• Greater level of impact/influence by environment
Wireless Sensor Networks (WSNs)
• Wireless sensor networks are made up of wirelessly connected
smart objects, which are sometimes referred to as motes.
• The following are some of the most significant limitations of the
smart objects in WSNs:

• Limited processing power


• Limited memory
• Lossy communication
• Limited transmission speeds
• Limited power
Data aggregation in WSN
• Wirelessly connected smart objects generally have one of the
following two communication patterns:
• Event-driven: Transmission of sensory information is triggered only
when a smart object detects a particular event or predetermined
threshold.
• Periodic: Transmission of sensory information occurs only at
periodic intervals.

• For example, in some medical use cases, sensors periodically send


postoperative vitals, such as temperature or blood pressure
readings.
• In other medical use cases, the same blood pressure or
temperature readings are triggered to be sent only when certain
Communication Protocols for Wireless Sensor Networks
• There are literally thousands of different types of sensors and
actuators. WSNs are becoming increasingly heterogeneous, with
more sophisticated interactions.
• WSNs are also evolving from single-purpose networks to more
flexible multipurpose networks that can use specific sensor types for
multiple different applications at any given time.
• Coordinated communication with sophisticated interactions by
constrained devices within such a heterogeneous environment is
quite a challenge.
The various technologies used for connecting sensors can differ
greatly depending on the criteria used to analyze them.
• Range: This section examines the importance of signal
propagation and distance.
• Frequency Bands: This section describes licensed and unlicensed
spectrum, including sub-GHz frequencies.
• Power Consumption: This section discusses the considerations
required for devices connected to a stable power source
compared to those that are battery powered.
• Topology: This section highlights the various layouts that may be
supported for connecting multiple smart objects.
• Constrained Devices: This section details the limitations of certain
smart objects from a connectivity perspective.
• Constrained-Node Networks: This section highlights the
challenges that are often encountered with networks connecting
smart objects.
Range
• what will be the area of coverage for a selected wireless
technology? Should indoor versus outdoor deployments be
differentiated?

• Short range: The classical wired example is a serial cable.


• Wireless shortrange technologies are often considered as an
alternative to a serial cable, supporting tens of meters of maximum
distance between two devices.
• Examples of short-range wireless technologies are IEEE 802.15.1
Bluetooth and IEEE 802.15.7 Visible Light Communications (VLC).
• Medium range: This range is the main category of IoT access
technologies. In the range of tens to hundreds of meters.
• The maximum distance is generally less than 1 mile between two
devices.
• Examples of medium-range wireless technologies include IEEE
802.11 Wi-Fi, IEEE 802.15.4, and 802.15.4g WPAN.
• Long range: Distances greater than 1 mile between two devices
require long-range technologies. Wireless examples are cellular
(2G, 3G, 4G) and some applications of outdoor IEEE 802.11 Wi-Fi
and Low-Power Wide- Area (LPWA) technologies.
Frequency Bands
• International Telecommunication Union (ITU) and the Federal
Communications Commission (FCC) groups define the regulations
and transmission requirements for various frequency bands.
• Focusing on IoT access technologies, the frequency bands are split
between licensed and unlicensed bands.
• Licensed spectrum is generally applicable to IoT long-range access
technologies.
• Licensed spectrum is that users must subscribe to services when
connecting their IoT devices.
• Examples of licensed spectrum commonly used for IoT access are
cellular, WiMAX, and Narrowband IoT (NB-IoT) technologies.
• Unlicensed spectrum for the industrial, scientific, and medical (ISM)
portions of the radio bands.
• Unlicensed spectrum is usually simpler to deploy than licensed
because it does not require a service provider.
• It can suffer from more interference because other devices may be
competing for the same frequency in a specific area.
• The sub-GHz frequency bands allow greater distances between
devices.
• These bands have a better ability than the 2.4 GHz ISM band to
penetrate building infrastructures or go around obstacles.
• Several sub-GHz ranges have been defined in the ISM band. The
most wellknown ranges are centered on 169 MHz, 433 MHz, 868
MHz, and 915 MHz.
Power Consumption
• Powered nodes and battery-powered nodes.
• IoT wireless access technologies must address the needs of low
power consumption and connectivity for battery-powered nodes.
• This has led to the evolution of a new wireless environment known
as Low-Power Wide-Area (LPWA).
Topology
• Three main topology schemes are dominant: star, mesh, and peer-
to-peer.
• For long-range and short-range technologies, a star topology is
prevalent.
• For medium-range technologies, a star, peer-to-peer, or mesh
topology is common.
• indoor Wi-Fi deployments are mostly a set of nodes forming a star
topology around their access points (APs). Meanwhile, outdoor Wi-
Fi may consist of a mesh topology for the backbone of Aps.
Constrained Devices
• Constrained nodes have limited resources that impact their
networking feature set and capabilities.
Constrained-Node Networks
• Some IoT access technologies are more suited to specifically
connect constrained nodes.
• Constrained-node networks are often referred to as low-power and
lossy networks (LLNs).
• Low-power - battery-powered constrained nodes.
• Lossy networks - network performance may suffer from interference
and variability.
Data Rate and Throughput
• The data rates available from IoT access technologies range from
100 bps to tens of megabits per second.
• The actual throughput is less—sometimes much less— than the
data rate.
• Cellular and Wi-Fi, match up well to IoT applications with high
bandwidth requirements.
• Short-range technologies can also provide medium to high data
rates that have enough throughput to connect a few endpoints.
Latency and Determinism
• latency expectations- for wireless networks, where packet loss and
retransmissions due to interference, collisions, and noise are normal
behaviors.
• Latency may range from a few milliseconds to seconds.
Overhead and Payload
• Most LPWA technologies offer small payload sizes.
• small payload sizes - low data rate and time over the air or duty
cycle.
IEEE 802.15.4
• wireless access technology for low-cost and low-data-rate devices
that are powered or run on batteries.
• IEEE 802.15.4 is commonly found in the following types of
deployments:
Home and building automation
Automotive networks
Industrial wireless sensor networks
Interactive toys and remote controls
• Collision Sense Multiple Access/Collision Avoidance (CSMA/CA)
algorithm – avoid collision.
• CSMA/CA is an access method in which a device “listens” to make
sure no other devices are transmitting before starting its own
transmission.
Standardization and Alliances
• defines low-data-rate PHY and MAC layer specifications for wireless
personal area networks (WPAN).
ZigBee
• ZigBee solutions are aimed at smart objects and sensors that have
low bandwidth and low power needs.
• The main areas where ZigBee is the most well-known include
automation for commercial, retail, and home applications and smart
energy.
ZigBee stack
• The ZigBee network and security layer provides mechanisms for
network startup, configuration, routing, and securing
communications.
• The network layer is also responsible for forming the appropriate
topology, which is often a mesh but could be a star or tree as well.
ZigBee IP
Physical Layer
physical layer transmission options were as follows:
• 2.4 GHz, 16 channels, with a data rate of 250 kbps
• 915 MHz, 10 channels, with a data rate of 40 kbps
• 868 MHz, 1 channel, with a data rate of 20 kbps
IEEE 802.15.4-2015 introduced additional PHY communication
options
• OQPSK PHY: quadrature phase shift keying (OQPSK) modulation.
OQPSK is a modulation technique that uses four unique bit values
that are signaled by phase changes.
• BPSK PHY: binary phase-shift keying (BPSK) modulation. BPSK
specifies two unique phase shifts as its data encoding scheme.
• ASK PHY: ASK uses amplitude shifts instead of phase shifts to signal
different bit values.
frame for the 802.15.4 physical layer

• The Preamble field is a 32-bit 4-byte pattern that identifies the start
of the frame and is used to synchronize the data transmission.
• The Start of Frame Delimiter field informs the receiver that frame
contents start immediately after this byte.
• The PHY Header portion of the PHY frame is simply a frame length
value.
MAC Layer
The 802.15.4 MAC layer performs the following
tasks:
• Network beaconing for devices acting as coordinators (New devices
use beacons to join an 802.15.4 network)
• PAN association and disassociation by a device
• Device security
• Reliable link communications between two peer MAC entities
The MAC layer achieves these tasks by using various predefined
frame types.

• Data frame: Handles all transfers of data


• Beacon frame: Used in the transmission of beacons from a PAN
coordinator
• Acknowledgement frame: Confirms the successful reception of a
frame
• MAC command frame: Responsible for control communication
between devices
• The Frame Control field defines attributes such as frame type,
addressing modes, and other control flags.
• The Sequence Number field indicates the sequence identifier for the
frame.
• The Addressing field specifies the Source and Destination PAN
Identifier fields as well as the Source and Destination Address fields.
• The MAC Payload field varies by individual frame type.
• For example, beacon frames have specific fields and payloads
related to beacons, while MAC command frames have different
fields present.
• An FCS is a calculation based on the data in the frame that is used by
the receiving side to confirm the integrity of the data in the frame.
Topology
• IEEE 802.15.4–based networks can be built as star, peer-to-peer, or
mesh topologies.
• Every 802.15.4 PAN should be set up with a unique ID. All the nodes
in the same 802.15.4 network should use the same PAN ID.
• A minimum of one FFD acting as a PAN coordinator is required to
deliver services that allow other devices to associate and form a
cell.
• FFD devices can communicate with any other devices, whereas RFD
devices can communicate only with FFD devices.
Security
• The IEEE 802.15.4 specification uses Advanced Encryption Standard
(AES) with a 128-bit key length as the base encryption algorithm for
securing its data.
• AES is a symmetric key cryptography. (A symmetric key means that
the same key is used for both the encryption and decryption of the
data.)
• AES in 802.15.4 also validates the data that is sent. This is
accomplished by a message integrity code (MIC).
• To enhance security auxiliary Security Header is created after the
Source Address field, by stealing some bytes from the Payload field.
IEEE 802.15.4g and 802.15.4e
• This technology applies to IoT use cases such as the following:
• Public lighting
• Environmental wireless sensors in smart cities
• Electrical vehicle charging stations
• Smart parking meters
• Renewable energy
Physical Layer
• Payload size increased from 127 to 2047 bytes.
• Error protection of CRC from 16 to 32 bits.
• Data rates in bands ranging from 169 MHz to 2.4 GHz.
• Data Is modulated onto the frequency
• Multi-Rate and Multi-Regional Frequency Shift Keying (MR-FSK):
Offers good transmit power efficiency due to the constant envelope
of the transmit signal.
• Multi-Rate and Multi-Regional Orthogonal Frequency Division
Multiplexing (MR-OFDM): Provides higher data rates but may be
too complex for low-cost and low-power devices.
• Multi-Rate and Multi-Regional Offset Quadrature Phase-Shift
Keying (MR-O-QPSK): Shares the same characteristics of the IEEE
802.15.4- 2006 O-QPSK PHY, making multi-mode systems more
cost-effective and easier to design
MAC Layer
• Time-Slotted Channel Hopping (TSCH)
• Channel hopping, also known as frequency hopping, utilizes
different channels for transmission at different times.
• TSCH divides time into fixed time periods, or “time slots,”.
• In a time slot, one packet and its acknowledgement can be
transmitted, increasing network capacity because multiple nodes
can communicate in the same time slot using different channels.
• Information elements:
• Information elements (IEs) allow for the exchange of information at
the MAC layer in an extensible manner, either as header IEs
(standardized) and/or payload IEs (private).
• Enhanced beacons (EBs): EBs extend the flexibility of IEEE
802.15.4 beacons to allow the construction of application-specific
beacon content.
• Enhanced beacon requests (EBRs): EBRs allow the sender to
selectively specify the request of information. Beacon responses are
then limited to what was requested in the EBR.
• Enhanced Acknowledgement: The Enhanced Acknowledgement
frame allows for the integration of a frame counter for the frame
being acknowledged.
IEEE 802.15.4g/e MAC Frame Format

• The Auxiliary Security header provides for the encryption of the


data frame.
• IE field contains one or more information elements that allow for
additional information to be exchanged at the MAC layer.
Security

• The MIC is a unique value that is calculated based on the frame


contents.
1901.2a (wired technology)
• This is a standard for Narrowband Power Line Communication
(NB-PLC).
Technology used in:
• Smart metering: NB-PLC can be used to automate the reading of
utility meters, such as electric, gas, and water meters.
• Distribution automation: NB-PLC can be used for distribution
automation, which involves monitoring and controlling all the
devices in the power grid.
• Public lighting: A common use for NB-PLC is with public lighting—
the lights found in cities and along streets, highways, and public
areas such as parks.
• Electric vehicle charging stations: NB-PLC can be used for electric
vehicle charging stations, where the batteries of electric vehicles
can be recharged.
• Renewable energy: NB-PLC can be used in renewable energy
applications, such as solar, wind power, hydroelectric.
• The first generations of NB-PLC implementations suffered from poor
reliability, low throughput (maximum of 2 kbps), lack of
manageability, and poor interoperability.
• Most recent NB-PLC standards are based on orthogonal frequency-
division multiplexing (OFDM).
1901.2a Physical Layer
• NB-PLC is defined for frequency bands from 3 to 500 kHz.

1901.2a supports the largest set of coding


• Robust modulation (ROBO)
• differential binary phase shift keying (DBPSK)
• differential quadrature phase shift keying (DQPSK)
• differential 8-point phase shift keying (D8PSK)

• The PHY payload size can change dynamically, based on channel


conditions in IEEE 1901.2a.
• If the size of the MAC payload is too large to fit within one PHY
service data unit (PSDU), the MAC payload is partitioned into
smaller segments.
• The segmentation may require the addition of padding bytes to the
last payload segment.
1901.2a MAC Layer

• IEEE 1901.2 has a Segment Control field, This field handles the
segmentation or fragmentation of upper-layer packets with sizes
larger than what can be carried in the MAC protocol data unit
(MPDU).
1901.2a Topology
• Deployment topologies for IEEE 1901.2a are tied to the physical
power lines.
• NB-PLC deployments use mesh topology. Mesh networks offer the
advantage of devices relaying the traffic of other devices.
1901.2a Security
Security capabilities of IEEE 1901.2a:
• Security Enabled bit in the Frame Control field should be set in all
MAC frames carrying segments of an encrypted frame.
• If data encryption is required, it should be done before packet
segmentation.
• On the receiver side, the data decryption is done after packet
reassembly.
• When security is enabled, the MAC payload is composed of the
ciphered payload and the message integrity code (MIC)
IEEE 802.11ah
• IEEE 802.11 is a key IoT wireless access technology, either for
connecting endpoints such as fog computing nodes, highdata- rate
sensors, and audio or video analytics devices or for deploying Wi-Fi
backhaul infrastructures.
• This Wi-Fi lacks sub-GHz support for better signal penetration, low
power for battery-powered nodes.
• For these reasons the IEEE 802.11ah has been launched.
Three main use cases are identified for IEEE 802.11ah:
• Sensors and meters covering a smart grid: Meter to pole,
environmental/agricultural monitoring, industrial process sensors,
indoor healthcare system and fitness sensors, home and building
automation sensors.
• Backhaul aggregation of industrial sensors and meter data:
Potentially connecting IEEE 802.15.4g sub networks.
• Extended range Wi-Fi: For outdoor extended-range hotspot or
cellular traffic offloading.
IEEE 802.11ah Physical Layer
• Various countries and regions use the following bands for IEEE
802.11ah: 868–868.6 MHz for EMEAR, 902–928 MHz and associated
subsets for North America and Asia-Pacific regions, and 314–316
MHz, 430–434 MHz, 470–510 MHz, and 779–787 MHz for China.
• IEEE 802.11ah uses channels of 2, 4, 8, or 16 MHz.
• IEEE 802.11ah uses one-tenth of the IEEE 802.11ac channel speed.
IEEE 802.11ah MAC Layer
• Enhancements and features specified by IEEE 802.11ah for the MAC
layer include the following:
• Number of devices: Has been scaled up to 8192 per access point.
• MAC header: Has been shortened to allow more efficient
communication.
• Null data packet (NDP) support: Is extended to cover several
control and management frames.
• Restricted access window (RAW): Is a control algorithm that avoids
simultaneous transmissions.
• Target wake time (TWT): Reduces energy consumption by
permitting an access point to define times when a device can
access the network.
• Speed frame exchange: Enables an AP and endpoint to exchange
frames during a reserved transmit opportunity (TXOP).
IEEE 802.11ah Topology
• IEEE 802.11ah is deployed as a star topology, it includes a simple
hops relay operation to extend its range.
• This relay operation can be combined with a higher transmission
rate or modulation and coding scheme (MCS).
• This means that a higher transmit rate is used by relay devices
talking directly to the access point.
• Sectorization is a technique that involves partitioning the coverage
area into several sectors.
LoRa WAN (Long Range WAN) Physical Layer
• LoRa modulation is based on chirp spread spectrum modulation,
which trades a lower data rate for receiver sensitivity to significantly
increase the communication distance.
• LoRa WAN use of the main unlicensed sub-GHz frequency bands of
433 MHz, 779–787 MHz, 863–870 MHz, and 902– 928 MHz.
• The data rate in LoRaWAN varies depending on the frequency bands
and adaptive data rate (ADR).
• ADR is an algorithm that manages the data rate and radio signal for
each endpoint.
• The ADR algorithm ensures that packets are delivered at the best
data rate possible.
• Endpoints close to the gateways with good signal values transmit
with the highest data rate, which enables a shorter transmission
time over the wireless network, and the lowest transmit power.
LoRa WAN MAC Layer
• The LoRaWAN specification documents three classes of LoRaWAN
devices:
• Class A: This class is the default implementation. Optimized for
battery powered nodes, it allows bidirectional communications.
• Class B :A Class B node or endpoint should get additional receive
windows compared to Class A, but gateways must be synchronized
through a beaconing process.
• Class C: This class is particularly adapted for powered nodes. This
classification enables a node to be continuously listening by keeping
its receive window open when not transmitting.
• LoRaWAN endpoints are uniquely addressable through a variety of
methods, including the following:
• An endpoint can have a global end device ID represented as an IEEE
EUI-64 address.
• An endpoint can have a global application ID represented as an IEEE
EUI-64 address that uniquely identifies the application provider.
• In a LoRaWAN network, endpoints are also known by their end
device address, known as a DevAddr, a 32-bit address.
LoRa WAN Topology
LoRa WAN Security
• Implemented two layers of security, protecting communications
and data privacy across the network.
• The first layer, called “network security” applied at the MAC layer,
guarantees the authentication of the endpoints.
• The second layer is an application session key (AppSKey), which
performs encryption and decryption functions between the
endpoint and its application server.
NB-IoT and Other LTE Variations
• NB-IoT specifically addresses the requirements of a massive number
of low-throughput devices, low device power consumption,
improved indoor coverage, and optimized network architecture.
LTE Cat 0
• Characteristics
• Power saving mode (PSM): This new device status minimizes energy
consumption.
• PSM is defined as being similar to “powered off” mode, but the
device stays registered with the network.
• Half-duplex mode: This mode reduces the cost and complexity of a
device’s implementation.
LTE-M
• Lower receiver bandwidth: Bandwidth has been lowered to 1.4
MHz versus the usual 20 MHz. This further simplifies the LTE
endpoint.
• Lower data rate: Data is around 200 kbps for LTE-M, compared to 1
Mbps for Cat 0.
• Half-duplex mode: Just as with Cat 0, LTE-M offers a half-duplex
mode that decreases node complexity and cost.
• Enhanced discontinuous reception (eDRX): This capability increases
from seconds to minutes the amount of time an endpoint can
“sleep” between paging cycles.
NB-IoT
• Three modes of operation are applicable to NB-IoT:
• Standalone: A GSM carrier is used as an NB-IoT carrier, enabling
reuse of 900 MHz or 1800 MHz.
• In-band: Part of an LTE carrier frequency band is allocated for use
as an NB-IoT frequency. The service provider typically makes this
allocation, and IoT devices are configured accordingly.
• Guard band: An NB-IoT carrier is between the LTE or WCDMA
bands.

You might also like