IoT Chapter 3
IoT Chapter 3
BLUETOOTH
These include tags, and other small transmitters which can send information to other NFC devices
without the need for a power source of their own. These devices don’t really process any information
sent from other sources, and can not connect to other passive components. These often take the form
of interactive signs on walls or advertisements.
These devices are able to both the things i.e. send and receive data. They
can communicate with each other as well as with passive devices. Smartphones the best example of
active NFC device. Card readers in public transport and touch payment terminals are also good
examples of the technology.
The NFC standard currently has three distinct modes of operation
to determine what sort of information will be exchanged between
devices.
2.The second mode i.e. read/write mode is a one-way data transmission. The
active device, possibly your smartphone, links up with another device in order to
read information from it. NFC advertisement tags use this mode.
3.The third mode of operation is card emulation. The NFC device can function as a
smart or contactless credit card and make payments or tap into public transport
systems.
Comparisons with Bluetooth –
There are two types of RFID readers -- fixed readers and mobile readers. The RFID reader is a
network-connected device that can be portable or permanently attached. It uses radio waves to
transmit signals that activate the tag. Once activated, the tag sends a wave back to the antenna,
where it is translated into data.
The transponder is in the RFID tag itself. The read range for RFID tags varies based on factors
including the type of tag, type of reader, RFID frequency and interference in the surrounding
environment or from other RFID tags and readers. Tags that have a stronger power source also
have a longer read range.
There are two main types of RFID tags:
•Active RFID. An active RFID tag has its own power source, often a
battery.
•Passive RFID. A passive RFID tag receives its power from the reading
antenna, whose electromagnetic wave induces a current in the RFID
tag's antenna.
Smart labels can be printed on-demand using desktop printers, where RFID tags
require more advanced equipment.
Types of RFID systems:
•UHF RFID systems. These range from 300 MHz to 960 MHz, with the
typical frequency of 433 MHz and can generally be read from 25-plus feet
away.
•Microwave RFID systems. These run at 2.45 Ghzand can be read from
30-plus feet away.
RFID applications:
• pet and livestock tracking
• asset tracking and equipment tracking
• cargo and supply chain logistics
• vehicle tracking
• customer service
• Access Control in security situations
• Shipping
• Healthcare
• Manufacturing
• Retail sales
• tap-and-go credit card payments
Constrained Application Protocol (COAP)
The device should be having sleep mode in order to support the battery saving.
Features of 6LoWPAN:
It is used in home-automation,
ZigBee is a Personal Area Network task group with low rate task
group 4. It is a technology of home networking. ZigBee is a
technological standard created for controlling and sensing the
network. As we know that ZigBee is the Personal Area network of
task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.
Zigbee Applications:
1.Home Automation
2.Medical Data Collection
3.Industrial Control Systems
4.meter reading system
5.light control system
Thread
Thread is a wireless networking protocol using IP data transfer.
REST is the basis for the most widely used form of API and is designed to be
used over any protocol. However, it typically uses HTTP or COAP to work
with components in a particular IoT device, such as:
Files
Objects
Media
Advantages of Using REST APIs
Scalability -
REST means that there’s a clear separation between client and server. As a result,
products can be scaled up by a development team without much difficulty.
Language-independent -
Developers can use any language that uses HTTP to make web-based requests.
This is another reason why REST APIs are so popular with developers. They give
you the power to program using a language you’re comfortable and familiar with
to develop your IoT app.
Limited Architecture -
While the simple architecture of REST is a great entry point for budding IoT
developers, those who want to do more or work with REST frequently may
encounter limitations due to its architecture.
Lack of Security
REST doesn’t impose security, like SOAP APIs for example (more on that
later).
The benefit of this is the REST is able to run on public URLs. However, it’s not
good if you want to set up a confidential data passage between client and
server.
MQTT – Message Queuing Telemetry Transport
The publisher does not need any data on the number or the locations of
subscribers. In turn, subscribers do not need any data about the publisher.
Any client can be a publisher, subscriber, or both. The clients are typically
not aware of each other, only of the broker that serves as the intermediary.
This setup is popularly known as the “pub/sub model.”
The Benefits of MQTT
Lightweight code footprint: Devices need only a few lines of code in
order to get up and running with the MQTT protocol.
Minimized data packets: MQTT is very energy-efficient. This is great if a
device is battery-powered or has little CPU power.
Speed: MQTT operates in real time, with no delays outside of QoS.
Ease of implementation: MQTT already has libraries in programming
languages such as Elixir and Python.
Last will and testament: If a client unexpectedly disconnects, you can set
message instructions to be sent to all subscribers in order to remedy the
situation.
Retained messages: Each topic can have one retained message that a
client automatically receives when it subscribes (like a pinned post on
social media).
DTLS - DTLS - Datagram Transport Layer Security
Datagram Transport Layer Security
Datagram Transport Layer Security (DTLS) – DTLS was developed
with TLS as a starting point for applications with an unreliable
transport layer, such as IoT, Video Conferencing, Voice over IP, VPN,
and Massive Multiplayer Online Games. It was standardized in 2006
revised in 2012.
Advantages of DTLS
IoT and specialized protocols such as CoAPs often rely on UDP for
communication as the transport layer is unreliable by nature, making
DTLS a great candidate for encryption, thus, eliminating the need for a
TCP/TLS stack.
Resource consumption can be further optimized by using specialized
cipher suites and pre-shared keys, making DTLS an attractive protocol for
such devices.
LTE provides built-in security along with robust and scalable traffic
management capabilities, but the main driver for LTE in the IoT is
economic. Since LTE is significantly more spectrally-efficient than 2G or
3G, transporting data over a 4G LTE network can be done at a much lower
cost per bit.
Benefits of LTE for IoT
Since many IoT devices are sold and used globally, a key requirement is
having a secure connection to the internet — anytime, anywhere. To ensure
this safe, ubiquitous connectivity, devices may require a cellular connection
Mobile IoT supports data rates below 1 Mbps and as low as 30 Kbps,
offering IoT device makers the flexibility to address both voice and data
centric applications.
Z-Wave
Z-Wave is a wireless communication protocol used primarily in
smart home networks, allowing smart devices to connect and exchange
control commands and data with each other.
To bear the Z-Wave branding, smart home products must become Z-Wave
certified. This involves meeting a number of requirements and, most
importantly, being interoperable with all other Z-Wave-certified devices.
Z-Wave Components :
Controllers: A controller is a unit that has the ability to compile a routing
table of the network and can calculate routes to the different nodes.
Slave nodes: Slave nodes are the nodes that do not contain routing tables
but may contain a network map. slave nodes have the ability to receive
frames and respond to them if necessary.
Home ID: The ID used by z-Wave for the separation of the network from
each other is called Home ID. It is created by the primary controller and is
32-bit in size.
Node ID: The identification number or an address that is given to every
device during the process of inclusion is called Node ID.
Applications of Z-Wave :
Home automation
Water management using flood sensors
Fingerprint scanner
LoRaWAN
The LoRa Alliance describes LoRaWAN as, "a Low Power, Wide Area
(LPWA) networking protocol designed to wirelessly connect battery
operated ‘things’ to the internet in regional, national or global networks,
and targets key Internet of Things (IoT) requirements such as bi-
directional communication, end-to-end security, mobility and localization
services.".
LoRa and LoRaWAN
He LoRaWAN protocol is a Low Power Wide Area Networking (LPWAN)
communication protocol that functions on LoRa. The LoRaWAN
specification is open so anyone can set up and operate a LoRa network.
WiMAX would operate similar to Wi-Fi, but at higher speeds over greater
distances and for a greater number of users. WiMAX has the ability to provide
service even in areas that are difficult for wired infrastructure to reach and the
ability to overcome the physical limitations of traditional wired infrastructure.
A signal will be sent from the WiMAX base station or tower station to the
WiMAX receiver.
THANK YOU