0% found this document useful (0 votes)
29 views59 pages

IoT Chapter 3

Uploaded by

Priyanka Kengar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views59 pages

IoT Chapter 3

Uploaded by

Priyanka Kengar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

IoT technologies and protocols

NEAR FIELD COMMUNICATION (NFC)

BLUETOOTH

RADIO FREQUENCY IDENTIFICATION (RFID)

CONSTRAINED APPLICATION PROTOCOL (COAP)


Near Field Communication (NFC)

 NFC stands for Near Field Communication. It enables short


range communication between devices.

 At least one transmitting device and another receiving device is


needed to transmit the signal. Many devices can use the NFC
standard and are considered either passive or active .
NFC devices can be classified into 2 types:

1.Passive NFC devices –

These include tags, and other small transmitters which can send information to other NFC devices
without the need for a power source of their own. These devices don’t really process any information
sent from other sources, and can not connect to other passive components. These often take the form
of interactive signs on walls or advertisements.

2.Active NFC devices –

These devices are able to both the things i.e. send and receive data. They
can communicate with each other as well as with passive devices. Smartphones the best example of
active NFC device. Card readers in public transport and touch payment terminals are also good
examples of the technology.
The NFC standard currently has three distinct modes of operation
to determine what sort of information will be exchanged between
devices.

1.The most common used in smartphones is the peer-to-peer mode. Exchange of


various piece of information is allowed between 2 devices. In this mode both
devices switch between active when sending data and passive when receiving.

2.The second mode i.e. read/write mode is a one-way data transmission. The
active device, possibly your smartphone, links up with another device in order to
read information from it. NFC advertisement tags use this mode.

3.The third mode of operation is card emulation. The NFC device can function as a
smart or contactless credit card and make payments or tap into public transport
systems.
Comparisons with Bluetooth –

 Here are several important technological differences between


NFC and Bluetooth but NFC has some significant benefits in
certain circumstances.

 The major advantage of NFC over Bluetooth is that it requires


much less power consumption than Bluetooth. This makes NFC
perfect for passive devices, such as the advertising tags as they
can operate without a major power source.
Bluetooth In IoT

 Bluetooth has become a household name in the Internet of Things


community. It is a serious technology used for IoT applications. Apart
from being the ubiquitous solution for hands-free calling and wireless
transmission technology for audio, Bluetooth technology is leading in
consumer and business IoT.

 Since a device-to-device connection is expected to be fast, seamless,


and wireless in the Internet of Things,
internet of things Bluetooth (Bluetooth IoT) is highly deployed
because of its no-internet function on the one hand and its capability
to create large-scale device networks via Bluetooth mesh
Bluetooth Mesh Networking :

 Bluetooth mesh IoT is a computer mesh networking system


based on Bluetooth Low Energy (BLE) that allows for many-
to-many communication among connected devices over a
Bluetooth radio.

 In a Bluetooth mesh IoT network, every message has a source


and destination address through which devices publish
messages to their destinations, which is a single thing, group
of things, or everything.
RFID (Radio Frequency Identification)

 RFID (radio frequency identification) is a form of


Wieless communication that incorporates the use of
electromagnetic or electrostatic coupling in the radio frequency
portion of the electromagnetic spectrum to uniquely identify an
object, animal or person.
How does RFID work?
 Every RFID system consists of three components: a scanning antenna, a transceiver and a
transponder. When the scanning antenna and transceiver are combined, they are referred to as an
RFID reader or interrogator.

 There are two types of RFID readers -- fixed readers and mobile readers. The RFID reader is a
network-connected device that can be portable or permanently attached. It uses radio waves to
transmit signals that activate the tag. Once activated, the tag sends a wave back to the antenna,
where it is translated into data.

 The transponder is in the RFID tag itself. The read range for RFID tags varies based on factors
including the type of tag, type of reader, RFID frequency and interference in the surrounding
environment or from other RFID tags and readers. Tags that have a stronger power source also
have a longer read range.
There are two main types of RFID tags:

•Active RFID. An active RFID tag has its own power source, often a
battery.

•Passive RFID. A passive RFID tag receives its power from the reading
antenna, whose electromagnetic wave induces a current in the RFID
tag's antenna.
 Smart labels can be printed on-demand using desktop printers, where RFID tags
require more advanced equipment.
Types of RFID systems:

•Low-frequency RFID systems. These range from 30 KHzto 500 KHz,


though the typical frequency is 125 KHz. LF RFID has short transmission
ranges, generally anywhere from a few inches to less than six feet.

•High-frequency RFID system These range from 3 MHzto 30 MHz, with


the typical HF frequency being 13.56 MHz. The standard range is
anywhere from a few inches to several feet.

•UHF RFID systems. These range from 300 MHz to 960 MHz, with the
typical frequency of 433 MHz and can generally be read from 25-plus feet
away.

•Microwave RFID systems. These run at 2.45 Ghzand can be read from
30-plus feet away.
RFID applications:
• pet and livestock tracking
• asset tracking and equipment tracking
• cargo and supply chain logistics
• vehicle tracking
• customer service
• Access Control in security situations
• Shipping
• Healthcare
• Manufacturing
• Retail sales
• tap-and-go credit card payments
Constrained Application Protocol (COAP)

 The constrained application protocol is a client server-based


protocol. With this protocol, the COAP packet can be shared
between different client nodes which are commanded by the
COAP server.

 The server is responsible to share the information depending on


its logic but has not acknowledged it. This is used with the
applications which support the state transfer model .
 CoAP Protocol (Constrained Application Protocol) is a web-based
protocol that has been specifically designed to connect small, semi-
intelligent devices to the Internet of Things (IoT).

 CoAP Protocol works with constrained nodes and constrained


networks, to facilitate the compartmentalized deployment of
machine-to-machine (M2M) solutions comprising of a multitude of
network-enabled devices.

 CoAP Protocol facilitates the rapid networking of hundreds of IoT-


enabled devices, to build a single networked application, such as
could be used for automated manufacturing lines, or a smart
building.
CoAP Protocol Basic Feature :

 The most defining feature of CoAP Protocol is the fact that it


leverages the tried and tested REST model. These enable
developers to make API style calls to GET, PUT, POST and
DELETE data via a URL. This makes CoAP very easy to develop
for.
The Benefits of the CoAP Protocol :

 CoAP is incredibly lightweight. It has been developed to RFC 7252


standards. This means it can be run on devices with very limited
resources. As low as 10k of memory and 100k of application space
is all that a device needs to run CoAP.

 Alongside this small resource footprint comes a comprehensive


security suite. CoAP can use both TCP and UDP to communication
across a network.
Where Can CoAP Protocol Be Used?

 CoAP can also be included as a library during application


development. A C implementation of the CoAP protocol is available
as libcoap. A more in-depth integration can be achieved with products
such as Erbium, a framework for developing applications based on
constrained nodes.

 Many other languages also have CoAP libraries available including


JavaScript, Python, C#, and Ruby. Most of these libraries and
integrations are published as open source, using the Apache 2.0 or
MIT license.
6LoWPAN Protocol :

 6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6


over Low Power Personal Area Network. As the name itself
explains the meaning of this protocol is that this protocol works
on Wireless Personal Area Network i.e., WPAN.

 LoWPAN initially came into existence to overcome the


conventional methodologies that were adapted to transmit
information. But still, it is not so efficient as it only allows for
the smaller devices with very limited processing ability to
establish communication using one of the Internet Protocols,
i.e., IPv6. It has very low cost, short-range, low memory usage,
and low bit rate. For example LED Streetlights.
Basic Requirements of 6LoWPAN:

 The device should be having sleep mode in order to support the battery saving.

 Minimal memory requirement.

 Routing overhead should be lowered.

Features of 6LoWPAN:

 It is used with IEEE 802.15,.4 in the 2.4 GHz band.

 Outdoor range: ~200 m (maximum)

 Data rate: 200kbps (maximum)

 Maximum number of nodes: ~100


Applications of 6LoWPAN:

 It is a wireless sensor network.

 It is used in home-automation,

 It is used in smart agricultural techniques, and industrial


monitoring.
ZigBee Protocol:

 ZigBee is a Personal Area Network task group with low rate task
group 4. It is a technology of home networking. ZigBee is a
technological standard created for controlling and sensing the
network. As we know that ZigBee is the Personal Area network of
task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.

 ZigBee is a standard that addresses the need for very low-cost


implementation of Low power devices with Low data rates for
short-range wireless communications.
Types of ZigBee Devices:

 Zigbee Coordinator Device: It communicates with routers. This


device is used for connecting the devices.

 Zigbee Router: It is used for passing the data between devices.

 Zigbee End Device: It is the device that is going to be controlled.


Zigbee Network Topologies:

 Star Topology (ZigBee Smart Energy): Consists of a coordinator and


several end devices, end devices communicate only with the coordinator.
 Mesh Topology (Self Healing Process): Mesh topology consists of one
coordinator, several routers, and end devices.
 Tree Topology: In this topology, the network consists of a central node
which is a coordinator, several routers, and end devices. the function of
the router is to extend the network coverage.

Zigbee Applications:
1.Home Automation
2.Medical Data Collection
3.Industrial Control Systems
4.meter reading system
5.light control system
Thread
 Thread is a wireless networking protocol using IP data transfer.

 Thread wireless connectivity has been developed specifically to


support the Internet of Things, IoT, and as a result, it incorporates
many features that have not been available in previous standards.

 Thread has been designed for consumer applications and devices in


and around the home, To enable this to be achieved, Thread has been
designed to be set up for easy and secure connections between
hundreds of devices to each other and directly to the cloud using real
Internet Protocols in a low-power, wireless mesh network.
Thread Group
 In order to promote the technology and provide standards to enable
interoperability, an organization called the Thread Group has been set up.

 The Thread Group founding members include: Yale Security, Silicon


Labs, Samsung Electronics, Nest Labs, Freescale Semiconductor, Big Ass
Fans and ARM.

Thread IoT wireless basics


 Thread has been designed to enable IPv6 data to be carried, a facility that
other similar networking technologies cannot currently accommodate.
 Thread IoT technology can also securely connect up to 250 devices in a
wireless mesh network that includes direct Internet and cloud access for
every device.
 In this way, Thread builds on existing standards, while also extending the
capability.
REST (Representational State Transfer)

 REST (Representational State Transfer) is an architectural style for


developing web services.
 REST is popular due to its simplicity and the fact that it builds upon existing
systems and features of the internet's Hypertext Transfer Protocol (HTTP) in
order to achieve its objectives, as opposed to creating new standards,
frameworks and technologies.

 REST is the basis for the most widely used form of API and is designed to be
used over any protocol. However, it typically uses HTTP or COAP to work
with components in a particular IoT device, such as:
 Files
 Objects
 Media
Advantages of Using REST APIs
 Scalability -
REST means that there’s a clear separation between client and server. As a result,
products can be scaled up by a development team without much difficulty.
 Language-independent -
Developers can use any language that uses HTTP to make web-based requests.
This is another reason why REST APIs are so popular with developers. They give
you the power to program using a language you’re comfortable and familiar with
to develop your IoT app.

 Familiarity and Usability -


REST APIs use constructs that are familiar to anyone who has used HTTP – i.e.
the internet. Unless you’re completely off the grid, you’ll have used the internet
before.
Disadvantages of Using REST APIs

 Limited Architecture -
While the simple architecture of REST is a great entry point for budding IoT
developers, those who want to do more or work with REST frequently may
encounter limitations due to its architecture.

 Lack of Security
REST doesn’t impose security, like SOAP APIs for example (more on that
later).
The benefit of this is the REST is able to run on public URLs. However, it’s not
good if you want to set up a confidential data passage between client and
server.
MQTT – Message Queuing Telemetry Transport

 QTT (Message Queuing Telemetry Transport) is a messaging protocol for


restricted low-bandwidth networks and extremely high-latency IoT devices.
Since Message Queuing Telemetry Transport is specialized for low-bandwidth,
high-latency environments, it is an ideal protocol for machine-to-machine
(M2M) communication.

 MQTT works on the publisher / subscriber principle and is operated via a


central broker. This means that the sender and receiver have no direct
connection. The data sources report their data via a publish and all recipients
with interest in certain messages (“marked by the topic”) get the data delivered
because they have registered as subscribers.
How Does MQTT Work?
MQTT architecture
 The connected devices in the MQTT protocol are known as “clients,” which
communicate with a server referred to as the “broker.” The broker handles
the task of data transmission between clients.

 Whenever a client (known as the “publisher”) wants to distribute


information, it will publish to a particular topic, the broker then sends this
information to any clients that have subscribed to that topic (known as
“subscribers”).

 The publisher does not need any data on the number or the locations of
subscribers. In turn, subscribers do not need any data about the publisher.
Any client can be a publisher, subscriber, or both. The clients are typically
not aware of each other, only of the broker that serves as the intermediary.
This setup is popularly known as the “pub/sub model.”
The Benefits of MQTT
 Lightweight code footprint: Devices need only a few lines of code in
order to get up and running with the MQTT protocol.
 Minimized data packets: MQTT is very energy-efficient. This is great if a
device is battery-powered or has little CPU power.
 Speed: MQTT operates in real time, with no delays outside of QoS.
 Ease of implementation: MQTT already has libraries in programming
languages such as Elixir and Python.
 Last will and testament: If a client unexpectedly disconnects, you can set
message instructions to be sent to all subscribers in order to remedy the
situation.
 Retained messages: Each topic can have one retained message that a
client automatically receives when it subscribes (like a pinned post on
social media).
DTLS - DTLS - Datagram Transport Layer Security
Datagram Transport Layer Security
 Datagram Transport Layer Security (DTLS) – DTLS was developed
with TLS as a starting point for applications with an unreliable
transport layer, such as IoT, Video Conferencing, Voice over IP, VPN,
and Massive Multiplayer Online Games. It was standardized in 2006
revised in 2012.

Advantages of DTLS

Handles Unreliable Transport Layers Low Power End-To-End Security


How DTLS Works

 IoT and specialized protocols such as CoAPs often rely on UDP for
communication as the transport layer is unreliable by nature, making
DTLS a great candidate for encryption, thus, eliminating the need for a
TCP/TLS stack.
 Resource consumption can be further optimized by using specialized
cipher suites and pre-shared keys, making DTLS an attractive protocol for
such devices.

 Every DTLS-enabled application involves a number of vital


processing steps:
 Packet IO
 Tracking the state of different connections
 Packet processing which includes the encryption/decryption of packets
LTE for IoT
 Long Term Evolution for the Internet Of Things) The employment of
low-speed and low-power LTE cellular transmission for machine
communications. In 2014, approximately 15% of all machine-to-machine
(M2M) communications was via cellular, mostly 2G. See LTE, LPWA,
802.11af and IoT.

 LTE provides built-in security along with robust and scalable traffic
management capabilities, but the main driver for LTE in the IoT is
economic. Since LTE is significantly more spectrally-efficient than 2G or
3G, transporting data over a 4G LTE network can be done at a much lower
cost per bit.
Benefits of LTE for IoT

 Since many IoT devices are sold and used globally, a key requirement is
having a secure connection to the internet — anytime, anywhere. To ensure
this safe, ubiquitous connectivity, devices may require a cellular connection

 Mobile IoT supports data rates below 1 Mbps and as low as 30 Kbps,
offering IoT device makers the flexibility to address both voice and data
centric applications.
Z-Wave
 Z-Wave is a wireless communication protocol used primarily in
smart home networks, allowing smart devices to connect and exchange
control commands and data with each other.

 With two-way communication through mesh networking and message


acknowledgment, the Z-Wave protocol helps alleviate power issues and
brings low-cost wireless connectivity to home automation, offering a
lower-power alternative to Wi-Fi and a longer-range alternative to
Bluetooth.
How Z-Wave works
 A Z-Wave network consists of internet of things (IoT) devices and a primary
controller, also known as a smart home hub, which is the only device in a Z-
Wave network that is usually connected to the internet. When a Z-Wave hub
receives a command from a smart home application on a user's smartphone,
tablet or computer, it routes the command to its destination device across
networks of up to 232 devices -- including the hub.
 In terms of identification and authorization, each Z-Wave network is
identified by a network ID and each end device is identified with a node ID.
The unique network ID prevents, for example, one Z-Wave-equipped house
from controlling devices in another similarly equipped house.

 To bear the Z-Wave branding, smart home products must become Z-Wave
certified. This involves meeting a number of requirements and, most
importantly, being interoperable with all other Z-Wave-certified devices.
Z-Wave Components :
 Controllers: A controller is a unit that has the ability to compile a routing
table of the network and can calculate routes to the different nodes.

 Slave nodes: Slave nodes are the nodes that do not contain routing tables
but may contain a network map. slave nodes have the ability to receive
frames and respond to them if necessary.

 Home ID: The ID used by z-Wave for the separation of the network from
each other is called Home ID. It is created by the primary controller and is
32-bit in size.
 Node ID: The identification number or an address that is given to every
device during the process of inclusion is called Node ID.

 Routing table: It is used by controllers for calculating routes.


Characteristics of Z-Wave :

 Uses RF for signalling and control


 Frequency : 900 MHz (ISM)
 Range : 30 meter
 Data rates : upto 100 kbps
 FSK Modulation

Applications of Z-Wave :
 Home automation
 Water management using flood sensors
 Fingerprint scanner
LoRaWAN
 The LoRa Alliance describes LoRaWAN as, "a Low Power, Wide Area
(LPWA) networking protocol designed to wirelessly connect battery
operated ‘things’ to the internet in regional, national or global networks,
and targets key Internet of Things (IoT) requirements such as bi-
directional communication, end-to-end security, mobility and localization
services.".
LoRa and LoRaWAN
 He LoRaWAN protocol is a Low Power Wide Area Networking (LPWAN)
communication protocol that functions on LoRa. The LoRaWAN
specification is open so anyone can set up and operate a LoRa network.

 LoRa is a wireless audio frequency technology that operates in a license-


free radio frequency spectrum. LoRa is a physical layer protocol that
uses spread spectrum modulation and supports long-range
communication at the cost of a narrow bandwidth.
Characteristics of LoRaWAN technology

 Long range communication up to 10 miles in line of sight.

 Long battery duration of up to 10 years. For enhanced battery life, you


can operate your devices in class A or class B mode, which requires
increased downlink latency.

 Low cost for devices and maintenance.

 License-free radio spectrum but region-specific regulations apply.


Neul
 Neul specializes in the industrial side of the internet things: the billions of
sensors, instruments and meters that need only send tiny amounts of
information intermittently

 NeulNET is their cloud-based solution that offers an end-to-end pipe


from sensor to analytics by stripping away layer upon layer of
complicated eco-system to simply and economically deliver the Internet
of Everything.
 Neulnet based networks use license exempt UHF frequencies to provide
wide area coverage through trees and foliage into the buildings. They
cover 10 km range larger cells.

 The NeulNet based wireless technology is used as rural broadband and


private network backhaul. All the weightless enabled devices can also be
for internet of things (IoT).
WiMAX
 WiMAX is one of the hottest broadband wireless technologies around today.
WiMAX systems are expected to deliver broadband access services to
residential and enterprise customers in an economical way.

 WiMAX would operate similar to Wi-Fi, but at higher speeds over greater
distances and for a greater number of users. WiMAX has the ability to provide
service even in areas that are difficult for wired infrastructure to reach and the
ability to overcome the physical limitations of traditional wired infrastructure.

 Acronym for Worldwide Interoperability for Microwave Access.


 Based on Wireless MAN technology.
 A wireless technology optimized for the delivery of IP centric services over a
wide area.
 A scalable wireless platform for constructing alternative and complementary
broadband networks.
 WiMAX is defined under IEEE 802.16y standards where y stands for
various WiMAX versions.
 WiMAX is for MAN (Metropolitan Area Network) applications.

 WiMAX guarantees Quality of Service (QoS).

 WiMAX network can reach about 50-90 km.

 WiMAX networks operate on a connection-oriented MAC.

 WiMAX connection can transmit up to 70 Mbps.

 A signal will be sent from the WiMAX base station or tower station to the
WiMAX receiver.
THANK YOU

You might also like