Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
41 views

Internet of Things - Architecture and Protocols - Unit 2

Internet of Things - Architecture and Protocols - ANU Guntur - UNIT 2

Uploaded by

Prudhvi
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Internet of Things - Architecture and Protocols - Unit 2

Internet of Things - Architecture and Protocols - ANU Guntur - UNIT 2

Uploaded by

Prudhvi
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 57

UNIT 2

IOT ARCHITECTURE AND PROTOCOLS

PRUDHVI KIRAN P
Assistant Professor, CSE - IoT Dept.
R. V. R. & J. C. College of Engineering
UNIT - 2 [ 12 Periods ]
IoT Connectivity Technologies (PART 2):
1. LoRa - Introduction, Physical Layer, MAC Layer and Topology, Protocol Stack
2. Thread
3. ISA100.11A
4. Wireless HART
5. RFID
6. NFC
7. DASH7
8. Weightless
9. NB-IoT
10. Wi-Fi
11. Bluetooth

SUBJECT CODE - CO 224


CLASS DETAILS - IoT IV SEM - MARCH 2023
FACULTY DETAILS - PRUDHVI KIRAN P, Asst. Prof., CSE (IoT), RVR&JC College of Engineering
QUESTION BANK - UNIT 2 [Assignment Questions - 2, 3, 6]
1. Explain LoRa protocol in Detail. Draw and explain the protocol stack of LoRa.
2. Explain Thread and NB - IoT protocols with relevant block diagrams. What are their applications
in IOT.
3. Explain ISA100.11A and Wireless HART protocols with relevant block diagrams. What are their
applications in IOT.
4. Explain RFID and NFC protocol with relevant block diagram. What are their applications in IOT.
5. Explain DASH7 and Weightless protocols with relevant block diagrams. What are their
applications in IOT.
6. Explain about Wi-Fi in detail with relevant block diagram. What are the unique competencies
and various specialized topologies IOT supported Wi-Fi topologies that uniquely position for
IoT?
7. Explain about Bluetooth in detail with relevant block diagram. What are the various available
Bluetooth protocols and how they support IOT.

END
2.1 LoRa - Introduction
 LoRa (short notation for long range) is a wireless modulation technique, which encodes
information on radio waves; similar to the way dolphins and bats communicate. LoRa supports up
to five kilometers in urban areas, and up to 15 kilometers or more in rural areas (line of sight).
 LoRa end devices are optimized to operate in low power mode and can last up to 10 years on a
single coin cell battery.
 LoRa is ideal for applications that transmit small chunks of data with low bit rates which involves
sensors and actuators that operate in low power mode.
 LoRa modulated transmission is robust against disturbances and can provide deep indoor
coverage (easily cover multi floor buildings.).
 LoRa can be operated on the license free bands, for example, 915 MHz, 868 MHz, and 433 MHz
and also be operated on paid 2.4 GHz to achieve higher data rates. AES-128 encryption is used to
ensures secure communication between the end device and the application server.
 In LoRa, data can be transmitted at a longer range compared to technologies like Wi-Fi,
Bluetooth, ZigBee, & Z-Wave.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

Paid - 2.4 GHz


2015 LoRa Alliance Indoor & Outdoor <=15KM Star, Star of Stars
Free - 915, 860, 433
 LoRaWAN is a Media Access Control (MAC) layer protocol built on top of LoRa modulation. It is a
software layer which defines how devices use the LoRa hardware. This LoRaWAN protocol is
developed and maintained by the LoRa Alliance.
 The LoRa Alliance is an open, non-profit association established in 2015 with few members and
today, the LoRa Alliance has over 500 members around the globe. The first LoRaWAN specification
1.0 was released in 2015 and the latest 1.0.4 was released in 2020.
 The LoRa Alliance provides LoRaWAN certification for end devices. Certified end devices provide
users with confidence that the end device is reliable and compliant with the LoRaWAN
specification. Once certified, the end device manufacturer can use the LoRaWAN Certified mark
with the product.
 Firmware (applications and the LoRaWAN stack) updates for these end devices can be done over
air remotely, for a single end device or group of end devices. And these LoRaWAN end devices are
fully capable of roaming, i.e. can perform seamless handovers from one network to another.
 It is easy to deploy public and private LoRaWAN networks using the same hardware and
software. LoRaWAN's high capacity network servers seamlessly handle millions of messages
from thousands of gateways.
 LoRa gateways connect devices within the Internet of Things to one another and to the cloud,
translating communication between the devices and filtering data into useful information.
LoRa - Topology
 The LoRa network was built according to the "star" topology, in which gateway is connected to
multiple end devices. The advantage of using this topology is to extend the battery life and offload
the network, where nodes do not need to receive and forward data from other nodes, as in Mesh
topology.
 LoRa network architecture can also be implemented as a star-of-stars topology, in which a central
network server and end-devices are connected through the multiple gateways/stars.

LoRa STAR OF STAR TOPOLOGY


LoRaWAN
Gateway
LoRa STAR TOPOLOGY

LoRaWAN
Gateway

LoRaWAN
LoRaWAN
Central Network Server
End Device

LoRaWAN
End Device

*connecting lines in topology represent wireless connectivity


LoRa - Protocol Stack

MEDIUM
ACCESS
CONTROL LAYER
(MAC)

PHYSICAL
LAYER
(PHY)
RADIO FREQUENCY LAYER

 Apart of Application Layer at user level, LoRa Protocol Stack can be viewed as two parts, LoRa and
LoRaWAN.
 LoRa is the physical (PHY) layer, i.e., the wireless modulation used to create the long-range
communication link. LoRaWAN is the (MAC) Layer ,the open network protocol, that delivers
secure bi-directional communication, mobility, and localization services standardized and
maintained by the LoRa Alliance.
Physical Layer (PHY) - LoRa
 LoRa - PHY Layer is referred as a wireless modulation technique, mentioned as LoRa Modulation
in the protocol stack, derived from Chirp Spread Spectrum (CSS) technology. It encodes
information on radio waves using chirp pulses - similar to the way dolphins and bats
communicate. LoRa modulated transmission is robust against disturbances and can be received
across great distances.
 PHY offers services to upper layers above it i.e. MAC layer and Application layer, through LoRa
Modulation.
 Using LoRa Modulation, PHY Layer passes physical layer frame to radio frequency layer for up
conversion to radio frequency as per regional ISM band specified to region such as US, EU,
Australia and so on. Example frequency bands; EU 868, EU 433, US 915, AS 430.
 PHY uses Forward Error Correction (FEC) to help in error correction. And it adds preamble to
physical layer frame which is used in time/frequency synchronization at the receiver. PHY also
uses Cyclic Redundancy Check (CRC) technique to help in error detection of the PHY frame
carrying MAC payload.
 LoRa is the silicon (for LoRa devices) developed by Semtech, and LoRaWAN, managed by LoRa
Alliance, is a standard for interoperability of LoRa devices. LoRaWAN - MAC layer is a ecosystem
through which, most IoT use cases can be solved and on the other hand LoRa - PHY layer defines
the physical and electrical characteristics of this ecosystem.
Medium Access Control Layer (MAC) - LoRaWAN
 While LoRa/(PHY) is the underlying physical part, LoRaWAN/(MAC) is the network on which LoRa
operates. LoRaWAN defines a set of rules and software that ensures data arrives with an
acknowledgement and does not have duplicate packets. It is a network architecture that is
deployed in a star topology and so the communication between the end device and gateway is
bidirectional.
 LoRaWAN is a Media Access Control (MAC) layer protocol built on top of LoRa modulation. It is a
software layer which defines how devices use the LoRa hardware.
 MAC layer functionality is defined with three options of LoRa devices: Class A, Class B, and Class
C. While all devices can send a message up to the gateway at any time (uplink), the device's class
determines when it can receive a message (downlink).
UPLINK

END DEVICE GATEWAY

DOWNLINK
CLASS DESCRIPTION COMMENT

Class A devices allow for bi-directional communications, where each device's uplink
"Talk Before transmission is followed by two short downlink receive windows. These devices wake
Class A Listening" up and transmit when a change in environment is sensed or other event is triggered.
Following the two receiving windows, Class A devices go back to sleep until the another
following uplink transmission.

In addition to Class A random receive windows, Class B devices also open extra receive
"Listen at windows at scheduled times. The end-device opens a receive window after it receives a
Class B Specific time-synchronized beacon from the gateway. Timed slots allow the server to talk to a
Times" specific node (unicast transmission) or multiple nodes simultaneously (multicast
transmission) at a specific time.

The end-device can receive a message at nearly any time. Class C receive windows are
Class C "Listen only closed when transmitting. This means they require more power to operate than
Continuously" Class A or Class B, but they offer the lowest latency for server to end-device
communication.
CLASS A

CLASS B

CLASS C
 Class A is battery-efficient, but requires the end device to transmit before downlink data can be
sent. Class B is the ideal solution for applications which require low latency communication
with battery powered devices. Class C is the simplest and is ideal for externally-powered
devices (for example, a smart outlet).
 For battery efficiency, Class B and Class C may be combined with Class A operation. For
example, the device may normally operate in Class A to send and receive low-priority unicast
traffic, and only switch to Class B or Class C only during business hours to receive time-critical
downlinks or requests. It is up to the application developer to decide on the best way to utilize
each LoRaWAN Class, balancing battery consumption against traffic latency requirements.
LoRa - IoT Applications
1. Vaccine Cold Chain Monitoring - LORAWAN sensors are used to ensure vaccines are kept at
appropriate temperatures in transit.
2. Animal Conservation - Tracking sensors manage endangered species data.
3. Dementia Patients - Wristband sensors provide fall detection and medication tracking.
4. Water Conservation - Identification and faster repair of leaks in a city’s water network.
5. Food Safety - Temperature monitoring ensures food quality maintenance.
6. Smart Waste Bins - Waste bin level alerts sent to staff optimize the pickup schedule.
7. Airport Tracking - GPS free tracking systems for vehicles, personnel, and luggage.
2.2 Thread
 Thread is a low-power and low-latency wireless mesh networking protocol for Home
environment built using open and proven standards, IP Standards. Thread solves the
complexities of the IoT, addressing challenges such as interoperability, range, security, energy,
and reliability. Thread networks have no single point of failure and include the ability to self-heal.
 The Internet runs on IP. From phones, to routers, to connections across the globe, IP is how
devices communicate directly with each other, regardless of what connectivity technologies they
use (i.e. Ethernet, Wi-Fi, 5G and LTE). Thread brings the Internet to the Internet of Things by
using this Internet’s proven, open standards, IP to create an Internet Protocol version 6 (IPv6)
based mesh network.
 Thread devices seamlessly integrate with larger IP networks and don’t need proprietary
gateways or translators. This reduces infrastructure investment and complexity, removes
potential points of failure and reduces maintenance burdens.
 With Thread, developers can bring their apps, devices, systems and services to market faster
because they’re using the same rich set of tools available for the Internet.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

2014 Thread Group Home <=100 Feet 2.4 GHz Mesh


 Thread came into existence in 2014, when the Thread Group was formed. It now has big
organizations like Google, Samsung, Qualcomm, and ARM to design and develop the Thread
protocol. Thread is an open standard that is not tied to a specific manufacturer, which minimizes
the risk of incompatibilities.
 Thread uses IEEE 802.15.4 radio technology on the 2.4 GHz spectrum, which can be deployed
worldwide. This enables large scale production and ease of installation, as the same devices and
network technologies can be used in all regions.
Thread - Network Normal
End devices
A Thread Border Router Coordinator
connects a Thread network to devices
other IP-based networks, such
as Wi-Fi or Ethernet. A Thread
network requires a Border
Router to connect to other
networks. A Thread Border
Router minimally supports
the following functions:
Bidirectional IP connectivity
between Thread and
Wi-Fi/Ethernet networks.
Thread Group Certification
 Thread Group Certification provides an official,
independent proof-point of the product's functional
conformance to the thread specification and
interoperability performance with market-leading Thread
reference implementations.
 Thread group certified products will have license to display a Thread Group certified product logo
(Thread Certified Component or Built on Thread) on the product / packaging. Logo varies based on
the functionality of the product.
 Thread group certified products will be listed in Thread Group website's certified product listing
and also showcased at product demonstrations at Thread Group and industry events.
Thread - IoT Applications
1. Smart home sensors, like Door & Window controls, Room air quality monitor, Water leak sensor,
Weather sensor, Smart lighting sensors enabling Smart Light Switches and Smart Dimmer.
2. Smart home locking system - Schedule access codes, monitor lock activity.
3. Smart irrigation system - Home gardens and patio plants.
4. Autopilot plugs - Controlling appliances with a simple tap on mobile phone or by asking Siri and
we can see how much power they’re using.
OFFICIAL THREAD PRODUCT LISTING - https://www.threadgroup.org/What-is-Thread/Thread-Benefits#certifiedproducts
2.3 ISA 100.11A
 ISA100.11a is a wireless networking technology standard developed by the International
Society of Automation (ISA). The official description of this protocol is "Wireless Systems for
Industrial Automation, i.e. this protocol is designed and used for the purpose of Industrial
Automation for Process Control and related Applications. ISA100.11a Uses mesh/star topology
for communication.
 The ISA100 committee is part of ISA and was formed in 2005 to establish standards and related
information that will define procedures for implementing wireless systems in the automation and
control environment with a focus on the field level (industrial). In 2009 ISA officially released
ISA100.11a.
 ISA100.11a use the IEEE 802.15.4 radio standard referencing the 2.4 GHz ISM (industrial,
scientific, and medical) frequency band for global deployment.
 Various solutions exist in the market that are focused on application of wireless networks in
Industrial process automation; ISA-100.11a and WirelessHART are two of the most important
standards available.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY
ISA 100
2009 Industry <=600 Meters 2.4 GHz Star, Mesh
Committee
ISA100.11a - Network
 As shown in image, ISA100.11 a
consists of field devices and
backbone devices. Field devices
include non routing I/O devices,
routing I/O devices & handheld
devices.
 Routing enabled I/O Devices will work
as routers and in some cases these
can also be worked as I/O Devices.
Non - Routing I/O Devices only do I/O
but not routing. Hand held devices
can be connected to any field device
to monitor the status.
 Backbone devices include backbone
Routing Enabled I/O Device Routing Enabled I/O Device
router, Gateway, System Manager will help in overall data
and Security Manager, which are Non - Routing I/O Device transmission in MESH
connected to Plant Network (Wired Handheld Devices topology style.
PC/Central Server).
ISA100.11a - IoT Applications
ISA100.11a wireless technology is employed in wide variety of industrial applications as mentioned
below:
1. Health monitoring of machines
2. Gas Detection
3. Monitoring of well heads
4. Monitoring of tank levels
5. Fuel tank gauging
6. Steam trap monitoring
7. Monitoring of leaks
2.4 Wireless HART
 WirelessHART was the first standard developed for wireless communication for Industrial
process control. Officially presented by the HART Communication Foundation in September,
2007, it adds wireless communication capability to the HART protocol, and it is compatible with
existing HART devices.
 HART (Highway Addressable Remote Transducer) Protocol is the global standard for sending and
receiving digital information across analogue wires between smart devices and host. The host
can be a PC-based asset management system or a Handheld device and the smart device is
typically a field measurement device such as pressure, level, temperature, flow or other
transmitters.
 The HART Protocol is a request-response communication protocol which means that during
normal operation, each communication is initiated by a request (or command) from the host
communication device, using HART commands.
 HART protocol is very popular; above 30 million devices across the globe are powered with the
HART protocol. Wireless HART adds wireless capabilities to HART technology while maintaining
compatibility with existing HART devices, commands, and tools.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY
2007 HART CF Industry <=750 Feet 2.4 GHz Star, Mesh
 WirelessHART use the IEEE 802.15.4 radio standard referencing the 2.4 GHz ISM (industrial,
scientific, and medical) frequency band for global deployment.
 Wireless HART using mesh networking technology. Each device in a mesh network can serve as
a router for messages from other devices. In other words, a device doesn't have to communicate
directly to a gateway, but just forward its message to the next closest device.
WirelessHART - Network
Each WirelessHART network includes three
main elements:
1. Wireless Field Devices connected to process
or plant equipment. This device could be a
device with WirelessHART built in or an
existing installed HART-enabled device with
a WirelessHART adapter attached to it.
2. Gateways enable communication between
these devices and host applications
connected to a high-speed backbone or
other existing plant communications
network.
3. Network Manager is responsible for
configuring the network, scheduling
communications between devices,
managing message routes, and monitoring
network health. The Network Manager
can be integrated into the gateway, host
application, or process automation
controller.
Gateway connects to host system, WirelessHART
instrument do it's measurement task, WirelessHART
adapter connects wired instruments to WirelessHART. Three Main Elements of WirelessHART Network

 WirelessHART network’s interoperability is a brilliant factor that allows you to have


WirelessHART products from various brands in the same network.
 WirelessHART combines frequency-hopping spread spectrum (FHSS) and direct-sequence spread
spectrum (DSSS) to ensure reliability and security.
 By adjusting communication paths (Monitors paths of degradation and adjusts it, Finding
alternate paths around obstructions) for optimal performance, WirelessHART can be seen as a
Self-Healing Network.
FINDING ALTERNATE PATHS AROUND OBSTRUCTIONS

ISA100.11a - IoT Applications


HART Communication is the global standard for the process automation industry. An estimated 80%-
90% of all industrial measurement and control devices shipped each year are HART-enabled. Users
around the world get valuable process and diagnostic information from their systems to enable them
to avoid unplanned shutdowns, improve plant reliability, lower maintenance cost and diagnose
potential device problems from anywhere within their Industry. Various applications include;
1. Mass flow Meters
2. Density Meters
3. Temperature Meters
4. Device Configuration and Maintenance
5. Remote Indicators
2.5 RFID
 Radio Frequency Identification (RFID) refers to a wireless system comprised of two components:
tags and readers. The reader is a device that has one or more antennas that emit radio waves
and receive signals back from the RFID tag, this process is called Inductive Coupling.
 RFID tags are made up of an integrated circuit (IC) and an antenna. There are two main types of
RFID tags: Active RFID - An active RFID tag has its own power source, often a battery. Passive
RFID - A passive RFID tag receives its power from the reading antenna (reader’s), whose
electromagnetic wave induces a current in the RFID tag's antenna.
 Low-power, embedded non-volatile memory in RFID tag plays an important role in every RFID
system. RFID tags typically hold less than 2,000 KB of data, including a unique identifier/serial
number. Tags can be read-only or read-write, where data can be added by the reader or existing
data overwritten.
 RFID is one of the most important technological innovations, used in manufacturing, inventory
control, warehousing, distribution, logistics, automatic object tracking and supply chain
management; allowing tracking or matching of an item or individual.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

1970s - Hybrid <=100 Meters 120 KHz - 5.8 MHz Point to Point
 Although commercial uses for it were first developed in the 1970s, it has become more
universally accessible in recent years.
RFID - Network
RFID READER scans (reads) RFID
TAG, then data from RFID
READER will be sent back to the
reader. RFID reader will send
this received data to Computer,
in wire/wireless medium. RFID TAG RFID READER COMPUTER

There are three main types of RFID systems:


1. Low frequency (LF)
2. High frequency (HF) and
3. Ultra-high frequency (UHF).
4. Super High Frequency (SHF)/Microwave RFID
*Cost of above types will be in ascending style, starting from LF.
 Frequencies vary greatly by country and region.
 Based on the application requirements, type of RFID is
chosen.
Understanding Hardware of RFID Reader & Tag (Passive);
RFID TAG
• RFID Reader is controlled by a micro controller and it has ANTENNA
CHIP
separate transmitting and receiving antennas. • Rectifier
• Basic components inside RFID Tag includes, Transponder, • Controller
Rectifier circuit, Controller, Memory • memory
This transponder receives radio waves using antenna, which are transmitted by RFID reader. Rectifier
circuit converts this radio waves into power which can activate the RFID tag system, i.e. the
controller and memory. Controller reads data from memory and transmit this data to the RFID
reader via transponder.
MICRO RF SIGNAL
TRANSPONDER RECTIFIER CONTROLLER
CONTROLLER GENERATOR

RF SIGNAL
MEMORY
RECEIVER
RFID READER RFID TAG
RFID reader continuously sends radio waves of a particular frequency. If the object, on which this RFID tag is attached is
within the range of this radio waves then it sends the feedback back to this RFID reader.
RFID - IoT Applications
2.6 NFC
 NFC, or near-field communication, refers to technology that allows NFC enabled devices that
are near each other to wirelessly share data. NFC is Introduced in early 2000s and it is a more
fine-tuned technology evolved from radio frequency identification (RFID) technology.
 NFC allows your phone to act as a transit pass or credit card, or for quickly transfer data, or to
instantly pair with Bluetooth devices like headphones and speakers; NFC had lot of scope in
the concept of IoT.
 NFC has become a popular term in the payments industry in the last couple years with an
increase in contactless payments via mobile wallets and wearables. NFC allows two devices; like
your phone and a payments terminal - to talk to each other when they’re close together,
resulting in secure payments.
 Both RFID and NFC operate on the principle of inductive coupling; this essentially involves the
reader generating a magnetic field through antenna. When a tag is brought nearby, the field
induces an electric current within the tag, then any stored data on the tag is wirelessly
transmitted to the reader.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

2000 - Hybrid <=4 CM 13.56 MHz Point to Point


 Specifically, NFC is a branch of High-Frequency (HF) RFID, and both operate at the 13.56 MHz
frequency. Apart of Inductive coupling working principal which is same in RFID and NFC, there
exists various functional differences in between these two identical technologies. Important
ones are listed below;
LESS DISTANCE
While RFID technology can be used over long distances, NFC technology is limited to small
distances. RFID tags can generally be scanned at distances of up to 100 meters and do not require a
direct line of sight to the reader. NFC generally requires a direct line of site to the reader, and also
requires the communicating devices to be within a few centimetres of each other.
TWO WAY COMM.
RFID enables a one way wireless communication - typically an RFID tag sending data to an RFID
reader. NFC is capable of both one-way and two-way communication, meaning it can act as both a
reader and a tag. This allows NFC to be used for more complex interactions such as peer-to-peer
(P2P).
LESS VOLUME OF DATA
RFID tags can be read quickly in batches, making the technology a good fit for tasks such as
inventory management. In contrast, only a single NFC tag can be scanned at one time, making NFC a
good fit for contactless payment transactions.
NFC - Network
 NFC tags work like any other RFID tag to
NFC TAG ANTENNA
communicate over radio waves. Two NFC ENABLED
SMART PHONE/ CHIP
devices - the NFC tag and the NFC reader READER
• Rectifier
exchange information in NFC data • Controller
exchange format. • memory

The NFC standard currently has three distinct


modes of operation;
1. Reader/Writer m\Mode
One-way data transmission where the active
device, which may be your smartphone,
establishes a link with another device in order
to read/write data from/to it. This mode is
used by NFC advertisement tags.
2. Peer-to-Peer Mode
This enables two NFC-enabled devices to
share different types of data. Both devices
transform from active to passive when -
- sending and receiving data in this mode. Most common use in smartphones.
3. Card Emulation mode
The NFC device can be used to make purchases or tap into public transportation networks as a
smart or contactless credit card, i.e. Google Pay, Samsung Pay & Apple Pay.
UNDERSTANDING NFC CONTACTLESS PAYMENTS
 A contactless payment is a transaction that requires no physical
contact between a device like, smartphone and a payments
terminal. Meaning, people can just hold up their mobile devices to
pay. In an NFC payment, you tap or hover your device to pay.
 The NFC enabled mobile device and the NFC-enabled point-of-sale
system talk back and forth to each other to process a payment.
 When a contactless payment is initiated (by a customer holding or
tapping a mobile device to the payments terminal), the NFC
technology goes to work. Using that specific frequency we talked
about, the NFC-enabled reader and the smartphone pass encrypted
information back and forth to each other to complete the payment.
This all takes just seconds, just as you do with physical card
transaction.
SECURITY IN NFC PAYMENTS
As opposed to the data on a magnetic-stripe card (which is static - there on the back of your card), the
data involved in an NFC transaction is encrypted and dynamic, meaning it’s constantly changing.
As an example, let’s take Apple Pay, which uses a technology called tokenization to safeguard bank
details. Here’s how it works:
 After you take a picture of your credit card and load it into your iPhone (read our detailed guide
about how to set up Apple Pay), Apple sends the details to your card’s issuing bank or network.
 The banks and networks then replace your bank details with a series of randomly generated
numbers (the token).
 That random numbers are sent back to Apple Phone, which then programs it into your phone and
used randomly. This means that the account details on your phone can’t be cloned by fraudsters.
NFC payments are encrypted and secure.
 Also Apple Pay is protected by Touch ID or Face ID, Apple’s fingerprint/facial recognition
technology. To initiate an Apple Pay transaction, you have to unlock your phone via your
fingerprint or face. So even if your device is stolen, no one would be able to get at your data.
A variety of different NFC-enabled payments are coming to market. For iPhone users, there’s Apple
Pay. Android users have Google Pay and Samsung Pay as options. Some chip cards are even equipped
to be “contactless” or “tap to pay.”
NFC - IoT Applications
2.7 Dash7
 DASH7 Protocol (referred as Dash7 Alliance Protocol (D7A)) is an open source Wireless Sensor
and Actuator Network protocol, which operates in the 433 MHz, 868 MHz and 915 MHz
unlicensed ISM bands.
 The DASH7 Alliance is a non-profit mutual benefit organization formed to foster the existence
and the further development of the DASH7 protocol specification. The protocol specification is
free to use without any patent or license requirements.
 Dash7 is tailored for tailored for ultra lower sensor-actuator applications using private
networks. Sensors will securely report events and actuators can receive commands with a typical
latency of 1 second.
 D7A fills the gap between the Short and the Large Area Networks. D7A excels in urban and
industrial network installations connecting actuators and messaging applications (sensors,
alarms, states) with ranges up to 500 m.
 Compact and affordable development kits, containing multiple endpoints and gateway, are
available to evaluate the Dash7 technology and prototype your DASH7 application.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

2011 Dash 7 Alliance Hybrid <=2 KM 433 MHz, 868 MHz ,915 MHz Star
Dash7 - Network
3 3
Different device classes defined in D7A
(Dash7 Alliance Protocol).
1. Blinker: It only transmits and does 2
not use a receiver.
2. EndPoint: It can transmit and receive
the data. It also supports wake-up
events. 1
3. Gateway: It connects D7A network Dash7 Pull Mode Dash7 Push Mode
with the other network. It will always
be online. It always listens unless it is Gateway Pulls the data from the end devices by sending the request;
end devices respond to that request. Blinker devices Push the data to
transmitting. gateway, with/without any intervention of the gateway.

 DASH7 works in Star topology and provides multi-year battery life for sensors and offers AES 128-
bit shared-key encryption based security support with data transfer rate of up to 167 kbit/s.
Dash7 - IoT Applications
1. Valve position monitoring in Industries 3. Critical Alerting System 5. Plant Monitoring System
2. Smart Parking 4. Crowd Density Systems
2.8 Weightless
 The Weightless specification is a Low Power, Wide Area (LPWA) networking protocol designed
to wirelessly connect ‘things’ to the internet.
 The Weightless Alliance is a global, non-profit alliance dedicated to the continual growth and
innovation of the Weightless technology standard for IoT (Internet-of-Things).
 Weightless network uses star topology and is composed of end-device communication modules
and base stations. Multiple end-device communication modules connected to one base station
for full bidirectional communication through Weightless protocol, which also manages device
authorization and radio resource allocation.
 Weightless provides fully acknowledged two-way communications offering both uplink and
downlink capabilities and best in class QoS required for the stringent industrial IoT sector.
 Weightless offers the promised performance, network reliability and security characteristics of
3GPP carrier grade solutions.
 In addition the Standard will enable substantially lower costs, comparable to other LPWAN
technologies.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

2011 Weightless Alliance Industry <= 10 KM 470 MHz - 790 MHz Star
 With FDMA - Frequency Division Multiple Access and TDMA - Time Division Multiple Access
techniques, Weightless can be configured to use lower bandwidth with higher efficiency for large
scale network deployment.
Weightless - Network
SENSOR

SENSOR

SENSOR

SENSOR

SENSOR

*Weightless Protocol uses Star SENSOR

Network Topology
The Weightless offers three different protocols; Weightless-N, Weightless-W, and Weightless-P,
that support different modalities and use cases.
Weightless-W
 This Weightless-W open standard is designed to operate in TV white space (TVWS) spectrum.
Using TVWS is attractive in theory, because it takes advantage of good ultra-high frequency (UHF)
spectrum. However, in practice, it can be quite difficult; one reason is, the rules and regulations
for utilizing TVWS for IoT vary, and it isn’t available everywhere.
Weightless-N
 Weightless-N was an uplink-only LPWAN technology which uses ultra-narrowband
communication channel and is ideal for sensor-based networks like temperature readings, tank
level monitoring, etc.
Weightless-P
 After W and N, Weightless-P seeks to revolutionize LPWAN for the IoT. Though limited to one-
way communications, Weightless-N supports farther range and lower power consumption than
Weightless-P, which trades these benefits to a certain extent for higher performance and
flexibility, which is ideal for private networks like sophisticated industrial systems. It uses a
narrow band modulation scheme offering a fully acknowledged 2-way communications offering
both uplink and downlink.
Weightless-N Weightless-P Weightless-W

Directionality 1-way 2-way 2-way


Feature set Simple Full Extensive
Range 5km+ 2km+ 5km+
Battery life 10 years 3-8 years 3-5 years
Terminal cost Very low Low Low-medium

Network cost Very low Medium Medium


Weightless Protocol - IoT Applications
1. Temperature readings 4. Control & Monitoring of Sensors
2. Tank level monitoring 5. Machine Health Monitoring
3. Smart Metering of resource consumption,
such as energy, water, gas, etc.
2.9 NB-IoT
 Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) protocol using low-power wide
area network (LPWAN) technology. It was developed by 3GPP for cellular wireless
communication that enables a wide range of new NB-IoT devices and services.
 The NB-IoT communication standard is aimed at enabling IoT devices to operate via carrier
networks, either within an existing Global System for Mobile (GSM) communication carrier
wave, in an unused "guard band" between LTE channels (Guard Band in LTE has defined to be
10% of available bandwidth) or independently.
 Narrowband IoT connectivity standard that enables IoT devices to send their data directly to the
cloud without a gateway in between.
 NB-IoT reduces the power consumption of connected devices, while increasing system capacity
and bandwidth efficiency. NB-IoT connected devices can have a battery life of more than 10
years for many use cases.
 Applications that send small amounts of data occasionally from sensor nodes that run on
batteries, with limited mobility and installed in remote locations will benefit by using NB-IoT.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

2016 3GPP Hybrid <=10 KM 200 KHz Star


 NB-IoT fills the gap between cellular technologies such as 3G/4G and short range technologies
such as Wi-Fi/ZigBee/Bluetooth. In other words, it solves the last-mile problem for IoT devices.
NB-IoT - Network
 Specially designed devices
and sensors are the basic
components in the NB-IoT
systems. These devices
collect the information from
its surroundings and
transmit to operator Base
Stations.
 Individual base stations are
connected to an Operator
Server Platform and from
there to IoT cloud
application servers
(PC/Mobile) for monitoring
and data analysis by the
user.
NB-IoT - Deployment Modes

 In-band Mode: This is easiest for operators since no changes to hardware are needed. LTE
spectrum is used. Internal interference can be a problem and this has to be managed effectively.
 Guard band Mode: NB-IoT is served by the same eNodeB that serves the LTE cell, thus sharing
the power. There's no spectrum cost since operation is in the guard band.
 Standalone Mode: By refarming unused GSM bands, NB-IoT can be deployed in these bands.
Frequency planning incurs a cost. New RF modules are needed but more power may be available
since this is independent of the LTE cell.
NB-IoT - Applications

NB-IoT

As NB-IoT is very flexible, it can operate in 2G, 3G and 4G band and it removes the need for a
gateway, which ultimately saves money. To date, 159 operators have invested in NB-IoT with 107
deployed/launched networks worldwide.
2.10 Wi-Fi
 Wi-Fi is a group of wireless networking protocols based on the IEEE 802.11 standard. It is
designed for local communication and Internet access, allowing nearby digital devices to
exchange data over radio waves. It is now the most widely used computer network allowing
computers, mobile devices, TVs, etc. to interface with Internet. Wi-Fi works on Physical and Data
Link Layer and operated at 2.4 GHz radio spectrum.
 Simple Wi-Fi network involves, The router (1) is
Wi-Fi Module
connected via cable to the DSL (Digital subscriber line)
Router modem and already has a connection to the internet.
The devices 2 and 3 are connected to the router via
ethernet cable. The devices 3 and 4 are as you see in
the picture connected to the router via Wi-Fi, through
Secure
Wi-Fi module (USB adapter, PCI adapter or onboard Wi-
Channel Fi module) s needed. All devices will automatically get
SIMPLE WIFI NETWORK an IP address from the router.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

1999 CSIRO Hybrid <=150 Meters 2.5 - 5 Ghz Star


Wi-Fi - IoT Specific Wi-Fi Networks
These specialized architectures offer a variety of network topologies to different IoT environments
providing scalable and customizable options.
 Wi-Fi CERTIFIED EasyMesh
Employ multiple access points that work together to form a unified network that provides smart,
efficient Wi-Fi throughout the home and outdoor spaces.
 Wi-Fi CERTIFIED Wi-Fi Aware
This extends Wi-Fi capability with quick discovery, connection, and data exchange with other Wi-Fi
devices by continuously scanning surroundings, anticipate actions, and notify of services and
selected preferences.
 Wi-Fi CERTIFIED Wi-Fi Direct
This enables Wi-Fi devices to connect directly to each other, making it simple and convenient to print,
share, sync, play games, and display content to another device).
Several unique competencies that uniquely position Wi-Fi for IoT include:
1. Standards-based, interoperable technology 4. Cost effective, simple deployment
2. Pervasive connectivity 5. Backward compatibility
3. Proven WPA3™ security 6. Location awareness and Reliable connectivity
Wi-Fi CERTIFIED EasyMesh
Wi-Fi CERTIFIED Wi-Fi Aware
Wi-Fi CLASSIC
Wi-Fi CERTIFIED Wi-Fi Direct PC DIRECTLY COMMUNICATES
WITH PRINTER VIA ACCESS
POINT
Wi-Fi DIRECT
PC DIRECTLY COMMUNICATES
WITH PRINTER
Wi-Fi - Coverage
 Wi-Fi data transmission work best in line-
of-sight areas. Various obstacles in the
form of poles, appliances, walls, and other
things reduce their propagation speed
and reduce the range of coverage. On
average, Wi-Fi coverage is about 20 m.
Modern Wi-Fi access points can achieve a
range of up to 150 m, but only outdoors.
Wi-Fi - in IoT
 Wi-Fi has a foundational role in delivering
IoT innovation, providing pervasive
connectivity to connect a wide variety of
“things” to the internet, with Proven
WPA3 security. WAP3 - Wi-Fi Protected
Access 3, is the third standard developed
by the Wi-Fi Alliance.
Wi-Fi - Standards
IEEE 802.11 The original 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and IR standard
IEEE 802.11a 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001)
IEEE 802.11b Enhancements to 802.11 to support 5.5 and 11 Mbit/s (1999)
IEEE 802.11d International (country-to-country) roaming extensions
IEEE 802.11e Enhancements: QoS, including packet bursting
IEEE 802.11f Inter-Access Point Protocol (IAPP)
IEEE 802.11g 54 Mbit/s, 2.4 GHz standard (backwards compatible with b) (2003)
IEEE 802.11h 5 GHz spectrum
IEEE 802.11n Higher throughput improvements
IEEE 802.11p Wireless Access for the Vehicular Environment
IEEE 802.11r Fast roaming
IEEE 802.11s Wireless mesh networking
IEEE 802.11T Wireless Performance Prediction (WPP) - test methods and metrics
IEEE 802.11u Interworking with non-802 networks (e.g., cellular)
IEEE 802.11v Wireless network management
IEEE 802.11w Protected Management Frames
Wi-Fi
IoT Applications
2.11 Bluetooth
 Bluetooth is a short-range wireless communication technology that allows devices such as
mobile phones, computers, and peripherals to transmit data or voice wirelessly over a short
distance. The purpose of Bluetooth is to replace the cables that normally connect devices,
while still keeping the communications between them secure.
 The Bluetooth technology emerged from the task undertaken by Ericsson Mobile
Communications in 1994 to find an alternative to the use of cables for communication
between mobile phones and other devices. In 1998, the companies Ericsson, IBM, Nokia, and
Toshiba formed the Bluetooth Special Interest Group (SIG) which published the 1st version in
1999.
 It is a specification of IEEE 802.15.1 for the use of low-power radio communications to link
phones, computers, and other network devices over short distances without wires. Wireless
signals transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters). It is
achieved by embedded low-cost transceivers into the devices. It uses the same 2.4GHz
frequency as some other wireless technologies in the home or office, such as Wi-Fi.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY

1996 SIG Hybrid <= 10 Meters 2.45 Ghz Mesh


 It can connect up to eight devices simultaneously and each device offers a unique 48-bit
address from the IEEE 802 standard with the connections being made a point to point or
multipoint.
 The Bluetooth standards have been revised over many years starting with version 1.0 (not
widely used) and 1.1 on up to version 5. Early versions of the standard supported connections
below 1 Mbps while modern versions are rated up to 50 Mbps.
Bluetooth - Network
Bluetooth Network is viewed as a Personal Area Network or a Piconet which contains a minimum
of 2 to a maximum of 8 Bluetooth peer devices, usually a single master and up to 7 slaves.
 A master is a device that initiates communication with other devices. The master device
governs the communications link and traffic between itself and the slave devices associated
with it.
 A slave device is a device that responds to the master device. Slave devices are required to
synchronize their transmit/receive timing with that of the master’s. In addition, transmissions
by slave devices are governed by the master device (i.e. the master device dictates when a slave
device may transmit). Specifically, a slave may only begin its transmissions in a time slot
immediately following the time slot in which it was addressed by the master, or in a time slot
explicitly reserved for use by the slave device.
Bluetooth - Adaptive Frequency Hopping (AFH) Communication channel is rapidly changing while
 One of the techniques Bluetooth technology transmission; adaptive frequency hopping (AFH)
uses to overcome interference and find a
clear transmission path that avoids packet
collision is Adaptive Frequency Hopping
(AFH). In AHF Bluetooth divides the
frequency band into smaller channels and
rapidly hops between those channels when
transmitting packets. Channels that are noisy
and busy are dynamically tracked and
avoided when sending packets.
 The devices are synchronized to change
channels together many times a second, as
per the AFH path.
The frequency hopping sequence is defined by the Bluetooth device address (BD_ADDR) of the
master device. The master device first sends a radio signal asking for a response from the
particular slave devices within the range of addresses. The slaves respond and synchronize their
hop frequency as well as a clock with that of the master device.
Bluetooth - Security
Bluetooth is considered a reasonably secure wireless technology when used with precautions.
Connections are encrypted, preventing casual eavesdropping from other devices nearby. Bluetooth
devices also shift radio frequencies often while paired and not connecting to unknown Bluetooth
devices. These may prevent an easy invasion.
Bluetooth - Versions
Bluetooth technology has
progressed from standard
Bluetooth to smart
Bluetooth, with the most
recent version being
Bluetooth 5. Compared to
previous generations,
Bluetooth 5 provides four
times the range, quadruple
the speed, and 800 percent
2019 5.1 Pinpoint the device location greater data transmitting
2020 5.2 High quality audio, low-power consumption frequency.
Bluetooth 4.0 - Bluetooth for IoT
 Bluetooth 4.0 is an optimized version of the proprietary wireless Bluetooth technology standard
for data exchange over short distances. Bluetooth 4.0 enhances Bluetooth technology while
maintaining compatibility with classic Bluetooth-capable devices. Bluetooth 4.0 is also known as
Bluetooth Smart, Bluetooth Smart Ready and Bluetooth Low Energy (BLE).
 Bluetooth Special Interest Group (Bluetooth SIG) developed BLE focusing on industries like
healthcare, security, home entertainment, etc. The BLE is Bluetooth version 4.0 and focuses on the
Internet of Things (IoT) applications.
 Bluetooth 4.0 uses low energy technology, allowing manufacturers to include Bluetooth in small
battery operated devices. This new energy specification is a key benefit for developers and
consumers of handheld and compatible devices.
 Bluetooth Low Energy (BLE) can assist IoT devices in conserving energy by keeping them in sleep
mode until they are connected. BLE is perfect for IoT applications since it can pair and reconnect
with devices in six milliseconds instead of six seconds with traditional Bluetooth. This not only
improves operating efficiency but also increases device availability.
 BLE’s energy efficiency has made it a preferred and and one of the most compatible options for IoT.
Fitness products and wearables are good examples of BLE connected IoT products. BLE, for
example, is more energy efficient than ZigBee, Bluetooth classic and Wi-Fi.
Bluetooth - IoT
Bluetooth - IoT Applications
1. Smart Keys: A mobile app would receive a secret pass code key upon hotel check-in, the user just
need to go in front of the hotel room door with their smart phone and it will exchange the pass
code securely to the door lock using BLE and open it without any hassle.
2. Event Management: Managing access of huge number of people in a trade show or a concert is
no easy task, all they need to be given is a wrist band or ring which the attendee need to flash at
the counters to gain access, so no more boring paper invites to be carried on. The BLE module in
the wrist band carries the user identity information and the POS machines at the counters
connect with a cloud service to authenticate the identity.
3. Retail Shops: As soon as the customer walks in a welcome message would get popped up in their
mobile and when they go near the product shelf, details of that would be displayed in their
mobile screens. Retail world is trying to find ways of targeted and contextual advertising; BLE
technology is definitely an enabler.
4. Bluetooth enabled home appliances: Controlling a device using any other device containing
Bluetooth central mode module (Laptops, mobiles etc.).
5. Heart Beat Sensor Apps: Sending real time sensor data to smartphone. With BLE, the
communication between sensor and the smartphone consumes less power.
END OF UNIT 2

You might also like