Internet of Things - Architecture and Protocols - Unit 2
Internet of Things - Architecture and Protocols - Unit 2
PRUDHVI KIRAN P
Assistant Professor, CSE - IoT Dept.
R. V. R. & J. C. College of Engineering
UNIT - 2 [ 12 Periods ]
IoT Connectivity Technologies (PART 2):
1. LoRa - Introduction, Physical Layer, MAC Layer and Topology, Protocol Stack
2. Thread
3. ISA100.11A
4. Wireless HART
5. RFID
6. NFC
7. DASH7
8. Weightless
9. NB-IoT
10. Wi-Fi
11. Bluetooth
END
2.1 LoRa - Introduction
LoRa (short notation for long range) is a wireless modulation technique, which encodes
information on radio waves; similar to the way dolphins and bats communicate. LoRa supports up
to five kilometers in urban areas, and up to 15 kilometers or more in rural areas (line of sight).
LoRa end devices are optimized to operate in low power mode and can last up to 10 years on a
single coin cell battery.
LoRa is ideal for applications that transmit small chunks of data with low bit rates which involves
sensors and actuators that operate in low power mode.
LoRa modulated transmission is robust against disturbances and can provide deep indoor
coverage (easily cover multi floor buildings.).
LoRa can be operated on the license free bands, for example, 915 MHz, 868 MHz, and 433 MHz
and also be operated on paid 2.4 GHz to achieve higher data rates. AES-128 encryption is used to
ensures secure communication between the end device and the application server.
In LoRa, data can be transmitted at a longer range compared to technologies like Wi-Fi,
Bluetooth, ZigBee, & Z-Wave.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY
LoRaWAN
Gateway
LoRaWAN
LoRaWAN
Central Network Server
End Device
LoRaWAN
End Device
MEDIUM
ACCESS
CONTROL LAYER
(MAC)
PHYSICAL
LAYER
(PHY)
RADIO FREQUENCY LAYER
Apart of Application Layer at user level, LoRa Protocol Stack can be viewed as two parts, LoRa and
LoRaWAN.
LoRa is the physical (PHY) layer, i.e., the wireless modulation used to create the long-range
communication link. LoRaWAN is the (MAC) Layer ,the open network protocol, that delivers
secure bi-directional communication, mobility, and localization services standardized and
maintained by the LoRa Alliance.
Physical Layer (PHY) - LoRa
LoRa - PHY Layer is referred as a wireless modulation technique, mentioned as LoRa Modulation
in the protocol stack, derived from Chirp Spread Spectrum (CSS) technology. It encodes
information on radio waves using chirp pulses - similar to the way dolphins and bats
communicate. LoRa modulated transmission is robust against disturbances and can be received
across great distances.
PHY offers services to upper layers above it i.e. MAC layer and Application layer, through LoRa
Modulation.
Using LoRa Modulation, PHY Layer passes physical layer frame to radio frequency layer for up
conversion to radio frequency as per regional ISM band specified to region such as US, EU,
Australia and so on. Example frequency bands; EU 868, EU 433, US 915, AS 430.
PHY uses Forward Error Correction (FEC) to help in error correction. And it adds preamble to
physical layer frame which is used in time/frequency synchronization at the receiver. PHY also
uses Cyclic Redundancy Check (CRC) technique to help in error detection of the PHY frame
carrying MAC payload.
LoRa is the silicon (for LoRa devices) developed by Semtech, and LoRaWAN, managed by LoRa
Alliance, is a standard for interoperability of LoRa devices. LoRaWAN - MAC layer is a ecosystem
through which, most IoT use cases can be solved and on the other hand LoRa - PHY layer defines
the physical and electrical characteristics of this ecosystem.
Medium Access Control Layer (MAC) - LoRaWAN
While LoRa/(PHY) is the underlying physical part, LoRaWAN/(MAC) is the network on which LoRa
operates. LoRaWAN defines a set of rules and software that ensures data arrives with an
acknowledgement and does not have duplicate packets. It is a network architecture that is
deployed in a star topology and so the communication between the end device and gateway is
bidirectional.
LoRaWAN is a Media Access Control (MAC) layer protocol built on top of LoRa modulation. It is a
software layer which defines how devices use the LoRa hardware.
MAC layer functionality is defined with three options of LoRa devices: Class A, Class B, and Class
C. While all devices can send a message up to the gateway at any time (uplink), the device's class
determines when it can receive a message (downlink).
UPLINK
DOWNLINK
CLASS DESCRIPTION COMMENT
Class A devices allow for bi-directional communications, where each device's uplink
"Talk Before transmission is followed by two short downlink receive windows. These devices wake
Class A Listening" up and transmit when a change in environment is sensed or other event is triggered.
Following the two receiving windows, Class A devices go back to sleep until the another
following uplink transmission.
In addition to Class A random receive windows, Class B devices also open extra receive
"Listen at windows at scheduled times. The end-device opens a receive window after it receives a
Class B Specific time-synchronized beacon from the gateway. Timed slots allow the server to talk to a
Times" specific node (unicast transmission) or multiple nodes simultaneously (multicast
transmission) at a specific time.
The end-device can receive a message at nearly any time. Class C receive windows are
Class C "Listen only closed when transmitting. This means they require more power to operate than
Continuously" Class A or Class B, but they offer the lowest latency for server to end-device
communication.
CLASS A
CLASS B
CLASS C
Class A is battery-efficient, but requires the end device to transmit before downlink data can be
sent. Class B is the ideal solution for applications which require low latency communication
with battery powered devices. Class C is the simplest and is ideal for externally-powered
devices (for example, a smart outlet).
For battery efficiency, Class B and Class C may be combined with Class A operation. For
example, the device may normally operate in Class A to send and receive low-priority unicast
traffic, and only switch to Class B or Class C only during business hours to receive time-critical
downlinks or requests. It is up to the application developer to decide on the best way to utilize
each LoRaWAN Class, balancing battery consumption against traffic latency requirements.
LoRa - IoT Applications
1. Vaccine Cold Chain Monitoring - LORAWAN sensors are used to ensure vaccines are kept at
appropriate temperatures in transit.
2. Animal Conservation - Tracking sensors manage endangered species data.
3. Dementia Patients - Wristband sensors provide fall detection and medication tracking.
4. Water Conservation - Identification and faster repair of leaks in a city’s water network.
5. Food Safety - Temperature monitoring ensures food quality maintenance.
6. Smart Waste Bins - Waste bin level alerts sent to staff optimize the pickup schedule.
7. Airport Tracking - GPS free tracking systems for vehicles, personnel, and luggage.
2.2 Thread
Thread is a low-power and low-latency wireless mesh networking protocol for Home
environment built using open and proven standards, IP Standards. Thread solves the
complexities of the IoT, addressing challenges such as interoperability, range, security, energy,
and reliability. Thread networks have no single point of failure and include the ability to self-heal.
The Internet runs on IP. From phones, to routers, to connections across the globe, IP is how
devices communicate directly with each other, regardless of what connectivity technologies they
use (i.e. Ethernet, Wi-Fi, 5G and LTE). Thread brings the Internet to the Internet of Things by
using this Internet’s proven, open standards, IP to create an Internet Protocol version 6 (IPv6)
based mesh network.
Thread devices seamlessly integrate with larger IP networks and don’t need proprietary
gateways or translators. This reduces infrastructure investment and complexity, removes
potential points of failure and reduces maintenance burdens.
With Thread, developers can bring their apps, devices, systems and services to market faster
because they’re using the same rich set of tools available for the Internet.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY
1970s - Hybrid <=100 Meters 120 KHz - 5.8 MHz Point to Point
Although commercial uses for it were first developed in the 1970s, it has become more
universally accessible in recent years.
RFID - Network
RFID READER scans (reads) RFID
TAG, then data from RFID
READER will be sent back to the
reader. RFID reader will send
this received data to Computer,
in wire/wireless medium. RFID TAG RFID READER COMPUTER
RF SIGNAL
MEMORY
RECEIVER
RFID READER RFID TAG
RFID reader continuously sends radio waves of a particular frequency. If the object, on which this RFID tag is attached is
within the range of this radio waves then it sends the feedback back to this RFID reader.
RFID - IoT Applications
2.6 NFC
NFC, or near-field communication, refers to technology that allows NFC enabled devices that
are near each other to wirelessly share data. NFC is Introduced in early 2000s and it is a more
fine-tuned technology evolved from radio frequency identification (RFID) technology.
NFC allows your phone to act as a transit pass or credit card, or for quickly transfer data, or to
instantly pair with Bluetooth devices like headphones and speakers; NFC had lot of scope in
the concept of IoT.
NFC has become a popular term in the payments industry in the last couple years with an
increase in contactless payments via mobile wallets and wearables. NFC allows two devices; like
your phone and a payments terminal - to talk to each other when they’re close together,
resulting in secure payments.
Both RFID and NFC operate on the principle of inductive coupling; this essentially involves the
reader generating a magnetic field through antenna. When a tag is brought nearby, the field
induces an electric current within the tag, then any stored data on the tag is wirelessly
transmitted to the reader.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY
2011 Dash 7 Alliance Hybrid <=2 KM 433 MHz, 868 MHz ,915 MHz Star
Dash7 - Network
3 3
Different device classes defined in D7A
(Dash7 Alliance Protocol).
1. Blinker: It only transmits and does 2
not use a receiver.
2. EndPoint: It can transmit and receive
the data. It also supports wake-up
events. 1
3. Gateway: It connects D7A network Dash7 Pull Mode Dash7 Push Mode
with the other network. It will always
be online. It always listens unless it is Gateway Pulls the data from the end devices by sending the request;
end devices respond to that request. Blinker devices Push the data to
transmitting. gateway, with/without any intervention of the gateway.
DASH7 works in Star topology and provides multi-year battery life for sensors and offers AES 128-
bit shared-key encryption based security support with data transfer rate of up to 167 kbit/s.
Dash7 - IoT Applications
1. Valve position monitoring in Industries 3. Critical Alerting System 5. Plant Monitoring System
2. Smart Parking 4. Crowd Density Systems
2.8 Weightless
The Weightless specification is a Low Power, Wide Area (LPWA) networking protocol designed
to wirelessly connect ‘things’ to the internet.
The Weightless Alliance is a global, non-profit alliance dedicated to the continual growth and
innovation of the Weightless technology standard for IoT (Internet-of-Things).
Weightless network uses star topology and is composed of end-device communication modules
and base stations. Multiple end-device communication modules connected to one base station
for full bidirectional communication through Weightless protocol, which also manages device
authorization and radio resource allocation.
Weightless provides fully acknowledged two-way communications offering both uplink and
downlink capabilities and best in class QoS required for the stringent industrial IoT sector.
Weightless offers the promised performance, network reliability and security characteristics of
3GPP carrier grade solutions.
In addition the Standard will enable substantially lower costs, comparable to other LPWAN
technologies.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY
2011 Weightless Alliance Industry <= 10 KM 470 MHz - 790 MHz Star
With FDMA - Frequency Division Multiple Access and TDMA - Time Division Multiple Access
techniques, Weightless can be configured to use lower bandwidth with higher efficiency for large
scale network deployment.
Weightless - Network
SENSOR
SENSOR
SENSOR
SENSOR
SENSOR
Network Topology
The Weightless offers three different protocols; Weightless-N, Weightless-W, and Weightless-P,
that support different modalities and use cases.
Weightless-W
This Weightless-W open standard is designed to operate in TV white space (TVWS) spectrum.
Using TVWS is attractive in theory, because it takes advantage of good ultra-high frequency (UHF)
spectrum. However, in practice, it can be quite difficult; one reason is, the rules and regulations
for utilizing TVWS for IoT vary, and it isn’t available everywhere.
Weightless-N
Weightless-N was an uplink-only LPWAN technology which uses ultra-narrowband
communication channel and is ideal for sensor-based networks like temperature readings, tank
level monitoring, etc.
Weightless-P
After W and N, Weightless-P seeks to revolutionize LPWAN for the IoT. Though limited to one-
way communications, Weightless-N supports farther range and lower power consumption than
Weightless-P, which trades these benefits to a certain extent for higher performance and
flexibility, which is ideal for private networks like sophisticated industrial systems. It uses a
narrow band modulation scheme offering a fully acknowledged 2-way communications offering
both uplink and downlink.
Weightless-N Weightless-P Weightless-W
In-band Mode: This is easiest for operators since no changes to hardware are needed. LTE
spectrum is used. Internal interference can be a problem and this has to be managed effectively.
Guard band Mode: NB-IoT is served by the same eNodeB that serves the LTE cell, thus sharing
the power. There's no spectrum cost since operation is in the guard band.
Standalone Mode: By refarming unused GSM bands, NB-IoT can be deployed in these bands.
Frequency planning incurs a cost. New RF modules are needed but more power may be available
since this is independent of the LTE cell.
NB-IoT - Applications
NB-IoT
As NB-IoT is very flexible, it can operate in 2G, 3G and 4G band and it removes the need for a
gateway, which ultimately saves money. To date, 159 operators have invested in NB-IoT with 107
deployed/launched networks worldwide.
2.10 Wi-Fi
Wi-Fi is a group of wireless networking protocols based on the IEEE 802.11 standard. It is
designed for local communication and Internet access, allowing nearby digital devices to
exchange data over radio waves. It is now the most widely used computer network allowing
computers, mobile devices, TVs, etc. to interface with Internet. Wi-Fi works on Physical and Data
Link Layer and operated at 2.4 GHz radio spectrum.
Simple Wi-Fi network involves, The router (1) is
Wi-Fi Module
connected via cable to the DSL (Digital subscriber line)
Router modem and already has a connection to the internet.
The devices 2 and 3 are connected to the router via
ethernet cable. The devices 3 and 4 are as you see in
the picture connected to the router via Wi-Fi, through
Secure
Wi-Fi module (USB adapter, PCI adapter or onboard Wi-
Channel Fi module) s needed. All devices will automatically get
SIMPLE WIFI NETWORK an IP address from the router.
AVAILABLE FROM DEV TEAM USAGE AREA WORKING RANGE WORKING FREQUENCY TOPOLOGY