What Is LoRa BLE ZIGBEE

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 13

What is LoRa?

 LoRa (short for long range) is a spread spectrum modulation


technique derived from chip spread spectrum (CSS) technology.
 Semtech’s LoRa devices and wireless radio frequency technology
is a long range, low power wireless platform that has become the de
facto technology for Internet of Things (IoT) networks worldwide.

 LoRa devices and the open LoRaWAN® protocol enable smart


IoT applications that solve some of the biggest challenges facing our
planet: energy management, natural resource reduction, pollution
control, infrastructure efficiency, disaster prevention, and more.

 Semtech’s LoRa devices and the LoRaWAN protocol


have amassed several hundred known uses cases for smart cities,
smart homes and buildings, smart agriculture, smart metering, smart
supply chain and logistics, and more. With well over 100
million devices connected to networks in 100 countries and
growing, LoRa devices are the DNA of IoT, creating a
Smarter Planet.

 LoRa is Long Range ,low data rate, low power wireless platform
technology for building IoT network.
 LoRa technology is owned by a chip company – Semtech, who
acquired it from another French startup – Cycleo. Semtech has
formed the LoRa Alliance, which develops global standards and
makes this available under a royalty free license to its members.
 Semtech builds LoRa Technology into its chipsets. These chipsets
are then built into the products offered by our vast network of IoT
partners and integrated into LPWANs from mobile network
operators worldwide.
LoRa Features
 Geo-Location: It enables GPS-free, low power tracking technology

 Low Cost: Reduces costs three ways: infrastructure investment,

operating expenses and end-node sensors, A LoRa base station cost a


few hundred dollars and set themselves up with a network. It easy to
plug into the existing infrastructure and offers a solution to serve
battery-operated IoT applications
 Standardization: LoRa Alliance develops global standards and

improved global inter-operability speeds adoption and roll out of


LoRaWAN-based networks and IoT applications
 Low Power: Its protocol designed specifically for low power

consumption extending battery lifetime up to 20 years


 Long Range: Single base station of LoRa provides deep

penetration in dense urban/indoor regions, plus connects rural areas


up to 30 miles away
 High Capacity: It supports millions of messages per base station,

ideal for public network operators serving many customers


 Secure: Embedded end-to-end AES-128 encryption mechanism

 Low connection cost : LoRa Technology operates in the


unlicensed ISM band, which means no or very low spectrum costs
(there may be a very low connection fee if using an external
service provider)

LoRa Network
LoRa network is consist of gateways, network servers and End
devices. The network topology  used is star of stars. End devices
are also known as motes and gateways are known as base
stations or concentrators in LoRa network system. End devices
and Gateways are connected wirelessly using ISM bands specified
with single hop. Gateways and network servers are connected
using IP back-haul or 3G/4G broadband connections.

LoRa Operational Specifications


Specification LoRa Support
Cell Range Urban 2-5 Km , Rural 15-20 Km
Frequency
ISM Bands: 433 MHz/868 MHz/780 MHz/915 MHz
Band
IEEE Standard IEEE 802.15.4g
Cell Capacity One LoRa cell can support 100K device
Standard Specification available since June 2015,  There are Live LoRa
Availability Networks  in about 50+ Countries
Spread Spectrum Modulation types is used with wideband linear FM
Modulation
pulses. Provice about 30 dB gain over FSK
Battery About 20 Years battery life
LoRa
Topology Star Topology
support
LoRa Physical Take cares of Power, Frequency,modulation and signaling between
Layer base station and devices
LoRa Technology Application Landscape
 Air Pollution Monitoring
 Agriculture Processing
 Animal Tracking
 Fire Detection
 Fleet Tracking
 Home Security
 Indoor Air Quality
 Industrial Temperature Monitoring
 Assets Management
 Predictive Maintenance
 Radiation Leak Detection
 Smart Lighting
 Smart Parking
 Waste Management
 Water Flow Monitoring

Wireless IoT Network Protocols

Bluetooth

Bluetooth is a global 2.4 GHz personal area network for short-range wireless
communication.  Device-to-device file transfers, wireless speakers, and wireless
headsets are often enabled with Bluetooth.

Bluetooth is a another wireless technology standard (not a piece of plastic you stick
in your ear for phone calls). Of course the two are related, but the wireless connection
between your phone and the earpiece is called Bluetooth… not the piece itself. As
you can imagine, Bluetooth was developed as a way to exchange data over a short
range (like from your pocket to your shoulder) without the need for wires. That’s
why Bluetooth is used for wireless headsets, hands-free calling through your car, and
wireless file transfers.

In engineering speak, Bluetooth operates in the 2400-2483.5 MHz range within the
ISM 2.4 GHz frequency band. Data is split into packets and exchanged through one
of 79 designated Bluetooth channels (each of which have 1 MHz in bandwidth).
Bluetooth’s M2M/IoT Applications
When considering the difference between Bluetooth and Bluetooth Low Energy (it’s
newer sibling), it’s important to talk about power consumption.

Bluetooth was originally designed for continuous, streaming data applications. That
means that you can exchange a lot of data at a close range. That’s why Bluetooth is
such a good fit for consumer products. People like to receive data and talk at the
same time, and exchange videos from one device from another. Here are some
Machine to Machine (M2M) and Internet of Things (IoT) uses for Bluetooth:
 Wireless headsets
 File transfers between devices
 Wireless keyboards and printers
 Wireless speakers

What Is Bluetooth Low Energy (BLE)?

BLE is a version of Bluetooth designed for lower-powered devices that use less data.
To conserve power, BLE remains in sleep mode except when a connection is
initiated. This makes it ideal for wearable fitness trackers and health monitors.

What Is Bluetooth Low Energy (BLE)?

Bluetooth Low Energy hit the market in 2011 as Bluetooth 4.0. When talking about
Bluetooth Low Energy vs. Bluetooth,

the key difference is in Bluetooth 4.0's low power consumption. Although that may
sound like something negative, it’s actually extremely positive when talking about
M2M communication. With Bluetooth LE's power consumption, applications can run
on a small battery for four to five years. Although this isn’t ideal for talking on the
phone, it is vital for applications that only need to exchange small amounts of data
periodically.

Just like Bluetooth, BLE operates in the 2.4 GHz ISM band. Unlike classic
Bluetooth, however, BLE remains in sleep mode constantly except for when a
connection is initiated. The actual connection times are only a few mS, unlike
Bluetooth which would take ~100mS. The reason the connections are so short, is
that the data rates are so high at 1 Mb/s.

BLE’s M2M/IoT Applications


 Blood pressure monitors
 Industrial monitoring sensors
 Geography-based, targeted promotions (iBeacon)
 Public transportation apps

Zigbee:
ZigBee protocol which is heavily used for IoT applications for establishing
connectivity between the different nodes and this ZigBee works on top of the
802.15.4 for extending this functionalities to the different other layers.

So, if you recall 802.15.4 is useful for establishing connections and function
functionalities in the physical layer and the MAC layer.

ZigBee basically will take these functionalities to the higher layers network and
beyond network layer and beyond.

Features of ZigBee
 Most widely deployed enhancement of IEEE 802.15.4.
 The ZigBee protocol is defined by layer 3 and above. It works with the 802.15.4
layers 1 and 2.
 The standard uses layers 3 and 4 to define additional communication
enhancements.
 These enhancements include authentication with valid nodes,encryption for
security, and a data routing and forwarding capability that enables mesh networking.
 The most popular use of ZigBee is wireless sensor networks using the mesh
topology.

how ZigBee basically functions.


So, ZigBee protocol is defined by the layer 3 and above. So, it works on top of layers
1 and 2 of 802.15.4 and extends to layer 3 and above and ZigBee basically works on
top of 802.15.4. So, this is something that we have to understand and we have to
remember that there is a difference between 802.15.4 and ZigBee.
This is what many people often confused. People think that ZigBee and
802.15.4 are one and the same, but it is not.
So, ZigBee is definitely based on the 802.15.4, but it has its own distinct identity.
So, the ZigBee basically uses layer 3 and layer 4 to define additional communication
enhancements and these enhancements include authentication with valid nodes
encryption for security and data routing and forwarding capability that enables mesh
networking and ZigBee is typically used in wireless sensor network applications. It is
heavily used in wireless sensor network applications, where mesh topologies are
formed with the help of ZigBee.
So, this is a diagraph diagram which basically
shows the position of ZigBee with respect to
802.15.4. So, where is 802.15.4, it focus is
mostly on the 5 and the MAC layers ZigBee
takes it beyond MAC beyond network layer.
So, network layer and the rest of the layers all
the way up to the application layer basically
this extension or the enhancement is made
possible with the help of ZigBee over the
802.15.4 protocol.

In ZigBee there are primarily


two different components.
1. ZDO which stands for
ZigBee device object
2. APS which stands for
Application Support Sub-layer
.
The first one is known as ZDO The second component is
which stands for ZigBee device APS which stands for
object and it takes care of issues Application Support Sub-
such as device management, layer which takes care of
security provisioning policies services such as control
and so on. services, interfacing bridging
So, these are the different between network and other
functionalities of ZDO and that layers and so on.
means the ZigBee device object
component.

So, these are the two distinct components with separate


functionalities
So, ZigBee basically supports star topology. So, this is the star topology
that we see over here. So, we have this coordinator node and we have
these different age devices and these age devices, they form a star
topology with the coordinator node.
Then, we have this coordinator node can be a gateway node also and
this can be a simple local area network or local area network equivalent.
Then, we have the cluster 3 topology, where these are like different
clusters that are formed with these different blue colored cluster head
which basically in reality are things such as routers and hubs.
So, these will act as routers and these routers will form a tree like
structure with the coordinator node. So, this is why this is known as the
cluster tree topology and then,
we have the mesh topology which is forming a mesh network with the
help of these different routers. These different routers, they form a mesh
backbone kind of network and to each of these routers, these different
devices are attached.

So, basically these green devices are the end devices in this particular
diagram and these green devices attached to these blue devices which
basically denote the the routers and at the end of this mesh network on one
end, we have this coding and then, node which acts as a gateway and from
this point on it offers connectivity to the outside network such as the
internet
ZigBee Mesh
 In a mesh, any node can communicate with any other node within its range.
 If nodes are not in range,messages are relayed through intermediate nodes.
 This allows the network deployment over large areas.

So, in a mesh any node can communicate with any other node within its range. So,
this is the main advantage to offer faulty tolerance, reliability. Mesh topologies are
very much useful. So, if the nodes are not in the range, messages are relayed through
intermediate nodes. So, this allows the network deployment over large areas. So,
using mesh topology you can extend the network to larger areas, you can span across
larger area. So, this is possible with the help of the mesh topology.

 Meshes have increased network reliability.


 For example, if nodes C and F are down, the
message packets from A can still be relayed to G
via B and E.
 ZigBee mesh networks are self-configuring and
self‐healing.
So, the meshes have increased network reliability.
For example, if nodes C and F are down in this particular scenario, so let us say that
initially we had this kind of a mesh.
Now, if the nodes C and F, these routers are down for one reason or another, the
messages can still go from A to Z using this particular path because an alternative
path was possible to have in because it is a mesh network.

Now, the ZigBee mesh networks are self-


configuring and self-healing.
Self-healing is quite obvious because if there
is some link failure or node failure or
something, it is possible to have other
alternative routes and yes they can configure
on their own, they can form the network on
their own. So, this is the advantage of the
ZigBee mesh network.
ZigBee Types : ZigBee Coordinator (ZC), ZigBee Router
(ZR), ZigBee End Device (ZED).

 ZigBee Coordinator (ZC):


 The Coordinator forms the root of the ZigBee network tree and might act as a
bridge between networks.
 There is a single ZigBee Coordinator in each network, which originally initiates
the network.
 It stores information about the network under it and outside it.
 It acts as a Trust Center & repository for security keys.

So, in ZigBee there are different entities.


The first one is the ZigBee coordinator, ZC. The ZigBee in the coordinator
basically forms the root of the ZigBee network.So, the entire network or the network
tree has a route and these routes are known as the ZigBee coordinator and form this
coordinator. So, first of all there is a single coordinator and from this coordinator,
there is single hop connectivity to the end devices. So, this coordinator basically
stores information about the network which is under it and which is outside it.
So, basically you know it is sort of buffers some of this information that I received
from these end devices and stores with it for certain time. It buffer for some certain
time. So, it also acts as a trust center and repository for the security keys.

 ZigBee Router (ZR):


 Capable of running applications, as well as relaying information between nodes
connected to it.
 ZigBee End Device (ZED):
 It contains just enough functionality to talk to the parent node, and it cannot relay
data from other devices. So, it has reduced functionality.
 This allows the node to be asleep a significant amount of the time thereby
enhancing battery life.
 Memory requirements and cost of ZEDs are quite low, as compared to ZR or ZC.
ZigBee Network Layer
 The network layer uses Ad Hoc On‐Demand Distance Vector (AODV)routing.
 To find the final destination, the AODV broadcasts a route request to all its
immediate neighbors.
 The neighbors relay the same information to their neighbors, eventually spreading
the request throughout the network.
 Upon discovery of the destination, a low‐cost path is calculated and informed to
the requesting device via unicast messaging.

Now, ZigBee also incorporates a network layer. So, this network layer uses the ad
hoc on demand distance vector routing protocol which is the AODV protocol and it is
been popular in the case of ad-hoc networks. It is used mostly in the ad hoc networks
for as a routing protocol that operates in the network layer and it used to find the final
destination.

So, how it can be found? AODV basically this particular protocol, it broadcasts a
route message to all its intermediate neighbors. These neighbors basically they relay
the same information to their neighbors intern and eventually this message space
across throughout the network. Upon discovering of destination, a low cost path is
calculated and is informed to the requesting device via the unicast messaging. So, this
is how this particular protocol functions.
Applications
 Building automation
 Remote control (RF4CE or RF for consumer electronics)
 Smart energy for home energy monitoring
 Health care for medical and fitness monitoring
 Home automation for control of smart homes
 Light Link for control of LED lighting
 Telecom services

So, we have discussed two very important protocols IEEE 802.15.4 and the ZigBee
protocol in this particular lecture. We have seen that where as the 802.15.4 it is
primarily restricted to the physical and the MAC layers ,ZigBee basically extends it
or enhances its functionality beyond network layer and all the way up to application
layer.
IoT Challenges

Developing a successful IoT application is still not an easy task


due to multiple challenges. These challenges include: mobility,
reliability, scalability, management, availability, interoperability,
and security and privacy. In the following, we briefly describe
each of these challenges.
Mobility

IoT devices need to move freely and change their IP address and
networks based on their location. Thus, the routing protocol, such
as RPL has to reconstruct the DODAG each time a node goes off
the network or joins the network which adds a lot of overhead. In
addition, mobility might result in a change of service provider
which can add another layer of complexity due to service
interruption and changing gateway.
Reliability

System should be perfectly working and delivering all of its


specifications correctly. It is a very critical requirement in
applications that requires emergency responses. In IoT
applications, the system should be highly reliable and fast in
collecting data, communicating them and making decisions and
eventually wrong decisions can lead to disastrous scenarios.
Scalability

Scalability is another challenge of IoT applications where millions


and trillions of devices could be connected on the same network.
Managing their distribution is not an easy task. In addition, IoT
applications should be tolerant of new services and devices
constantly joining the network and, therefore, must be designed to
enable extensible services and operations.
Management

Managing all These devices and keeping track of the failures,


configurations, and performance of such large number of devices
is definitely a challenge in IoT. Providers should manage Fault,
Configuration, Accounting, Performance and Security (FCAPS) of
their interconnected devices and account for each aspect.
Availability

Availability of IoT includes software and hardware levels being


provided at anytime and anywhere for service subscribers.
Software availability means that the service is provided to anyone
who is authorized to have it. Hardware availability means that the
existing devices are easy to access and are compatible with IoT
functionality and protocols. In addition, these protocols should be
compact to be able to be embedded within the IoT constrained
devices.
Interoperability

Interoperability means that heterogeneous devices and protocols


need to be able to inter-work with each other. This is challenging
due to the large number of different platforms used in IoT
systems. Interoperability should be handled by both the
application developers and the device manufacturers in order to
deliver the services regardless of the platform or hardware
specification used by the customer.

You might also like