Professional Documents
Culture Documents
FIOT_UNIT_1
FIOT_UNIT_1
UNIT – I
IoT Definition:
A dynamic global n/w infrastructure with self configuring capabilities based on standard and interoperable
communication protocols where physical and virtual ―things‖ have identities, physical attributes and virtual
personalities and use intelligent interfaces, and are seamlessly integrated into information n/w, often
communicate data associated with users and their environments.
Features of IOT
The most important features of IoT on which it works are connectivity, analyzing,
integrating, active engagement, and many more. Some of them are listed below:
Connectivity: Connectivity refers to establish a proper connection between all the things of
IoT to IoT platform it may be server or cloud. After connecting the IoT devices, it needs a
high speed messaging between the devices and cloud to enable reliable, secure and bi-
directional communication.
Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data
collected and use them to build effective business intelligence. If we have a good insight
into data gathered from all these things, then we call our system has a smart system.
Integrating: IoT integrating the various models to improve the user experience as well.
Artificial Intelligence: IoT makes things smart and enhances life through the use of data.
For example, if we have a coffee machine whose beans have going to end, then the coffee
machine itself order the coffee beans of your choice from the retailer.
Sensing: The sensor devices used in IoT technologies detect and measure any change in the
environment and report on their status. IoT technology brings passive networks to active
networks. Without sensors, there could not hold an effective or true IoT environment.
Active Engagement: IoT makes the connected technology, product, or services to active
engagement between each other.
Advantages of IoT
Internet of things facilitates the several advantages in day-to-day life in the business sector.
Some of its benefits are given below:
o Efficient resource utilization: If we know the functionality and the way that how
each device work we definitely increase the efficient resource utilization as well as
monitor natural resources.
o Minimize human effort: As the devices of IoT interact and communicate with each
other and do lot of task for us, then they minimize the human effort.
o Save time: As it reduces the human effort then it definitely saves out time. Time is
the primary factor which can save through IoT platform.
Disadvantages of IoT
As the Internet of things facilitates a set of benefits, it also creates a significant set of
challenges. Some of the IoT challenges are given below:
o Security: As the IoT systems are interconnected and communicate over networks.
The system offers little control despite any security measures, and it can be lead the
various kinds of network attacks.
o Privacy: Even without the active participation on the user, the IoT system provides
substantial personal data in maximum detail.
o Complexity: The designing, developing, and maintaining and enabling the large
technology to IoT system is quite complicated.
IoT Applications
One of the lesser-known wearables includes the Guardian glucose monitoring device. The
device is developed to aid people suffering from diabetes. It detects glucose levels in the
body, using a tiny electrode called glucose sensor placed under the skin and relays the
information via Radio Frequency to a monitoring device.
The resources that current medical research uses, lack critical real-world information. It
mostly uses leftover data, controlled environments, and volunteers for medical
examination. IoT opens ways to a sea of valuable data through analysis, real-time field data,
and testing.
The Internet of Things also improves the current devices in power, precision, and
availability. IoT focuses on creating systems rather than just equipment.
The thing about the smart city concept is that it’s very specific to a city. The problems faced
in Mumbai are very different than those in Delhi. The problems in Hong Kong are different
from New York. Even global issues, like finite clean drinking water, deteriorating air quality
and increasing urban density, occur in different intensities across cities. Hence, they affect
each city differently.
• Factory Digitalization
• Product flow Monitoring
• Inventory Management
• Safety and Security
• Quality Control
• Packaging optimization
• Logistics and Supply Chain Optimization
Characteristics of IoT
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to
dynamically adapt with the changing contexts and take actions based on their operating
identifier(IP address).
5) Integrated into Information Network: that allow them to communicate
The things in IoT refers to IoT devices which have unique identities and
perform remote sensing, actuating and monitoring capabilities. IoT
devices can exchange data with other connected devices applications. It
collects data from other devices and process data either locally or
remotely.
An IoT device may consist of several interfaces for communication to
other devices both wired and wireless. These includes (i) I/O interfaces
for sensors, (ii) Interfaces for internet connectivity
(iii) memory and storage interfaces and (iv) audio/videointerfaces.
2) IoTProtocols:
a) Link Layer : Protocols determine how data is physically sent over
the network‘s physical layer or medium. Local network connect to
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
Protocols:
• 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet
standards for the link layer. Eg: 802.3 uses co-axial cable; 802.3i
uses copper twisted pair connection; 802.3j uses fiber optic
connection; 802.3ae uses Ethernet overfiber.
• 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN)
communication standards including extensive description of link
layer. Eg: 802.11a operates in 5GHz band, 802.11b and 802.11g
operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band,
Protocols:
• IPv4: Internet Protocol version4 is used to identify the
devices on a n/w using a hierarchical addressing scheme.
32 bit address. Allows total of 2**32addresses.
• IPv6: Internet Protocol version6 uses 128 bit address
scheme and allows 2**128 addresses.
• 6LOWPAN:(IPv6overLowpowerWirelessPersonalAreaNetwork)oper
atesin
2.4 GHz frequency range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer
capability independent of the underlying n/w. Set up on connection
with ACK as in TCP and without ACK as in UDP. Provides functions
such as error control, segmentation, flow control and congestion
control. Protocols:
• TCP: Transmission Control Protocol used by web browsers(along
with HTTP and HTTPS), email(along with SMTP, FTP).
Connection oriented and stateless protocol. IP Protocol deals with
sending packets, TCP ensures reliable transmission of protocols in
order. Avoids n/w congestion and congestioncollapse.
• UDP: User Datagram Protocol is connectionless protocol. Useful
in time sensitive applications, very small data units to exchange.
Transaction oriented and stateless protocol. Does not provide
guaranteeddelivery.
D) Application Layer: Defines how the applications interface with
lower layer protocols to send data over the n/w. Enables process-to-
process communication usingports.
Protocols:
• HTTP: Hyper Text Transfer Protocol that forms foundation of
WWW. Follow request- response model Stateless protocol.
• CoAP: Constrained Application Protocol for machine-to-
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
2) IoT CommunicationModels:
1) Request-ResponseModel:
In which the client sends request to the server and the server
replies to requests. Is a stateless communication model and each
request-response pair is independent of others.
2) Publish-SubscibeModel:
3) IoT CommunicationAPIs:
a) REST based communication APIs(Request-Response BasedModel)
b) WebSocket based Communication APIs(Exclusive PairBasedModel)
Sensing
Sensor:
Example:
Transducers:
Sensor Resolution:
• Based on Energy
Passive and Active Sensors
• Based on Output
Analog and Digital Sensors
• Based on Data type
Scalar and Vector Sensors
Passive Sensor:
Active Sensor:
Analog Sensors:
Vector Sensors:
• Temperature Sensor
• Proximity Sensor
• Pressure Sensor
• Level Sensor
• IR Sensor
• Ultrasonic Sensor
• Image sensors
• Accelerometer Sensors
• Gyrometer Sensors
• Humidity Sensors
• Optical Sensors
Basis For
Sensor Transducer
Comparison
Definition Senses the physical changes The transducer is a device which, when
occurs in the surrounding and actuates transforms the energy from one form
converting it into a readable to another.
quantity.
Function Detects the changes and induces Conversion of one form of energy into
the corresponding electrical another.
signals.
Actuation
Actuators convert an electrical signal into a corresponding physical quantity such as
movement, force, sound etc. An actuator is also classed as a transducer because it
changes one type of physical quantity into another and is usually activated or operated
by a low voltage command signal.
Actuators can be classified by the motion they produce and the power source they
use.
Motion
Actuators can create two main types of motion: linear and rotary.
Linear Actuators
Implied by their name, linear actuators are devices that produce movement within a
straight path. They can either be mechanical or electrical and are mostly seen in
hydraulic or pneumatic devices. Any machine, equipment, or gadget that requires some
form of straight motion typically has a linear actuator.
In a simple linear actuator, there is a nut, cover, and a sliding tube. The sliding tube
provides the space for the motion, whereas the nut and cover provide the interlocking
movement that keeps the actuator in a straight path. Other complex linear actuators
will have additional parts, but the system mentioned above is the foundation for
straight movement.
Rotary Actuators
In contrast to linear actuators, rotary actuators create a circular motion. From the term
“rotary,” most machines use these rotating parts to complete a turning movement. They
are often used in conjunction with a linear actuator if a machine requires moving
forward, backward, up, or down.
Many rotary actuators are electrically powered, but some are powered using a
hydraulic or pneumatic system. You can find rotary actuators in windshield wipers,
electric fans, or manufacturing machines that transport goods from one area to another.
Source of Energy
To further distinguish different types of actuators, we can also sort them according to
the power source or system they use to move. Below are the most common actuators
according to energy source:
Hydraulic Actuators
Pneumatic Actuators
Pneumatic actuators are one of the most reliable options for machine motion. They use
pressurized gases to create mechanical movement. Many companies prefer pneumatic-
powered actuators because they can make very precise motions, especially when
starting and stopping a machine.
• Bus brakes
• Exercise machines
• Vane motors
• Pressure sensors
• Pneumatic mailing systems
Electric Actuators
Electrical actuators, as you may have guessed, require electricity to work. Well-known
examples include electric cars, manufacturing machinery, and robotics equipment.
Similar to pneumatic actuators, they also create precise motion as the flow of electrical
power is constant.
Thermal and magnetic actuators usually consist of shape memory alloys that can be
heated to produce movement. The motion of thermal or magnetic actuators often
comes from the Joule effect, but it can also occur when a coil is placed in a static
magnetic field. The magnetic field causes constant motion called the Laplace-Lorentz
force. Most thermal and magnetic actuators can produce a wide and powerful range of
motion while remaining lightweight.
Mechanical Actuators
Some actuators are mostly mechanical, such as pulleys or rack and pinion systems.
Another mechanical force is applied, such as pulling or pushing, and the actuator will
leverage that single movement to produce the desired results. For instance, turning a
single gear on a set of rack and pinions can mobilize an object from point A to point B.
The tugging movement applied on the pulley can bring the other side upwards or
towards the desired location.
Supercoiled polymer actuators are a relatively new addition to the different types of
actuators. They are used in robotics and prosthetic limbs as they can replicate the
motion of human muscle via a coil that contracts and expands when heated or cooled.
IoT network
An IoT network refers to a collection of interconnected devices that communicate
with other devices without the need for human involvement, such as autonomous cars,
smart appliances, and wearable tech.
IoT Components:
IoT is a transformation process of connecting our smart devices and objects to network
to perform efficiently and access remotely
The Basic IoT Components are:
Most of the modern smart devices and sensors can be connected to low power
wireless networks like Wi-Fi, ZigBee, Bluetooth, Z-wave, LoraWAN etc… Each of
these wireless technologies has its own pros and cons in terms of power, data transfer
rate and overall efficiency.
Developments in the low power, low cost wireless transmitting devices are promising
in the area of IoT due to its long battery life and efficiency. Latest protocols like
6LoWPAN- IPv6 over Low Power Wireless Personal Area Networks have been
adapted by many companies to implement energy efficient data transmission for IoT
networks.
6LoWPAN uses reduced transmission time (typically short time pulses) and thus saves energy.
2. Gateway
Image: pinterest.com
IoT Gateway manages the bidirectional data traffic between different networks and
protocols. Another function of gateway is to translate different network protocols and
make sure interoperability of the connected devices and sensors.
IoT gateway offers certain level of security for the network and transmitted data with
higher order encryption techniques. It acts as a middle layer between devices and cloud
to protect the system from malicious attacks and unauthorized access.
3. Cloud
Internet of things creates massive data from devices, applications and users which has
to be managed in an efficient way. IoT cloud offers tools to collect, process, manage
and store huge amount of data in real time. Industries and services can easily access
these data remotely and make critical decisions when necessary.
Basically, IoT cloud is a sophisticated high performance network of servers optimized
to perform high speed data processing of billions of devices, traffic management and
deliver accurate analytics. Distributed database management systems are one of the
most important components of IoT cloud.
Cloud system integrates billions of devices, sensors, gateways, protocols, data storage
and provides predictive analytics. Companies use these analytics data for improvement
of products and services, preventive measures for certain steps and build their new
business model accurately.
4. Analytics
Analytics is the process of converting analog data from billions of smart devices and
sensors into useful insights which can be interpreted and used for detailed analysis.
Smart analytics solutions are inevitable for IoT system for management and
improvement of the entire system.
One of the major advantages of an efficient IoT system is real time smart analytics
which helps engineers to find out irregularities in the collected data and act fast to
prevent an undesired scenario. Service providers can prepare for further steps if the
information is collected
5. User interface
User interfaces are the visible, tangible part of the IoT system which can be accessible
by users. Designers will have to make sure a well designed user interface for minimum
effort for users and encourage more interactions.
Modern technology offers much interactive design to ease complex tasks into simple
touch panels controls. Multicolor touch panels have replaced hard switches in our
household appliances and the trend is increasing for almost every smart home devices.
The IoT implementation can be done to achieve different application needs. Figure
shows that we have different sensors, processors and radio.
It refitted to each of these devices or the sensor nodes or the sensor motes or the IoT
motes . These motes, they talk to one another, but these different sensor nodes, they are
basically within the jurisdiction or the domain of the gateway.
The gateway is basically tasked to assign different locally unique addresses to these
different nodes, to these different IoT nodes and the gateway basically takes care of the
local addressing within that particular local area network.
So, from that point, all the data can flow through a proxy server if internet access is
required. It will go through the internet, then a web socket and from the websocket, it
goes through a cloud server. That means, this is where lot of analytics and backend
processing takes place and based on that the actuation based on the analytics and the
inference that are drawn from the sensed data actuation of different devices can take
place.
management unit which does things like duty cycling of the sensors, how
much the sensors you know how much time we are going to be active or
how much time they are going to be in the sleep state, how to power them
because these are very small, very resource staved sensors. So, basically the
power unit in these sensor nodes, these are very small in size. So, basically
consequently what happens is these embedded devices; they themselves are
very resource starved.
Alongside we also have things like virtual machines which take care of the
virtualization of the nodes.
The web, and there are different things like http client, MQTT client,
CoAP client. We have different application level protocols that are used for
functioning of these different IoT devices.
Service-oriented architecture
IoT Categories:
IoT is classified as
The industrial internet of things (IIoT) refers to the extension and use of the internet
of things (IoT) in industrial sectors and applications.
The IIoT encompasses industrial applications, including robotics, medical devices, and
software-defined production processes.
The Consumer IoT refers to the billions of physical personal devices, such as
smartphones, wearables, fashion items and the growing number of smart home
appliances, that are now. connected to the internet, collecting and sharing data.
IoT Protocols:
IoT Protocols
IoT Protcols help to establish Communication between IoT Device (Node Device) and
Cloud based Server over the Internet. It help to sent commands to IoT Device and
received data from an IoT device over the Internet. An image is given below. By this
image you can understand which protocols used.
Defines how the applications interface with lower layer protocols to send data over the
n/w and enables process-to-process communication using ports. The following are the
Application Layer Protocols.
•HTTP
•CoAP
•WebSocket
•MQTT
•XMPP
•DDS
•AMQP
This protocol has formed the foundation of data communication over the web. It is the
most common protocol that is used for IoT devices when there is a lot of data to be
published. However, the HTTP protocol is not preferred because of its cost, battery-
life, energy saving, and more constraints.
Additive manufacturing/3D printing is one of the use cases of the HTTP protocol. It
enables computers to connect 3D printers in the network and print three-dimensional
objects and pre-determined process prototypes.
✓ Web transfer protocol for use with constrained nodes and networks.
✓ Built over UDP, instead of TCP (which is commonly used with HTTP) and has
a light mechanism to provide reliability.
1. Messaging
2. Request/response.
1. Confirmable
2. Non‐confirmable
3. Piggyback
4. Separate
2. Piggyback is used for client/server direct communication where the server sends
its response directly after receiving the message, i.e., within the
acknowledgment message.
3. On the other hand, the separate mode is used when the server response comes in
a message separate from the acknowledgment, and may take some time to be
sent by the server.
4. Similar to HTTP, CoAP utilizes GET, PUT, PUSH, DELETE messages requests
to retrieve, create, update, and delete, respectively .
MQTT is one of the most commonly used protocols in IoT projects. It stands for
Message Queuing Telemetry Transport.
MQTT has unique features you can hardly find in other protocols, like:
• It’s a lightweight protocol. So, it’s easy to implement in software and fast in data
transmission.
• It’s based on a messaging technique. Of course, you know how fast your
messenger/WhatsApp message delivery is. Likewise, the MQTT protocol.
• Minimized data packets. Hence, low network usage.
MQTT is based on clients and a server. Likewise, the server is the guy who is
responsible for handling the client’s requests of receiving or sending data between each
other.
• MQTT server is called a broker and the clients are simply the connected devices.
• When a device (a client) wants to send data to the broker, we call this operation
a “publish”.
• When a device (a client) wants to receive data from the broker, we call this
operation a “subscribe”.
In addition, These clients are publishing and subscribing to topics. So, the broker here
is the one that handles the publishing/subscribing actions to the target topics.
Example:
Let’s say there is a device that has a temperature sensor. Certainly, it wants to send his
readings to the broker. On the other side, a phone/desktop application wants to receive
this temperature value. Therefore, 2 things will happen:
• The device defines the topic it wants to publish on, ex: “temp”. Then, it
publishes the message “temperature value”.
Again, the broker role here is to take the message “temperature value” and deliver it to
phone/desktop application.
MQTT Components:
• Broker, which is the server that handles the data transmission between the
clients.
• A topic, which is the place a device want to put or retrieve a message to/from.
• The message, which is the data that a device receives “when subscribing” from a
topic or send “when publishing” to a topic.
• Publish, is the process a device does to send its message to the broker.
• Subscribe, where a device does to retrieve a message from the broker.
The number of connected devices “clients” to the broker depends on the broker service
provider.
In fact, it can reach a massive number of clients those are publishing and subscribing
all the time.
but the amazing part of this isn’t only the huge number of these connected devices but
also any the fact that any device can get any other device’s data at any time. As a
result, the applications based on these quickly shared data are limitless.
MQTT Topics
✓ A topic is a simple string that can have more hierarchy levels, which are
separated by a slash.
✓ A sample topic for sending temperature data of the living room could be
house/living‐room/temperature.
✓ On one hand the client (e.g. mobile device) can subscribe to the exact topic or
on the other hand, it can use a wildcard.
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
Applic ations
SMQTT
✓ In general, the algorithm consists of four main stages: setup, encryption, publish
and decryption.
✓ In the setup phase, the subscribers and publishers register themselves to the
broker and get a master secret key according to their developer’s choice of key
generation algorithm.
✓ When the data is published, it is encrypted and published by the broker which
sends it to the subscribers, which is finally decrypted at the subscriber end
having the same master secret key.
✓ The key generation and encryption algorithms are not standardized.
✓ SMQTT is proposed only to enhance MQTT security features.
Highlights:
✓ Decentralization – No central server; anyone can run their own XMPP server.
✓ Open standards – No royalties or granted permissions are required to implement
these specifications
✓ Security – Authentication, encryption, etc.
✓ Flexibility – Supports interoperability
Weaknesses
Applic ations
✓ Publish‐subscribe systems
✓ Signaling for VoIP
✓ Video
✓ File transfer
✓ Gaming
✓ Internet of Things applications
▪ Smart grid
▪ Social networking services
AMQP Components
The AMQP Model defining how messages are received, routed, stored, queued and
how application parts handling these tasks work rely on the clear set definitions of the
below components:
• Exchange: A part of the broker (i.e. server) which receives messages and routes
them to queues
• Queue (message queue): A named entity which messages are associated with
and from where consumers receive them
• Bindings: Rules for distributing messages from exchanges to queues
✓ At‐most‐once
▪ each message is delivered once or never
✓ At‐least‐once
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
✓ Nine AMQP frame types are defined that are used to initiate, control and tear
down the transfer of messages between two peers:
▪ Open (connection open)
▪ Begin (session open)
▪ Attach (initiate new link)
▪ Transfer (for sending actual messages)
▪ Flow (controls message flow rate)
▪ Disposition (Informs the changes in state of transfer)
▪ Detach (terminate the link)
▪ End (session close)
▪ Close (connection close)
AMQP Features
WebSocket
Communication Protocols:
The following communication protocols have immediate importance to consumer and
industrial IoT.
✓ IEEE 802.15.4
✓ Zigbee
✓ 6LoWPAN
✓ Wireless HART
✓ Z‐Wave
✓ ISA 100
✓ Bluetooth
✓ NFC
✓ RFID
IEEE 802.15.4
Features of IEEE 802.15.4
✓ This standard uses only the first two layers (PHY, MAC) plus the logical link
✓ Highly tolerant of noise and interference and offers link reliability improvement
mechanisms.
✓ Uses carrier sense multiple access with collision avoidance (CSMA‐CA) for
channel access.
Node types
The first one is the full-function device (FFD). It can serve as the coordinator of a
personal area network just as it may function as a common node. It implements a
general model of communication which allows it to talk to any other device: it may
also relay messages, in which case it is dubbed a coordinator (PAN coordinator when it
is in charge of the whole network).
On the other hand, there are reduced-function devices (RFD). These are meant to be
extremely simple devices with very modest resource and communication requirements;
due to this, they can only communicate with FFDs and can never act as coordinators.
Topologies
Networks can be built as either peer-to-peer or star networks. However, every network
needs at least one FFD to work as the coordinator of the network. Networks are thus
formed by groups of devices separated by suitable distances. Each device has a unique
64-bit identifier, and if some conditions are met, short 16-bit identifiers can be used
within a restricted environment. Namely, within each PAN domain, communications
will probably use short identifiers.
A more structured star pattern is also supported, where the coordinator of the network
will necessarily be the central node. Such a network can originate when an FFD
decides to create its own PAN and declare itself its coordinator, after choosing a
unique PAN identifier. After that, other devices can join the network, which is fully
independent from all other star networks.
Beacon Enabled:
Zigbee
• It is designed especially for industrial sites where low power is required and less
for the consumers’ network. With a maximum 1024 number of nodes in the
network, Zigbee can transfer data with a range of up to 200 meters, ZigBee can
even use 128 bit AES encryption.
Features of ZigBee
• The ZigBee protocol is defined by layer 3 and above. It works with the
802.15.4 layers 1 and 2.
• The most popular use of ZigBee is wireless sensor networks using the mesh
topology.
ZigBee Mesh
intermediate nodes.
• For example, if nodes C and Fare down, the message packets from A can still be
relayed to G via B and E.
ZigBee Types
• The Coordinator forms the root of the ZigBee network tree and might act as a
bridge between networks.
• It contains just enough functionality to talk to the parent node, and it cannot
relay data from other devices.
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
• This allows the node to be asleep a significant amount of the time thereby
enhancing battery life.
Applications
• Building automation
• Telecom services
6LoWPAN
• Allows for the smallest devices with limited processing ability to transmit
information wirelessly using an Internet protocol.
• üCreated by the Internet Engineering Task Force (IETF) ‐ RFC5933 and RFC
4919
• Standard- LoRaWAN
• Frequencies- Various
Features of 6LoWPANs
Addressing in 6LoWPAN
RFID
RFID-Introduction
• The tag is covered by a protective material which also acts as a shield against
various environmental effects.
Working Principle
• AIDC performs object identification, object data collection and mapping of the
collected data to computer systems with little or no human intervention.
• The main components of an RFID system include an RFID tag or smart label,
an RFID reader, and an antenna.
Applications
• Inventory management
• Asset tracking
• Personnel tracking
• ID badging
• The wireless protocol makes the implementation of HART cheaper and easier.
• HART encompasses the most number of field devices incorporated in any field
network.
• Wireless HART enables device placements more accessible and cheaper– such
as the top of a reaction tank, inside a pipe, or at widely separated warehouses.
• Main difference between wired and unwired versions is in the physical,data link
and network layers.
• Wireless HART relies on Mesh networking for its communication , and each
device is primed to forward packets from every other devices.
• Each device is armed with an updated network graph (i.e., updated topology) to
handle routing.
• This layer is seamless and does not differentiate between wireless and wired
versions of HART.
• Restricted to 2.4Ghz ISM band with channel 26 removed, due to its restricted
usage in certain areas.
• During each slot, all available channels can be utilized by the various nodes in
the network allowing for the propagation of 15 packets through the network at a
time, which also minimizes the risk of collisions.
• The network manager supervises each node in the network and guides them
on when and where to send packets.
• Allows for collision‐free and timely delivery of packets between a source and
destination. The network manager updates information about neighbors,
signal strength, and information needing delivery or receipt.
• Decides who will send, who will listen, and at what frequency is each time‐slot.
• A Wireless HART node hops after every message, changing channels every
time it sends a packet. ZigBee does not feature hopping at all, and only hops
when the entire network hops.
• At the MAC layer, Wireless HART utilizes time division multiple access
(TDMA), allotting individual time slots for each transmission. ZigBee applies
carrier sense multiple access with collision detection (CSMA/CD).
• Wireless HART represents a true mesh network, where each node is capable of
serving as a router so that, if one node goes down, another can replace it,
ensuring packet delivery. ZigBee utilizes a tree topology, which makes nodes
along the trunk critical.
• Wireless HART devices are all back compatible, allowing for the integration of
legacy devices as well as new ones. ZigBee devices share the same basis for
their physical layers, but ZigBee, ZigBee Pro, ZigBee RF4CE, and ZigBee IP
are otherwise incompatible with each other.
NFC
inherently more secure because devices normally only come into contact and
hence communication when the user intends this.
• As no physical connectors are used with NFC near field communication, the
connection is more reliable and does not suffer problems of contact wear,
corrosion and dirt experienced by systems using physical connectors.
• NFC utilises inductive-coupling, at a frequency of 13.56 MHz - a licence free
allocation in the HF portion of the radio spectrum.
• NFC is a form of RFID, but it has a specific set of standards governing its
operation, interface, etc. This means that NFC equipment, and elements from a
variety of manufacturers can be used together. The NFC standards determine not
only the contactless operating environment, but also the data formats and data
transfer rates.
NFC applications
Near field communication NFC lends itself ideally to a whole variety of applications.
These include:
• Payment cards
• Ticketing
• Mobile phones, PDAs, etc
The data transfer rate may be either 106, 212 or 424 kbps. The application itself sets up
the initial communication speed, but it may be changed later dependent upon the
communication environment and the requirements.
The NFC near field communication standard defines two types of NFC device. These
are known as the Initiator and Target of the communication. As the names imply, the
initiator is the device that initiates the communication and it controls the data
exchanges. The Target device is the one that responds to the requests from the Initiator.
The NFC near field communication standard defines two different modes of operation:
In addition to the NFC modes of operation, three communication modes are also
defined:
• Read / Write: This mode of operation within NFC near field communication
allows applications to transfer data in an NFC Forum-defined message format. It
should be noted that this mode is not secure. It is also necessary to note that this
mode is supported the Contactless Communication API
• NFC card emulation: This NFC mo enables the NFC device to behave as a
standard Smartcard. In this mode, data transfer is secure and the mode is also
supported by the Contactless Communication API.
• Peer to peer: A third mode within NFC is the peer to peer mode which
supports device to device link-level communication. It is worth noting that this
mode of NFC communication is not supported by the Contactless
Communication API.
Bluetooth
Introduction
Features
Baseband
L2CAP
Provides:
RFComm
Bluetooth Topologies:
Piconets
Piconet is a Bluetooth network that consists of one primary (master) node and seven
active secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations
within the distance of 10 meters.
• The communication between the primary and the secondary can be one-to-one or
one-to-many.
• In addition to seven active slave station, a piconet can have up to 255 parked nodes.
These parked nodes are secondary or slave stations and cannot take part in
communication until it is moved from parked state to active state.
2. Scatternet
• Such a station or node can receive messages from the master in the first piconet and
deliver the message to its slaves in other piconet where it is acting as master. This node
is also called bridge slave.
Applications
• Audio players
• Home automation
• Smart phones
• Toys
• Hands free headphones
• Sensor networks
Z Wave
• Zwave (or Z wave or Z‐wave) is a protocol for communication among devices
used for home automation.
• It uses RF for signaling and control.
• Operating frequency is 908.42 MHz in the US & 868.42 MHz in Europe.
• Mesh network topology is the main mode of operation, and can support 232
nodes in a network.
• Zwave utilizes GFSK modulation and Manchester channel encoding.
• A central network controller device sets‐up and manages a Zwave network.
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
• Each logical Zwave network has 1 Home (Network) ID and multiple node IDs
for the devices in it.
• Nodes with different Home IDs cannot communicate with each other.
• Network ID length=4 Bytes, Node ID length=1 Byte.
•
GFSK
ISA 100.11A
Introduction
• Star/tree
• Mesh
• Radio link
• ISA over Ethernet
• Field buses
• It can pass objects (methods, attributes) natively within the ISA 100.11A
protocol.
A tunneling mode is available to allow legacy data through the ISA100.11A network.
Features
• Flexibility
• Support for multiple protocols
• Use of open standards
• Support for multiple applications
• Reliability (error detection, channel hopping)
• Determinism (TDMA, QoS support)
• Security
Security
Sensor Networks
A Wireless Sensor Network is one kind of wireless network that includes a large
number of circulating, self-directed, minute, low powered devices named sensor nodes
called motes. These networks certainly cover a huge number of spatially distributed,
little, battery-operated, embedded devices that are networked to caringly collect,
process, and transfer data to the operators, and it has controlled the capabilities of
computing & processing. Nodes are tiny computers, which work jointly to form
network.
The most common wireless sensor network architecture follows the OSI architecture
Model. The architecture of the WSN includes five layers and three cross layers. Mostly
in sensor n/w, we require five layers, namely application, transport, n/w, data link &
physical layer. The three cross planes are namely power management, mobility
management, and task management. These layers of the WSN are used to accomplish
the n/w and make the sensors work together in order to raise the complete efficiency of
the network.
This kind of network uses hundreds of sensor nodes as well as a base station. Here the
arrangement of network nodes can be done into concentric layers. It comprises five
layers as well as 3 cross layers which include the following.
• Application Layer
• Transport Layer
• Network Layer
• Data Link Layer
• Physical Layer
Application Layer
The application layer is liable for traffic management and offers software for numerous
applications that convert the data in a clear form to find positive information. Sensor
networks arranged in numerous applications in different fields such as agricultural,
military, environment, medical, etc.
Transport Layer
The function of the transport layer is to deliver congestion avoidance and reliability
where a lot of protocols intended to offer this function are either practical on the
upstream. These protocols use dissimilar mechanisms for loss recognition and loss
recovery. The transport layer is exactly needed when a system is planned to contact
other networks.
Providing a reliable loss recovery is more energy-efficient and that is one of the main
reasons why TCP is not fit for WSN. In general, Transport layers can be separated into
Packet driven, Event-driven. There are some popular protocols in the transport layer
namely STCP (Sensor Transmission Control Protocol), PORT (Price-Oriented Reliable
Transport Protocol and PSFQ (pump slow fetch quick).
Network Layer
The main function of the network layer is routing, it has a lot of tasks based on the
application, but actually, the main tasks are in the power conserving, partial memory,
buffers, and sensor don’t have a universal ID and have to be self-organized.
The simple idea of the routing protocol is to explain a reliable lane and redundant
lanes, according to a convincing scale called a metric, which varies from protocol to
protocol. There are a lot of existing protocols for this network layer, they can be
separated into; flat routing and hierarchal routing or can be separated into time-driven,
query-driven & event-driven.
The data link layer is liable for multiplexing data frame detection, data streams, MAC,
& error control, confirm the reliability of point–point (or) point– multipoint.
Physical Layer
The physical layer provides an edge for transferring a stream of bits above the physical
medium. This layer is responsible for the selection of frequency, generation of a carrier
frequency, signal detection, Modulation & data encryption. IEEE 802.15.4 is suggested
as typical for low rate particular areas & wireless sensor networks with low cost, power
consumption, density, the range of communication to improve the battery life.
CSMA/CA is used to support star & peer to peer topology. There are several versions
of IEEE 802.15.4.V.
In this kind of architecture, separately sensor nodes add into groups known as clusters
which depend on the “Leach Protocol” because it uses clusters. The term ‘Leach
Protocol’ stands for “Low Energy Adaptive Clustering Hierarchy”. The main
properties of this protocol mainly include the following.
• In every cluster which is formed separately, the head nodes of the cluster will
create the TDMA (Time-division multiple access) plans.
• It uses the Data Fusion concept so that it will make the network energy efficient.
This kind of network architecture is extremely used due to the data fusion property. In
every cluster, every node can interact through the head of the cluster to get the data.
All the clusters will share their collected data toward the base station. The formation of
a cluster, as well as its head selection in each cluster, is an independent as well as
autonomous distributed method.
The design issues of wireless sensor network architecture mainly include the
following.
• Energy Consumption
• Localization
• Coverage
• Clocks
• Computation
• Cost of Production
• Design of Hardware
• Quality of Service
For radio communication networks, the structure of a WSN includes various topologies
like the ones given below.
Star Topologies
Due to its dependency on a single node to manage the network, the gateway must be
within the radio transmission range of all the individual nodes. The advantage includes
the ability to keep the remote nodes’ power consumption to a minimum and simply
under control. The size of the network depends on the number of connections made to
the hub.
III B.Tech II Semester Branch :CSE KITS(S)
Fundamentals of IoT Unit-1
Tree Topologies
Tree topology is also called as a cascaded star topology. In tree topologies, each node
connects to a node that is placed higher in the tree, and then to the gateway. The main
advantage of the tree topology is that the expansion of a network can be easily
possible, and also error detection becomes easy. The disadvantage with this network is
that it relies heavily on the bus cable; if it breaks, all the network will collapse.
Mesh Topologies
The Mesh topologies allow transmission of data from one node to another, which is
within its radio transmission range. If a node wants to send a message to another node,
which is out of the radio communication range, it needs an intermediate node to
forward the message to the desired node. The advantage of this mesh topology includes
easy isolation and detection of faults in the network. The disadvantage is that the
network is large and requires huge investment.