100% found this document useful (1 vote)
2K views18 pages

Unit 5 - Wireless Network - WWW - Rgpvnotes.in

The document discusses Internet of Things (IoT) architecture and its key components. It describes the typical 4-layer IoT architecture consisting of a sensing layer, network layer, data processing layer, and application layer. The sensing layer contains sensors and actuators that collect and transmit device data. The network layer includes gateways that collect, aggregate, and convert sensor data for transmission. The data processing layer analyzes and pre-processes data before sending it to applications. The application layer is where end-user applications access and manage data from the cloud/data centers. The document also outlines important design principles for IoT including abstraction, security, scalability, and support for multiple service delivery models.

Uploaded by

ZappY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views18 pages

Unit 5 - Wireless Network - WWW - Rgpvnotes.in

The document discusses Internet of Things (IoT) architecture and its key components. It describes the typical 4-layer IoT architecture consisting of a sensing layer, network layer, data processing layer, and application layer. The sensing layer contains sensors and actuators that collect and transmit device data. The network layer includes gateways that collect, aggregate, and convert sensor data for transmission. The data processing layer analyzes and pre-processes data before sending it to applications. The application layer is where end-user applications access and manage data from the cloud/data centers. The document also outlines important design principles for IoT including abstraction, security, scalability, and support for multiple service delivery models.

Uploaded by

ZappY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Please do not share these notes on apps like WhatsApp or Telegram.

The revenue we generate from the ads we show on our website and app
funds our services. The generated revenue helps us prepare new notes
and improve the quality of existing study materials, which are
available on our website and mobile app.

If you don't use our website and app directly, it will hurt our revenue,
and we might not be able to run the services and have to close them.
So, it is a humble request for all to stop sharing the study material we
provide on various apps. Please share the website's URL instead.
Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Subject: Wireless Network Subject Code: EC803(A)

Unit V
Internet of things (IoT) and GPS systems:
IoT architecture, Main design principles and needed capabilities, IoT Devices and gateways, Case studies:
Sensor body area network, Control of a smart home, Smart vehicles, Smart manufacturing and smart factory.
Emerging IoT standards, IoT-protocols, IoT Local and wide area networking, IEEE 802.15 WPAN, Bluetooth-pico
net, scatter net, Protocol stack, Interface between 802.11 and Bluetooth. Geolocation service techniques and
standards. Introduction to GPS-aided GEO augmented navigation (GAGAN), E.911, ZigBee, UWB and RFID.

5.1 IoT Architecture:

Internet of Things (IoT) technology has a wide variety of applications and use of Internet of Things is growing
so faster. Depending upon different application areas of Internet of Things, it works accordingly as per it has
been designed/developed. But it has not a standard defined architecture of working which is strictly followed
universally. The architecture of IoT as shown Fig 5.1 depends upon its functionality and implementation in
different sectors. Still, there is a basic process flow based on which IoT is built.

Application Layer
Smart
Smart Applications and Management Applications

Data Processing Layer


Process
Processing Unit
Information
Data Analytics/Decision Unit

Network Layer

Processing Unit Data


Internet Gateways/Network Gateways Transmission
(Data Acquisition system

Sensing Layer
Data Gathering
Physical objects (Sensors and Actuators)

Fig. 5.1 IOT Architecture

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

So, from the above Figure it is clear that there is 4 layers are present that can be divided as follows: Sensing
Layer, Network Layer, Data processing Layer, and Application Layer.
These are explained as following below.

Sensing Layer –
Sensors, actuators, devices are present in this Sensing layer. These Sensors or Actuators accepts
data(physical/environmental parameters), processes data and emits data over network.

Network Layer –
Internet/Network gateways, Data Acquisition System (DAS) are present in this layer. DAS performs data
aggregation and conversion function (Collecting data and aggregating data then converting analog data of
sensors to digital data etc). Advanced gateways which mainly opens up connection between Sensor networks
and Internet also performs many basic gateway functionalities like malware protection, and filtering also some
times decision making based on inputted data and data management services, etc.

Data processing Layer –


This is processing unit of IoT ecosystem. Here data is analyzed and pre-processed before sending it to data
center from where data is accessed by software applications often termed as business applications where data
is monitored and managed and further actions are also prepared. So here Edge IT or edge analytics comes into
picture.

Application Layer –
This is last layer of 4 stages of IoT architecture. Data centers or cloud is management stage of data where data
is managed and is used by end-user applications like agriculture, health care, aerospace, farming, defense, etc.

5.2 Main design principles and needed capabilities:


The architecture relies on the separation of resources providing sensing and actuation from the actual devices,
a set of contextual and real world entity-centric services, and the users of the services.
SENSEI further relies on an open-ended constellation of providers and users, and also provides a reference
model for different business roles. A number of design principles and guidelines are identified, and so is a set
of requirements.
Finally, the architecture itself contains a set of key functional capabilities.
IoT-A refers to as the Architectural Reference Model (ARM).
The vision of IoT-A is, via the ARM, to establish a means to achieve a high degree of interoperability between
different IoT solutions at the different system levels of communication, service, and information.
IoT-A provides a set of different architectural views, establishes a proposed terminology and a set of Unified
Requirements.
The overall design objective of IoT architecture shall be to target a horizontal system of real-world services
that are open, service-oriented, secure, and offer trust.
Design for reuse of deployed IoT resources across application domains.
Design for a set of support services that provide open service-oriented capabilities and can be used for
application development and execution.
Design for different abstraction levels that hide underlying complexities and heterogeneities.
Design for sensing and actors taking on different roles of providing and using services across different
business domains and value chains.
Design for ensuring trust, security, and privacy.
Design for scalability, performance, and effectiveness.

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Design for simplicity of management.


Design for different service delivery models.
Design for lifecycle support.

5.3 IoT Devices and gateways:


IoT devices: sensors
Sensors exist since long before the IoT in its current meaning and are ubiquitous in, for example, buildings,
factories, energy and much more. In all these cases sensors are part of the digital data backbone of connected
and intelligent solutions. Anything ‘smart’ and IoT-related is built upon sensors and other types of transducers
.

A transducer converts a signal in a form of energy into a signal in another form. In a context of IoT sensors
this simply means that sensors are able to sense conditions in or around the IoT device in which they are
present and in and around the (state and environments of) physical item to which they are attached. Sensors
can detect the events or changes in the environments and for the purposes for which they were designed and
communicate about these events or changes of specific parameters to systems and other devices which then
can use this data for actions, analysis and so forth.

Among the environmental parameters, factors and events that sensors can ‘sense’ and communicate about
are parameters such as sound, temperature, humidity, presence of specific chemical components or gases,
light, occupancy (e.g. of a room) and much more. It is clear that sensors are essential IoT components and
need to be very accurate because they are where the data gets captured to begin with.There are sensor
boards for applications such as smart city air quality monitoring and smart traffic applications.

IoT devices: actuators


Just like sensors, actuators are transducers. And just like sensors they have been used for quite some time
now and certainly since before IoT as a term was coined. Whereas sensors sense and send, actuators act and
activate. The actuator gets a signal and sets in motion what it needs to set in motion in order to act
upon/within an environment.

In a sense you could say that an actuator does the opposite of a sensor and it’s at least as crucial, even if today
what most companies do is acquiring and analyzing data, far less using data as triggers to make ‘something’
happen in the physical world where quite some value resides and not just in the scope of automation but also
in consumer IoT applications.

Let’s make the usage of actuators more tangible from an IoT perspective:

An example: actuators sit on your radiator or control airflow in a smart room in a smart home or smart
building; sensors detect there is no one in the room; actuators get triggered to lower temperature (or stop
HVAC or whatever); control system reports back decision to management system (with energy savings as a
result) and everyone happy.

You can imagine many other scenarios in that sense. Meeting room lights, air conditioning and heating are
turned off; worker approaches ‘smart office’, looks for available meeting room on his app and books it for
meeting; actuators get signals to make sure that the meeting room meets what one expects from a healthy
comfortable meeting room.OK, we make it sound a bit easier than it is. Just as there are many types of sensors
there are many types of actuators and ways in which they are used.

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

IoT gateways: devices on the intersection of devices/data and IoT platforms


In more than one sense IoT gateways can also be ranked under IoT devices. An IoT gateway can be hardware
but it can also be software and often a combination of both and, given the increasing functions of IoT
gateways it’s best to see them as a separate layer, not in the least because of these functions and the
technology aspects.

Essentially an IoT gateway plays a critical role on the intersection of IoT devices. IoT gateways de facto are
used for connectivity aggregation, encryption and decryption of IoT data (security), the translation of the
various protocols that exist in the overall IoT technology landscape
Simply said: they play a critical role on multiple levels but as the name suggests IoT gateways essentially are
just that: they are a gateway between the IoT device level and the technologies and environments where the
data from IoT devices really get leveraged.

5.4 Sensor body area network:


Wireless body area network (WBAN) is one crucial module of electronic-health recording. Generally, a
wireless body area network is arranged on a patient, and customarily contains of a gateway and some of
medical MEMS based sensors. These MEMS sensors are continuously used for tracking several sorts of
physiological indicators. The statistics data handshaking between those medical MEMS sensors and the
gateway is found out by using intra- wireless body area network communications, which has been underlined
in IEEE stds. 802.15.4 and 802.15.6 . Every gateway gathers biomedical signals from medical sensors which
have been distributed or placed in the body, and then onwards those to corresponding medical monitoring
centers WBAN communications channels.
In addition, for transmissions of medical data, the most important things to be considered is the quality of
service (QoS) being provided for the data transmission. This need a promising indicator that have to report a
priority of higher order over non-emergent ones ; and ii) transfer of consistent medical data consisting of
physical parameters should be planned by conjointly taking the information and delay time . In electronic-
health systems, based on the application-specific criticality levels the packets of data are generally categorized
into numerous classes. For instance, the data acquired from the electrocardiogram is given priority more
significant than body temperature, though both the parameters belonging nonemergency. Nevertheless,
excessive delays occur in any generous of information related to medical data may also lower the timeliness
of data transmission or distress the accuracy of disease monitoring and diagnosis. Along with it, the
implementation of priority-aware beyond wireless body area networks transmission scheduling depend on the
medical packets, which is needed to be reported by concomitant gateways. Nevertheless, unlike simple-
architecture sensors, wireless body area networks-gateways are meant to be smart devices high intellectual
data processing capability, So that they may behave tactically and inconsiderately.

5.5 Control of a smart home:


What Makes Your Smart Home so Smart
Interestingly, the first generation of smart homes had little to do with intelligence and was more about remote
control and automation. A decade ago, a futuristic space where you could operate blinders from your
smartphone or teach your thermostat to remember what temperature you prefer was enough to call it a
smart home. In 2019, this concept implies much more than that.

Today, a smart home using IoT and data science lives up to the consumer’s expectations and sometimes
even exceeds them. Using sensors, devices, appliances and the whole spaces in your house constantly
collect data on how you use them. They learn about your habits and determine consumption patterns using
complex algorithms. These insights then help personalize your experience at a granular level.

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Take the latest thermostats like Nest or Ecobee, for example. IoT smart home devices of the new generation
use their sensor datum to automatically adjust regimes to your routines. They monitor your location in real-
time and turn the heating on and off accordingly. The best part is that you really don’t have to do anything.
Smart thermostats rely on their algorithms to personalize the use of heating to your needs and save you good
money on reduced energy use.
More importantly, smart systems give you a previously unavailable picture of how things work in your
household. Connected devices collect data, process it and output meaningful insights on your app’s
dashboards. Thus, you can monitor, for example, how much electricity each device uses, calculate spending
on utilities in real time, track humidity and other air quality conditions in your space, etc.
Optimization of spending
As mentioned above, IoT and smart home systems enable transparency to your household. This, in turn,
allows you to seriously cut down on your utility spending.

Using the insights generated on electricity, water and gas consumption, you can easily identify the waste
points and adjust your usage accordingly. On top of that, smart appliances are usually designed to optimize
the use of resources. Smart lighting, for example, automatically turns on and off depending on the data
coming from the presence sensors.

5.6 Smart vehicles:


The implementation of IoT in automotive sector has brought in a huge development in the field of fleet
management. Trucks nowadays are integrated with weight measurement, location tracking, and several
other sensors. The volume of sensory data gathered from a large fleet of such trucks is stored into a cloud
application. This data is then processed through different analytics features and conceptualized into a visual
format. A fleet operator can easily go through this information to monitor different parameters associated
with its fleet. Some of the benefits that an IoT infused fleet management system offer to a fleet manager are:

• Real-time location monitoring of the fleet


• Weight/Volume tracking of cargo that the fleet is carrying
• Trucks’ performance statistics like fuel and mileage
• Tracking traffic conditions on the road
• Route management
• Time and Driver management

1. Connected Cars:
connected-cars
The idea of connected cars is not new. In fact, according to an estimation by Gartner, there will be more than
250 million connected cars in the world by the end of the year 2020. These cars are connected over an IoT
network called CV2X (cellular vehicle to everything) that connects vehicles and smart transport systems
with each other. Connected cars facilitate fast transmission of data and increase drivers’ response time
through enhanced vehicle communication.

2. Automotive Maintenance System:


Predictive analytics is one of the most startling features of IoT automotive. The sensors embedded in
different components of a car collect data and share it to a platform. This data is then processed by an
algorithm that can analyze the future outcomes of the component based on its performance. IoT automotive
maintenance system also helps a person to take necessary steps to prevent its car parts from sudden
breakdown. Just like dashboard indicators of a vehicle, this system alerts the driver about probable

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

malfunctions. However, the alerts are sent to the driver’s mobile, way before the problem even occurs. This
helps the driver to make cost-effective and time-saving steps to avoid component failure while driving.

4. Autonomous Vehicles:
Various car manufacturers are trying to develop a fully autonomous car that will assume all driving functions
from the driver. Even though developments have been made in this area, a fully independent vehicle is still to
be developed. However, semi-autonomous vehicles have been manufactured that partially assists drivers
with driving, braking, parking, and lane changing activities. IoT infused semi-autonomous cars take on-spot
decisions while partly controlling the vehicle operations to avoid accidents and reduce the load from the
driver. Along with different proximity sensors and cameras, cars are integrated with IoT systems to reduce
human error and make driving more comfortable and safe.

5. In-vehicle Infotainment and Telematics:


In-car Wi-Fi Capabilities powered by 4G LTE connection has enabled telematics features to IoT based
automotive. Telematics refers to the long transmission of computerized data. By using vehicular telematics a
car owner can keep an eagle eye view on its vehicle even from remote locations. Through a smartphone-
enabled dashboard, car owners can be ensured about its security, surveillance, and safety at all times.
External sensors and cameras keep a track of the vehicles’ condition and send the data to a mobile
application. Telematics system along with real-time alert system sounds an alarm in the owner’s smartphone
if someone tries to forcefully enter the vehicle without proper access. The smart car enabled with IoT also calls
concerned authorities immediately like ambulance or firefighters in case of an emergency.

5.7 Smart manufacturing and smart factory:


In the manufacturing sector, the rise of Industry 4.0 is evolving at a rapid pace and technological
advancements are the backbone of this evolution. Key technologies such as Artificial Intelligence, Machine
Learning, Automation and Industrial Internet of Things (IIOT) are essential. As part of connected and adaptive
manufacturing, Smart Factories are a new opportunity to adopt exciting technology in order to achieve
demanding production goals.

Smart Factory

Smart Factories rely heavily on smart manufacturing, with the use of data, they are a highly digitalised and
connected production facility. They are designed to drive the adoption of digital manufacturing processes
and create better outcomes for productivity, delivery, reduced labor and energy costs. As part of Industry
4.0, new technologies will be introduced as part of intelligent manufacturing and they can also be found in
Smart Factories, for example: Adopting robotics at a deeper level such as drones that would replace current
human workloads. Use of machine learning to analyse data gathered by sensors and monitoring devices in
order to make real-time decisions to improve the efficiency of production.

5.8 Emerging IoT standards:

Standard-based LPWAN
Geared for low-bandwidth, low computing end nodes, the newer Low Power Wide Area Networks (LPWAN)
offer highly power-efficient and affordable IoT connectivity in vast, structurally dense environments. No
current wireless classes could beat LPWAN when it comes to battery life, device and connectivity costs, as
well as ease of implementation. Due to this unique combination of features, LPWAN has established itself as

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

a key driver of massive, latency-tolerant sensors network in industrial IoT, smart building and smart city
sectors.

2. 5G
The latest cellular standard has been the subject of endless discussion and excitement across the board. And
while telco service operators have successively announced the launch of early next-gen cellular networks in
several countries since mid-2019, 3GPP Release 16 and with it, the “full 5G vision” is still yet to come. Planned
for completion in late 2020, Release 16 will bring major enhancements on ultra-reliable low-latency
communication (URLLC). On top of that, it will introduce a host of improvements as part of the “5G efficiency”
roadmap – including reduced network congestion, higher power efficiency and enhanced mobility. With that
said, 5G roll-out will span over the next few years and devices supporting full features are further down the
road.Besides its destined role in the consumer mobile market, 5G is deemed to be a major catalyst for other
emerging tech trends like augmented/virtual reality and connected vehicles. Providing reliable and
omnipresent IoT connectivity in urban areas, the technology will also play a vital role in telehealth innovations
alongside public safety and mission-critical communications.

3. Wi-Fi 6
While the term Wi-Fi 6 (aka 802.11.ax) has been hovering in the air for some time, its full specifications and
official launch only came later last year. Given Wi-Fi’s prevalence in our daily life, it’s no surprise that the latest
generation has garnered rapt attention at the CES. There’s already an abundance of compatible gadgets, and
as hardware prices continue to drop.

4. Bluetooth 5.X
Today, Bluetooth 5.0 offers a highly energy-efficient option to stream audios and send large data files
without quickly draining your device battery. If speed isn’t a top requirement, Bluetooth 5.0 also allows
devices to communicate at low data rates in exchange for a much-improved range of up to 200 meters,
making the technology ideal for next-gen smart home gadgets.

5.9 IoT-protocols:
The IoT system can perform and transfer information only when they are in online mode. For example, when
devices in IoT are safely connected to communication networks. Here the question arises that how much
connection is possible and what sort of connections are available for making these thousands of devices to
communicate with each other. The answer to these entire questions is PROTOCOL. We can say that protocols
enable these devices to communicate with each other and many protocols have been introduced so far and
continuously many protocols are being introduced. Here, a brief description of commonly used protocols in
the Internet of Things is provided.

IOT NETWORKS REQUIREMENTS


Some mandatory requirements to build an IoT network are listed below:

 Scalable i.e. can connect a large number of devices


 Highly reliable
 Support data transmission in real time with minimized delays
 Protect data flows
 Capable of configuring applications
 Traffic management and monitoring at device level
 It should be cost effective so that large number of devices can be connected.

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Types of IoT PROTOCOLS


Although, there exist a large number of IoT protocols are used in IoT. but here we will be discussing some
widely used protocols in the Internet of Things which are listed below:

MQTT Protocol
The first IOT protocol we are going to explain is MQTT (message queue telemetry transport). It is a lightweight
protocol and used for sending data from sensors to middleware and applications. Additionally, it works on top
of TCP / IP in order for providing reliable delivery of data. Furthermore, it has three main components:
Subscriber, Publisher and Broker
Hence, the basic workflow of this protocol is that the publisher is responsible for generating and transmission
of information to subscribers through a broker. The main function of a broker is to ensure security by
checking authorization of subscribers and publishers. This protocol is preferred for IoT devices because it
provides well-organized information routing function to cheap, small, low memory and power devices and also
low bandwidth networks.

DDS
DDS stands for data distribution service. In IoT it is used for scalable, real-time and for machine – machine high
performance. This protocol can be used in devices as well as in cloud. Mainly, it consists of two main layers:
DCPS i.e. data centric publish subscriber. It is used for delivering information to the subscribers
DLRL i.e. data local reconstruction layer. It is used for providing an interface to the functions of DCPS.

AMQP
AMQP stands for advance message queuing protocol. If we consider OSI model of internet architecture then
this protocol is used at application layer. The processing of this protocol consists of three main components
following some set of rules.

Exchange: to receive messages and putting them in queues


Message queue: for storing messages unless and until they are safely processed by the client applications
Binding: it defines the relationship of exchange and message queue i.e. first and second component.
BLUETOOTH
It is also a very famous IOT protocol. Furthermore, it is commonly used short range communication technology
and is used mostly in mobile devices and smart phones. Furthermore, it is mostly used in personal products.
This technology is real foundation for IoT and was designed in order to minimize power consumption. It is
flexible and scalable to almost all market inventions. A new important protocol to use in IoT is Bluetooth
Smart or BLE (Bluetooth low energy).

ZIGBEE Protocol
Another protocol we are going to discuss is Zigbee 3.0. The universal language for IoT was created by Zigbee
alliance known as Dotdot. This language enabled smart devices to work seamlessly and securely on any type of
network by understanding each other. Zigbee 3.0 has following features

a) It is a low power protocol


b) Comes in the category of wireless protocol offering low data rates
c) Mostly used in industrial settings
d) Zigbee 3.0 is based on IEEE 802.15.4 standard
e) Frequency is of about 2.4 GHz
f) Range is from 10 – 100 m for Zigbee 3.0
g) Data rate is about 250 kbps.

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Wi-Fi
In LAN environments, the most used type of connectivity is Wi-Fi. It is the technology that is used in radio
wireless networking of devices. Below are some features of this protocol

a) Fast data transfer is offered by this protocol


b) It can be used to process large amount of data
c) It is based on IEEE 802.11 standard
d) Frequencies are of about 2.4 GHz and 5 GHz bands
e) Range is approximately 50 m.
f) Data rate are about 150 – 200 Mbps and can offer up to maximum of 600 Mbps.

LoRaWAN
Long range wide area network (LoRaWAN) is a protocol which is used for wide area networks. It is designed in
such a way that it supports a huge amount of networks having millions of low power devices. Some features of
this protocol are listed below:

a) It is based on LoRaWAN standard


b) It can operate on various frequencies
c) Range of this protocol is 2 – 5 km in urban areas and 15 km in suburban areas
d) Data rates lie in the range of 0.3 – 50 Kbps

SOME OTHER IOT PROTOCOLS

Although above-metioned protocols are mostly used and famous. But these are also available.

UDP: stands for user data gram protocol. In reference to OSI model we can link this protocol to transport layer
and is an alternative to TCP but it is unreliable but provide fast transmission of data and is one of the oldest
protocol
QUIC: for supporting multiplexed connections between two hosts over user datagram gram protocol (UDP)
and for providing security
IPv6: used in packet switched network and provide end to end datagram transmission over multiple IP
networks
DLTS (datagram transport layer): used to provide communication privacy in datagram protocol
Nano-IP: e. Nano internet protocol was designed to bring internet services to sensors and embedded systems

5.10 IoT Local and wide area networking:


Local and Personal Area Networks (LAN/PAN)
Networks that cover fairly short distances are called personal area networks (PAN) and local area networks
(LAN). PAN and LAN networks are considered to be fairly cost-effective, but the transfer of data can
sometimes be unreliable. Wireless personal and local area network technologies that are commonly
incorporated into IoT connectivity solutions are WiFi and Bluetooth. WiFi can be used for applications that run
in a local environment, or in a distributed setting if there are multiple access points integrated into a larger
network. One downside to WiFi is that it works only if the signal is strong and you’re close to the access
point. Also, WiFi is generally more power-hungry than people think, but it is possible to operate it in a way
that’s a little more power-efficient (for example, your device only connects periodically to send data, then
goes back to sleep). Bluetooth Low Energy (BLE) is a more energy-efficient wireless network protocol—if

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

you’re not receiving data constantly, a single battery running BLE could last up to five years. However,
compared to WiFi it is slower to transmit and is more limited in the amount of data it is capable of sending.

Low Power Wide Area Networks (LPWAN)


IoT devices that run on LPWANs send small packets of information infrequently and over long distances. This
type of wireless network was developed in response to the early challenges of cellular connectivity.
Proponents of LPWAN position it as longer-range than WiFi and Bluetooth, but using less power than cellular.
Sigfox built the first LPWAN network in France and is considered the driving force behind its growth (despite
the fact that Sigfox never took off in the U.S.).

A well-known and commonly used IoT network protocol in this category is LoRaWAN (long range wireless area
network), which runs on the LoRa (long range) communication network. Advantages of LoRaWAN for IoT
devices are its low power requirement (for long battery life) and relatively low-cost chipsets. Plus, under the
right conditions, a single base station or gateway running on a long-range network is capable of providing
service to a very large area—a few kilometers in dense urban areas and up to 15–30 kilometers in rural areas.

5.11 IEEE 802.15 WPAN:


EEE 802.15 is a standard that was developed to provide a framework and the lower layers in the OSI model for
low cost, low power wireless connectivity networks. IEEE 802.15 provides provides the MAC and PHY layers,
leaving the upper layers to be developed for specific higher later standards like Thread, Zigbee, 6LoWPAN and
many others. As a result, IEEE 802.15.4 does not take the limelight in the way that other standards might, but
nevertheless it forms the basis for a large number of standards and accordingly it is far more widely deployed
than may be apparent at first sight. Low power is one of the key elements of 802.15.4 as it is used in many
areas where remote sensors need to operate on battery power, possibly for years without attention.

IEEE 802.15.4 basics


The IEEE 802.15.4 standard is aimed at providing the essential lower network layers for a wireless personal
area network, WPAN. The chief requirements are low-cost, low-speed ubiquitous communication between
devices. IEEE 802.15.4 does not aim to compete with the more commonly used end user-oriented systems
such as IEEE 802.11 where costs are not as critical and higher speeds are demanded and power may not be
quite as critical. Instead, IEEE 802.15.4 provides for very low cost communication of nearby devices with little
to no underlying infrastructure. The concept of IEEE 802.15.4 is to provide communications over distances up
to about 10 metres and with maximum transfer data rates of 250 kbps. Anticipating that cost reduction will
require highly embedded device solutions, the overall concept of IEEE 802.15.4 has been devised to
accommodate this.

IEEE 802.15.4 DERIVED STANDARDS

Zigbee Zigbee is supported by the Zigbee Alliance and provides the higher levels required for low powered
radio system for control applications including lighting, heating and many other applications.

Wireless HART WirelessHART is an open-standard wireless networking technology that has been developed by
HART Communication Foundation for use in the 2.4 GHz ISM band. The system uses IEEE802.15.4 for the lower
layers and provides a time synchronized, self-organizing, and self-healing mesh architecture.

RF4CE RF4CE, Radio Frequency for Consumer Electronics has amalgamated with the Zigbee alliance and aims
to provide low power radio controls for audio visual applications, mainly for domestic applications such as set

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

to boxes, televisions and the like. It promises enhanced communication and facilities when compared to
existing controls.
IEEE 802.15.4 frequencies and frequency bands
The IEEE 802.15.4 frequency bands align with the licence free radio bands that are available around the globe.
Of the bands available, the 2.4 GHz (2 400 MHz) band is the most widely used in view of the fact that it is
available globally and this brings many economies of scale.

5.12 Bluetooth-pico net and Scatternet:


Bluetooth enabled electronic devices connect and communicate wirelessly through short range devices known
as Piconets. Bluetooth devices exist in small ad-hoc configurations with the ability to act either as master or
slave the specification allows a mechanism for master and slave to switch their roles. Point to point
configuration with one master and one slave is the simplest configuration. When more than two Bluetooth
devices communicate with one another, this is called a PICONET. A Piconet can contain up to seven slaves
clustered around a single master. The device that initializes establishment of the Piconet becomes the master
.The master is responsible for transmission control by dividing the network into a series of time slots amongst
the network members, as a part of time division multiplexing scheme.Within a Piconet, the timing of various
devices and the frequency hopping sequence of individual devices is determined by the clock and unique 48-
bit address of master.
Piconets are established dynamically and automatically as Bluetooth enabled devices enter and leave
piconets. There is no direct connection between the slaves and all the connections are essentially master-to-
slave or slave-to-master. Slaves are allowed to transmit once these have been polled by the master.
Transmission starts in the slave-to-master time slot immediately following a polling packet from the master.

Devices resident in adjacent piconets provide a bridge to support inner-piconet connections, allowing
assemblies of linked piconets to form a physically extensible communication infrastructure known as
Scatternet.

5.13 Protocol stack:


IPv6 - "IPv6, is an Internet Layer protocol for packet-switched internetworking and provides end-to-end
datagram transmission across multiple IP networks.

6LoWPAN - "6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks. It is an
adaption layer for IPv6 over IEEE802.15.4 links. This protocol operates only in the 2.4 GHz frequency range
with 250 kbps transfer rate."

UDP (User Datagram Protocol) - A simple OSI transport layer protocol for client/server network applications
based on Internet Protocol (IP). UDP is the main alternative to TCP and one of the oldest network protocols in
existence, introduced in 1980. UDP is often used in applications specially tuned for real-time performance.

- QUIC (Quick UDP Internet Connections, pronounced quick) supports a set of multiplexed connections
between two endpoints over User Datagram Protocol (UDP), and was designed to provide security protection
equivalent to TLS/SSL, along with reduced connection and transport latency, and bandwidth estimation in
each direction to avoid congestion.

DTLS (Datagram Transport Layer) - "The DTLS protocol provides communications privacy for datagram
protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security
(TLS) protocol and provides equivalent security guarantees."

NanoIP
"NanoIP, which stands for the nano Internet Protocol, is a concept that was created to bring Internet-like
networking services to embedded and sensor devices, without the overhead of TCP/IP. NanoIP was designed
with minimal overheads, wireless networking, and local addressing in mind."

Time Synchronized Mesh Protocol (TSMP)


A communications protocol for self-organizing networks of wireless devices called motes. TSMP devices stay
synchronized to each other and communicate in timeslots, similar to other TDM (time-division multiplexing)
systems.

MQTT (Message Queuing Telemetry Transport)


"The MQTT protocol enables a publish/subscribe messaging model in an extremely lightweight way. It is useful
for connections with remote locations where a small code footprint is required and/or network bandwidth is
at a premium."

5.14 Interface between 802.11 and Bluetooth:

Similar to 802.11b, Bluetooth devices operate within the 2.4 GHz band. The difference is that that Bluetooth
uses frequency hopping (at 1,600 hops per second) to hop over the entire 2.4 GHz band. 802.11b, on the
other hand, uses direct sequence and only occupies approximately one third of the 2.4 GHz band. As a
result, Bluetooth hops all over 802.11b transmissions.

An 802.11 station (client or access point) is polite and first listens to the medium before transmitting. If the
802.11 station doesn’t sense RF energy above a certain threshold (meaning that the medium is idle), the
802.11 station can transmit a frame. While the 802.11 station is sending the frame, other 802.11 stations will
hold off their transmissions by following the same protocol. This provides a fairly good method of sharing a
common RF channel among devices complying with the 802.11 standard.

A critical problem is that Bluetooth and 802.11b neither understand each other nor follow the same rules. A
Bluetooth radio may haphazardly begin transmitting data while an 802.11 station is sending a frame. This
results in a collision, which forces the 802.11 station to retransmit the frame when it realizes that the receiving
station is not going to send back an acknowledgement. This lack of coordination is the basis for RF
interference between Bluetooth and 802.11.

Interference impacts vary


Because of the potential for collisions, 802.11 (and Bluetooth) networks can suffer lower performance. An
802.11 station automatically lowers its data rate and retransmits a frame when collisions occur. Consequently,
the 802.11 protocol introduces delays in the presence of Bluetooth interference.

5.15 Geolocation service techniques and standards:


Geolocation lets you share your location with your favorite web sites. A JavaScript can capture your latitude
and longitude and can be sent to backend web server and do fancy location-aware things like finding local
businesses or showing your location on a map. Today most of the browsers and mobile devices support

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Geolocation API. The geolocation APIs work with a new property of the global navigator object ie. Geolocation
object which can be created as follows −

var geolocation = navigator.geolocation;


The geolocation object is a service object that allows widgets to retrieve information about the geographic
location of the device.

Geolocation Methods
The geolocation object provides the following methods −

1 getCurrentPosition()
This method retrieves the current geographic location of the user.

2 watchPosition()
This method retrieves periodic updates about the current geographic location of the device.

3 clearWatch()
This method cancels an ongoing watchPosition call.

5.16 Introduction to GPS-aided GEO augmented navigation (GAGAN):


GAGAN is an acronym for GPS Aided GEO Augmented Navigation. It is a Space Based Augmentation System
(SBAS) jointly developed by ISRO and AAI to provide the best possible navigational services over Indian FIR
(Flight Information Region) with the capability of expanding to neighbouring FIRs.

GAGAN is a system of satellites and ground stations that provide GPS signal corrections, giving you better
position accuracy. GPS alone does not meet the ICAOs navigational requirements for accuracy, integrity and
availability. GAGAN corrects for GPS signal errors caused by Ionospheric disturbances, timing and satellite
orbit errors and also it provides vital information regarding the health of each satellite.
GAGAN consists of set of ground reference stations positioned across various locations in India called
Indian Reference Station (INRES), which gathers GPS satellite data. A master station, Indian Master Control
Centre (INMCC) collects data from reference stations and create GPS correction messages. The corrected
differential messages are uplinked via Indian Uplink Station (INLUS) and then broadcasted on a signal from
three geostationary satellites (GSAT-8, GSAT-10 and GSAT-15). The information on this signal is compatible
with basic GPS signal structure, which means any SBAS enabled GPS receiver can read this signal.

Services Offered: Aviation, Forest management, Railways signaling, Scientific Research for Atmospheric
Studies, Natural Resource and Land Management, Location based services, Mobile, Tourism.

Coverage Area: Two GEOs simultaneously transmit the GAGAN signal in space. GAGAN GEO footprint expands
from Africa to Australia and GAGAN system has capability to cater 45 reference stations for expansion to
neighbouring countries.

5.17 E.911:
Enhanced 911 (E911):
The Evolution of 911 Emergency Calls and E911
Landlines and 911

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

When the 911 system was initially implemented, no one had iPhones in their pockets, let alone VoIP systems.
Phones were tied to landlines, meaning the address associated with each line was definitely the location of the
call. Local carriers keep a database of linked phone numbers and physical addresses, which all local PSAPs can
access. What’s a PSAP? It’s a Public Safety Access Point, where dispatchers handle all emergency calls. When
someone calls 911 from a landline, the dispatcher sees the phone number and associated address, and that’s
how she knows exactly where to send emergency responders.

Cell Phones and 911


The invention of and subsequent surge in popularity of mobile phones threw a wrench into this system. Sure,
mobile phones have a billing address associated with the phone number, but the point of a mobile phone is
that it can be transported anywhere. Mobile phones can be located either through the device’s GPS receiver
or through radiolocation, usually by triangulation between cell towers.

VoIP and 911


Like with cell phones, the increased geographic flexibility that makes VoIP so enticing also makes a call more
difficult to locate in case of an emergency. VoIP providers enable E911 by having customers set a physical
address to show up when they dial 911 on their VoIP device. You can update this location if you move offices
or work from home. For this system to work, VoIP providers also have to cooperate with traditional phone
companies that control access to the public telephone system and 911 operators. This introduces a whole new
level of complication, as VoIP providers and the public telephone system are direct competitors.
5.18 ZigBee:
Zigbee communication is specially built for control and sensor networks on IEEE 802.15.4 standard for
wireless personal area networks (WPANs), and it is the product from Zigbee alliance. This communication
standard defines physical and Media Access Control (MAC) layers to handle many devices at low-data rates.
These Zigbee’s WPANs operate at 868 MHz, 902-928MHz, and 2.4 GHz frequencies. The data rate of 250 kbps
is best suited for periodic as well as intermediate two-way transmission of data between sensors and
controllers.

 Zigbee is a low-cost and low-powered mesh network widely deployed for controlling and monitoring
applications where it covers 10-100 meters within the range. This communication system is less
expensive and simpler than the other proprietary short-range wireless sensor networks as Bluetooth
and Wi-Fi.
 Zigbee supports different network configurations for the master to master or master to slave
communications. And also, it can be operated in different modes as a result the battery power is
conserved.
 Zigbee networks are extendable with the use of routers and allow many nodes to interconnect with
each other for building a wider area network.
 Zigbee technology works with digital radios by allowing different devices to converse through one
another. The devices used in this network are a router, coordinator as well as end devices. The main
function of these devices is to deliver the instructions and messages from the coordinator to the single
end devices such as a light bulb.

In this network, the coordinator is the most essential device which is placed at the origin of the system. For
each network, there is simply one coordinator, used to perform different tasks. They choose a suitable
channel to scan a channel as well as to find the most appropriate one through the minimum of interference,
allocate an exclusive ID as well as an address to every device within the network so that messages otherwise
instructions can be transferred in the network.

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

Routers are arranged among the coordinator as well as end devices which are accountable for messages
routing among the various nodes. Routers get messages from the coordinator and stored them until their end
devices are in a situation to get them. These can also permit other end devices as well as routers to connect
the network;

In this network, the small information can be controlled by end devices by communicating with the parent
node like a router or the coordinator based on the Zigbee network type. End devices don’t converse directly
through each other. First, all traffic can be routed toward the parent node like the router, which holds this
data until the device’s receiving end is in a situation to get it through being aware. End devices are used to
request any messages that are waiting from the parent.

5.19 UWB and RFID:


ULTRA WIDEBAND (UWB) TECHNOLOGY

Like Bluetooth and Wi-Fi, ultra-wideband (UWB) is a short-range, wireless communication protocol that
operates through radio waves. But unlike its counterparts, it operates at very high frequencies — a broad
spectrum of GHz frequencies — and can be used to capture highly accurate spatial and directional data. UWB
is set to unlock a whole range of new consumer and enterprise applications. It has already been incorporated
in Samsung’s new Galaxy S21+ and S21 Ultra 5G and Note20 Ultra and is likely to feature on a wider array of
computing devices and internet of things (IoT) peripherals.

Radio-frequency identification (RFID):


It uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system
consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic
interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying
inventory number, back to the reader. This number can be used to track inventory goods. There are two types
of RFID tags:

a)Passive tags are powered by energy from the RFID reader's interrogating radio waves.
b) Active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to
hundreds of meters.
Unlike a barcode, the tag does not need to be within the line of sight of the reader, so it may be embedded in
the tracked object. RFID is one method of automatic identification and data capture (AIDC).

RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production
can be used to track its progress through the assembly line, RFID-tagged pharmaceuticals can be tracked
through warehouses, and implanting RFID microchips in livestock and pets enables positive identification of
animals. Tags can also be used in shops to expedite checkout, and to prevent theft by customers and
employees. RFID can be used in a variety of applications, such as:

a) Electronic key for RFID based lock system


b) Access management
c) Tracking of goods
d) Tracking of persons and animals
e) Toll collection and contactless payment
f) Machine readable travel documents
g) Locating lost airport baggage
h) Timing sporting events

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Downloaded from www.rgpvnotes.in, whatsapp: 8989595022

follow us on instagram for frequent updates: www.instagram.com/rgpvnotes.in


Thank you for using our services. Please support us so that we can
improve further and help more people.
https://www.rgpvnotes.in/support-us

If you have questions or doubts, contact us on


WhatsApp at +91-8989595022 or by email at hey@rgpvnotes.in.

For frequent updates, you can follow us on


Instagram: https://www.instagram.com/rgpvnotes.in/.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy