Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
5 views37 pages

Mod2 Iot Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views37 pages

Mod2 Iot Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

6.

3 Processing Topologies – Point-wise Explanation

The selection of processing topology in an IoT deployment is critical


for energy efficiency, bandwidth optimization, and latency
management. IoT processing can be broadly classified into on-site and
off-site processing, with off-site further divided into remote and
collaborative processing.

1. On-site Processing

 Data is processed at the source itself (sensor node).

 Suitable for applications with very low tolerance for latency,


e.g., healthcare monitoring, flight control systems.

 Advantages:

o Immediate processing prevents missing fast temporal


changes.

o Ensures real-time alerts in critical scenarios.

 Example:

o Fire detection system where a temperature sensor detects a


rise in temperature and the sensor node processes the
event locally to generate an alert.

 Optional: Data can be forwarded to a remote system for further


analysis or storage.

 Figure Reference: 6.2

2. Off-site Processing
 Data is processed away from the source, at remote or shared
computing nodes.

 Suitable for non-time-critical applications and large-scale


deployments.

 Benefits:

o Lower cost than on-site processing.

o Simpler sensor nodes at the site.

o Enables reuse of high-power processors for multiple


nodes.

 Subtypes:

a) Remote Processing

 Sensor nodes collect and send data to a remote server or


cloud.

 Allows massive scalability with centralized processing.


 Limitations:

o High network bandwidth usage.

o Relies heavily on network connectivity.

 Example:

o Fire detection sensors sending data to a cloud processor for


decision-making.

 Figure Reference: 6.3

b) Collaborative Processing

 Nearby nodes share processing power locally when network


connectivity is limited or absent.

 Reduces latency and network bandwidth usage.

 Economical for vast, distributed deployments.

 Often implemented using mesh networks for easy collaboration.

 Example:

o Agricultural monitoring where multiple sensor nodes process


soil and environmental data collectively at the field level.

 Figure Reference: 6.4

Summary:

 On-site processing: Fast, real-time, expensive.

 Remote processing: Centralized, cost-efficient, bandwidth-heavy.

 Collaborative processing: Local sharing, reduces network


dependency, ideal for large-scale or low-connectivity scenarios.

6.5 Processing Offloading


Definition:
Processing offloading is the paradigm where data processing tasks are
shifted away from resource-constrained IoT devices to other layers
(edge, fog, remote server, or cloud) to enable dense, energy-efficient,
miniaturized, and cost-effective IoT deployments.

Purpose:

 Reduces the burden on IoT devices.

 Minimizes energy consumption at the source.

 Enables scalable and efficient handling of massive IoT data.

Illustration:

 IoT devices (temperature, camera sensors, etc.) detect events like


fire or surveillance.

 Processing can occur:

1. On-site – directly at the sensor node.

2. Edge – within a local network cluster.

3. Fog – at a local gateway serving multiple devices.


4. Cloud/Remote server – centralized processing for global
access.

 Figure 6.5 shows the multi-layer processing structure from sensor


to cloud.

6.5.1 Offload Location

Where the processing is offloaded affects cost, latency, scalability, and


sustainability.

1. Edge:

o Processing near the data source.

o Handles aggregation, data manipulation, and bandwidth


reduction locally.

o Advantage: Reduces network load and latency.

o Disadvantage: Limited processing power; may not handle


complex analytics.

2. Fog:

o Decentralized computing between IoT devices and the cloud.

o Conserves network bandwidth, reduces latency, and


enables rapid mobility support.

o Fog nodes are localized and serve smaller geographic areas.

o Advantage: Efficient for geographically distributed IoT


deployments.

o Disadvantage: Limited coverage and resources compared to


the cloud.

3. Remote Server:

o Processing offloaded to dedicated remote servers.

o Reduces the processing load on IoT devices.

o Advantage: Powerful processing for large data sets.

o Disadvantage: Scalability and maintenance challenges;


costlier than fog.

4. Cloud:
o Offloads processing to cloud infrastructure with virtually
unlimited resources.

o Enables on-demand scalability and global access.

o Advantage: High scalability, resource flexibility, and minimal


local infrastructure.

o Disadvantage: High latency, dependency on network


connectivity, and potential bandwidth costs.

6.5.2 Offload Decision Making

Determining where and how much data to offload is critical for


efficiency.

1. Naive Approach:

o Rule-based, offload data to the nearest location.

o Advantage: Simple and easy to implement.

o Disadvantage: Not suitable for dense or high-data IoT


deployments; ignores data complexity.

2. Bargaining-Based Approach:

o Optimizes multiple Quality of Service (QoS) parameters


like bandwidth and latency.

o Uses collaborative optimization rather than prioritizing few


devices.

o Example: Game theory-based resource allocation.

o Advantage: Balanced QoS across the network.

o Disadvantage: Slightly processing-intensive during decision


making.

3. Learning-Based Approach:

o Uses historical data and trends to optimize offloading.

o Example: Machine learning-based predictive offloading.

o Advantage: Improves performance over time.

o Disadvantage: High memory and processing requirement


during decision making.
6.5.3 Offloading Considerations

Factors to consider when deciding when, where, and how much to


offload:

1. Bandwidth:

o Maximum data transfer capacity of the network.

o High bandwidth supports offloading large datasets; limited


bandwidth may cause congestion.

2. Latency:

o Delay between start and completion of processing.

o Can arise from network transmission or processing speed.

o Critical for real-time applications (e.g., fire detection).

3. Criticality:

o Importance of the task.

o High-criticality tasks (fire detection) require low-latency


offloading.

o Low-criticality tasks (agriculture monitoring) can tolerate


delays.

4. Resources:

o Available processing power and algorithms at the offload


location.

o Example: Multimedia processing requires high


computational resources, unlike scalar data.

5. Data Volume:

o Total amount of data generated by IoT sources.

o Offload location must handle the capacity of high data


volumes, especially in dense deployments.
7.2 IEEE 802.15.4 Standard
Definition:
IEEE 802.15.4 is a low data rate wireless personal area network
(WPAN) standard designed for monitoring and control applications
with low-power consumption and extended device lifetime.

1. Operational Layers

 Operates primarily at the Physical (PHY) and Data Link layers.

 Adds two layers above them for IoT communication:

1. Logical Link Control (LLC) – interfaces lower layers with


upper layers.

2. Service-Specific Convergence Sub-layer (SSCS) – ensures


communication with higher protocols.

 Figure 7.1 shows IEEE 802.15.4 stack vs. OSI stack.

2. Modulation and Channel Access

 Direct Sequence Spread Spectrum (DSSS):

o Expands bandwidth, enhances security.

o High tolerance to noise/interference.

 Encoding Methods:

o Low-speed: Binary Phase Shift Keying (BPSK)

o High-speed: Offset Quadrature Phase Shift Keying (O-


QPSK)

 Channel Access:

o Carrier Sense Multiple Access with Collision Avoidance


(CSMA-CA) prevents collisions.

o Temporal multiplexing allows multiple users/nodes to share


channels efficiently.

3. Transmission Characteristics

 Short, infrequent packets with a low duty cycle (<1%) for


minimal power consumption.

 Power level: Min –3 dBm (0.5 mW).


 Transmission range:

o Typical: 10 m – 75 m

o Best-case outdoor: Up to 1000 m

 Mostly Line-of-Sight (LOS) transmission.

4. Network Topologies

1. Star Topology: Central coordinator communicates with all nodes.

2. Mesh Topology: Decentralized communication; nodes relay data.

5. Variants of IEEE 802.15.4

 A, B – Base versions

 C – China

 D – Japan

 E – Industrial applications

 F – Active RFID

 G – Smart utility systems

6. Device Types

1. Full Function Device (FFD):

o Supports full protocol stack and can communicate with any


device.

o Costly and power-consuming.

2. Reduced Function Device (RFD):

o Communicates only with FFDs.

o Low power and minimal CPU/RAM requirements.

 Figure 7.2 shows FFD/RFD and network types (coordinator, router,


device).

7. Network Types

1. Beacon-Enabled Networks:
o Periodic beacon transmissions for synchronization and
node association.

o Uses slotted CSMA/CA with a superframe structure.

o PAN coordinator manages the network.

2. Non-Beacon-Enabled Networks:

o Uses unslotted CSMA/CA (contention-based).

o Beacons only used for link layer discovery.

o Requires source/destination IDs for communication.

 Protocol designed for mesh configuration to support


decentralized communication.

8. Frame Types

 Beacon frames: Synchronization and signaling.

 Data frames: Carry the payload for communication.

 Acknowledgment frames (Ack): Confirm message reception.

 MAC & Command frames: Handle association, dissociation, data


requests, beacon requests, coordinator realignment, and orphan
notifications.

 Figure 7.3 illustrates the IEEE 802.15.4 frame types.

9. Advantages

 Low power consumption → longer device lifetime.

 Reliable communication with noise/interference tolerance.

 Supports scalable mesh networks.

 Flexible device types (FFD/RFD) for cost and energy optimization.

10. Disadvantages

 Limited data rate → not suitable for high-bandwidth applications.

 Short transmission range → requires dense network deployment for


large areas.

 Line-of-sight dependency can affect reliability outdoors.


 RFDs are limited in communication scope and cannot form complex
networks independently.

7.3 Zigbee
1. Introduction

o Zigbee is designed for wireless personal area networks


(WPANs).

o Uses IEEE 802.15.4 for the PHY (physical) and MAC


(medium access control) layers.

o Optimized for low-powered, low-cost mesh networks for


monitoring and control applications.

o Typical operational range: 10–100 meters.

o Data rate: 250 kbps, suitable for both periodic and


intermittent full-duplex communication.

2. Frequency Bands

o Operates in 2.4 GHz, 902–928 MHz, and 868 MHz bands.

3. Network Topologies

o Star topology:

 Single coordinator manages all end devices.

 Easy to deploy and maintain.

o Mesh topology:

 Multiple routers extend network coverage.

 Nodes can communicate via adjacent nodes.


 Provides automatic rerouting if some nodes fail.

o Cluster tree topology:

 Coordinator placed at a leaf node, connected to a


parent coordinator.

 Used for hierarchical network management.

4. Device Types

o Coordinator: Root of the network, manages data handling


and storage.

o Router: Connects devices and forwards messages.

o End devices: Limited functionality; communicate only with


parent nodes, enabling low power consumption.

5. Protocol Stack

o Built on IEEE 802.15.4 PHY and MAC layers, with additional


network and application layers for Zigbee.

o Physical layer: Handles signal transmission/reception,


modulation/demodulation.

 2.4 GHz: 16 channels at 250 kbps

 868.3 MHz: 1 channel at 20 kbps

 902–928 MHz: 10 channels at 40 kbps

o MAC layer: Ensures channel access, reliability, and


synchronization (uses CSMA-CA).

o Network layer: Manages network setup, device


connection/disconnection, configuration, and routing.

o Application Support Sub-Layer (APS):

 Provides data management, device bridging, and


service interfacing (Zigbee Device Objects – ZDO,
Zigbee Application Objects – ZAO).

o Application Framework:

 Supports key-value pairs and generic messages for


application-level communication.

6. Operational Modes

o Non-beacon mode:
 Coordinators and routers continuously monitor data.

 Higher power consumption because devices cannot


sleep.

o Beacon mode:

 Coordinators and routers sleep when idle, waking


periodically to send beacons.

 Reduces duty cycle and extends battery life.

7.5 ISA100.11A
1. Introduction

o ISA100.11A is a low-power wireless communication


standard developed by ISA (International Society of
Automation).

o Primarily designed for industrial plant automation


systems.

o Uses IEEE 802.15.4 as its base protocol.

o Compliant with IoT protocol stack, allowing integration


with wired networks via Ethernet.
o Supports device-level interoperability and open access
protocols.

2. Security

o Implements 128-bit AES encryption for all communications.

o Security is provided in two layers:

 Transport layer

 Data link layer

3. IP and Networking Support

o Extensive support for IPv6 and UDP, allowing end-to-end


communication.

o Uses TDMA (time-division multiple access) combined with


CSMA-CA for resource sharing.

o Supports star topology and benefits from IPv6 features:

 Increased address size

 Enhanced IPSec-based security

 Multicasting to save bandwidth

 Auto-address configuration

4. Frequency and Interference Handling

o Operates in the 2.4 GHz ISM band, similar to Wi-Fi and


Bluetooth.

o Uses frequency hopping spread spectrum (FHSS) over


16 channels to avoid interference.

o Implements channel blacklisting to exclude already-used


channels, improving immunity to interference.

5. Network Architecture

o Comprised of field devices and backbone devices:

 Field devices: Non-routing I/O devices, handheld


devices, and routing devices (fixed or mobile). Mobile
devices allow industrial personnel to monitor plant areas
efficiently.

 Backbone devices: Backbone routers, gateways,


system manager, and security manager (all fixed).
o Supports mesh, star, and star–mesh topologies.

o Devices collectively form the downLink (DL) subnet.

o A Wireless Industrial Sensor Network (WISN) gateway


connects ISA100.11A to the plant network.

6. Protocol Stack

o Comprised of five layers, comparable to the OSI stack:

1. Physical Layer:

 Built on IEEE 802.15.4-2006

 Operates at 2.4 GHz using DSSS (direct


sequence spread spectrum) modulation

2. Data Link Layer:

 Handles packet creation, forwarding, MAC


functions, error detection, and bus
arbitration

 Data Link Control (DLC) layer: Uses graph-


based routing, adaptive channel hopping,
message loss recovery, and clock synchronization

3. Network Layer:

 6LoWPAN-compliant, uses IPv6 addressing for


end-to-end routing

 Performs protocol conversion: IPv6 ↔ 6LoWPAN

4. Transport Layer:

 Supports UDP-based connectionless services

5. Application Layer:

 Primarily specifies system management


applications

7. Advantages of ISA100.11A

o Low power consumption suitable for industrial IoT


applications

o High security due to AES encryption

o Can integrate with wired and wireless networks


o Supports robust, interference-resistant communication
via FHSS and channel blacklisting

o Flexible topologies (mesh, star, star–mesh) for industrial


network design

o IPv6 support enables scalable addressing and efficient


routing

8. Disadvantages / Limitations

o Relatively complex protocol stack compared to simpler


WPAN standards (like Zigbee).

o Requires specialized backbone devices (system manager,


security manager) for full functionality.

o Higher deployment cost due to industrial-grade devices.

o Setup and maintenance may be more challenging for small-


scale deployments.

o Performance depends on synchronized channel hopping,


which may require careful planning in high-interference
environments.

7.6 WirelessHART
1. Introduction

o WirelessHART is the wireless evolution of the HART


protocol (Highway Addressable Remote Transducer).

o It is a license-free protocol developed for networking


smart field devices in industrial environments.

o Eliminates wires, making device placement more flexible


and cost-effective compared to wired HART.

o Uses IEEE 802.15.4 as its base protocol, similar to Zigbee.


o Highly secure due to encrypted communication.

2. Network Architecture

o WirelessHART can communicate with a central control


system in two ways:

1. Direct Communication: Devices transmit directly to


the gateway in line-of-sight (LOS) conditions (up to
250 m).

2. Indirect Communication: Devices form a mesh


network, forwarding messages hop-by-hop until they
reach the gateway.

o Includes field devices (handheld, routing, I/O) and access


points / gateways connected to industrial backbone
networks.

o Network manager oversees packet scheduling, collision


avoidance, and channel/frequency assignment.

3. Advantages over Wired HART

o Easier placement of devices in hard-to-reach locations


(e.g., reaction tanks, pipes, separated warehouses).

o Avoids physical wiring costs and maintenance challenges.

o Fully backward compatible with legacy wired HART devices.

o Highly reliable (99.999%) due to tight scheduling of


message transmissions.

4. Frequency and Channel Management

o Operates in the 2.4 GHz ISM band, using only 15 channels


to improve reliability.

o Channel blacklisting: Avoids channels with persistent


interference.

o Channel hopping: Further improves security and reduces


interference.

5. Protocol Stack (Comparison with OSI)

o Physical Layer: IEEE 802.15.4 standard, 2.4 GHz band, high


channel reliability.

o Data Link Layer:


 Uses TDMA (time-division multiple access) for
collision avoidance.

 Implements superframes (10 ms wide time slots) for


deterministic transmission and timing control.

 Includes channel hopping and blacklisting for


enhanced reliability and security.

o Network and Transport Layers:

 Handles routing, network traffic, security, session


initiation/termination.

 Mesh-based routing ensures each node forwards data


from others in range.

 Maintains an updated network graph for efficient


routing.

o Application Layer:

 Facilitates gateway-device communication through


command/response messages.

 Supports backward compatibility with legacy HART


devices.

6. Advantages of WirelessHART

o Flexible deployment in industrial environments.

o High reliability and deterministic communication.

o Secure communication via encryption and channel hopping.

o Backward compatibility with wired HART devices.

o Supports mesh networks, allowing dynamic routing and


resilience against node failures.

7. Disadvantages / Limitations

o Requires a network manager for scheduling and routing,


which adds complexity.

o Mesh networks may increase latency for distant nodes


compared to direct communication.

o Deployment and maintenance require careful planning of


channel hopping and superframe schedules.
o Limited frequency band (2.4 GHz) may face interference
from other industrial wireless systems (Wi-Fi, Zigbee).

o Primarily designed for industrial environments; less


suitable for general consumer IoT applications.

7.12 Sigfox
1. Introduction

o Sigfox is a low-power, wide-area network (LPWAN)


protocol designed for IoT applications requiring infrequent,
small data transmissions.

o Common use cases include building automation, smart


metering, agriculture, and security.

o Uses ultra-narrowband (UNB) technology with a


bandwidth of 192 kHz, which reduces noise effects and
enhances resilience to interference.

2. Data Rate and Modulation

o Typical data rates: 100–600 bits per second, optimized for


small bursts of data.

o Uses Binary Phase Shift Keying (BPSK) for encoding,


where each message is 100 Hz wide.

3. Frequency Bands
o Europe: 868–868.2 MHz

o US and other regions: 902–928 MHz

o Ultra-narrowband nature ensures that only a tiny part of


the spectrum is needed, reducing interference.

4. Network Architecture

o Figure 7.19 illustrates the Sigfox architecture: end-points →


base stations → cloud backend.

o Sigfox employs random access and time-frequency-


spatial diversity:

 Random access: Devices transmit messages at


arbitrary frequencies.

 Time-frequency diversity: Each message is sent


twice at different times/frequencies.

 Spatial diversity: Any nearby base station can receive


the message, improving reliability.

o Base stations are complex and handle continuous


monitoring of the spectrum for UNB signals, while devices
remain simple and low-power.

5. Protocol Stack (Comparison with OSI)

o Physical Layer: Handles transmission over UNB and ensures


low-power operation.

o MAC Layer (Medium Access Control): Manages access to


the radio spectrum.

o Frame / Application Layer: Handles message formatting,


small payloads (0–12 bytes), and integration of sensor data,
alerts, GPS, or application data.

o Bi-directional but asymmetric communication: Uplink


(device → base station) is prioritized over downlink.

6. Security Features

o Supports AES encryption.

o Provides authentication, integrity, and anti-replay


protection for messages.

o Ensures resilient and secure communication even with


simple end devices.
7. Advantages of Sigfox

o Ultra-low power consumption enables multi-year battery


life for IoT devices.

o High resilience due to time, frequency, and spatial


diversity.

o Simplified end devices keep costs low.

o Wide-area coverage suitable for dense deployments.

o Reliable for small, infrequent transmissions like sensor


readings or status updates.

8. Disadvantages / Limitations

o Low data rates (100–600 bps) make it unsuitable for high-


volume or continuous data streams (e.g., video or real-time
telemetry).

o Asynchronous communication limits real-time


responsiveness.

o Limited payload size (12 bytes per message) restricts the


type of data transmitted.

o Not designed for mobility, making it less suitable for


moving devices.

o Best suited for indoor or static deployments; range can be


affected by urban obstructions.

7.13 LoRa
 Definition:

o LoRa (Long Range) is a patented wireless technology


developed by Cycleo, France.

o Designed for M2M (Machine-to-Machine) and IoT connectivity.

o Sub-GHz technology operating in 169 MHz, 433 MHz, 868


MHz, and 915 MHz bands.

 Communication Features:

o Bi-directional communication links.

o Spread spectrum with 125 kHz wideband.

o Typical range: 15–20 km.

o Supports millions of devices.


 Applications:

o Electric grid monitoring.

o Smart metering.

o Asset tracking and management.

 Network Architecture (Figure 7.21):

o End-points (nodes): Handle sensing and control tasks.

o Gateways: Forward messages from end nodes to a backhaul


network (IP-based).

o Network server: Schedules acknowledgments, manages


data rates, removes redundancies.

o Application server / Remote computer: Acts as data sink


and controls end nodes.

 Technology Features:

o Spread spectrum technology with high receiver sensitivity via


frequency-modulated chirp coding gains.

o Excellent mobility support.

o Compared with NB-IoT: higher battery life, lower data rates


(27–50 kbps), and longer latency times.

 LoRaWAN:

o Network protocol for routing messages between end nodes


and gateways.

o Broader spectrum than Sigfox (possible interference mitigated


with chirp coding).

o Messages received by all nearby base stations → message


redundancy → enhanced resilience.

o Star topology with four entities:

1. End nodes: Sensing/control.

2. Gateways: Forward messages.

3. Network server: Schedule, manage data rates, remove


redundancies.

4. Remote computer / Application server: Data sink,


control end nodes.
 Security Mechanisms:

o Network key: Security at network level.

o Application key: End-to-end security at application level.

o Device-specific key: Secures communication between nodes


and network.

 Advantages (from content):

1. High receiver sensitivity and long range (15–20 km).

2. Excellent mobility support for asset tracking and


management.

3. Low-cost end nodes and base stations (compared to Sigfox).

4. Resilient network via message redundancy → reliable delivery.

5. High battery life compared to NB-IoT.

 Disadvantages (from content):

1. Low data rates (27–50 kbps).

2. Longer latency times compared to other technologies.

3. Potential interference due to broader spectrum (mitigated by


chirp coding).

4. Message redundancy increases network traffic, which may be


a drawback in dense deployments.

7.14 NB-IoT
 Definition:

o NB-IoT (Narrowband IoT) is a cellular standard initiative by


3GPP.

o Designed to coexist with 2G/3G/4G networks.

o Focuses on low power consumption, high interoperability,


and long battery life.

 Battery Life:

o Supports up to 10 years of battery life for most applications.

 Technical Features:

o Provides improvements in reliability, spectrum efficiency,


and system capacity.
o Uses OFDM (Orthogonal Frequency Division
Multiplexing) modulation → enhances system capacity and
spectrum efficiency.

o Device complexity is high.

o Provides security features: confidentiality, authentication,


integrity.

 Coverage:

o Supports indoor environments and dense urban areas.

o Higher quality of service and reduced latency compared


to LoRa.

 Deployment Suitability:

o Best suited for static deployments (e.g., energy metering,


fixed sensors).

o Not designed for mobility support.

 Frequency Bands:

o Can use 200 kHz GSM bands or resource blocks in LTE


guard bands.

o Ensures coexistence with cellular systems and extended


coverage.

 Data Handling:

o Designed for non-IP based applications with small daily


data transactions (tens to hundreds of bytes per device).

o Faster modulation via OFDM → higher data handling capacity


than Sigfox and LoRa.

 Advantages (from content):

1. Long battery life (up to 10 years).

2. High reliability and spectrum efficiency.

3. Supports coexistence with existing cellular networks.

4. High data handling capacity due to OFDM modulation.

5. Indoor and dense urban coverage.

 Disadvantages (from content):

1. Device complexity is high.


2. Not efficient for transferring large messages.

3. No mobility support.

7.15 Wi-Fi (IEEE 802.11)


 Definition:

o Wi-Fi is a wireless technology for local area networking of


devices and nodes.

o Technically referred to by its standard IEEE 802.11.

 Frequency Bands:

o Operates on 2.4 GHz UHF or 5.8 GHz SHF ISM radio bands.

o Each band is subdivided into multiple channels.

 Communication Technique:

o Multiple devices communicate simultaneously using TDMA


(time-division multiple access).

o CSMA/CA is used for channel access to avoid collisions.

 IEEE 802.11 Versions and Data Rates:

o 802.11a: 54 Mbps, 5 GHz band, uses OFDM.

o 802.11b: 11 Mbps, 2.4 GHz band.

o 802.11g: 54 Mbps, 2.4 GHz band, uses OFDM.

o 802.11n: 140 Mbps, 5 GHz band.

 Protocol Stack (Figure 7.25):

 Host layers: Application, Presentation, Session

 Media layers: Transport, Network

 IEEE 802.11: Data Link, Physical

 Network Architecture:

o Uses Wireless LAN (WLAN).

o Devices connect via a wireless access point to the WLAN.

o The WLAN forwards messages between devices and the


Internet.

o Multiple access points and routers can be used to extend


network coverage (Figure 7.26).
7.16 Bluetooth (IEEE 802.15.1)

 Definition:

o Bluetooth is a short-range wireless communication


technology operating at low power.
o Defined by the IEEE 802.15.1 standard.

o Initially developed as a cable replacement technology for


data communication between mobile devices (smartphones,
laptops).

 Frequency Band and Range:

o Operates on the 2.4 GHz ISM band.

o Typical range: approximately 10 meters.

 Communication Method:

o Uses Frequency Hopping Spread Spectrum (FHSS) to


reduce interference.

o Data is divided into packets transmitted over 79 designated


channels (1 MHz each).

o Adaptive Frequency Hopping (AFH): Performs 800


hops/sec to avoid interference.

 Modulation and Data Rates:

o Initial versions: Gaussian Frequency Shift Keying (GFSK) –


Basic Rate (BR) – up to 1 Mbps.

o Newer versions:

 4-DQPSK (Differential Quadrature Phase Shift Keying) – 2


Mbps.

 8-DPSK (Differential Phase Shift Keying) – 3 Mbps.

 Network Architecture (Figure 7.27):

o Follows master–slave architecture.

o A piconet is a small network with 1 master and up to 7


slave devices.

o Two piconets can connect via a bridge, forming a scatternet.

o All devices share the master node’s clock.

 Bluetooth Low Energy (BLE):

o Uses 2 MHz wide bands with 40 channels.

o Features: low energy consumption, low cost, multivendor


interoperability, enhanced range.

 Security:
o Connections are encrypted to prevent eavesdropping.

o Service-level security restricts device usage and activities.

 Bluetooth Standard Components:

1. Core protocols

2. Cable replacement protocols

3. Telephony control protocols

4. Adopted protocols

 Bluetooth Protocol Stack (Figure 7.28):

 Host layers: Application

 Media layers: LLC, Audio, RFComm, Telephony, Service Discovery

 Lower layers: L2CAP, Baseband, PHY Radio

 Key Protocols:

1. Link Manager Protocol (LMP):

 Manages link establishment, authentication, and


configuration.

 Handles services like name requests, link address


requests, connection authentication, mode negotiation,
and data transfer.

2. Host Controller Interface (HCI):

 Accesses hardware status and control registers.

 Connects controller with LMP and handles device


discovery.

3. Logical Link Control and Adaptation Protocol (L2CAP):

 Multiplexes logical connections between devices.

 Handles data segmentation, flow control, and integrity


checks.

4. Service Discovery Protocol (SDP):


 Discovers services provided by other Bluetooth devices.

5. Radio Frequency Communications (RFCOMM):

 Cable replacement protocol that generates virtual serial


data streams.

 Supports telephony profiles like AT commands and


OBEX.

6. Telephony Control Protocol–Binary (TCS BIN):

 Bit-oriented protocol controlling call signaling for


voice/data communications.

You might also like