KEMBAR78
4972 Note IOT Module 2 | PDF | Bluetooth | Computer Network
0% found this document useful (0 votes)
37 views21 pages

4972 Note IOT Module 2

Uploaded by

sohampandey689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views21 pages

4972 Note IOT Module 2

Uploaded by

sohampandey689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

BRAINWARE UNIVERSITY

[ESCD 301] CLASS NOTES [Internet of Things]

Communication module
BLUETOOTH

Bluetooth wireless technology is a short-range communications technology. Intended for replacing


cables connecting portable units. Maintains high levels of security. Bluetooth technology is based on
Ad‐hoc technology also known as Ad‐hoc Piconets.
Features
Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to
2.485 GHZ.

Uses spread spectrum hopping, full‐duplex signal at a nominal rate of 1600 hops/sec.

Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for Version 2.0 combined with
Error Data Rate.

Bluetooth operating range depends on the device:

Class 1 radios are used primarily in industrial use cases have a range of 100 meters or 300 feet.

Class 2 radios are most commonly found in mobile devices have a range of 10 meters or 30 feet

Class 3 radios have a range of up to 1 meter or 3 feet

Connection Establishment

In terms of connection establishment using Bluetooth there are 3 different phases. The first one is the
discovery or the inquiry phase. The next one is the paging phase, and the third one is the connection
phase.

Inquiry: Inquiry run by one Bluetooth device to try to discover other devices near it.
Paging: Process of forming a connection between two Bluetooth devices. It may involve security
mechanisms like PIN entry or key exchange. After pairing, the devices can bond, meaning they save the
encryption keys for future connections without the need for re-pairing.
Connection: A device either actively participates in the network or enters a low‐power sleep mode.

There are different modes of operation of Bluetooth devices, one is the active mode and this is the
mode where the device basically is fully active fully functional in all different respects it actively
transmits is data it actively receives data and so on and so forth.
The other 3 phases the sniff mode the hold mode and the park mode all these 3 different modes are
basically power saving modes.
In a sniff mode the device basically sleeps and only listens for transmission at a particular predefined
interval.
In the hold mode, a device sleeps for a defined period and then returns back to the active mode and in
the park mode the slave will become inactive until the master tells it to wake back up.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
Bluetooth Protocol Stack

The standard defines a general Bluetooth stack divided into layers and sublayers . Each layer
implements a set of related functions necessary for the layer immediately above and uses the
functions implemented by the directly lower layer. Thus, the lower layers i mplement low-level
functions like hardware interaction, while the higher layers implement functions closer to the user
application, such as managing device discovery, making connections, etc.

The physical layer in a Bluetooth connection is responsible for the actual data transmission
through the communication medium, i.e., the air. This layer defines aspects related to signal
modulation, operating frequencies, and radiofrequency spectrum management. Its main function
is to establish and maintain the physical link between Bluetooth devices, allowing the transfer of
data bits through radio waves.

Baseband Layer: It manages physical channels and links and different services such as error correction
etc.
Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP provides adaption between upper layer
frame and baseband layer frame format. L2CAP provides support for both connection-oriented as well
as connectionless services. It is a layer within the Bluetooth protocol stack that allows multiple logical
channels (connections) to be established between two devices. It manages the segmentation and
reassembly of data packets, and it supports multiplexing, enabling multiple higher-layer protocols to
run concurrently over the same physical Bluetooth link.

Radio frequency communication protocol: RF Comm is basically to replace the serial cables. RF Comm
it works as an emulation of the RS-232 (Recommended Standard 232) which is presently known as EIA 232.
It is a serial port communication protocol. It provides a simple reliable data stream to the user very
similar to TCP and supports up to sixty simultaneous connections between 2 Bluetooth devices.

Service Discovery Protocol (SDP): It is a crucial part of the Bluetooth protocol stack that enables
Bluetooth devices to discover what services are available on nearby devices and to find out the
characteristics of those services. Each service in a Bluetooth device is described by a set of attributes,
such as the service name, service class, and the protocols it supports. These attributes are used by SDP
to describe and identify services.
Bluetooth Classic:
Bluetooth Classic is designed for applications that require continuous, high-bandwidth data transfer.
Wireless Audio Streaming: Bluetooth Classic is widely used in devices like Bluetooth headphones,
speakers, and hands-free car systems for continuous audio streaming using profiles like A2DP
(Advanced Audio Distribution Profile).
File Transfers: Suitable for sending large amounts of data over Bluetooth, such as transferring files
between smartphones, laptops, or tablets. Devices using Bluetooth Classic (e.g., headphones, speakers)
typically need to be recharged after several hours of use because of the constant data flow and power
draw.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

Bluetooth Low Energy (BLE):


BLE is optimized for use cases that require short bursts of data transmission with minimal energy
consumption. It is ideal for devices that do not need continuous data streaming but instead require
periodic communication.
Wearables and Health Devices: Fitness trackers, smartwatches, and medical devices (e.g., heart rate
monitors) rely on BLE to send small amounts of data intermittently while maintaining long battery life.
IoT Devices: BLE is a key technology in the Internet of Things (IoT), powering smart home devices,
sensors, beacons, and environmental monitors that only need to send small data packets occasionally.
BLE devices, such as fitness trackers or sensors, can often run on a coin cell battery for months or even
years without needing to be replaced or recharged. BLE achieves this through:

➢ Shorter Connection Times: BLE devices establish connections quickly and only transmit when
needed, reducing the time they spend active.
➢ Sleep Mode: BLE devices spend most of their time in low-power sleep modes, only waking up
to transmit small data packets.

Zigbee

ZigBee protocol which is heavily used for IoT applications for establishing connectivity between the
different nodes. Most widely deployed enhancement of IEEE 802.15.4. The ZigBee protocol is defined
by layer 3 and above. It works with the 802.15.4 layers 1 and 2. The standard uses layers 3 and 4 to
define additional communication enhancements.
These enhancements include authentication with valid nodes, encryption for security, and a data
routing and forwarding capability that enables mesh networking. ZigBee solutions are aimed at smart
objects and sensors that have low bandwidth and low power needs.
• Low Data Rate (20- 250 kbps)
• Short-Range (75-100 meters)
• 3 frequency bands with 27 channels.
Operating Frequency Bands (Only one channel will be selected for use in a network):
1. Channel 0: 868 MHz (Europe)
2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

In ZigBee there are primarily two different


components. The first one is known as ZDO
which stands for ZigBee device object and it takes
care of issues such as device management, security
provisioning policies and so on.

The second component is APS which stands for


Application Support Sub-layer which
takes care of services such as control services,
interfacing bridging between network and
other layers and so on.

• Physical layer: The lowest two layers i.e the physical and the MAC (Medium Access
Control) Layer are defined by the IEEE 802.15.4 specifications. The Physical layer is closest
to the hardware and directly controls and communicates with the Zigbee radio. The
physical layer translates the data packets in the over-the-air bits for transmission and vice-
versa during the reception.
• Medium Access Control layer (MAC layer): The layer is responsible for the interface
between the physical and network layer. The MAC layer is also responsible for providing
PAN ID and also network discovery through beacon requests.
• Network layer: This layer acts as an interface between the MAC layer and the application
layer. It is responsible for mesh networking.
• Application layer: The application layer in the Zigbee stack is the highest protocol layer
and it consists of the application support sub-layer and Zigbee device object. It contains
manufacturer-defined applications.
The ZigBee specification supports star and two kinds of peer-to-peer topologies, mesh and cluster
tree. ZigBee-compliant devices are sometimes specified as supporting point-to-point and point-to-
multipoint topologies. The ZigBee specification supports star and two kinds of peer-to-peer
topologies, mesh and cluster tree. ZigBee-compliant devices are sometimes specified as supporting
point-to-point and point-to-multipoint topologies.

Types of ZigBee Devices:

• Zigbee Coordinator Device: The Coordinator creates the Zigbee network by selecting the network
channel and network PAN (Personal Area Network) ID. It starts the network and handles the initial
network setup. It communicates with routers. This device is used for connecting the devices.
The coordinator can handle the initial security setup for the network, including encryption keys.
• Zigbee Router: The Router extends the range and capacity of the Zigbee network by relaying data
between devices and facilitating communication between them. It is used for passing the data
between devices.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
• Zigbee End Device: It is the device that is going to be controlled

Zigbee Network Topologies

• Star Topology (ZigBee Smart Energy): Consists of a coordinator and several end devices,
end devices communicate only with the coordinator.
• Mesh Topology (Self Healing Process): Mesh topology consists of one coordinator, several
routers, and end devices.
• Tree Topology: In this topology, the network consists of a central node which is a
coordinator, several routers, and end devices. the function of the router is to extend the
network coverage.

Zigbee Topologies
2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)
BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

Disadvantages of Zigbee:
1. Limited range: Zigbee has a relatively short range compared to other wireless
communications protocols, which can make it less suitable for certain types of applications
or for use in large buildings.
2. Limited data rate: Zigbee is designed for low-data-rate applications, which can make it less
suitable for applications that require high-speed data transfer.
3. Interoperability: Zigbee is not as widely adopted as other IoT protocols, which can make
it difficult to find devices that are compatible with each other.
4. Security: Zigbee’s security features are not as robust as other IoT protocols, making it more
vulnerable to hacking and other security threats.

WiFi

WiFi, or Wireless Fidelity, is a technology that allows devices to connect to the internet
wirelessly. In IoT, WiFi is commonly used for devices that require high data rates and constant
connectivity. Smart home devices like cameras, thermostats, and appliances often use WiFi to
communicate with cloud services, providing users with remote access and control.

Benefits of Using WiFi in IoT Applications

One of its main advantages is its high data transfer rate, which supports applications that
require large amounts of data, such as video streaming from security cameras. This high throughput
ensures that IoT devices can transmit and receive data quickly and efficiently, essential for real-time
applications.
Additionally, WiFi’s widespread availability and compatibility with existing network
infrastructure make it easy to deploy and scale. Most homes and businesses already have WiFi
networks in place, allowing new IoT devices to integrate seamlessly without the need for additional
hardware. This reduces deployment costs and simplifies the process of expanding IoT networks as
needed.
Another significant benefit of WiFi is its extensive range, allowing devices to connect over
relatively long distances within a home or office environment. This makes it suitable for various
applications, from home automation, where devices like smart thermostats and security systems
need reliable connectivity, to industrial monitoring, where sensors and actuators spread across a
large area require consistent communication.

It outlines the architecture and defines the MAC and physical layer specifications for wireless LANs
(WLANs). Wi-Fi utilizes the 2.4 gigahertz (120 mm) UHF (Ultra High Frequency) and 5 gigahertz (60 mm)
SHF (Super High Frequency) radio bands. The latest version of Wi-Fi also known as 802.11ax, this version
of Wi-Fi has a theoretical maximum throughput of 9.6 Gbps across multiple channels.

Elements of Wi-Fi network architecture components

Stations: Stations are components that connect to the network wirelessly. Stations are either access
2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)
BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
points or endpoints, and each is identified by a unique network address.
Access point: The access point is the base station that serves as a hub to which other stations connect.
The "access" is that of the stations to the network. But it may also mean internet access, since many
routers double as internet modems.

Endpoint: The endpoint is any end-user station, such as a computer, mobile device, printer, or Internet
of Things (IoT) device.

There are two types of services


1. BSS: Basic Service Set
2. ESS: Extended Service Set
Basic Service Set (BSS): A BSS is a group of stations that connects to the network. In an ad hoc network—
established when two or more wireless devices join together without a router or access point—this
group is called an Independent BSS (IBSS).
In an Infrastructure BSS, all devices communicate through the access point. The AP manages the network traffic
and provides connectivity to other networks.
Extended Service Set (ESS): It is a network configuration that consists of multiple Infrastructure BSSs
interconnected through a backbone network. ESS provides a larger coverage area and allows devices to roam
seamlessly between different BSSs.
Distribution system: The distribution system is the means of connecting access points in an ESS. These
connections can be either wired or wireless. A wireless distribution system (WDS) may use mesh or its
own WDS protocol. Fixed wireless is a specialized form of radio transmission for connecting a
geographically distant access point. In an ESS, access points may be connected wirelessly or with
Ethernet cables.

BSS Architecture

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

ESS Architecture

The 802.11 Distributed Coordination Function (DCF) is a fundamental mechanism in the IEEE 802.11
wireless networking standard used to manage access to the shared communication medium (the
wireless channel).

802.11 Distributed Coordination Function (DCF)


802.11 Distributed Coordination Function (DCF) is a protocol which uses carrier sensing along with a
four way handshake to maximize the throughput while preventing packet collisions. A packet collision
is defined as any case where a node is receiving more than one packet at a time, resulting in neither
packet being correctly received. 802.11 is a carrier sensing multiple access with collision avoidance
(CSMA/CA) medium access control (MAC) protocol using a direct sequence spread spectrum (DSSS)
physical interface.
802.11 DCF Algorithm
• When a station has a frame to transmit, it waits for a random backoff time. The random backoff
time is defined by a contention window In Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA), a contention window is a time period set after a frame transmission to
prevent collisions between stations that are competing for channel access. With each collision,
this time window doubles, which corresponds to the binary exponential backoff (BEB). The
backoff time is given by the following equation −
Timebackoff = random()×Timeslots
Here, the function generates a random number and Timeslots is the time period for one slot.
• If the station senses that the channel is busy during the contention period, it pauses its timer till
the channel is clear.
• At the end of the backoff period, if the channel is clear, the station will wait for an amount of
time equal to DIFS (Distributed Inter-Frame Space) and sense the channel again.
• If the channel is still clear, the station transmits a RTS (request to send) frame.
• After receiving the RTS the destination station waits for SIFS and then responds using a CTS (clear
to send) frame if it is available.
• Then the transmitting station wait for another SIFS and then sends the data frames.
• After receiving the data the destination station waits for a time equal to SIFS (Short Inter-Frame
Space) and then send the acknowledgement to the transmitting station.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
• At the end of this transmission process, the station again waits for the backoff time before the
next transmission.

802.11 Carrier Sensing


In 802.11, carrier sensing is the primary method used to avoid collision. Carrier sensing is accomplished
by simply measure the amount of energy received on the channel. If that energy is above a threshold,
the sensing node determines that another node is currently transmitting and that it must remain silent.
As an alternative to carrier sensing, the network allocation vector (NAV) is used to inform other nodes
how long the current node will need the channel. Any nodes overhearing the NAV know that they
have no need of sensing the channel for the time indicated.

802.11 Problem and Solutions


Finally, hidden and exposed terminals are a major problem with any carrier sensing based MAC. Briefly,
a hidden terminal is a terminal which is within range of the receiving node, but not within range of
the transmitting node. Even though this node’s transmissions would interfere with the communication
between the sender and receiver, it can not hear the transmission from the source and therefore may
transmit, causing collisions. The exposed terminal problem is where a node is within range of the
sending node, but not the receiving node. This node will think that any transmission it creates will
interfere with the transmission it overhears. In reality, since it is not in range of the receiver, it should
be free to transmit.
802.11 uses the RTS and CTS packets described above to resolve both of these issues. If a node hears a
CTS, it knows that it is in range of the receiver and therefore can not transmit without causing a collision.
If a node hears an RTS but does not hear a CTS, it knows that it is an exposed terminal and is free to
transmit.
Point coordination function (PCF)
Point coordination function (PCF) is an optional technique used to prevent collisions in IEEE 802.11-
based WLAN standard including Wi-Fi. It is a medium access control (MAC) sublayer technique used in
areas where carrier-sense multiple access with collision avoidance (CSMA/CA) is used.
PCF is used additionally along with the mandatory distributed coordination function (DCF). It is used in
centralized control system, and is present in the access point (AP) of the wireless network. An AP is
generally a wireless router that coordinates network communication.
2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)
BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
• It is an optional function that resides on the top of the mandatory DCF. Both PCF and DCF
operate simultaneously.
• It provides channel access to the stations using poll and response method thus eliminating the
need of contention.
• The polling is done by the point coordinator (PC) that resides in central access point (AP).
• The station waits for Point Inter–Frame Space (PIFS) before transmission. PISF is typically smaller
than DIFS (Distributed Inter-Frame Space) as used in DCF.
• PC polls in a round – robin method to provide access to the stations in the wireless network.
• AP issues a special control frame called beacon frame to initiate and repeat polling.
Technique
• Step 1 − PC sends a beacon frame after waiting for PIFS. The beacon frame reaches every station
in the wireless network.
• Step 2 − If AP has data for a particular station, say station X, it sends the data and a grant to
station X.
• Step 3 − When station X gets the grant from the AP, if it has a data frame for AP, it transmits
data and acknowledgement (ACK) to the AP.
• Step 4 − On receiving data from station X, the AP sends an ACK to it.
• Step 5 − The AP then sends goes to the next station, say station Y. If AP has data for Y, it sends
data and grant to Y, otherwise it sends only grant to Y.
• Step 6 − On receiving grant from AP, station Y transmits its data (if any) to AP.
• Step 7 − This process continues for all the stations in the poll.
• Step 8 − At the end of granting access to all the stations, the AP sends an ACK to the last station.
It then notifies all stations that this is the end of polling.
Advantages of WIFI
The advantages of Wi-Fi Tt include
o A versatile network connection and the absence of complicated wiring requirements for
installation.
o Everywhere in the Wi-Fi range can access it.
o Independent users are not required to obtain regulatory approval.
o In addition, Wi-Fi Extenders make it possible to expand the network.
o It's easy and quick to set up.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
o Only the SSID and password need to be configured.
o As part of its security measures, Wi-Fi networks encrypt radio signals using WPA encryption.
o It is also more affordable.
o Hotspots are another feature that it offers.
o Roaming is supported as well.
Wi-Fi Disadvantages
o Mobile phones, laptops, and other devices with batteries consume a lot of power when using
Wi-Fi.
o Even when encryption is in place, security issues can still arise.
o Wi-Fi can be attacked and accessed in the same way that recognised devices become
unidentified to the router.
o In comparison to a direct cable connection, the speed is slower.
o People can be harmed by it because it emits radiation like cell phones.
o Thunderstorms, for example, can interfere with Wi-Fi signals.
o Because it lacks a firewall, unauthorised access to Wi-Fi is possible.
o Since a router is required to access the internet via Wi-Fi, we can't access the internet if the
power goes out.

Global Positioning System

The Global Positioning System (GPS) is a navigation system that allows users to determine their exact
location on the earth's surface. The development of GPS began in the 1970s when the United States
Department of Defense recognized the need for a reliable navigation system for military purposes. GPS
was made available to civilians in 1993 and has since become a ubiquitous technology used in many
aspects of daily life.

Basic Principles

GPS works by using a network of satellites orbiting the Earth to determine the location of a GPS receiver
on the ground. The GPS receiver sends a signal to one of the GPS satellites, which then transmits a signal
back to the receiver. By measuring the time it takes for the signal to travel from the satellite to the
receiver, the GPS receiver can calculate the distance between the two.

GPS receivers need to receive signals from at least four GPS satellites to determine their location
accurately.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
The GPS architecture is divided into three major segments: a GPS Space Segment (SS), a GPS Ground
Segment or control segment (CS), and a GPS User Segment (US).

These are the satellites in space circling the Earth every 12 hours. The space segment mainly does two
things:

• Route the radio signals.


• Store the radio signal and retransmit it to the receiver unit.

• A GPS system consists of a network of 24 orbiting satellites, called NAVSTAR (Navigation System
with Time and Ranging), and placed in space in six different orbital paths with four satellites in
each orbital plane and covering the entire earth under their signal beams.

GPS Control Segment:

There are one master control station and 5 monitor stations which form the GPC control segment. The
monitor stations monitor the signals from satellites. Then the qualified signals are sent to the master
station that revises the abnormalities and checks the operational specifications before sending the
revised signals back to the satellites.

• GPS Receiver or User Segment:

This forms all the GPS receivers like mobile phones, PCs, laptops and other devices that receive GPS
signals and determines its distance from each satellite.

The GPS satellite constellation comprises up to 24 satellites orbiting the earth at an altitude of
approximately 20200 km. The satellites are positioned so that they cover the entire planet, ensuring
that GPS signals are available anywhere in the world.

The GPS satellites are powered by solar panels and are equipped with atomic clocks that provide highly
accurate timing information. The satellites continually transmit navigation signals that can be received
by GPS receivers on the ground.

The GPS is based on well-known concept called the triangulation technique.

Benefits of GPS Integration in IoT

The integration of GPS with IoT can help organizations to optimize their operations and simplify complex
processes, reducing downtime and increasing efficiency. Tracking vehicles in real-time can reduce
transport time, simplify logistical planning, and optimize delivery schedules.

Challenges and Limitations of GPS in IoT

Despite the benefits of GPS-enabled IoT devices, there are also challenges and limitations that need to

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
be addressed. The accuracy of GPS tracking is limited and is affected by physical and environmental
factors such as signal interference, weather, and the location of the receiver. Issues with privacy and
data security must also be addressed when implementing GPS tracking in IoT devices.

Application

Personal Tracking and Wearable Devices

GPS technology in wearable devices, such as smartwatches and fitness trackers, can track personal
health and activity data. The accurate location information can enable people to monitor exercise
routines, sleep patterns, and nutrition, leading to better health outcomes.

Smart Transportation and Fleet Management

GPS technology is widely used in many transportation and logistics applications, such as tracking cargo
shipments and optimizing distribution routes in real-time. Fleet managers can monitor and analyze
vehicle performance, fuel consumption, and driver data. This information helps them to increase
operational efficiency, reduce costs, and improve safety.

Precision Agriculture and Environmental Monitoring

GPS technology is also useful in precision agriculture and environmental monitoring. GPS receivers on
drones, for instance, allow farmers to collect data on crop growth and soil conditions, improving yields
and reducing costs. The technology can also be used to monitor environmental factors such as water
levels and air or water quality, allowing for informed conservation and sustainability practices.

IPv6

Internet Protocol version 6 (IPv6) is also known as Internet Protocol next generation. It also
accommodates more feature to meet the global requirement of growing Internet.

The Limitations of IPv4 for IoT

The explosive growth of IoT has illuminated the inherent constraints of IPv4, the foundational internet
protocol that has underpinned the digital landscape for decades. As billions of devices ranging from
smart appliances and wearable gadgets to industrial sensors and autonomous vehicles seek
connectivity, the available quantity of IPv4 addresses nears depletion. This scarcity not only escalates
the costs associated with acquiring and managing IP addresses but also complicates network
configurations and hampers scalability efforts.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
The protocol’s limited support for Quality of Service (QoS) mechanisms and advanced security protocols
further aggravates vulnerabilities, exposing IoT deployments to potential threats and compromising
data integrity.

QoS methods help ensure that certain bandwidth, latency, jitter etc. are satisfied, allowing for seamless
and reliable communication.

Key Features of IPv6 Relevant to IoT

Vast Address Space

The most salient feature of IPv6 is its expansive address space, characterized by a 128-bit address
format. It can accommodate an astronomical number of unique IP addresses.

Enhanced Security Mechanisms

IoT ecosystem security continues to be a top priority in a time of growing cyber threats. Recognizing
this imperative, IPv6 incorporates a suite of advanced security features

These include built-in support for IPsec (Internet Protocol Security), facilitating end-to-end encryption
and authentication, thereby mitigating risks associated with data interception, tampering, and
unauthorized access.

Simplified Network Configuration

IPv6’s simplified network configuration mechanisms emerge as a pivotal enabler, facilitating seamless
integration and management of heterogeneous IoT ecosystems.

With plug-and-play capabilities, IPv6 simplifies the deployment process, reduces administrative
overheads, and fosters interoperability across disparate IoT platforms and protocols.

To allocate a sufficient number of network address, IPv6 allows 128 bits of IP address separated into 8
sections of 2 bytes each. IPv6 uses hexadecimal numbers and colon (“:”) is used as a delimiter between
the sections.

Example: IPv6 address may be like this:

FA20:B120: 6230:0000:0000: CE12:0006: ABDF

IPv6 Frame Format

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

Version: This field is 4 bits long and it defines the version of the IP packet. The value of it for IPv6 is 6
Traffic Class: The Traffic Class field indicates class or priority of IPv6 packet which is similar to Service
Field in IPv4 packet. It helps routers to handle the traffic based on the priority of the packet. If
congestion occurs on the router, then packets with the least priority will be discarded.
Flow Label: The flow label in IPv6 is a mechanism for identifying a sequence of packets, or flow, that
are sent from a source to a destination. This field is 20 bits long and it is used to allow the source and
destination nodes to set up a pseudo connection with particular properties and requirements.
Payload Length (16-bits)
It is a 16-bit (unsigned integer) field, indicates the total size of the payload which tells routers about
the amount of information a particular packet contains in its payload.
Next Header (8-bits)
Next Header indicates the type of extension header (if present) immediately following the IPv6
header.
Hop Limit (8-bits)
It indicates the maximum number of intermediate nodes IPv6 packet is allowed to travel. Its value gets
decremented by one, by each node that forwards the packet and the packet is discarded if the value
decrements to 0.
Source Address (128-bits)
Source Address is the 128-bit IPv6 address of the original source of the packet.
Destination Address (128-bits)

The destination Address field indicates the IPv6 address of the final destination (in most cases).

Extension Headers
The next Header field of IPv6 fixed header points to the first Extension Header and this first extension
header points to the second extension header and so on. There are be one or more of the six possible
extension headers. Extension headers help network devices like routers and switches process and
direct IPv6 packets. The Authentication and Encapsulating Security Payload Headers are extension
headers that secure IP communication between hosts.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
Comparison between IPv4 and IPv6

6LoWPAN

6LoWPAN stands for IPv6 over Low-Power Wireless Personal Area Networks. It’s a communication
protocol designed to enable small, low-power devices to connect over wireless networks. This
protocol works on a Wireless Personal Area Network. It has very low cost, short-range, low memory
usage, and low bit rate. It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT
devices can now be part of the network, and the information can be transmitted to the outside world
as well. For example, LED Streetlights.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

Basic Requirements of 6LoWPAN


• The device should be having sleep mode in order to support the battery saving.
• Minimal memory requirement.
• Routing overhead should be lowered.
Features of 6LoWPAN
• It is used with IEEE 802.15,.4 in the 2.4 GHz band.
• Outdoor range: ~200 m (maximum)
• Data rate: 200kbps (maximum)
• Maximum number of nodes: ~100
Advantages of 6LoWPAN
• 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
• It delivers low-cost and secure communication in IoT devices.
• It uses IPv6 protocol and so it can be directly routed to cloud platforms.
• It offers one-to-many and many-to-one routing.
• In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN
• It is comparatively less secure than Zigbee.
• It has lesser immunity to interference than that Wi-Fi and Bluetooth.
• Without the mesh topology, it supports a short range.
Applications of 6LoWPAN
• It is a wireless sensor network.
• It is used in home-automation,
• It is used in smart agricultural techniques, and industrial monitoring.
• It is utilised to make IPv6 packet transmission on networks with constrained power and
reliability resources possible.
Security and Interoperability with 6LoWPAN
• Security: 6LoWPAN security is ensured by the AES algorithm, which is a link layer
security, and the transport layer security mechanisms are included as well.
• Interoperability: 6LoWPAN is able to operate with other wireless devices as well which
makes it interoperable in a network.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)


BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]

RPL
RPL stands for Routing Protocol for Low Power and Lossy Networks (LLN) for heterogeneous traffic
networks. LLNs are networks composed of low-power and lossy links, making it difficult for traditional
routing protocols to operate effectively. RPL allows devices within an LLN to communicate with each
other efficiently while also minimizing power consumption. By using RPL, devices can send messages
across multiple nodes in the network without relying on any one specific device as a central hub. This
function helps balance energy consumption and spread-out processing efforts among all devices in
the network, thereby reducing the risk of system overload or failure due to heavy traffic loads.

Features of RPL
• Multipoint-to-point traffic − RPL provides a mechanism for data transmission from multiple
devices inside the LLN to a single destination point.
• Scalability − The protocol is designed to support large-scale networks with low power and lossy
links, making it suitable for various IoT applications.
• Energy efficiency − RPL minimizes energy consumption by choosing the most optimal path and
effectively managing network resources.
• Quality of Service (QoS) − The protocol ensures QoS by providing congestion control
mechanisms and packet delivery reliability.
• Security − RPL includes authentication, confidentiality, integrity protection, and encryption
mechanisms to ensure secure communication within the LLN.
Working of RPL
RPL organizes the network into a Destination Oriented Directed Acyclic Graph (DODAG), which is a
tree-like structure rooted at one or more sink nodes. RPL uses objective functions to determine the best
paths through the network. These functions can optimize for different metrics such as hop count,
energy consumption, or link reliability. ach node in the network has a "rank" that indicates its position
relative to the root. To minimize control message overhead, RPL employs the Trickle algorithm. If a link
fails or becomes unreliable, the protocol can dynamically reorganize the DODAG by selecting alternate
parents or adjusting ranks, allowing the network to recover without significant disruptions.

CoAP

The Constrained Application Protocol (CoAP) is a special web transfer protocol that operates with
constrained nodes and networks. CoAP or Constrained Application Protocol, as the name suggests, is
an application layer protocol that was introduced by the Internet Engineering Task Force in the year
2014. It is a web-based protocol that resembles HTTP. It is also based on the request-response
model. CoAP supports several methods similar to HTTP:
o GET
o POST
o DELETE
o PUT
2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)
BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
The CoAP protocol’s built-in discovery mechanism allows devices to discover resources on other
devices without requiring any prior knowledge of their existence. This is especially useful in IoT
networks, where devices may be constantly joining and leaving the network.
CoAP supports asynchronous message exchanges, which is crucial for IoT networks where devices
may not always be connected or available. With asynchronous message exchanges, a device can send
a request to another device and then continue with other tasks without waiting for a response. The
response can be processed once it arrives, even if delayed.
CoAP offers optional reliability through the use of confirmable messages. When a device sends a
confirmable message, it expects an acknowledgment from the recipient. If no acknowledgment is
received within a certain time, the message is retransmitted.
The CoAP protocol operates over UDP (User Datagram Protocol). In stateless communication, each
request from a client to a server is processed independently, without any knowledge of the previous
requests. CoAP is suitable for real-time applications, as it provides low-latency communication, CoAP
follows a RESTful architecture. CoAP includes support for DTLS (Datagram Transport Layer Security)
which provides security features like encryption, authentication, and integrity protection.

MQTT

MQTT stands for Message Queuing Telemetry Transport. MQTT is a machine-to-machine internet of
things connectivity protocol. It is an extremely lightweight and publish-subscribe messaging transport
protocol.

MQTT Client and Broker


Clients publish messages on different topics to brokers. The broker is the central server that receives
these messages and filters them based on their topics. It then sends these messages to respective
clients that have subscribed to those different topics. The heart of any publish/subscribe protocol is
the MQTT broker. A broker can handle up to thousands of concurrently connected MQTT customers,
depending on how it is implemented.
When a broker and a subscribing client lose contact, the broker will store messages in a buffer and
send them to the subscriber whenever the broker is back to running state. The broker has the right
to cut off communication with subscribers and send them a cached message containing publisher
instructions if the publishing client abruptly disconnects from the broker.
Lightweight: MQTT is considered a lightweight protocol because all its messages have a small code
footprint. Each message consists of a fixed header of 2 bytes, an optional variable header, a message
payload that is limited to 256 megabytes (MB) of information, and a quality of service (QoS) level.
Quality of Service (QoS) Levels: MQTT supports exclusive stages of message delivery warranty,
referred to as Quality of Service (QoS). QoS levels range from 0 to 2, providing various stages of
reliability and message transport guarantees, relying at the utility necessities.
Retained Messages: MQTT lets in agents to store retained messages on topics, making sure that new
subscribers acquire the maximum latest message posted on a subject right now after subscribing. This
characteristic is beneficial for fame updates and configuration settings.
Security: MQTT helps various protection mechanisms, consisting of Transport Layer Security
(TLS) encryption and authentication mechanisms which include username/password and consumer
certificates.
2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)
BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
It provides faster data transmission, like how WhatsApp/messenger provides a faster delivery. It's a
real-time messaging protocol.

Wired Communication
The wired communication is divided into two categories:
Internal Communication:
1. I2C
2. SPI
External Communication
1. Ethernet
2. RS-232
3. RS-485
4. UART
5. USART
6. USB
Ethernet Protocol Architecture

Ethernet is a widely used technology for local area networks (LANs) that enables devices to
communicate with each other by transmitting and receiving data over a wired connection. It operates
at the data link layer (Layer 2) and physical layer (Layer 1) of the OSI model and has evolved to support
high-speed data transfer, making it fundamental to modern networking.

Frames: Ethernet transmits data in small units called frames. Each frame contains a source and
destination MAC address, data payload, and error-checking information (Cyclic Redundancy Check -
2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)
BRAINWARE UNIVERSITY
[ESCD 301] CLASS NOTES [Internet of Things]
CRC).
Media Access Control (MAC): • Every device on an Ethernet network is identified by a unique MAC
address, a 48-bit hardware address assigned to network interface cards (NICs) at the time of manufacture.
The MAC address is used for identifying devices and routing data between them within the network.
Ethernet follows the CSMA/CD (Carrier Sense Multiple Access/Collision Detection) protocol to manage
access to the shared medium. Devices listen for a clear network before sending data to avoid collisions.
If a collision occurs, devices wait for a random period before retransmitting.

Ethernet Standards: Ethernet comes in different standards for varying speeds, such as:
o Ethernet (10 Mbps)
o Fast Ethernet (100 Mbps)
o Gigabit Ethernet (1 Gbps)
o 10 Gigabit Ethernet (10 Gbps)
Physical Layer: Ethernet uses different types of cables, including twisted-pair cables (Cat5, Cat6) for
shorter distances and fiber-optic cables for long-distance communication. The physical layer (PHY) in
Ethernet refers to the hardware responsible for transmitting and receiving raw data over the network
medium. It manages the modulation, encoding, and physical signaling.

Switches and Hubs: Ethernet networks use switches and hubs to manage the flow of data. Switches
intelligently route data to the correct device using MAC address, while hubs broadcast the data to all
connected devices, increasing the chances of collisions in older networks.
Modern Ethernet supports full-duplex communication, allowing data to be sent and received
simultaneously.

2024-25 Prepared by: Faculty of CSE-CSDS Department ( Brainware University, Barasat)

You might also like